
api.openapi.yaml Maven / Gradle / Ivy
Show all versions of okta-sdk-api Show documentation
openapi: 3.0.3
info:
contact:
email: [email protected]
name: Okta Developer Team
url: https://developer.okta.com/
description: Allows customers to easily access the Okta Management APIs
license:
name: Apache-2.0
url: https://www.apache.org/licenses/LICENSE-2.0.html
termsOfService: https://developer.okta.com/terms/
title: Okta Admin Management
version: 2024.08.3
x-logo:
url: logo.svg
backgroundColor: transparent
altText: Okta Developer
externalDocs:
description: Find more info here
url: https://developer.okta.com/docs/reference/core-okta-api/#design-principles
servers:
- url: "https://{yourOktaDomain}"
variables:
yourOktaDomain:
default: subdomain.okta.com
description: "The domain of your organization. This can be a provided subdomain\
\ of an official okta domain (okta.com, oktapreview.com, etc) or one of your\
\ configured custom domains."
tags:
- description: The Agent Pools API provides operation to manage the update settings
of the agents for your organization.
name: AgentPools
x-displayName: Agent Pools
- description: |
This API provides operations to manage API service integration instances in your organization.
For a current list of available API service integrations, see the [Okta Integration Network catalog](https://www.okta.com/integrations/?capability=api).
See [Add an API Service Integration](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-api-service-integration) for corresponding admin instructions using the Admin Console.
If you want to build an API service integration, see [API service integrations in the OIN](https://developer.okta.com/docs/guides/oin-api-service-overview/).
name: ApiServiceIntegrations
x-displayName: API Service Integrations
- description: The API Tokens API provides operations to manage SSWS API tokens for
your organization.
name: ApiToken
x-displayName: API Tokens
- description: |-
The Applications API provides operations to manage apps in your org.
To create a custom app integration instance, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) operation with the schema provided in the request payload.
To create an app instance from the Okta Integration Network (OIN), use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication)
operation with the corresponding OIN app schema in the request body.
name: Application
x-displayName: Applications
- description: |
The Application Connections API provides operations for configuring connections to an app.
Okta supports token-based and OAuth 2.0-based provisioning connections for supported apps.
The following available provisioning connections are supported by the indicated apps:
| Connection | Description | Apps supported |
| -------------------------------- | -------------- | ----------- |
| Token | The provisioning API connection is based on bearer token authentication. | - Okta Org2Org (`okta_org2org`)
- Zscaler 2.0 (`zscalerbyz`)
|
| OAuth 2.0 | The provisioning API connection is based on OAuth 2.0 authentication. | - Google Workspace (`google`)
- Microsoft Office 365 (`office365`)
- Okta Org2Org (`okta_org2org`)
- Slack (`slack`)
- Zoom (`zoomus`)
|
> **Note:** The Okta Org2Org (`okta_org2org`) app isn't available in Okta Developer Edition orgs. If you need to test this feature in your Developer Edition org, contact your Okta account team.
name: ApplicationConnections
x-displayName: Application Connections
- description: |
The Application Features API supports operations to configure app provisioning feature settings.
You must have app provisioning enabled to configure provisioning features. See [Update the default Provisioning Connection](/openapi/okta-management/management/tag/ApplicationConnections/#tag/ApplicationConnections/operation/updateDefaultProvisioningConnectionForApplication).
The following available provisioning features are supported by the indicated apps:
| Feature | Description | Apps supported |
| -------------------- | -------------- | ----------- |
| `USER_PROVISIONING` | Similar to the app **Provisioning** > **To App** setting in the Admin Console, user profiles are pushed from Okta to the third-party app. You can configure rules for creating users, deactivating users, and syncing passwords. | - Google Workspace (`google`)
- Microsoft Office 365 (`office365`)
- Okta Org2Org (`okta_org2org`)
- Slack (`slack`)
- Zoom (`zoomus`)
- Zscaler 2.0 (`zscalerbyz`)
|
| `INBOUND_PROVISIONING` | Similar to the app **Provisioning** > **To Okta** provisioning setting in the Admin Console, user profiles are imported from the third-party app into Okta. You can schedule user import and configure rules for user creation and matching. | - Google Workspace (`google`)
- Microsoft Office 365 (`office365`)
- Okta Org2Org (`okta_org2org`)
- Slack (`slack`)
- Zoom (`zoomus`)
|
> **Note:** The Okta Org2Org (`okta_org2org`) app isn't available in Okta Developer Edition orgs. If you need to test this feature in your Developer Edition org, contact your Okta account team.
name: ApplicationFeatures
x-displayName: Application Features
- description: |
The Application Grants API provides a set of operations to manage scope consent grants for an app.
A scope consent grant represents an app's permission to include specific Okta scopes in OAuth 2.0 Bearer tokens.
If the app doesn't have permission to grant consent for a particular Okta scope, token requests that contain the scope are denied.
name: ApplicationGrants
x-displayName: Application Grants
- description: The Application Groups API provides a set of operations to manage group
assignment for an app.
name: ApplicationGroups
x-displayName: Application Groups
- description: Provides a resource to manage the application instance logo
name: ApplicationLogos
x-displayName: Application Logos
- description: The Application Policies API provides a resource to manage authentication
policies associated with an app.
name: ApplicationPolicies
x-displayName: Application Policies
- description: Provides a Single Sign-On (SSO) resource for an application
name: ApplicationSSO
x-displayName: Application SSO
- description: |
The Application Key Credentials API provides a set of operations to manage an app's key store credentials.
name: ApplicationSSOCredentialKey
x-displayName: Application Key Credentials
- description: |
The Application Client Authentication Credentials API provides a set of operations to manage credentials used for OAuth 2.0 client authentication as described in [Client authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/client-auth/).
name: ApplicationSSOCredentialOAuth2ClientAuth
x-displayName: Application Client Auth Credentials
- description: |
Resource to manage OAuth 2.0 tokens for an app
> **Note:** To configure refresh tokens for an app, see
> [grant_types](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=4/settings/oauthClient/grant_types&t=request)
> and [refresh_token](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=4/settings/oauthClient/refresh_token&t=request).
name: ApplicationTokens
x-displayName: Application Tokens
- description: |
The Application Users API provides operations to manage app users and their assignments.
The object returned from assigning a user to an app is known as the Application User.
You can assign users to apps for:
* SSO only
* SSO and provisioning
name: ApplicationUsers
x-displayName: Application Users
- description: The Attack Protection API provides operations to configure the User
Lockout Settings and the Authenticator Settings in your org to protect against
password abuse.
name: AttackProtection
x-displayName: Attack Protection
- description: |-
The Authenticators Administration API provides operations to configure which Authenticators are available to end users for use when they sign in to applications.
End users are required to use one or more Authenticators based on the security requirements of the authentication policy.
Okta Identity Engine currently supports Authenticators for the following factors:
**Knowledge-based:**
* Password
* Security Question
**Possession-based:**
* Phone (SMS, voice call)
* Email
* WebAuthn
* Duo
* Custom app
name: Authenticator
x-displayName: Authenticators
- description: |-
Authorization Servers generate OAuth 2.0 and OpenID Connect tokens, including access tokens and ID tokens. The Okta Management API gives you the ability to configure and manage Authorization Servers and the security policies that are attached to them.
**Work with the Default Authorization Server**
Okta provides a pre-configured Custom Authorization Server with the name `default`. This Default Authorization Server includes a basic access policy and rule, which you can edit to control access. It allows you to specify `default` instead of the `authorizationServerId` in requests to it:
`https://${yourOktaDomain}/api/v1/authorizationServers/default`
vs
`https://${yourOktaDomain}/api/v1/authorizationServers/${authorizationServerId}` for other Custom Authorization Servers
name: AuthorizationServer
x-displayName: Authorization Servers
- description: "Associated authorization servers allow you to designate a trusted\
\ authorization server that you associate with another authorization server. This\
\ type of association provides a way to configure [token exchange](https://developer.okta.com/docs/guides/set-up-token-exchange/main/#trusted-servers)\
\ between other authorization servers under the same Okta tenant."
name: AuthorizationServerAssoc
x-displayName: Authorization Server Associated Servers
- description: Provides operations to manage custom token claims for the given `authServerId`
and `claimId`
name: AuthorizationServerClaims
x-displayName: Authorization Server Claims
- description: |-
These endpoints allow you to manage tokens issued by an authorization server for a particular client. For example, you can revoke every active refresh token for a specific client. You can also revoke specific tokens or manage tokens at the User level.
Read [Validate access tokens](https://developer.okta.com/docs/guides/validate-access-tokens/dotnet/main/) and [Validate ID tokens](https://developer.okta.com/docs/guides/validate-id-tokens/main/) to understand more about how OAuth 2.0 tokens work.
name: AuthorizationServerClients
x-displayName: Authorization Server Clients
- description: |-
Provides operations to manage [JSON Web Key](https://datatracker.ietf.org/doc/html/rfc7517) credentials for the given `authServerId`.
> **Note:** Looking for how to obtain the jwks_uri for your org or custom authorization server? See the [well-known OpenID metadata endpoint](https://developer.okta.com/docs/api/openapi/okta-oauth/oauth/tag/CustomAS/#tag/CustomAS/operation/getWellKnownOpenIDConfigurationCustomAS) and the [well-known OAuth 2.0 metadata endpoint](https://developer.okta.com/docs/api/openapi/okta-oauth/oauth/tag/CustomAS/#tag/CustomAS/operation/getWellKnownOAuthConfigurationCustomAS).
name: AuthorizationServerKeys
x-displayName: Authorization Server Keys
- description: Provides operations to manage policies for the given `authServerId`.
name: AuthorizationServerPolicies
x-displayName: Authorization Server Policies
- description: "Provides operations to manage policy rules for the given `authServerId`,\
\ `policyId`, and `ruleId`."
name: AuthorizationServerRules
x-displayName: Authorization Server Rules
- description: "Provides operations to manage custom token scopes for the given `authServerId`\
\ and `scopeId`. See [scope properties](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/#scope-properties)."
name: AuthorizationServerScopes
x-displayName: Authorization Server Scopes
- description: The Behavior Rules API provides operations to manage the behavior detection
rules for your organization.
name: Behavior
x-displayName: Behavior Rules
- description: |-
These endpoints allow you to manage Brands, and their metadata, in your orgs. With Brands, you can customize the following:
* [The Okta-hosted sign-in page](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/CustomPages/)
* [The sign-out page](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/CustomPages/)
* [Error pages](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/CustomPages/)
* [Email templates](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/CustomTemplates/)
* [The Okta End-User Dashboard](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Themes/)
> **Note:** Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).
name: Brands
x-displayName: Brands
- description: |-
As an option to increase org security, Okta supports CAPTCHA services to prevent automated sign-in attempts. You can integrate one of two providers: [hCaptcha](https://www.hcaptcha.com/) or [reCAPTCHA v2](https://developers.google.com/recaptcha/docs/invisible).
The vendor implementations supported by Okta are both invisible. They each run risk-analysis software in the background during user sign in to determine the likelihood that the user is a bot. This risk analysis is based on the settings that you configure with the provider that you choose.
Before you configure your org to use CAPTCHA, sign in to the vendor of your choice or sign up for an account. For more details, refer to [CAPTCHA integration](https://help.okta.com/okta_help.htm?type=oie&id=csh-captcha).
name: CAPTCHA
x-displayName: CAPTCHAs
- description: The Custom Domains API provides operations to manage custom domains
for your organization.
name: CustomDomain
x-displayName: Custom Domains
- description: |-
These endpoints allow you to customize the contents of various pages, including:
* The Okta-hosted sign-in page
* Error pages
* The sign-out page
> **Note:** Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).
name: CustomPages
x-displayName: Custom Pages
- description: |-
These endpoints allow you to programmatically manage email customizations.
Okta provides many customizable email templates. For example, the `UserActivation` email template allows users to activate their account. Use email customizations to override a template's default content. See the [list of email templates](https://developer.okta.com/docs/guides/custom-email/main/#use-customizable-email-templates).
Each template has default content that Okta translates to any one of the supported languages. The following settings determine the language for emails sent from Okta to a user, if the user hasn't selected a specific display language:
* The user's locale property value (if specified)
* The org's display language
See [Supported languages](https://developer.okta.com/docs/guides/custom-email/main/#supported-languages).
The following constraints apply to email customizations:
* If an email template has any customizations at all, exactly one of them must be the default (where `isDefault` is `true`). Okta uses the default customization when no other customization applies to the user's language settings.
* Each email template can have only one customization for each supported language.
### Enable other locales
Use the [BCP 47 format](https://www.rfc-editor.org/info/bcp47) to enable more locales than Okta's 27 default languages.
Once you create a customization with the new locale, the locale appears in the Admin Console along with the default-supported locales.
Include `null` in the subject or body of the email customization. Okta replaces `null` with a default value based on the following order of priority:
- An existing default email customization, if one exists
- Okta-provided translated content for the specified language, if one exists
- Okta-provided translated content for the brand locale, if it's set
- Okta-provided content in English
name: CustomTemplates
x-displayName: Custom Email Templates
- description: |-
The Okta Devices API provides a centralized integration platform to fetch and manage device information. Okta administrators can use these APIs to manage workforce identity Device object information.
The Devices API supports the following **Device Operations**:
* Get, Delete Device objects.
* Perform lifecycle transitions on the Device objects.
Device lifecycle is defined as transitions of the Device Status by the associated operations. The Device object follows a predefined lifecycle transition flow. Device Lifecycle operations are idempotent and its calls are synchronous.
The Devices API supports the following **Authorization Schemes**:
* SSWS - [API tokens](https://developer.okta.com/docs/reference/core-okta-api/#authentication)
* Bearer - [OAuth2.0 and OpenID Connect](https://developer.okta.com/docs/concepts/oauth-openid/)
> **Note:** For devices to enroll in Okta and show up in the Devices API, the following actions are required:
> 1. Admins - Enable Okta FastPass. See [Enable FastPass](https://help.okta.com/okta_help.htm?type=oie&id=ext-fp-enable)
> 2. End users with existing mobile Okta Verify enrollments - After you upgrade your org to Okta Identity Engine, direct end users with existing Okta Verify enrollments to use [FastPass](https://help.okta.com/okta_help.htm?type=oie&id=csh-fp-main).
> **Note:** End users with a new enrollment in Okta Verify on an Okta Identity Engine org have a device record created in the device inventory by default.
See [Device Registration](https://help.okta.com/okta_help.htm?type=oie&id=csh-device-registration), [Login Using Okta Verify](https://help.okta.com/okta_help.htm?type=eu&id=ext-ov-user-overview).
name: Device
x-displayName: Devices
- description: The Device Access API provides operations to configure device access
settings.
name: DeviceAccess
x-displayName: Device Access
- description: The Device Assurance Policies API provides operations to manage device
assurance policies in your organization.
name: DeviceAssurance
x-displayName: Device Assurance Policies
- description: |-
> **Note:** Your Okta org needs to have the AD bidirectional group management feature enabled. Contact your Okta account team to enable this feature.
The Directories Integration API provides operations to manage Active Directory objects in a connected on-premises directory through Okta.
name: DirectoriesIntegration
x-displayName: Directories Integration
- description: The Email Customization API provides operations to modify the email
bounce list for your Okta org.
name: EmailCustomization
x-displayName: Email Customization
- description: The Email Domains API provides operations to manage email domains for
your organization.
name: EmailDomain
x-displayName: Email Domains
- description: "The Email Servers API allows you to configure a custom external email\
\ provider to send email notifications. By default, notifications such as the\
\ welcome email or an account recovery email are sent through an Okta-managed\
\ SMTP server. Adding a custom email provider gives you more control over your\
\ email delivery."
name: EmailServer
x-displayName: Email Servers
- description: |-
The Event Hooks API provides operations to manage event hooks for your organization.
For general information on event hooks and how to create and use them, see [Event hooks](https://developer.okta.com/docs/concepts/event-hooks/). The following documentation is only for the management API, which provides a CRUD interface for registering event hooks.
For a step-by-step guide on implementing an example event hook, see the [Event hook](https://developer.okta.com/docs/guides/event-hook-implementation/) guide.
When you create an event hook, you need to specify which events you want to subscribe to. To see the list of event types currently eligible for use in event hooks, use the [Event Types](https://developer.okta.com/docs/reference/api/event-types/#catalog) catalog and search with the parameter `event-hook-eligible`.
name: EventHook
x-displayName: Event Hooks
- description: |-
The Okta Features API provides operations to manage self-service Early Access (EA) and Beta features in your org.
> **Note:** Important background information for this API is available on the [Feature Lifecycle Management](https://developer.okta.com/docs/concepts/feature-lifecycle-management/) page.
name: Feature
x-displayName: Features
- description: The Groups API provides operations to manage Okta Groups and their
user members for your org.
name: Group
x-displayName: Groups
- description: |-
The Group Owners API provides operations to manage owners of Okta Groups for your organization.
> **Note**: This API is only available if you're subscribed to [Okta Identity Governance](https://www.okta.com/products/identity-governance/). Contact your Customer Success Manager or Account Executive for more information.
name: GroupOwner
x-displayName: Group Owners
- description: The Group Rules API provides operations to manage rules for Okta Groups
in your org.
name: GroupRule
x-displayName: Group Rules
- description: |-
The Okta Key Management API provides a CRUD interface for JSON Web Keys (JWK) used with other parts of the application, such as inline hooks. For information on how to create inline hooks, see [inline hooks](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/).
> **Note:** Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).
name: HookKey
x-displayName: Hook Keys
- description: "The Identity Providers API provides operations to manage federations\
\ with external Identity Providers (IdP). For example, your app can support signing\
\ in with credentials from Apple, Facebook, Google, LinkedIn, Microsoft, an enterprise\
\ IdP using SAML 2.0, or an IdP using the OpenID Connect (`OIDC`) protocol."
name: IdentityProvider
x-displayName: Identity Providers
- description: The Identity Provider Keys API provides operations to manage Key Credentials
for Identity Providers.
name: IdentityProviderKeys
x-displayName: Identity Provider Keys
- description: |-
The Identity Provider Signing Keys API provides operations to manage signing Key Credentials and Certificate Signing Requests for Identity Providers.
> **Note:** Okta currently uses the same key for both request signing and the decryption of SAML assertions that the IdP encrypts. Changing your signing key also changes your decryption key.
name: IdentityProviderSigningKeys
x-displayName: Identity Provider Signing Keys
- description: The Identity Provider Users API provides operations to manage Identity
Provider Users.
name: IdentityProviderUsers
x-displayName: Identity Provider Users
- description: The Okta Identity Source API provides a mechanism to synchronize an
HR source (the custom identity source) with Okta user profiles in an org.
name: IdentitySource
x-displayName: Identity Sources
- description: |-
The Inline Hooks API provides operations to manage inline hooks for your organization.
For general information on inline hooks and how to create and use them, see [inline hooks](https://developer.okta.com/docs/concepts/inline-hooks/). The following documentation is only for the management API, which provides a CRUD interface for registering inline hooks.
name: InlineHook
x-displayName: Inline Hooks
- description: |-
Users have relationships to each other, like manager and subordinate or customer and sales representative. You can create users with relationships by using the Linked Objects API to represent the relationship.
1. Create a Linked Object definition such as Manager:Subordinate or Case Worker:Client. These pairs are represented by a `primary` attribute and an `associated` attribute.
2. Link users together to create the relationship between the two. You create a Linked Object value with a single request that links one `primary` and one `associated` user.
For each relationship:
* A user has at most one `primary` link (a user has a single manager), but can have many `associated` links (a user can have many subordinates).
* A user can be the `primary` in one relationship and the `associated` in another.
* A user can be both the `primary` and `associated` in the same relationship.
Okta Expression Language function for [Linked Objects](https://developer.okta.com/docs/reference/okta-expression-language/#linked-object-function) provides access to the details about a linked user.
> **Note:** The Linked Objects feature isn't available for OpenID Connect claims.
## Example usage
Okta allows you to create up to 200 Linked Object definitions. These definitions are one-to-many, for example:
* A manager has many subordinates. Each subordinate has one manager.
* A sales representative has many customers. Each customer has one sales rep.
* A case worker has many clients. Each client has one case worker.
Most organizations have more than one manager or sales representative. You can create the Linked Object definition once, and then assign the `primary` relationship to as many users as you have people in that relationship.
You can assign the `associated` relationship for a single `primary` user to as many users as needed. The `associated` user can be related to only one `primary` per Linked Object definition. But a user can be assigned to more than one Linked Object definition.
For example, assume that you've created one Linked Object definition for manager (`primary`) and for subordinates (`associated`):
* Joe is Frank's manager.
* Bob is Joe's manager, but Jane's subordinate.
* Jane is the CEO, so she reports to herself.
Thus, you can create chains of relationships (Jane > Bob > Joe > Frank) or terminal relationships (Jane is both `primary` and `associated` user).
Then, if you create another Linked Object relationship for scrum team membership, you could assign relationships to the same four users:
* Bob is the scrum lead for the Identity Scrum team.
* Joe and Frank are both contributors to the team.
Bob can be the `primary` for a Manager:Subordinate, an `associated` user for that same Linked Object definition, and also the `primary` for the Scrumlead:Contributor Linked Object definition.
To represent a relationship, create a Linked Object definition that specifies a `primary` (parent) relationship and an `associated` (child) relationship, and then add a link in which the appropriate user is assigned to each side of that link type.
## Links between User Types
If you created multiple User Types (see [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/)), they all share the same Linked Object definitions. For example, if you have separate User Types for employees and contractors, a link could designate an employee as the manager for a contractor, with the contractor being a subordinate of that employee.
## Link definition operations
Link definition operations allow you to manage the creation and removal of the link definitions. If you remove a link definition, links based on that definition are unavailable.
> **Note:** Links reappear if you recreate the definition. However, Okta is likely to change this behavior so that links don't reappear. Don't rely on this behavior in production environments.
name: LinkedObject
x-displayName: Linked Objects
- description: The Log Streaming API provides operations to manage Log Stream configurations
for an org. You can configure up to two Log Stream integrations per org.
name: LogStream
x-displayName: Log Streaming
- description: |-
The Network Zones API provides operations to manage system default and custom zones in your Okta org.
Network Zones are configurable boundaries that you can use to grant or restrict access to resources in your organization.
They're used for two purposes:
* `POLICY`: Network Zones used to guide policy decisions
* `BLOCKLIST`: Network Zones used to deny access from certain IP addresses, locations, Autonomous System Numbers (ASNs), proxy types, or IP service categories before policy evaluation
> **Note:** The Network Zone blocklist applies to all URLs for the org.
See [Network zones](https://help.okta.com/okta_help.htm?id=ext_Security_Network) in the Okta product documentation.
Your Okta org provides the following default system Network Zones that you can modify and use:
* `LegacyIpZone`: The system default IP Network Zone
* `BlockedIpZone`: The system default IP Blocklist Network Zone
* `DefaultEnhancedDynamicZone`: The system default Enhanced Dynamic Network Zone
You can create and use the following custom Network Zones:
* IP Network Zone (`IP`): Allows you to define network perimeters around a set of IPs
* Dynamic Network Zone (`DYNAMIC`): Allows you to define network perimeters around location, IP type, or ASNs
* Enhanced Dynamic Network Zone (`DYNAMIC_V2`): Extends the Dynamic Network Zone and allows you to include or exclude specific locations, ASNs, or IP service categories
> **Notes:**
> * To create multiple Network Zones, you must have Adaptive MFA enabled in your Okta org.
> * Enhanced Dynamic Network Zones is a [self-service Early Access (EA)](/openapi/okta-management/guides/release-lifecycle/#early-access-ea) feature. You must enable **Enhanced Dynamic Network Zones** in your Org settings to access this API. See [Manage Early Access and Beta features](https://help.okta.com/okta_help.htm?id=ext_secur_manage_ea_bata).
name: NetworkZone
x-displayName: Network Zones
- description: The Okta Application Settings API provides operations to manage settings
for Okta apps in your org.
name: OktaApplicationSettings
x-displayName: Okta Application Settings
- description: |-
> **Note:** You need to have the **Platform - Multi-org Deployment** product to enable the **Org Creator API** feature. Contact your Okta account team for more information.
The Org Creator API provides an operation to create Okta orgs (child orgs) based on features from your current org (the parent org). See [Org Creator](https://developer.okta.com/docs/concepts/org-creator/).
name: OrgCreator
x-displayName: Org Creator
- description: The Org Admin Settings API provides operations to manage the admin
settings for your Okta org.
name: OrgSettingAdmin
x-displayName: Org Admin Settings
- description: "The Org Communication Settings API provides operations to manage the\
\ communication settings for your Okta org. For example, opt users in or out of\
\ communication emails."
name: OrgSettingCommunication
x-displayName: Org Communication Settings
- description: The Org Contacts API provides operations to manage the contact types
of your Okta org.
name: OrgSettingContact
x-displayName: Org Contacts
- description: The Org Customization API provides operations to retrieve and modify
custom settings for your Okta org.
name: OrgSettingCustomization
x-displayName: Org Customization
- description: The Org General Settings API provides operations to manage the general
settings of your Okta org.
name: OrgSettingGeneral
x-displayName: Org General Settings
- description: The Org Metadata API provides operation to fetch metadata for your
Okta org.
name: OrgSettingMetadata
x-displayName: Org Metadata
- description: The Org Support Settings API provides operations to manage the support
settings for your Okta org.
name: OrgSettingSupport
x-displayName: Org Support Settings
- description: |-
The Okta Policy API enables an Administrator to perform Policy and Policy Rule operations. The Policy framework is used by Okta to control Rules and settings that govern, among other things, user session lifetime, whether multi-factor authentication is required when logging in, what MFA factors may be employed, password complexity requirements, what types of self-service operations are permitted under various circumstances, and what identity provider to route users to.
Policy settings for a particular Policy type, such as Sign On Policy, consist of one or more Policy objects, each of which contains one or more Policy Rules. Policies and Rules contain conditions that determine whether they are applicable to a particular user at a particular time.
name: Policy
x-displayName: Policies
- description: The Principal Rate Limits API provides operations to manage Principal
Rate Limits for your organization.
name: PrincipalRateLimit
x-displayName: Principal Rate Limits
- description: "The Mappings API provides operations to manage the mapping of Profile\
\ properties between an Okta User and an App User using [Okta Expression Language](https://developer.okta.com/docs/reference/okta-expression-language).\
\ More information on Okta User and App User Profiles can be found in Okta's [User\
\ profiles](https://developer.okta.com/docs/concepts/user-profiles/#what-is-the-okta-universal-directory)."
name: ProfileMapping
x-displayName: Profile Mappings
- description: |-
The Okta Push Providers API provides a centralized integration platform to fetch and manage push provider configurations. Okta administrators can use these APIs to provide their push provider credentials, for example from APNs and FCM, so that Okta can send push notifications to their own custom app authenticator applications.
The Push Providers API supports the following **Authorization Schemes**:
* SSWS - [API tokens](https://developer.okta.com/docs/reference/core-okta-api/#authentication)
* Bearer - [OAuth2.0 and OpenID Connect](https://developer.okta.com/docs/concepts/oauth-openid/)
> **Notes:**
> * Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/reference/core-okta-api/#authentication).
> * You can use the Push Providers API as part of the "Create a custom authenticator" flow. See the [Custom authenticator integration guide](https://developer.okta.com/docs/guides/authenticators-custom-authenticator/android/main/).
name: PushProvider
x-displayName: Push Providers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
- description: The Rate Limit Settings APIs provide operations to manage settings
and configurations surrounding rate limiting in your Okta organization.
name: RateLimitSettings
x-displayName: Rate Limit Settings
- description: The Realms API provides operations to manage realms
name: Realm
x-displayName: Realms
- description: The Realm Assignments API provides operations to manage Realm Assignments
name: RealmAssignment
x-displayName: Realm Assignments
- description: "The Risk Events API provides the ability for third-party risk providers\
\ to send risk events to Okta. See [Third-party risk provider integration](https://developer.okta.com/docs/guides/third-party-risk-integration/)\
\ for guidance on integrating third-party risk providers with Okta."
name: RiskEvent
x-displayName: Risk Events
- description: "The Risk Providers API enables you to manage the Risk Providers within\
\ Okta. See [Third-party risk provider integration](https://developer.okta.com/docs/guides/third-party-risk-integration/)\
\ for guidance on integrating third-party risk providers with Okta."
name: RiskProvider
x-displayName: Risk Providers
- description: The User Role Assignments APIs allow you to assign roles and designate
third-party admin status to Users.
name: RoleAssignmentAUser
x-displayName: User Role Assignments
- description: The Group Role Assignments APIs allow you to assign roles and designate
third-party admin status to Groups.
name: RoleAssignmentBGroup
x-displayName: Group Role Assignments
- description: The Client Role Assignments APIs allow you to assign roles and designate
third-party admin status to public client apps.
name: RoleAssignmentClient
x-displayName: Client Role Assignments
- description: |-
User role targets are a way of limiting the app or group resources for a [standard role](/openapi/okta-management/guides/roles/#standard-roles) that's assigned to an admin User within your org.
You can define admin roles to target Groups, Applications, and Application Instances.
* **Group targets:** Grant an admin permission to manage only a specified Group. For example, an admin role may be assigned to manage only the IT Group.
* **App targets:** Grant an admin permission to manage all instances of an OIN-cataloged app integration. For example, an admin role can manage all customer instances of an OIN-cataloged app, such as Salesforce or Facebook.
* **App instance targets:** Grant an admin permission to manage an instance of an OIN-catalog app. For example, there may be a few Salesforce app instances configured for each sales region of an org. You can configure an admin to manage two Salesforce instances in a specific region and not the other regional Salesforce instances.
> **Note:** You can only use the User Role Targets API with [standard roles](/openapi/okta-management/guides/roles/#standard-roles). You can define specific targets for custom roles with [Resource Set Resources](/openapi/okta-management/management/tag/RoleCResourceSet/). See the [Role Assignments concept](https://developer.okta.com/docs/concepts/role-assignment/).
name: RoleBTargetAdmin
x-displayName: User Role Targets
- description: |-
Group role targets allow you to limit the app or group resources for a [standard role](/openapi/okta-management/guides/roles/#standard-roles) that's assigned to a Group within your org.
You can define admin roles to target Groups, Applications, and Application Instances.
* **Group targets:** Grant an admin permission to manage only a specified Group. For example, an admin role may be assigned to manage only the IT Group.
* **App targets:** Grant an admin permission to manage all instances of an OIN-cataloged app integration. For example, an admin role can manage all customer instances of an OIN-cataloged app, such as Salesforce or Facebook.
* **App instance targets:** Grant an admin permission to manage an instance of an OIN-catalog app. For example, there may be a few Salesforce app instances configured for each sales region of an org. You can configure an admin to manage two Salesforce instances in a specific region and not the other regional Salesforce instances.
> **Note:** You can only use the User Role Targets API with [standard roles](/openapi/okta-management/guides/roles/#standard-roles). You can define specific targets for custom roles with [Resource Set Resources](/openapi/okta-management/management/tag/RoleCResourceSet/). See the [Role Assignments concept](https://developer.okta.com/docs/concepts/role-assignment/).
name: RoleBTargetBGroup
x-displayName: Group Role Targets
- description: |-
Client role targets allow you to limit the app or group resources for a [standard role](/openapi/okta-management/guides/roles/#standard-roles) that's assigned to a client (Application) within your org.
You can define admin roles to target Groups, Applications, and Application Instances.
* **Group targets:** Grant an admin permission to manage only a specified Group. For example, an admin role may be assigned to manage only the IT Group.
* **App targets:** Grant an admin permission to manage all instances of an OIN-cataloged app integration. For example, an admin role can manage all customer instances of an OIN-cataloged app, such as Salesforce or Facebook.
* **App instance targets:** Grant an admin permission to manage an instance of an OIN-catalog app. For example, there may be a few Salesforce app instances configured for each sales region of an org. You can configure an admin to manage two Salesforce instances in a specific region and not the other regional Salesforce instances.
> **Note:** You can only use the User Role Targets API with [standard roles](/openapi/okta-management/guides/roles/#standard-roles). You can define specific targets for custom roles with [Resource Sets](/openapi/okta-management/management/tag/RoleCResourceSet/). See the [Role Assignments concept](https://developer.okta.com/docs/concepts/role-assignment/).
name: RoleBTargetClient
x-displayName: Client Role Targets
- description: "The Resource Sets API provides operations to manage Resource Sets\
\ as a custom set of resources. See [Supported Resources](/openapi/okta-management/guides/roles/#supported-resources)."
name: RoleCResourceSet
x-displayName: Resource Sets
- description: "The Resource Set Resources API provides operations to manage Resources\
\ within a Resource Set. You can add or remove Resources in Resource Sets. See\
\ [Supported Resources](/openapi/okta-management/guides/roles/#supported-resources)."
name: RoleCResourceSetResource
x-displayName: Resource Set Resources
- description: "The Role Resource Set Bindings API provides operations to assign members\
\ to a [Custom Role](/openapi/okta-management/management/tag/RoleECustom/) that\
\ targets resources in a [Resource Set](/openapi/okta-management/management/tag/RoleCResourceSet/).\
\ The returned Role Resource Set Binding is a single unique combination of a principal,\
\ a resource set, and a custom role. You can assign custom roles to admins who\
\ are scoped to the designated resources in a resource set."
name: RoleDResourceSetBinding
x-displayName: Role Resource Set Bindings
- description: "The Role Resource Set Binding Members API provides operations to manage\
\ members in a [Role Resource Set Binding](/openapi/okta-management/management/tag/RoleDResourceSetBinding/)."
name: RoleDResourceSetBindingMember
x-displayName: Role Resource Set Binding Members
- description: The Custom Roles API provides operations to manage custom roles that
limit an admin's access to a subset of permissions and resources.
name: RoleECustom
x-displayName: Custom Roles
- description: The Custom Role Permissions API provides operations to manage the permissions
assigned to a Custom Role.
name: RoleECustomPermission
x-displayName: Custom Role Permissions
- description: |-
> This feature is only available with Identity Threat Protection in Identity Engine.
Okta uses the [Shared Signals Framework (SSF)](https://sharedsignals.guide/) to receive security-related events and other data-subject signals from third-party security vendors. In this scenario, commonly used terms for third-party vendors that send signals are "transmitters", Okta is the "receiver", and the connection between the two entities is referred to as a "stream."
The SSF Receiver API allows you to manage SSF vendor stream configurations between the transmitter and Okta. A stream is configured by [creating a Security Events Provider](/openapi/okta-management/management/tag/SSFReceiver/#tag/SSFReceiver/operation/createSecurityEventsProviderInstance) object in your Okta org. You can create a Security Events Provider object in Okta with a published well-known URL or an issuer-and-JWKS combination.
After the Security Events Provider object is created for a transmitter, the provider can use the [SSF Security Event Tokens](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/SSFSecurityEventToken/) API to publish events to Okta. While the SSF allows ingestion through push and poll-based operations, Okta currently supports only push-based operations.
name: SSFReceiver
x-displayName: SSF Receiver
- description: |-
> This feature is only available with Identity Threat Protection in Identity Engine.
The Shared Signals Framework (SSF) Security Event Tokens API allows third-party security event providers to send Security Event Tokens (SETs) to Okta. The provider must be configured in Okta as a Security Events Provider instance before transmitting a SET to Okta. See [Create a Security Events Provider](/openapi/okta-management/management/tag/SSFReceiver/#tag/SSFReceiver/operation/createSecurityEventsProviderInstance). After the token is verified, any appropriate action is performed upon ingestion.
Okta uses the Shared Signals Framework (SSF) defined by the [OpenID Shared Signals and Events Framework specification](https://openid.net/specs/openid-sse-framework-1_0.html). A risk signal is ingested as a Security Event Token (SET), a type of JSON Web Token (JWT) that must comply with the SET standard: [RFC 8417 - Security Event Token(SET)](https://datatracker.ietf.org/doc/html/rfc8417). The `security.events.provider.receive_event` System Log event is created when a SET is published to Okta successfully.
name: SSFSecurityEventToken
x-displayName: SSF Security Event Tokens
- description: |-
> **Note:** The SSF Transmitter API is a [self-service Early Access (EA)](/openapi/okta-management/guides/release-lifecycle/#early-access-ea) feature. You must enable the **Enable Managed Apple ID federation and provisioning** feature in your Org settings to access this feature. See [Manage Early Access and Beta features](https://help.okta.com/okta_help.htm?id=ext_secur_manage_ea_bata).
Okta uses the [Shared Signals Framework (SSF)](https://sharedsignals.guide) to send security-related events and other data-subject signals to third-party security vendors. In this scenario, commonly used terms for third-party vendors that receive signals are "receivers", Okta is the "transmitter", and the connection between the two entities is referred to as a "stream."
The SSF Transmitter API allows you to manage SSF stream configurations between the receiver that receives signals transmitted by Okta. Okta sends signals in the form of [Security Event Tokens (SETs)](https://datatracker.ietf.org/doc/html/rfc8417) to a third-party SSF receiver. To enable the transmission of signals from Okta, you must create an SSF Stream using the SSF Transmitter API and configure the third-party receiver to accept signals from Okta.
name: SSFTransmitter
x-displayName: SSF Transmitter
- description: |-
The Schemas API provides operations to manage custom User profiles as well as endpoints to discover the structure of the Log Stream configuration.
Okta's [Universal Directory](https://help.okta.com/okta_help.htm?id=ext_About_Universal_Directory) allows administrators to define custom User profiles for Okta Users and Applications.
Okta adopts a subset of [JSON Schema Draft 4](https://tools.ietf.org/html/draft-zyp-json-schema-04) as the schema language to describe and validate extensible User profiles.
For Log Stream Schemas, Okta uses [JSON Schema Draft 2020-12](https://json-schema.org/specification.html).
[JSON Schema](http://json-schema.org/) is a lightweight declarative format for describing the structure, constraints, and validation of JSON documents.
> **Note:** Okta implements only a subset of [JSON Schema Draft 4](https://tools.ietf.org/html/draft-zyp-json-schema-04) and [JSON Schema Draft 2020-12](https://json-schema.org/specification.html). This document describes which parts apply to Okta, and any extensions Okta has made to [JSON Schema Draft 4](https://tools.ietf.org/html/draft-zyp-json-schema-04) and [JSON Schema Draft 2020-12](https://json-schema.org/specification.html).
### Unique Attributes
You can enforce uniqueness for custom properties in Okta user profiles or the Okta group profile, such as an employee identification number. You can declare a maximum of five unique properties for each user type and five unique properties in the Okta group profile. Different user types can have the same or different unique properties (up to the limit of five per type).
Unique properties in Okta user profiles share a single namespace across all [user types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) in an org. If user types A and B both contain the property `ice cream` and you identify it as unique in both profiles, then if a user of type A has the value `chocolate`, no other users of type A or B (or any other user type that declares `ice cream` as unique) can have that value.
Properties that aren't unique also aren't tracked for uniqueness. Suppose the property `candy` is unique in type E and not unique in type F. If a user of type E has the value `caramel` for the `candy` property, no other users of type E can also have the value `caramel`, but any number of users of type F can already have or later be assigned the value `caramel`. Furthermore, because `candy` is not unique in type F, any values users of type F may have are not considered when enforcing uniqueness for users of type E. No matter how many users of type F already have the value `cotton`, it might be assigned to a user of type E as long as no other such user already has that value.
If you attempt to create or update a user with a duplicate value for a custom user property with a uniqueness restriction, the user creation or update operation fails. The user isn't created or updated until you enter a unique value. Similarly, creating or updating a group fails when the request contains a value for a unique custom group property that is duplicated by another group.
`null` values don't enter into the uniqueness calculation. If the unique property isn't also specified as being required, you can also omit the value entirely. Multiple users or groups can omit the property and not violate uniqueness.
To enforce uniqueness for custom properties, you can either add new unique custom properties or update existing custom properties to be unique.
#### Add new unique custom property
You can use the [add property to user profile schema](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateUserProfile) request or the [add property to group profile schema](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateGroupSchema) request to add one or more unique custom user or group properties. Specify `"unique": true` on the properties to be marked as unique. The response shows the properties with `"unique": "UNIQUE_VALIDATED"` and uniqueness is then enforced on those properties.
#### Update existing custom property to be unique
You can use the [update user profile schema property](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateUserProfile) request or the [update group profile schema property](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateGroupSchema) request to mark existing custom user or group properties as unique by specifying `"unique": true` on the properties to be marked as unique.
After the request to mark existing custom properties as unique is submitted, an asynchronous validation check is performed to make sure that there are no existing duplicate entries. If you have a significant number of users or groups, the validation can take some time.
A uniqueness status of `"unique": "PENDING_UNIQUENESS"` indicates that the validation check is still in progress. Use the Universal Directory page in the Admin Console (**Directory** > **Directory Integrations**) to track the status of the validation check. After the validation completes, if you submit a retrieve user schema request or a retreive group schema request, the property's uniqueness status changes to `UNIQUE_VALIDATED` if no duplicate records are found, and uniqueness is then enforced on that property. Otherwise, if duplicate records are found, the `unique` attribute of the schema property isn't shown in the get schema request and uniqueness isn't enforced on the schema property.
#### Update existing unique custom property to be non-unique
You can use the [update user profile schema property](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateUserProfile) request or the [update group profile schema property](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/updateGroupSchema) request to change existing unique custom user or group properties to be non-unique by specifying `"unique": false` on the properties to be changed to non-unique. The response shows the properties without the `unique` attribute and the uniqueness constraint is then removed on those properties.
**Note:** If multiple user types declare a property as unique and you remove the uniqueness constraint on one type, there may be a delay before users of other types that declare the property as unique can be assigned values formerly held by users of the first type.
name: Schema
x-displayName: Schemas
- description: |-
Okta uses a cookie-based authentication mechanism to maintain a user's authentication Session across web requests. The Okta Sessions API provides operations to create and manage authentication Sessions for users in your Okta organization.
>**Notes:**
> * Some browsers block third-party cookies by default, which disrupts Okta functionality in certain flows. See [Mitigate the impact of third-party cookie deprecation](https://help.okta.com/okta_help.htm?type=oie&id=ext-third-party-cookies).
> * The Sessions API doesn't support direct authentication. Direct authentication is supported through the [Authentication API](https://developer.okta.com/docs/reference/api/authn/#authentication-operations) or through OIDC using the [Resource Owner Password flow](https://developer.okta.com/docs/guides/implement-grant-type/ropassword/main/).
### Session cookie
Okta uses an HTTP session cookie to provide access to your Okta organization and applications across web requests for an interactive user agent such as a web browser. A session cookie has an expiration configurable by an administrator for the organization and is valid until the cookie expires or the user closes the Session (logout) or browser application.
### Session token
A [session token](https://developer.okta.com/docs/reference/api/authn/#session-token) is a one-time bearer token that provides proof of authentication and may be redeemed for an interactive SSO session in Okta in a user agent. Session tokens can only be used **once** to establish a Session for a user and are revoked when the token expires.
Okta provides a very rich [Authentication API](https://developer.okta.com/docs/reference/api/authn/) to validate a [user's primary credentials](https://developer.okta.com/docs/reference/api/authn/#primary-authentication) and secondary [MFA factor](https://developer.okta.com/docs/reference/api/authn/#verify-factor). A session token is returned after successful authentication, which can be later exchanged for a session cookie that uses one of the following flows:
- [Retrieve a session cookie by visiting the OpenID Connect Authorization Endpoint](https://developer.okta.com/docs/guides/session-cookie/main/#retrieve-a-session-cookie-through-the-openid-connect-authorization-endpoint)
- [Retrieve a session cookie by visiting a session redirect link](https://developer.okta.com/docs/guides/session-cookie/main/#retrieve-a-session-cookie-by-visiting-a-session-redirect-link)
- [Retrieve a session cookie by visiting an application embed link](https://developer.okta.com/docs/guides/session-cookie/main/#retrieve-a-session-cookie-by-visiting-an-application-embed-link)
>**Note:** **Session tokens** are secrets and should be protected at rest and during transit. A session token for a user is equivalent to having the user's actual credentials.
name: Session
x-displayName: Sessions
- description: The Subscriptions API provides operations to manage email subscription
settings for Okta administrator notifications.
name: Subscription
x-displayName: Subscriptions
- description: |-
The Okta System Log records system events that are related to your organization in order to provide an audit trail that can be used to understand platform activity and to diagnose problems.
The Okta System Log API provides near real-time, read-only access to your organization's system log and is the programmatic counterpart of the [System Log UI](https://help.okta.com/okta_help.htm?id=ext_Reports_SysLog).
The terms "event" and "log event" are often used interchangeably. In the context of this API, an "event" is an occurrence of interest within the system, and a "log" or "log event" is the recorded fact.
The System Log API supports these primary use cases:
* Event data export into a security information and event management system (SIEM)
* System monitoring
* Development debugging
* Event introspection and audit
> **Note:** Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).
name: SystemLog
x-displayName: System Log
- description: |-
The SMS Templates API provides operations to manage custom SMS templates for verification.
> **Note:** Only SMS custom Templates are available through the API.
SMS Templates customize the SMS message that is sent to users. One default SMS Template is provided. All custom Templates must have the variable `${code}` as part of the text. The `${code}` variable is replaced with the actual SMS code when the message is sent. Optionally, you can also use the variable `${org.name}`. If a Template contains `${org.name}`, it is replaced with the organization name before the SMS message is sent.
### SMS Template macros
Only two macros are supported for SMS Templates:
| Type | Description |
| -------------------- | ----------- |
| ${code} | The one-time verification code that's required for a user to sign in. |
| ${org.name} | The Okta org name that the user is trying to authenticate into. |
>**Note:** The length of your SMS message can't exceed 160 characters. If the verification code portion of the message falls outside of the 160-character limit, your message isn't sent.
name: Template
x-displayName: SMS Templates
- description: |-
These endpoints allow you to customize the look and feel of pages and templates, including the following:
* The Okta-hosted sign-in page
* The sign-out page
* Error pages
* Email templates
* The Okta End-User Dashboard
Each new org contains Okta default branding. You can upload your own assets (colors, background image, logo, and favicon) to replace the default assets. Then you can publish these assets directly to your pages and templates.
> **Notes:**
> * Some of the curl code examples on this page include SSWS API token authentication. However, Okta recommends scoped OAuth 2.0 and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0 and OIDC access tokens provide fine-grain control over the bearer's actions on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).
> * Okta optimizes the `primaryColorContrastHex` and `secondaryColorContrastHex` properties for the highest contrast between the font color and the background or button color. To disable or override the contrast auto-detection, update either contrast value with an accepted contrast hex code. Any update disables future automatic optimizations for the contrast hex.
> * Contrast color is used by pages to optimize the opacity of text color when primary or secondary color is used as the background.
name: Themes
x-displayName: Themes
- description: |-
[Okta ThreatInsight](https://help.okta.com/okta_help.htm?id=ext_threatinsight) maintains a
constantly evolving list of IP addresses that consistently exhibit malicious activity.
Authentication requests that are associated with an IP in this list can be logged to the
[System Log](https://help.okta.com/okta_help.htm?id=ext_Reports_SysLog) and blocked.
ThreatInsight also covers non-authentication requests in limited capacity depending on the attack patterns of these malicious IPs.
The ThreatInsight API provides operations to manage your org ThreatInsight configuration.
> **Note:** To prevent abuse, Okta ThreatInsight works in a limited capacity for free trial edition orgs. Please contact Okta support if fully functional Okta ThreatInsight is required.
name: ThreatInsight
x-displayName: ThreatInsight
- description: "The Trusted Origins API provides operations to manage Trusted Origins\
\ and sources.\n\nWhen external URLs are requested during sign-in, sign-out, or\
\ recovery operations, Okta checks those URLs against the allowed list of Trusted\
\ Origins. Trusted Origins also enable browser-based applications to access Okta\
\ APIs from JavaScript (CORS). If the origins aren't specified, the related operation\
\ (redirect or Okta API access) isn't permitted.\n\nYou can also configure Trusted\
\ Origins to allow iFrame embedding of Okta resources, such as Okta sign-in pages\
\ and the Okta End-User Dashboard, within that origin.\n\n> **Notes:** \n> *\
\ This feature is supported for Okta domains only. It isn't currently supported\
\ for custom domains.\n> * Some of the curl code examples on this page include\
\ SSWS API token authentication. However, Okta recommends using scoped OAuth 2.0\
\ and OIDC access tokens to authenticate with Okta management APIs. OAuth 2.0\
\ and OIDC access tokens provide fine-grain control over the bearer's actions\
\ on specific endpoints. See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/)."
name: TrustedOrigin
x-displayName: Trusted Origins
- description: |-
The Okta UI Schema API allows you to control how inputs appear on an enrollment form. The UI Schema API is only available as a part of Okta Identity Engine.
If you're not sure which solution you're using, check the footer on any page of the Admin Console. The version number is appended with E for Identity Engine orgs and C for Classic Engine orgs.
name: UISchema
x-displayName: UI Schema
- description: "The Users API provides operations to manage users in your organization.\n\
> **Note:** Some of the curl code examples on this page include SSWS API token\
\ authentication. However, Okta recommends using scoped OAuth 2.0 and OIDC access\
\ tokens to authenticate with Okta management APIs.\n> OAuth 2.0 and OIDC access\
\ tokens provide fine-grain control over the bearer's actions on specific endpoints.\
\ See [Okta API authentication methods](https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/).\n\
\n### User status\nThe following diagram shows the flow of User status:\n\n\
\n### User creation scenarios\n\n The following table describes the user experience\
\ and expectation of user status and welcome screen, depending on which options\
\ (security question and answer, password, and activate query) are defined during\
\ user creation.\n\n **User creation details and outcomes**\n\n | Security Q\
\ & A | Password | Activate Query Parameter | User Status \
\ | Login Credential | Welcome Screen |\n | ----- \
\ | -------- | ------------------------ | ------------- | \
\ ---------------------- | -------------- |\n | |\
\ | FALSE | `STAGED` | \
\ | |\n | | \
\ | TRUE | `PROVISIONED` or `ACTIVE` | One-Time\
\ Token (Email) or Email | X |\n | X | \
\ | FALSE | `STAGED` | \
\ | |\n | X | |\
\ TRUE | `PROVISIONED` or `ACTIVE` | One-Time Token (Email)\
\ or Email | X |\n | | X | FALSE \
\ | `STAGED` | \
\ | |\n | | X | TRUE \
\ | `ACTIVE` | Password \
\ | X |\n | X | X | FALSE \
\ | `STAGED` | | \
\ |\n | X | X | TRUE \
\ | `ACTIVE` | Password | \
\ |\n\nCreating users with a `FEDERATION` or `SOCIAL` provider sets\
\ the User status to either `ACTIVE` or `STAGED` based on the `activate` query\
\ parameter since these two providers don't support a `password` or `recovery_question`\
\ credential.\n\nMore information about the use cases are in the following sections\
\ and in the examples for [Create a User](/openapi/okta-management/management/tag/User/#tag/User/operation/createUser).\n\
\n#### Create User with Optional Password enabled\n\nWhen Optional Password is\
\ enabled, the User status following User creation can be affected by the enrollment\
\ policy. See [Create an authenticator enrollment policy](https://help.okta.com/okta_help.htm?type=oie&id=ext-create-mfa-policy).\n\
Based on the group memberships that are specified when the User is created, a\
\ password may or may not be required to make the user's status `ACTIVE`.\n\n\
If the enrollment policy that applies to the User (as determined by the groups\
\ assigned to the user) specifies that the Password authenticator is `required`,\
\ then in the case where the User is created without a password, the User is in\
\ the `PROVISIONED` status and\na One-Time Token is sent to the User through email.\
\ If the User is created with a password, then their status is set to ACTIVE,\
\ and they can immediately sign in using their Password authenticator.\n\nIf the\
\ enrollment policy that applies to the groups specified for the newly created\
\ User indicates that password is `optional` or `disabled`, then the Administrator\
\ can't specify a password for the user. Instead, the user status is set to `ACTIVE`\
\ and the User can immediately sign in using their Email authenticator. If policy\
\ permits, and the User so chooses, they can enroll a password after they sign\
\ in.\n\n#### Create User without credentials\n\nCreates a user without a `password`\
\ or `recovery question & answer`\n\nIf appropriate, when the user is activated,\
\ an email is sent to the user with an activation token that the user can use\
\ to complete the activation process.\nThis is the default flow for new user registration\
\ using the administrator UI.\n\n#### Create User with recovery question\n\nCreates\
\ a user without a `password`\n\nWhen the user is activated, an email is sent\
\ to the user with an activation token that can be used to complete the activation\
\ process.\nThis flow is useful if migrating users from an existing user store.\n\
\n#### Create User with password\n\nCreates a user without a `recovery question\
\ & answer`\n\nThe new user is able to sign in after activation with the assigned\
\ password. This flow is common when developing a custom user registration experience.\n\
> **Important:** Do not generate or send a one-time activation token when activating\
\ users with an assigned password. Users should sign in with their assigned password.\n\
\n#### Create User with imported hashed password\n\nCreates a user with a specified\
\ `hashed password`.\n\nThe new user is able to sign in after activation with\
\ the specified password.\nThis flow is common when migrating users from another\
\ data store in cases where we want to allow the users to retain their current\
\ passwords.\n> **Important:** Do not generate or send a one-time activation token\
\ when activating users with an imported password. Users should login with their\
\ imported password.\n\n#### Create User with password import inline hook\n\n\
Creates a user with a `Password Hook` object specifying that a password inline\
\ hook should be used to handle password verification.\n\nThe password inline\
\ hook is triggered to handle verification of the end user's password the first\
\ time the user tries to sign in, with Okta calling the password inline hook to\
\ check that the password the user supplied is valid. If the password is valid,\
\ Okta stores the hash of the password that was provided and can authenticate\
\ the user independently from then on. See [Password import inline hook](https://developer.okta.com/docs/reference/password-hook/)\
\ for more details.\n\nThe new user is able to sign in after activation with the\
\ valid password. This flow supports migrating users from another data store in\
\ cases where we wish to allow the users to retain their current passwords.\n\
> **Important:** Don't generate or send a one-time activation token when activating\
\ users with an password inline hook. Users should sign in with their existing\
\ password to be imported using the password import inline hook.\n\n#### Create\
\ User with Password & Recovery Question\n\nCreates a new user with a `password`\
\ and `recovery question & answer`.\n\nThe new user is able to log in with the\
\ assigned password after activation. This flow is common when developing a custom\
\ user-registration experience.\n> **Important:** Don't generate or send a one-time\
\ activation token when activating users with an assigned password. Users should\
\ login with their assigned password.\n\n#### Create User with Authentication\
\ Provider\n\nCreates a new passwordless user with a `SOCIAL` or `FEDERATION`\
\ authentication provider that must be authenticated via a trusted Identity Provider.\n\
\n#### Create User in Group\n\nCreates a user that is added to the specified groups\
\ upon creation.\n\nUse this in conjunction with other create operations for a\
\ Group Administrator that is scoped to create users only in specified groups.\
\ The request may specify up to 20 group ids. (This limit applies only when\
\ creating a user. The user may later be added to more groups.)\n\n#### Create\
\ User with non-default User Type\nCreates a user with a specified User Type (see\
\ [User Types](https://developer.okta.com/docs/reference/api/user-types)). The\
\ type specification may be included with any of the above Create User operations;\
\ this example demonstrates creating a user without credentials.\nThe User Type\
\ determines which [Schema](/openapi/okta-management/management/tag/Schema/) applies\
\ to that user. After a user has been created, the user can be assigned a different\
\ User Type only by an administrator via a full replacement [PUT operation](https://developer.okta.com/docs/reference/api/user-types/#update-user-type).\n\
\n### Links object\n\nThe Links object specifies link relations. See [`_links`](/openapi/okta-management/management/tag/User/#tag/User/operation/listUsers!c=200&path=_links&t=response).\n\
\n> **Note:** This Links object is different from [Linked Objects](/openapi/okta-management/management/tag/LinkedObject/).\n\
\n#### Individual Users versus collection of Users\n\nFor an individual User result,\
\ the Links object contains a full set of link relations available for that User\
\ as determined by your policies. For a collection of Users, the Links object\
\ contains only the `self` link. Operations that return a collection of Users\
\ include [List all Users](/openapi/okta-management/management/tag/User/#tag/User/operation/listUsers)\
\ and [List all Member Users](openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroupUsers).\n\
\nThe following table shows some links that may be available on a User, as determined\
\ by your policies:\n\n| Link Relation Type | \
\ Description \
\ \
\ |\n|------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n\
|self\t | A self-referential link to this user \
\ \
\ |\n|activate\t \
\ | Lifecycle action to [activate the user](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/activateUser)\
\ |\n|deactivate |\tLifecycle\
\ action to [deactivate the user](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/deactivateUser)\
\ |\n|suspend |\tLifecycle\
\ action to [suspend the user](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/suspendUser)\
\ |\n|unsuspend |\t\
Lifecycle action to [unsuspend the user](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/unsuspendUser)\
\ |\n|resetPassword |\tLifecycle\
\ action to [trigger a password reset](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/resetPassword)\
\ |\n|expirePassword |\t\
Lifecycle action to [expire the user's password](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/expirePassword)\
\ |\n|resetFactors |\tLifecycle\
\ action to [reset all MFA factors](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/resetFactors)\
\ |\n|unlock |\tLifecycle\
\ action to [unlock a locked-out user](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/unlockUser)\
\ |\n|forgotPassword |\t[Resets\
\ a user's password](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/forgotPassword)\
\ by validating the user's recovery credential. |\n|changePassword\
\ |\t[Changes a user's password](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/changePassword)\
\ validating the user's current password |\n|changeRecoveryQuestion\
\ |\t[Changes a user's recovery credential](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/changeRecoveryQuestion)\
\ by validating the user's current password |"
name: User
x-displayName: Users
- description: The User Credentials API provides operations to manage user credentials
in your org.
name: UserCred
x-displayName: User Credentials
- description: |-
The Factors API provides operations to enroll, manage, and verify factors for multifactor authentication (MFA). Generally, authentication involves verifying a different one-time passcode (OTP). Manage both administration and end-user accounts, or verify an individual factor at any time.
Okta supports several different types of Factors:
| Factor Type | Description |
|-----------------------|-------------|
| `call` | Software OTP sent using a voice call to a registered phone number |
| `sms` | Software OTP sent using SMS to a registered phone number |
| `email` | Software OTP sent using email |
| `question` | Additional knowledge-based security question |
| `push` | Out-of-band verification using a push notification to a device and transaction verification with digital signature |
| `token` | Software or hardware OTP sent to a device |
| `token:hardware` | Hardware OTP sent to a device |
| `token:hotp` | Custom [TOTP](https://www.ietf.org/rfc/rfc6238.txt) factor that uses an extension of the HMAC-based one-time passcode (HOTP) algorithm |
| `token:software:totp` | Software time-based one-time passcode (TOTP) |
| `u2f` | Hardware Universal 2nd Factor (U2F) device |
| `web` | HTML inline frame (iframe) for embedding verification from a third party |
| `webauthn` | Hardware WebAuthn device |
| `signed_nonce` | Okta Fastpass (device-bound authentication). This is available for OIE orgs if the org has users that have enrolled with Okta Verify after the org started using OIE. |
name: UserFactor
x-displayName: User Factors
- description: |-
The User Grants API provides operations to manage user consent Grants in your org.
A consent represents a user's explicit permission to allow an app to access resources protected by scopes. Consent grants are different from tokens because a consent can outlast a token, and there can be multiple tokens with varying sets of scopes derived from a single consent. When an application comes back and needs to get a new access token, it may not need to prompt the user for consent if they've already consented to the specified scopes. Consent grants remain valid until the user manually revokes them, or until the user, application, authorization server or scope is deactivated or deleted.
> **Hint:** For all grant operations, you can use `me` instead of the `userId` in an endpoint that contains `/users`, in an active session with no SSWS token (API token). For example: `https://${yourOktaDomain}/api/v1/users/me/grants` returns all the grants for the active session user.
> **Note:** Some browsers have begun blocking third-party cookies by default, disrupting Okta functionality in certain flows. For more information, see [FAQ: How Blocking Third Party Cookies Can Potentially Impact Your Okta Environment](https://support.okta.com/help/s/article/FAQ-How-Blocking-Third-Party-Cookies-Can-Potentially-Impact-Your-Okta-Environment).
name: UserGrant
x-displayName: User Grants
- description: |-
The User Lifecycle API provides lifecycle operations, which are non-idempotent operations that initiate a state transition for a user's status. Some operations are asynchronous while others are synchronous.
The user's current status limits what operations are allowed.
name: UserLifecycle
x-displayName: User Lifecycle
- description: "The User Linked Objects API provides operations to manage User Linked\
\ Objects in your org.\nUse link value operations to assign Users to a relationship,\
\ represented by a pair of `primary` and `associated` links. See also the [Linked\
\ Objects API](/openapi/okta-management/management/tag/LinkedObject/). \n\nFor\
\ these operations, the examples use consistent IDs so that you can follow the\
\ operations more easily:\n* `manager` is the `primary` relationship and is assigned\
\ `00u5t60iloOHN9pBi0h7`\n* `subordinate` is the `associated` relationship and\
\ is assigned to IDs `00u5zex6ztMbOZhF50h7` and `00u1tsf0nQKavLDUh0g5`"
name: UserLinkedObject
x-displayName: User Linked Objects
- description: |-
The User OAuth 2.0 Token Management API provides operations to manage tokens issued by an Authorization Server for a particular User and Client in your org. For example, you can revoke every active refresh token for a User in the context of a specific Client. You can also [revoke specific tokens](https://developer.okta.com/docs/guides/revoke-tokens/main/) or [manage tokens at the authorization server level](/openapi/okta-management/management/tag/AuthorizationServer/).
Read [Validate Access Tokens](https://developer.okta.com/docs/guides/validate-access-tokens/) to understand more about how OAuth 2.0 tokens work.
name: UserOAuth
x-displayName: User OAuth 2.0 Token Management
- description: The User Resources API provides operations related to User resources.
name: UserResources
x-displayName: User Resources
- description: The User Sessions API provides operations to manage User sessions in
your org.
name: UserSessions
x-displayName: User Sessions
- description: The User Types API provides operations to manage User Types.
name: UserType
x-displayName: User Types
- description: The WebAuthn Preregistration API provides a flow to initiate and set
up WebAuthn Preregistration authenticator enrollments through third-party fulfillment
providers.
name: WebAuthnPreregistration
x-displayName: WebAuthn Preregistration
paths:
/.well-known/app-authenticator-configuration:
get:
description: "Retrieves the well-known app authenticator configuration. Includes\
\ an app authenticator's settings, supported methods, and other details."
operationId: getWellKnownAppAuthenticatorConfiguration
parameters:
- description: Filters app authenticator configurations by `oauthClientId`
explode: true
in: query
name: oauthClientId
required: true
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
AuthenticatorConfiguration:
$ref: '#/components/examples/WellKnownAppAuthenticatorConfigurationCustomApp'
schema:
items:
$ref: '#/components/schemas/WellKnownAppAuthenticatorConfiguration'
type: array
description: Success
"400":
content:
application/json:
examples:
MissingRequiredParameter:
$ref: '#/components/examples/ErrorMissingRequiredParameter'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security: []
summary: Retrieve the Well-Known App Authenticator Configuration
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/.well-known/okta-organization:
get:
description: "Retrieves the well-known org metadata, which includes the org\
\ ID, configured custom domains, authentication pipeline, and various other\
\ org settings"
operationId: getWellknownOrgMetadata
responses:
"200":
content:
application/json:
examples:
Identity Engine Org with Custom Domain:
$ref: '#/components/examples/WellKnownOrgMetadataResponseCustomUrlOie'
Classic Org:
$ref: '#/components/examples/WellKnownOrgMetadataResponseClassic'
schema:
$ref: '#/components/schemas/WellKnownOrgMetadata'
description: Success
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security: []
summary: Retrieve the Well-Known Org Metadata
tags:
- OrgSettingMetadata
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/.well-known/ssf-configuration:
get:
description: "Retrieves SSF Transmitter configuration metadata. This includes\
\ all supported endpoints and key information about certain properties of\
\ the Okta org as the transmitter, such as `delivery_methods_supported`, `issuer`,\
\ and `jwks_uri`."
operationId: getWellknownSsfMetadata
responses:
"200":
content:
application/json:
examples:
wellKnownSSFMetadataExample:
$ref: '#/components/examples/wellKnownSSFMetadataExample'
schema:
$ref: '#/components/schemas/WellKnownSSFMetadata'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security: []
summary: Retrieve the SSF Transmitter metadata
tags:
- SSFTransmitter
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/agentPools:
get:
description: Lists all agent pools with pagination support
operationId: listAgentPools
parameters:
- description: Maximum number of AgentPools being returned
explode: true
in: query
name: limitPerPoolType
required: false
schema:
default: 5
type: integer
style: form
- description: Agent type to search for
explode: true
in: query
name: poolType
required: false
schema:
$ref: '#/components/schemas/AgentType'
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/AgentPool'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.read
summary: List all Agent Pools
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates:
get:
description: Lists all agent pool updates
operationId: listAgentPoolsUpdates
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Scope the list only to scheduled or ad-hoc updates. If the parameter
is not provided we will return the whole list of updates.
explode: true
in: query
name: scheduled
required: false
schema:
type: boolean
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/AgentPoolUpdate'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.read
summary: List all Agent Pool updates
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates an Agent pool update \\n For user flow 2 manual update,\
\ starts the update immediately. \\n For user flow 3, schedules the update\
\ based on the configured update window and delay."
operationId: createAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Create an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/settings:
get:
description: Retrieves the current state of the agent pool update instance settings
operationId: getAgentPoolsUpdateSettings
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdateSetting'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.read
summary: Retrieve an Agent Pool update's settings
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates an agent pool update settings
operationId: updateAgentPoolsUpdateSettings
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdateSetting'
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdateSetting'
description: Updated
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Update an Agent Pool update settings
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}:
delete:
description: Deletes Agent pool update
operationId: deleteAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"204":
description: Deleted
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Delete an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves Agent pool update from updateId
operationId: getAgentPoolsUpdateInstance
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.read
summary: Retrieve an Agent Pool update by id
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates Agent pool update and return latest agent pool update
operationId: updateAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Updated
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Update an Agent Pool update by id
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/activate:
post:
description: Activates scheduled Agent pool update
operationId: activateAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Activated
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Activate an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/deactivate:
post:
description: Deactivates scheduled Agent pool update
operationId: deactivateAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Deactivated
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Deactivate an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/pause:
post:
description: Pauses running or queued Agent pool update
operationId: pauseAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Paused
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Pause an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/resume:
post:
description: Resumes running or queued Agent pool update
operationId: resumeAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Resumed
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Resume an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/retry:
post:
description: Retries Agent pool update
operationId: retryAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Retried
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Retry an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/agentPools/{poolId}/updates/{updateId}/stop:
post:
description: Stops Agent pool update
operationId: stopAgentPoolsUpdate
parameters:
- description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
- description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/AgentPoolUpdate'
description: Stopped
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.agentPools.manage
summary: Stop an Agent Pool update
tags:
- AgentPools
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/api-tokens:
get:
description: Lists all the metadata of the active API tokens
operationId: listApiTokens
responses:
"200":
content:
application/json:
examples:
List Tokens:
$ref: '#/components/examples/ApiTokenListMetadataResponse'
schema:
items:
$ref: '#/components/schemas/ApiToken'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apiTokens.read
summary: List all API Token Metadata
tags:
- ApiToken
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/api-tokens/current:
delete:
description: Revokes the API token provided in the Authorization header
operationId: revokeCurrentApiToken
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
summary: Revoke the Current API Token
tags:
- ApiToken
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/api-tokens/{apiTokenId}:
delete:
description: Revokes an API token by `apiTokenId`
operationId: revokeApiToken
parameters:
- description: id of the API Token
explode: false
in: path
name: apiTokenId
required: true
schema:
example: 00Tabcdefg1234567890
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apiTokens.manage
summary: Revoke an API Token
tags:
- ApiToken
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves the metadata for an active API token by `apiTokenId`
operationId: getApiToken
parameters:
- description: id of the API Token
explode: false
in: path
name: apiTokenId
required: true
schema:
example: 00Tabcdefg1234567890
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/ApiTokenMetadataResponse'
schema:
$ref: '#/components/schemas/ApiToken'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apiTokens.read
summary: Retrieve an API Token's Metadata
tags:
- ApiToken
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Upserts an API Token Network Condition by `apiTokenId`
operationId: upsertApiToken
parameters:
- description: id of the API Token
explode: false
in: path
name: apiTokenId
required: true
schema:
example: 00Tabcdefg1234567890
type: string
style: simple
requestBody:
content:
application/json:
example:
name: api_token_name
clientName: client_name
userId: 00uabcdefg1234567890
network:
connection: ANYWHERE
created: 2021-11-09T20:38:10.000Z
schema:
$ref: '#/components/schemas/ApiTokenUpdate'
required: true
responses:
"200":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/ApiTokenMetadataResponse'
schema:
$ref: '#/components/schemas/ApiToken'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apiTokens.manage
summary: Upsert an API Token Network Condition
tags:
- ApiToken
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps:
get:
description: "Lists all apps in the org with pagination. A subset of apps can\
\ be returned that match a supported filter expression or query. The results\
\ are [paginated](/#pagination) according to the `limit` parameter. If there\
\ are multiple pages of results, the header contains a `next` link. Treat\
\ the link as an opaque value (follow it, don't parse it)."
operationId: listApplications
parameters:
- description: Searches for apps with `name` or `label` properties that starts
with the `q` value using the `startsWith` operation
explode: true
in: query
name: q
required: false
schema:
example: Okta
type: string
style: form
- description: "Specifies the [pagination](/#pagination) cursor for the next\
\ page of results. Treat this as an opaque value obtained through the `next`\
\ link relationship."
explode: true
in: query
name: after
required: false
schema:
example: "16278919418571"
type: string
style: form
- description: "Specifies whether to use query optimization. If you specify\
\ `useOptimization=true` in the request query, the response contains a subset\
\ of app instance properties."
explode: true
in: query
name: useOptimization
required: false
schema:
default: false
type: boolean
style: form
- description: Specifies the number of results per page
explode: true
in: query
name: limit
required: false
schema:
default: -1
format: int32
maximum: 200
type: integer
style: form
- description: "Filters apps by `status`, `user.id`, `group.id`, `credentials.signing.kid`\
\ or `name` expression that supports the `eq` operator"
examples:
ActiveStatusEx:
summary: Filter for active apps
value: status eq "ACTIVE"
NameFilterEx:
summary: Filter for apps with `okta_org2org` name
value: name eq "okta_org2org"
CredKidEx:
summary: Filter for apps using a specific key
value: credentials.signing.kid eq "SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-F1bm4"
explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- description: |-
An optional parameter used for link expansion to embed more resources in the response.
Only supports `expand=user/{userId}` and must be used with the `user.id eq "{userId}"` filter query for the same user.
Returns the assigned [Application User](/openapi/okta-management/management/tag/ApplicationUsers/) in the `_embedded` property.
explode: true
in: query
name: expand
required: false
schema:
example: user/0oa1gjh63g214q0Hq0g4
type: string
style: form
- description: "Specifies whether to include non-active, but not deleted apps\
\ in the results"
explode: true
in: query
name: includeNonDeleted
required: false
schema:
default: false
type: boolean
style: form
responses:
"200":
content:
application/json:
examples:
ResponseExample1:
$ref: '#/components/examples/GetApplicationsByUserResponseEx'
ResponseExample2:
$ref: '#/components/examples/GetApplicationsByGroupResponseEx'
ResponseExample3:
$ref: '#/components/examples/GetApplicationsByKeyResponseEx'
ResponseExample4:
$ref: '#/components/examples/GetApplicationsByNameResponseEx'
schema:
items:
$ref: '#/components/schemas/Application'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Applications
tags:
- Application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |
Creates an app instance in your Okta org.
You can either create an OIN app instance or a custom app instance:
* OIN app instances have prescribed `name` (key app definition) and `signOnMode` options. See the [OIN schemas](/openapi/okta-management/management/tag/Application/#tag/Application/schema/GoogleApplication) for the request body.
* For custom app instances, select the [signOnMode](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=0/signOnMode&t=request) that pertains to your app and specify the required parameters in the request body.
operationId: createApplication
parameters:
- description: Executes activation lifecycle operation when creating the app
explode: true
in: query
name: activate
required: false
schema:
default: true
type: boolean
style: form
- explode: false
in: header
name: OktaAccessGateway-Agent
required: false
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
BOOKMARK:
$ref: '#/components/examples/BookmarkEx'
AUTO_LOGIN:
$ref: '#/components/examples/AutoLoginEx'
BASIC_AUTH:
$ref: '#/components/examples/BasicAuthEx'
SECURE_PASSWORD_STORE:
$ref: '#/components/examples/SecurePasswordStoreEx'
WS_FEDERATION:
$ref: '#/components/examples/WSFederationEx'
BROWSER_PLUGIN:
$ref: '#/components/examples/BrowserPluginEx'
BROWSER_PLUGIN_SWA_3FIELD:
$ref: '#/components/examples/BrowserPluginSwa3FieldEx'
SAML_2_0:
$ref: '#/components/examples/Saml2.0Ex'
OPENID_CONNECT:
$ref: '#/components/examples/OpenidConnectEx'
schema:
$ref: '#/components/schemas/Application'
required: true
responses:
"200":
content:
application/json:
examples:
BOOKMARK:
$ref: '#/components/examples/BookmarkAppResponseEx'
AUTO_LOGIN:
$ref: '#/components/examples/AutoLoginAppResponseEx'
BASIC_AUTH:
$ref: '#/components/examples/BasicAuthResponseEx'
SECURE_PASSWORD_STORE:
$ref: '#/components/examples/SecurePasswordStoreResponseEx'
WS_FEDERATION:
$ref: '#/components/examples/WSFederationResponseEx'
BROWSER_PLUGIN:
$ref: '#/components/examples/BrowserPluginResponseEx'
BROWSER_PLUGIN_SWA_3FIELD:
$ref: '#/components/examples/BrowserPluginSwa3FieldResponseEx'
SAML_2_0:
$ref: '#/components/examples/Saml2.0ResponseEx'
OPENID_CONNECT:
$ref: '#/components/examples/OpenidConnectResponseEx'
schema:
$ref: '#/components/schemas/Application'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Create an Application
tags:
- Application
x-codegen-request-body-name: application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/google/{appId}/oauth2/callback: {}
/api/v1/apps/office365/{appId}/oauth2/callback: {}
/api/v1/apps/{appId}:
delete:
description: Deletes an inactive application
operationId: deleteApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Delete an Application
tags:
- Application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an application from your Okta organization by `id`
operationId: getApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: |-
An optional query parameter to return the specified [Application User](/openapi/okta-management/management/tag/ApplicationUsers/) in the `_embedded` property.
Valid value: `expand=user/{userId}`
explode: true
in: query
name: expand
required: false
schema:
example: user/0oa1gjh63g214q0Hq0g4
type: string
style: form
responses:
"200":
content:
application/json:
examples:
RetrieveEx1:
$ref: '#/components/examples/GetApplicationsResponseEx'
schema:
$ref: '#/components/schemas/Application'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an Application
tags:
- Application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Replaces properties for an application
> **Notes:**
> * All required properties must be specified in the request body
> * You can't modify system-assigned properties, such as `id`, `name`, `status`, `created`, and `lastUpdated`. The values for these properties in the PUT request body are ignored.
operationId: replaceApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
BOOKMARK:
$ref: '#/components/examples/BookmarkPutEx'
AUTO_LOGIN:
$ref: '#/components/examples/AutoLoginPutEx'
BASIC_AUTH:
$ref: '#/components/examples/BasicAuthPutEx'
SECURE_PASSWORD_STORE:
$ref: '#/components/examples/SecurePasswordStorePutEx'
WS_FEDERATION:
$ref: '#/components/examples/WSFederationPutEx'
BROWSER_PLUGIN:
$ref: '#/components/examples/BrowserPluginPutEx'
BROWSER_PLUGIN_SWA_3FIELD:
$ref: '#/components/examples/BrowserPluginSwa3FieldPutEx'
SAML_2_0:
$ref: '#/components/examples/Saml2.0PutEx'
OPENID_CONNECT:
$ref: '#/components/examples/OpenidConnectPutEx'
schema:
$ref: '#/components/schemas/Application'
required: true
responses:
"200":
content:
application/json:
examples:
BOOKMARK:
$ref: '#/components/examples/BookmarkPutResponseEx'
AUTO_LOGIN:
$ref: '#/components/examples/AutoLoginPutResponseEx'
BASIC_AUTH:
$ref: '#/components/examples/BasicAuthPutResponseEx'
SECURE_PASSWORD_STORE:
$ref: '#/components/examples/SecurePasswordStorePutResponseEx'
WS_FEDERATION:
$ref: '#/components/examples/WSFederationPutResponseEx'
BROWSER_PLUGIN:
$ref: '#/components/examples/BrowserPluginPutResponseEx'
BROWSER_PLUGIN_SWA_3FIELD:
$ref: '#/components/examples/BrowserPluginSwa3FieldPutResponseEx'
SAML_2_0:
$ref: '#/components/examples/Saml2.0PutResponseEx'
OPENID_CONNECT:
$ref: '#/components/examples/OpenidConnectPutResponseEx'
schema:
$ref: '#/components/schemas/Application'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Replace an Application
tags:
- Application
x-codegen-request-body-name: application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/connections/default:
get:
description: Retrieves the default Provisioning Connection for an app
operationId: getDefaultProvisioningConnectionForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ProvisioningConnectionTokenZscalerEx:
$ref: '#/components/examples/ProvisioningConnectionTokenResponseWithProfileZscalerEx'
ProvisioningConnectionTokenOrg2OrgEx:
$ref: '#/components/examples/ProvisioningConnectionTokenResponseWithProfileOrg2OrgEx'
ProvisioningConnectionOauthO365Ex:
$ref: '#/components/examples/ProvisioningConnectionOauthResponseEx'
schema:
$ref: '#/components/schemas/ProvisioningConnectionResponse'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve the default Provisioning Connection
tags:
- ApplicationConnections
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates the default Provisioning Connection for an app
operationId: updateDefaultProvisioningConnectionForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Activates the Provisioning Connection
explode: true
in: query
name: activate
required: false
schema:
type: boolean
style: form
requestBody:
content:
application/json:
examples:
ProvisioningConnectionTokenZscalerEx:
$ref: '#/components/examples/ProvisioningConnectionTokenRequestEx'
ProvisioningConnectionTokenOrg2OrgEx:
$ref: '#/components/examples/ProvisioningConnectionTokenOrg2OrgRequestEx'
ProvisioningConnectionOauthO365Ex:
$ref: '#/components/examples/ProvisioningConnectionOauthO365RequestEx'
schema:
$ref: '#/components/schemas/updateDefaultProvisioningConnectionForApplication_request'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ProvisioningConnectionResponse'
description: OK
"201":
content:
application/json:
examples:
ProvisioningConnectionTokenZscalerEx:
$ref: '#/components/examples/ProvisioningConnectionTokenResponseWithProfileZscalerEx'
ProvisioningConnectionTokenOrg2OrgEx:
$ref: '#/components/examples/ProvisioningConnectionTokenResponseWithProfileOrg2OrgEx'
ProvisioningConnectionOauthO365Ex:
$ref: '#/components/examples/ProvisioningConnectionOauthResponseEx'
schema:
$ref: '#/components/schemas/ProvisioningConnectionResponse'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Update the default Provisioning Connection
tags:
- ApplicationConnections
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/connections/default/lifecycle/activate:
post:
description: Activates the default Provisioning Connection for an app
operationId: activateDefaultProvisioningConnectionForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Activate the default Provisioning Connection
tags:
- ApplicationConnections
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/connections/default/lifecycle/deactivate:
post:
description: Deactivates the default Provisioning Connection for an app
operationId: deactivateDefaultProvisioningConnectionForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Deactivate the default Provisioning Connection
tags:
- ApplicationConnections
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/csrs:
get:
description: Lists all Certificate Signing Requests for an application
operationId: listCsrsForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Csr'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Certificate Signing Requests
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Generates a new key pair and returns the Certificate Signing Request(CSR) for it. The information in a CSR is used by the Certificate Authority (CA) to verify and create your certificate. It also contains the public key that is included in your certificate.
Returns CSR in `pkcs#10` format if the `Accept` media type is `application/pkcs10` or a CSR object if the `Accept` media type is `application/json`.
> **Note:** The key pair isn't listed in the Key Credentials for the app until it's published.
operationId: generateCsrForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/CsrMetadata'
required: true
responses:
"201":
content:
application/pkcs10:
examples:
CsrPkcs10Response:
$ref: '#/components/examples/AppCsrPkcs10Response'
schema:
$ref: '#/components/schemas/AppCsrPkcs10'
application/json:
examples:
CsrJsonResponse:
$ref: '#/components/examples/AppCsrJsonResponse'
schema:
$ref: '#/components/schemas/Csr'
description: Created
headers:
Content-Type:
description: The Content-Type of the response
examples:
pkcs10Header:
summary: application/pkcs10 Content-Type header
value: application/pkcs10; filename=okta.p10
json:
summary: application/json Content-Type header
value: application/json
explode: false
schema:
type: string
style: simple
Content-Transfer-Encoding:
description: Encoding of the response
example: base64
explode: false
schema:
type: string
style: simple
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Generate a Certificate Signing Request
tags:
- ApplicationSSOCredentialKey
x-codegen-request-body-name: metadata
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
- application/pkcs10
/api/v1/apps/{appId}/credentials/csrs/{csrId}:
delete:
description: Revokes a Certificate Signing Request and deletes the key pair
from the app
operationId: revokeCsrFromApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of the CSR'
explode: false
in: path
name: csrId
required: true
schema:
example: fd7x1h7uTcZFx22rU1f7
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Revoke a Certificate Signing Request
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |-
Retrieves a Certificate Signing Request (CSR) for the app by `csrId`.
Returns a Base64-encoded CSR in DER format if the `Accept` media type is `application/pkcs10` or a CSR object if the `Accept` media type is `application/json`.
operationId: getCsrForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of the CSR'
explode: false
in: path
name: csrId
required: true
schema:
example: fd7x1h7uTcZFx22rU1f7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
CsrJsonResponse:
$ref: '#/components/examples/AppCsrJsonResponse'
schema:
$ref: '#/components/schemas/Csr'
application/pkcs10:
examples:
CsrPkcs10Response:
$ref: '#/components/examples/AppCsrPkcs10Response'
schema:
$ref: '#/components/schemas/AppCsrPkcs10'
description: Success
headers:
Content-Type:
description: The Content-Type of the response
examples:
pkcs10Header:
summary: application/pkcs10 Content-Type header
value: application/pkcs10; filename=okta.p10
json:
summary: application/json Content-Type header
value: application/json
explode: false
schema:
type: string
style: simple
Content-Transfer-Encoding:
description: Encoding of the response
example: base64
explode: false
schema:
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve a Certificate Signing Request
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
- application/pkcs10
/api/v1/apps/{appId}/credentials/csrs/{csrId}/lifecycle/publish:
post:
description: |-
Publishes a Certificate Signing Request (CSR) for the app with a signed X.509 certificate and adds it into the Application Key Credentials.
> **Note:** Publishing a certificate completes the lifecycle of the CSR and it's no longer accessible.
operationId: publishCsrFromApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of the CSR'
explode: false
in: path
name: csrId
required: true
schema:
example: fd7x1h7uTcZFx22rU1f7
type: string
style: simple
requestBody:
content:
application/x-x509-ca-cert:
schema:
description: |-
X.509 certificate in `CER` format.
The client can either post in binary or Base64URL-encoded. If the post is Base64URL-encoded, set the `Content-Transfer-Encoding` header to `base64`.
example: !!binary |-
QGNlcnRpZmljYXRlLnBlbQ==
format: binary
type: string
x-okta-operationId: publishBinaryCerCert
application/pkix-cert:
schema:
description: "X.509 certificate in `DER` format. \nThe client can either\
\ post in binary or Base64URL-encoded. If the post is Base64URL-encoded,\
\ set the `Content-Transfer-Encoding` header to `base64`."
example: !!binary |-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format: binary
type: string
x-okta-operationId: publishBinaryDerCert
application/x-pem-file:
schema:
description: X.509 certificate in `PEM` format
example: !!binary |-
QGNlcnRpZmljYXRlLnBlbQ==
format: binary
type: string
x-okta-operationId: publishBinaryPemCert
required: true
responses:
"201":
content:
application/json:
examples:
PublishCSR:
$ref: '#/components/examples/KeyCredentialExample'
schema:
$ref: '#/components/schemas/JsonWebKey'
description: Created
"400":
content:
application/json:
examples:
ErrorPublishCSRCertDoesNotMatchCSR:
$ref: '#/components/examples/ErrorPublishCSRCertDoesNotMatchCSR'
ErrorPublishCSRCertValidityLessThan90Days:
$ref: '#/components/examples/ErrorPublishCSRCertValidityLessThan90Days'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Publish a Certificate Signing Request
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/x-x509-ca-cert
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/jwks:
get:
description: Lists all JSON Web Keys for an OAuth 2.0 client app
operationId: listJwk
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
OAuthClientJsonWebKeyListResponseExample:
$ref: '#/components/examples/oAuthClientJsonWebKeyListResponse'
schema:
items:
$ref: '#/components/schemas/OAuth2ClientJsonWebKey'
type: array
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all the OAuth 2.0 Client JSON Web Keys
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Adds a new JSON Web Key to the client’s JSON Web Keys. \n> **Note:**\
\ This API doesn't allow you to add a key if the existing key doesn't have\
\ a `kid`. This is also consistent with how the [Dynamic Client Registration](/openapi/okta-oauth/oauth/tag/Client/)\
\ or [Applications](/openapi/okta-management/management/tag/Application/)\
\ APIs behave, as they don't allow the creation of multiple keys without `kids`.\
\ Use the [Replace an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/replaceApplication)\
\ or the [Replace a Client Application](/openapi/okta-oauth/oauth/tag/Client/#tag/Client/operation/replaceClient)\
\ operation to update the JWKS or [Delete an OAuth 2.0 Client JSON Web Key](/openapi/okta-management/management/tag/ApplicationSSOCredentialOAuth2ClientAuth/#tag/ApplicationSSOCredentialOAuth2ClientAuth/operation/deletejwk)\
\ and re-add the key with a `kid`."
operationId: addJwk
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
createOAuth2ClientJsonWebKeyRequestBody:
$ref: '#/components/examples/oAuthClientJsonWebKeyRequest'
schema:
$ref: '#/components/schemas/OAuth2ClientJsonWebKeyRequestBody'
required: true
responses:
"201":
content:
application/json:
examples:
newOAuth2ClientSecretResponse:
$ref: '#/components/examples/oAuthClientJsonWebKey'
schema:
$ref: '#/components/schemas/OAuth2ClientJsonWebKey'
description: Created
"400":
content:
application/json:
examples:
ErrorClientJsonWebKeyNonUniqueKid:
$ref: '#/components/examples/ErrorClientJsonWebKeyNonUniqueKid'
ErrorClientJsonWebKeyDuplicateKid:
$ref: '#/components/examples/ErrorClientJsonWebKeyDuplicateKid'
ErrorClientJsonWebKeyKidLengthTooShort:
$ref: '#/components/examples/ErrorClientJsonWebKeyKidLengthTooShort'
ErrorClientJsonWebKeyTooManyKids:
$ref: '#/components/examples/ErrorClientJsonWebKeyTooManyKids'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Add a JSON Web Key
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/jwks/{keyId}:
delete:
description: Deletes an OAuth 2.0 Client JSON Web Key by `keyId`. You can only
delete an inactive key.
operationId: deletejwk
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
explode: false
in: path
name: keyId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"400":
content:
application/json:
examples:
ErrorDeleteActiveJsonWebKey:
$ref: '#/components/examples/ErrorDeleteActiveJsonWebKey'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Delete an OAuth 2.0 Client JSON Web Key
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an OAuth 2.0 Client JSON Web Key by `keyId`.
operationId: getJwk
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
explode: false
in: path
name: keyId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
OAuthClientJsonWebKeyResponseExample:
$ref: '#/components/examples/oAuthClientJsonWebKey'
schema:
$ref: '#/components/schemas/OAuth2ClientJsonWebKey'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an OAuth 2.0 Client JSON Web Key
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/jwks/{keyId}/lifecycle/activate:
post:
description: Activates an OAuth 2.0 Client JSON Web Key by `keyId`
operationId: activateOAuth2ClientJsonWebKey
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
explode: false
in: path
name: keyId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
activateOAuth2ClientJsonWebKeyResponse:
$ref: '#/components/examples/oAuthClientJsonWebKey'
schema:
$ref: '#/components/schemas/OAuth2ClientJsonWebKey'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Activate an OAuth 2.0 Client JSON Web Key
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/jwks/{keyId}/lifecycle/deactivate:
post:
description: Deactivates an OAuth 2.0 Client JSON Web Key by `keyId`.
operationId: deactivateOAuth2ClientJsonWebKey
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
explode: false
in: path
name: keyId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
deactivateOAuth2ClientJsonWebKeyResponse:
$ref: '#/components/examples/deactivateOAuth2ClientJsonWebKeyResponse'
schema:
$ref: '#/components/schemas/OAuth2ClientJsonWebKey'
description: OK
"400":
content:
application/json:
examples:
ErrorDeactivateTheOnlyKeyWithPrivateKeyJwtAuthMethod:
$ref: '#/components/examples/ErrorDeactivateTheOnlyKeyWithPrivateKeyJwtAuthMethod'
ErrorDeactivateTheOnlyKeyWithRequestObjectSignAlgorithm:
$ref: '#/components/examples/ErrorDeactivateTheOnlyKeyWithRequestObjectSignAlgorithm'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Deactivate an OAuth 2.0 Client JSON Web Key
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/keys:
get:
description: Lists all key credentials for an app
operationId: listApplicationKeys
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListAllKeyCredentialsExample:
$ref: '#/components/examples/ListAllKeyCredentialsExample'
schema:
items:
$ref: '#/components/schemas/JsonWebKey'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Key Credentials
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/keys/generate:
post:
description: |-
Generates a new X.509 certificate for an app key credential
> **Note:** To update an Application with the newly generated key credential, use the [Replace an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/replaceApplication) request with the new [credentials.signing.kid](/openapi/okta-management/management/tag/Application/#tag/Application/operation/replaceApplication!path=4/credentials/signing/kid&t=request) value in the request body. You can provide just the [Signing Credential object](/openapi/okta-management/management/tag/Application/#tag/Application/operation/replaceApplication!path=4/credentials/signing&t=request) instead of the entire [Application Credential object](/openapi/okta-management/management/tag/Application/#tag/Application/operation/replaceApplication!path=4/credentials&t=request).
operationId: generateApplicationKey
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Expiry years of the Application Key Credential
explode: true
in: query
name: validityYears
required: true
schema:
example: 5
type: integer
style: form
responses:
"201":
content:
application/json:
examples:
KeyCredentialExample:
$ref: '#/components/examples/KeyCredentialExample'
schema:
$ref: '#/components/schemas/JsonWebKey'
description: Created
"400":
content:
application/json:
examples:
ErrorKeyCredentialInvalidValidity:
$ref: '#/components/examples/ErrorKeyCredentialInvalidValidity'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Generate a Key Credential
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/keys/{keyId}:
get:
description: Retrieves a specific Application Key Credential by `kid`
operationId: getApplicationKey
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: ID of the Key Credential for the application
explode: false
in: path
name: keyId
required: true
schema:
example: sjP9eiETijYz110VkhHN
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
KeyCredentialExample:
$ref: '#/components/examples/KeyCredentialExample'
schema:
$ref: '#/components/schemas/JsonWebKey'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve a Key Credential
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/keys/{keyId}/clone:
post:
description: |-
Clones an X.509 certificate for an Application Key Credential from a source app to a target app.
For step-by-step instructions to clone a credential, see [Share application key credentials for IdPs across apps](https://developer.okta.com/docs/guides/sharing-cert/main/).
> **Note:** Sharing certificates isn't a recommended security practice.
operationId: cloneApplicationKey
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: ID of the Key Credential for the application
explode: false
in: path
name: keyId
required: true
schema:
example: sjP9eiETijYz110VkhHN
type: string
style: simple
- description: Unique key of the target Application
explode: true
in: query
name: targetAid
required: true
schema:
example: 0ouuytCAJSSDELFTUIDS
type: string
style: form
responses:
"201":
content:
application/json:
examples:
KeyCredentialExample:
$ref: '#/components/examples/KeyCredentialExample'
schema:
$ref: '#/components/schemas/JsonWebKey'
description: Created
"400":
content:
application/json:
examples:
ErrorKeyCredentialCloneDuplicateKey:
$ref: '#/components/examples/ErrorKeyCredentialCloneDuplicateKey'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Clone a Key Credential
tags:
- ApplicationSSOCredentialKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/secrets:
get:
description: Lists all client secrets for an OAuth 2.0 client app
operationId: listOAuth2ClientSecrets
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
OAuthClientSecretListResponseExample:
$ref: '#/components/examples/oAuthClientSecretListResponse'
schema:
items:
$ref: '#/components/schemas/OAuth2ClientSecret'
type: array
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all OAuth 2.0 Client Secrets
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates an OAuth 2.0 Client Secret object with a new active client secret. You can create up to two Secret objects. An error is returned if you attempt to create more than two Secret objects.
> **Note:** This API lets you bring your own secret. If [token_endpoint_auth_method](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=4/credentials/oauthClient/token_endpoint_auth_method&t=request) of the app is `client_secret_jwt`, then the minimum length of `client_secret` is 32 characters. If no secret is specified in the request, Okta adds a new system-generated secret.
operationId: createOAuth2ClientSecret
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
createOAuth2ClientSecretSystemGeneratedRequestBody:
$ref: '#/components/examples/createOAuth2ClientSecretSystemGeneratedRequestBody'
createOAuth2ClientSecretCustomRequestBody:
$ref: '#/components/examples/createOAuth2ClientSecretCustomRequestBody'
schema:
$ref: '#/components/schemas/OAuth2ClientSecretRequestBody'
responses:
"201":
content:
application/json:
examples:
newOAuth2ClientSecretResponse:
$ref: '#/components/examples/oAuth2ClientSecretResponse'
schema:
$ref: '#/components/schemas/OAuth2ClientSecret'
description: Created
"400":
content:
application/json:
examples:
ErrorClientSecretTooLong:
$ref: '#/components/examples/ErrorClientSecretTooLong'
ErrorClientSecretTooShort:
$ref: '#/components/examples/ErrorClientSecretTooShort'
ErrorClientSecretTooShortJWT:
$ref: '#/components/examples/ErrorClientSecretTooShortWithClientSecretJWT'
ErrorClientSecretPrivateKeyJWT:
$ref: '#/components/examples/ErrorClientSecretWithPrivateKeyJWT'
ErrorClientSecretNonAscii:
$ref: '#/components/examples/ErrorClientSecretNonAscii'
ErrorMaxNumberOfSecrets:
$ref: '#/components/examples/ErrorMaxNumberOfSecrets'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Create an OAuth 2.0 Client Secret
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/secrets/{secretId}:
delete:
description: Deletes an OAuth 2.0 Client Secret by `secretId`. You can only
delete an inactive Secret.
operationId: deleteOAuth2ClientSecret
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client Secret
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"400":
content:
application/json:
examples:
ErrorDeleteActiveClientSecret:
$ref: '#/components/examples/ErrorDeleteActiveSecret'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Delete an OAuth 2.0 Client Secret
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an OAuth 2.0 Client Secret by `secretId`
operationId: getOAuth2ClientSecret
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client Secret
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
OAuthClientSecretResponseExample:
$ref: '#/components/examples/oAuth2ClientSecretResponse'
schema:
$ref: '#/components/schemas/OAuth2ClientSecret'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an OAuth 2.0 Client Secret
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/secrets/{secretId}/lifecycle/activate:
post:
description: Activates an OAuth 2.0 Client Secret by `secretId`
operationId: activateOAuth2ClientSecret
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client Secret
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
activateOAuth2ClientSecretResponse:
$ref: '#/components/examples/activateOAuth2ClientSecretResponse'
schema:
$ref: '#/components/schemas/OAuth2ClientSecret'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Activate an OAuth 2.0 Client Secret
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/credentials/secrets/{secretId}/lifecycle/deactivate:
post:
description: Deactivates an OAuth 2.0 Client Secret by `secretId`. You can't
deactivate a secret if it's the only secret of the client.
operationId: deactivateOAuth2ClientSecret
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Unique `id` of the OAuth 2.0 Client Secret
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
deactivateOAuth2ClientSecretResponse:
$ref: '#/components/examples/deactivateOAuth2ClientSecretResponse'
schema:
$ref: '#/components/schemas/OAuth2ClientSecret'
description: OK
"400":
content:
application/json:
examples:
ErrorDeactivateTheOnlyClientSecret:
$ref: '#/components/examples/ErrorDeactivateTheOnlyClientSecret'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Deactivate an OAuth 2.0 Client Secret
tags:
- ApplicationSSOCredentialOAuth2ClientAuth
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/features:
get:
description: |
Lists all features for an app
> **Note:** This request returns an error if provisioning isn't enabled for the app.
> To set up provisioning, see [Update the default Provisioning Connection](/openapi/okta-management/management/tag/ApplicationConnections/#tag/ApplicationConnections/operation/updateDefaultProvisioningConnectionForApplication).
operationId: listFeaturesForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListAppFeatureResponse:
$ref: '#/components/examples/AppFeatureListResponseEx'
schema:
items:
$ref: '#/components/schemas/ApplicationFeature'
type: array
description: Success
"400":
content:
application/json:
examples:
ListAppFeatureAPIValidationFailed:
$ref: '#/components/examples/ErrorAppFeatureAPIValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Features
tags:
- ApplicationFeatures
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/features/{featureName}:
get:
description: Retrieves a Feature object for an app
operationId: getFeatureForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Name of the Feature
explode: false
in: path
name: featureName
required: true
schema:
$ref: '#/components/schemas/ApplicationFeatureType'
style: simple
responses:
"200":
content:
application/json:
examples:
AppFeatureResponse:
$ref: '#/components/examples/AppFeatureResponseEx'
schema:
$ref: '#/components/schemas/ApplicationFeature'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve a Feature
tags:
- ApplicationFeatures
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Updates a Feature object for an app
> **Note:** This endpoint supports partial updates.
operationId: updateFeatureForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Name of the Feature
explode: false
in: path
name: featureName
required: true
schema:
$ref: '#/components/schemas/ApplicationFeatureType'
style: simple
requestBody:
content:
application/json:
examples:
UpdateAppFeatureEx:
$ref: '#/components/examples/UpdateAppFeatureRequestEx'
UpdateInboundProvisioningFeatureEx:
$ref: '#/components/examples/UpdateInboundProvisioningFeatureRequestEx'
schema:
$ref: '#/components/schemas/updateFeatureForApplication_request'
required: true
responses:
"200":
content:
application/json:
examples:
UpdateAppFeatureEx:
$ref: '#/components/examples/UpdateAppFeatureResponseEx'
UpdateInboundProvisioningFeatureEx:
$ref: '#/components/examples/UpdateInboundProvisioningFeatureResponseEx'
schema:
$ref: '#/components/schemas/ApplicationFeature'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Update a Feature
tags:
- ApplicationFeatures
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/grants:
get:
description: Lists all scope consent Grants for the app
operationId: listScopeConsentGrants
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: "An optional parameter to return scope details in the `_embedded`\
\ property. Valid value: `scope`"
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListAppGrantsExample:
$ref: '#/components/examples/ListAppGrantsEx'
schema:
items:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.appGrants.read
summary: List all app Grants
tags:
- ApplicationGrants
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Grants consent for the app to request an OAuth 2.0 Okta scope
operationId: grantConsentToScope
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
AppGrantsExample:
$ref: '#/components/examples/AppGrantsPostEx'
schema:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
required: true
responses:
"201":
content:
application/json:
examples:
AppGrantsExample:
$ref: '#/components/examples/AppGrantsEx'
schema:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.appGrants.manage
summary: Grant consent to scope
tags:
- ApplicationGrants
x-codegen-request-body-name: oAuth2ScopeConsentGrant
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/grants/{grantId}:
delete:
description: Revokes permission for the app to grant the given scope
operationId: revokeScopeConsentGrant
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Grant ID
explode: false
in: path
name: grantId
required: true
schema:
example: iJoqkwx50mrgX4T9LcaH
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.appGrants.manage
summary: Revoke an app Grant
tags:
- ApplicationGrants
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a single scope consent Grant object for the app
operationId: getScopeConsentGrant
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: Grant ID
explode: false
in: path
name: grantId
required: true
schema:
example: iJoqkwx50mrgX4T9LcaH
type: string
style: simple
- description: "An optional parameter to return scope details in the `_embedded`\
\ property. Valid value: `scope`"
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
responses:
"200":
content:
application/json:
examples:
AppGrantsExample:
$ref: '#/components/examples/AppGrantsEx'
schema:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.appGrants.read
summary: Retrieve an app Grant
tags:
- ApplicationGrants
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/groups:
get:
description: Lists all app group assignments
operationId: listApplicationGroupAssignments
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: "Specifies a filter for a list of assigned groups returned based\
\ on their names. The value of `q` is matched against the group `name`.\
\ \nThis filter only supports the `startsWith` operation that matches the\
\ `q` string against the beginning of the [Group name](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups!c=200&path=profile/name&t=response)."
explode: true
in: query
name: q
required: false
schema:
example: test
type: string
style: form
- description: "Specifies the pagination cursor for the `next` page of results.\
\ Treat this as an opaque value obtained through the next link relationship.\
\ See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
example: "16275000448691"
type: string
style: form
- description: |-
Specifies the number of objects to return per page.
If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it).
See [Pagination](/#pagination).
examples:
min:
summary: Minimum limit value
value: 20
hundred:
summary: Sample limit value
value: 100
max:
summary: Maximum limit value
value: 200
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
minimum: 20
type: integer
style: form
- description: "An optional query parameter to return the corresponding assigned\
\ [Group](/openapi/okta-management/management/tag/Group/) or \nthe group\
\ assignment metadata details in the `_embedded` property. "
examples:
group:
summary: Embedded assigned Group
value: group
metadata:
summary: Embedded group assignment metadata
value: metadata
explode: true
in: query
name: expand
required: false
schema:
example: metadata
type: string
style: form
responses:
"200":
content:
application/json:
examples:
listGroupAssignmentsResponseExample:
$ref: '#/components/examples/GroupAssignmentExListResponse'
schema:
items:
$ref: '#/components/schemas/ApplicationGroupAssignment'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Application Groups
tags:
- ApplicationGroups
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/groups/{groupId}:
delete:
description: Unassigns a Group from an app
operationId: unassignApplicationFromGroup
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Unassign an Application Group
tags:
- ApplicationGroups
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an app group assignment
operationId: getApplicationGroupAssignment
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: "An optional query parameter to return the corresponding assigned\
\ [Group](/openapi/okta-management/management/tag/Group/) or \nthe group\
\ assignment metadata details in the `_embedded` property. "
examples:
group:
summary: Embedded assigned Group
value: group
metadata:
summary: Embedded group assignment metadata
value: metadata
explode: true
in: query
name: expand
required: false
schema:
example: group
type: string
style: form
responses:
"200":
content:
application/json:
examples:
getGroupAssignmentResponseExample:
$ref: '#/components/examples/EmbeddedGroupAssignmentSampleResponse'
schema:
$ref: '#/components/schemas/ApplicationGroupAssignment'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an Application Group
tags:
- ApplicationGroups
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
patch:
description: Updates a group assignment to an app
operationId: updateGroupAssignmentToApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
requestBody:
content:
application/json:
examples:
groupAssignmentPatchRequetExample:
$ref: '#/components/examples/GroupAssignmentPatchRequestExample'
schema:
items:
$ref: '#/components/schemas/JsonPatchOperation'
type: array
required: false
responses:
"200":
content:
application/json:
examples:
patchGroupAssignmentResponseExample:
$ref: '#/components/examples/GroupAssignmentPatchResponseExample'
schema:
$ref: '#/components/schemas/ApplicationGroupAssignment'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Update an Application Group
tags:
- ApplicationGroups
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: "Assigns a [Group](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/)\
\ to an app, which in turn assigns the app to each [User](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/)\
\ that belongs to the group. \nThe resulting Application User [scope](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/ApplicationUsers/#tag/ApplicationUsers/operation/listApplicationUsers!c=200&path=scope&t=response)\
\ is `GROUP` since the assignment was from the group membership."
operationId: assignGroupToApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
requestBody:
content:
application/json:
examples:
putGroupAssignmentRequestExample:
$ref: '#/components/examples/GroupAssignmentPutRequestExample'
schema:
$ref: '#/components/schemas/ApplicationGroupAssignment'
required: false
responses:
"200":
content:
application/json:
examples:
putGroupAssignmentResponseExample:
$ref: '#/components/examples/GroupAssignmentPutResponseExample'
schema:
$ref: '#/components/schemas/ApplicationGroupAssignment'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Assign an Application Group
tags:
- ApplicationGroups
x-codegen-request-body-name: applicationGroupAssignment
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/lifecycle/activate:
post:
description: Activates an inactive application
operationId: activateApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Activate an Application
tags:
- Application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/lifecycle/deactivate:
post:
description: Deactivates an active application
operationId: deactivateApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Deactivate an Application
tags:
- Application
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/logo:
post:
description: |
Uploads a logo for the app instance.
If the app already has a logo, this operation replaces the previous logo.
The logo is visible in the Admin Console as an icon for your app instance.
If you have one `appLink` object configured, this logo also appears in the End-User Dashboard as an icon for your app.
> **Note:** If you have multiple `appLink` objects, use the Admin Console to add logos for each app link.
> You can't use the API to add logos for multiple app links.
operationId: uploadApplicationLogo
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
multipart/form-data:
schema:
$ref: '#/components/schemas/uploadApplicationLogo_request'
responses:
"201":
description: Content Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Upload an application Logo
tags:
- ApplicationLogos
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: multipart/form-data
x-accepts:
- application/json
/api/v1/apps/{appId}/policies/{policyId}:
put:
description: |-
Assigns an app to an [authentication policy](/openapi/okta-management/management/tag/Policy/), identified by `policyId`.
If the app was previously assigned to another policy, this operation replaces that assignment with the updated policy identified by `policyId`.
> **Note:** When you [merge duplicate authentication policies](https://help.okta.com/okta_help.htm?type=oie&id=ext-merge-auth-policies),
the policy and mapping CRUD operations may be unavailable during the consolidation. When the consolidation is complete, you receive an email with merged results.
operationId: assignApplicationPolicy
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Assign an Authentication Policy
tags:
- ApplicationPolicies
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/apps/{appId}/sso/saml/metadata:
get:
description: Previews the SSO SAML metadata for an application
operationId: previewSAMLmetadataForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- explode: true
in: query
name: kid
required: true
schema:
type: integer
style: form
responses:
"200":
content:
text/xml:
examples:
previewSAML:
summary: SAML metadata example
value: |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urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
schema:
description: SAML metadata in XML
type: string
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Preview the application SAML metadata
tags:
- ApplicationSSO
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
- text/xml
/api/v1/apps/{appId}/tokens:
delete:
description: "Revokes all OAuth 2.0 refresh tokens for the specified app. Any\
\ access tokens issued with these refresh tokens are also revoked, but access\
\ tokens issued without a refresh token aren't affected."
operationId: revokeOAuth2TokensForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Revoke all Application Tokens
tags:
- ApplicationTokens
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |
Lists all refresh tokens for an app
> **Note:** The results are [paginated](/#pagination) according to the `limit` parameter.
> If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it).
operationId: listOAuth2TokensForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: "An optional parameter to return scope details in the `_embedded`\
\ property. Valid value: `scope`"
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
- description: "Specifies the pagination cursor for the next page of results.\
\ Treat this as an opaque value obtained through the next link relationship.\
\ See [Pagination](/#pagination)."
explode: true
in: query
name: after
required: false
schema:
example: "16275000448691"
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
getOAuth2TokenForApplicationListExample:
$ref: '#/components/examples/OAuth2RefreshTokenResponseListEx'
schema:
items:
$ref: '#/components/schemas/OAuth2RefreshToken'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Application Refresh Tokens
tags:
- ApplicationTokens
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/tokens/{tokenId}:
delete:
description: Revokes the specified token for the specified app
operationId: revokeOAuth2TokenForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Revoke an Application Token
tags:
- ApplicationTokens
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a refresh token for the specified app
operationId: getOAuth2TokenForApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
- description: "An optional parameter to return scope details in the `_embedded`\
\ property. Valid value: `scope`"
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
responses:
"200":
content:
application/json:
examples:
getOAuth2TokenForApplicationExample:
$ref: '#/components/examples/OAuth2RefreshTokenResponseEx'
schema:
$ref: '#/components/schemas/OAuth2RefreshToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an Application Token
tags:
- ApplicationTokens
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/apps/{appId}/users:
get:
description: Lists all assigned users for an app
operationId: listApplicationUsers
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: "Specifies the pagination cursor for the next page of results.\
\ Treat this as an opaque value obtained through the next link relationship.\
\ See [Pagination](/#pagination)."
explode: true
in: query
name: after
required: false
schema:
example: "16275000448691"
type: string
style: form
- description: |
Specifies the number of objects to return per page.
If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it).
See [Pagination](/#pagination).
explode: true
in: query
name: limit
required: false
schema:
default: 50
format: int32
maximum: 500
minimum: 1
type: integer
style: form
- description: |
Specifies a filter for the list of Application Users returned based on their profile attributes.
The value of `q` is matched against the beginning of the following profile attributes: `userName`, `firstName`, `lastName`, and `email`.
This filter only supports the `startsWith` operation that matches the `q` string against the beginning of the attribute values.
> **Note:** For OIDC apps, user profiles don't contain the `firstName` or `lastName` attributes. Therefore, the query only matches against the `userName` or `email` attributes.
explode: true
in: query
name: q
required: false
schema:
example: sam
type: string
style: form
- description: |-
An optional query parameter to return the corresponding [User](/openapi/okta-management/management/tag/User/) object in the `_embedded` property.
Valid value: `user`
explode: true
in: query
name: expand
required: false
schema:
example: user
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListAppUsersExample:
$ref: '#/components/examples/AppUserListEx'
schema:
items:
$ref: '#/components/schemas/AppUser'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: List all Application Users
tags:
- ApplicationUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Assigns a user to an app for:
* SSO only
Assignments to SSO apps typically don't include a user profile.
However, if your SSO app requires a profile but doesn't have provisioning enabled, you can add profile attributes in the request body.
* SSO and provisioning
Assignments to SSO and provisioning apps typically include credentials and an app-specific profile.
Profile mappings defined for the app are applied first before applying any profile properties that are specified in the request body.
> **Notes:**
> * When Universal Directory is enabled, you can only specify profile properties that aren't defined in profile mappings.
> * Omit mapped properties during assignment to minimize assignment errors.
operationId: assignUserToApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
AppUserSSOEx:
$ref: '#/components/examples/AppUserAssignSSORequest'
AppUserProvEx:
$ref: '#/components/examples/AppUserAssignProvRequest'
schema:
$ref: '#/components/schemas/AppUserAssignRequest'
required: true
responses:
"200":
content:
application/json:
examples:
AppUserSSOEx:
$ref: '#/components/examples/AppUserSSOResponse'
AppUserProvEx:
$ref: '#/components/examples/AppUserProvResponse'
schema:
$ref: '#/components/schemas/AppUser'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AppUserProvEx:
$ref: '#/components/examples/ErrorAppUserForbiddenAction'
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Assign an Application User
tags:
- ApplicationUsers
x-codegen-request-body-name: appUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appId}/users/{userId}:
delete:
description: |-
Unassigns a user from an app
For directories like Active Directory and LDAP, they act as the owner of the user's credential with Okta delegating authentication (DelAuth) to that directory.
If this request is successful for a user when DelAuth is enabled, then the user is in a state with no password. You can then reset the user's password.
> **Important:** This is a destructive operation. You can't recover the user's app profile. If the app is enabled for provisioning and configured to deactivate users, the user is also deactivated in the target app.
operationId: unassignUserFromApplication
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00u13okQOVWZJGDOAUVR
type: string
style: simple
- description: Sends a deactivation email to the administrator if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: false
type: boolean
style: form
x-okta-added-version: 1.5.0
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Unassign an Application User
tags:
- ApplicationUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific user assignment for a specific app
operationId: getApplicationUser
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00u13okQOVWZJGDOAUVR
type: string
style: simple
- description: |-
An optional query parameter to return the corresponding [User](/openapi/okta-management/management/tag/User/) object in the `_embedded` property.
Valid value: `user`
explode: true
in: query
name: expand
required: false
schema:
example: user
type: string
style: form
responses:
"200":
content:
application/json:
examples:
GetAppUserExample:
$ref: '#/components/examples/AppUserProvExpandResponse'
schema:
$ref: '#/components/schemas/AppUser'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve an Application User
tags:
- ApplicationUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates the profile or credentials of a user assigned to an app
operationId: updateApplicationUser
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00u13okQOVWZJGDOAUVR
type: string
style: simple
requestBody:
content:
application/json:
examples:
AppUserUpdateCredEx:
$ref: '#/components/examples/AppUserUpdateCredRequest'
AppUserUpdateProfileEx:
$ref: '#/components/examples/AppUserUpdateProfileRequest'
schema:
$ref: '#/components/schemas/AppUserUpdateRequest'
required: true
responses:
"200":
content:
application/json:
examples:
AppUserUpdateCredEx:
$ref: '#/components/examples/AppUserCredUpdateResponse'
AppUserUpdateProfileEx:
$ref: '#/components/examples/AppUserProfUpdateResponse'
schema:
$ref: '#/components/schemas/AppUser'
description: Success
"400":
content:
application/json:
examples:
AppUserUpdateCredEx:
$ref: '#/components/examples/ErrorAppUserUpdateBadRequest'
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AppUserProvEx:
$ref: '#/components/examples/ErrorAppUserForbiddenAction'
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Update an Application User
tags:
- ApplicationUsers
x-codegen-request-body-name: appUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/apps/{appName}/{appId}/oauth2/callback:
post:
description: |
Verifies the OAuth 2.0-based connection as part of the OAuth 2.0 consent flow. The validation of the consent flow is the last step of the provisioning setup for an OAuth 2.0-based connection.
Currently, this operation only supports `office365`,`google`, `zoomus`, and `slack` apps.
operationId: verifyProvisioningConnectionForApplication
parameters:
- explode: false
in: path
name: appName
required: true
schema:
$ref: '#/components/schemas/OAuthProvisioningEnabledApp'
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
- explode: true
in: query
name: code
required: false
schema:
description: Unique string associated with each authentication request
type: string
style: form
- explode: true
in: query
name: state
required: false
schema:
description: A temporary code string that the client exchanges for an access
token
type: string
style: form
responses:
"204":
description: No content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Verify the Provisioning Connection
tags:
- ApplicationConnections
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/authenticators:
get:
description: Lists all authenticators
operationId: listAuthenticators
responses:
"200":
content:
application/json:
examples:
OrgAuthenticatorsEx:
$ref: '#/components/examples/AuthenticatorsResponse'
schema:
items:
$ref: '#/components/schemas/AuthenticatorBase'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.read
summary: List all Authenticators
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates an authenticator
operationId: createAuthenticator
parameters:
- description: Whether to execute the activation lifecycle operation when Okta
creates the authenticator
explode: true
in: query
name: activate
required: false
schema:
default: true
type: boolean
style: form
requestBody:
$ref: '#/components/requestBodies/AuthenticatorRequestBody'
responses:
"200":
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorResponseDuo'
Email:
$ref: '#/components/examples/AuthenticatorResponseEmail'
Password:
$ref: '#/components/examples/AuthenticatorResponsePassword'
Phone:
$ref: '#/components/examples/AuthenticatorResponsePhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseWebAuthn'
SecurityQuestion:
$ref: '#/components/examples/AuthenticatorResponseSecurityQuestion'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Create an Authenticator
tags:
- Authenticator
x-codegen-request-body-name: authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}:
get:
description: Retrieves an authenticator from your Okta organization by `authenticatorId`
operationId: getAuthenticator
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorResponseDuo'
Email:
$ref: '#/components/examples/AuthenticatorResponseEmail'
Password:
$ref: '#/components/examples/AuthenticatorResponsePassword'
Phone:
$ref: '#/components/examples/AuthenticatorResponsePhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseWebAuthn'
SecurityQuestion:
$ref: '#/components/examples/AuthenticatorResponseSecurityQuestion'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.read
summary: Retrieve an Authenticator
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces the properties for an Authenticator identified by `authenticatorId`
operationId: replaceAuthenticator
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
requestBody:
$ref: '#/components/requestBodies/AuthenticatorRequestBody'
responses:
"200":
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorResponseDuo'
Email:
$ref: '#/components/examples/AuthenticatorResponseEmail'
Password:
$ref: '#/components/examples/AuthenticatorResponsePassword'
Phone:
$ref: '#/components/examples/AuthenticatorResponsePhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseWebAuthn'
SecurityQuestion:
$ref: '#/components/examples/AuthenticatorResponseSecurityQuestion'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Replace an Authenticator
tags:
- Authenticator
x-codegen-request-body-name: authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/lifecycle/activate:
post:
description: Activates an authenticator by `authenticatorId`
operationId: activateAuthenticator
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorResponseDuo'
Email:
$ref: '#/components/examples/AuthenticatorResponseEmail'
Password:
$ref: '#/components/examples/AuthenticatorResponsePassword'
Phone:
$ref: '#/components/examples/AuthenticatorResponsePhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseWebAuthn'
SecurityQuestion:
$ref: '#/components/examples/AuthenticatorResponseSecurityQuestion'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Activate an Authenticator
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/lifecycle/deactivate:
post:
description: Deactivates an authenticator by `authenticatorId`
operationId: deactivateAuthenticator
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseInactiveWebAuthn'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Deactivate an Authenticator
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/methods:
get:
description: |-
Lists all Methods of an Authenticator identified by `authenticatorId`
> **Note:**
> The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
> This feature has several limitations when enrolling a security key:
> - Enrollment is currently unsupported on Firefox.
> - Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
> - If prompted during enrollment, users must allow Okta to see the make and model of the security key.
operationId: listAuthenticatorMethods
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Phone:
$ref: '#/components/examples/AuthenticatorMethodPhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorMethodWebauth'
schema:
items:
$ref: '#/components/schemas/AuthenticatorMethodBase'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.read
summary: List all Methods of an Authenticator
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/methods/{methodType}:
get:
description: |-
Retrieves a Method identified by `methodType` of an Authenticator identified by `authenticatorId`
> **Note:**
> The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
> This feature has several limitations when enrolling a security key:
> - Enrollment is currently unsupported on Firefox.
> - Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
> - If prompted during enrollment, users must allow Okta to see the make and model of the security key.
operationId: getAuthenticatorMethod
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
- description: Type of authenticator method
explode: false
in: path
name: methodType
required: true
schema:
$ref: '#/components/schemas/AuthenticatorMethodType'
style: simple
responses:
"200":
content:
application/json:
examples:
sms:
$ref: '#/components/examples/AuthenticatorMethodSms'
voice:
$ref: '#/components/examples/AuthenticatorMethodInactiveVoice'
webAuthn:
$ref: '#/components/examples/AuthenticatorMethodWebauth'
schema:
$ref: '#/components/schemas/AuthenticatorMethodBase'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.read
summary: Retrieve an Authenticator Method
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: |-
Replaces a Method of `methodType` for an Authenticator identified by `authenticatorId`
> **Note:**
> The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
> This feature has several limitations when enrolling a security key:
> - Enrollment is currently unsupported on Firefox.
> - Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
> - If prompted during enrollment, users must allow Okta to see the make and model of the security key.
operationId: replaceAuthenticatorMethod
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
- description: Type of authenticator method
explode: false
in: path
name: methodType
required: true
schema:
$ref: '#/components/schemas/AuthenticatorMethodType'
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AuthenticatorMethodBase'
responses:
"200":
content:
application/json:
examples:
sms:
$ref: '#/components/examples/AuthenticatorMethodSms'
voice:
$ref: '#/components/examples/AuthenticatorMethodInactiveVoice'
webAuthn:
$ref: '#/components/examples/AuthenticatorMethodWebauth'
schema:
$ref: '#/components/schemas/AuthenticatorMethodBase'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Replace an Authenticator Method
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/methods/{methodType}/lifecycle/activate:
post:
description: |-
Activates a Method for an Authenticator identified by `authenticatorId` and `methodType`
> **Note:**
> The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
> This feature has several limitations when enrolling a security key:
> - Enrollment is currently unsupported on Firefox.
> - Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
> - If prompted during enrollment, users must allow Okta to see the make and model of the security key.
operationId: activateAuthenticatorMethod
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
- description: Type of authenticator method
explode: false
in: path
name: methodType
required: true
schema:
$ref: '#/components/schemas/AuthenticatorMethodType'
style: simple
responses:
"200":
content:
application/json:
examples:
sms:
$ref: '#/components/examples/AuthenticatorMethodSms'
webAuthn:
$ref: '#/components/examples/AuthenticatorMethodWebauth'
schema:
$ref: '#/components/schemas/AuthenticatorMethodBase'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Activate an Authenticator Method
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/authenticators/{authenticatorId}/methods/{methodType}/lifecycle/deactivate:
post:
description: |-
Deactivates a Method for an Authenticator identified by `authenticatorId` and `methodType`
> **Note:**
> The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
> This feature has several limitations when enrolling a security key:
> - Enrollment is currently unsupported on Firefox.
> - Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
> - If prompted during enrollment, users must allow Okta to see the make and model of the security key.
operationId: deactivateAuthenticatorMethod
parameters:
- description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
- description: Type of authenticator method
explode: false
in: path
name: methodType
required: true
schema:
$ref: '#/components/schemas/AuthenticatorMethodType'
style: simple
responses:
"200":
content:
application/json:
examples:
voice:
$ref: '#/components/examples/AuthenticatorMethodInactiveVoice'
schema:
$ref: '#/components/schemas/AuthenticatorMethodBase'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authenticators.manage
summary: Deactivate an Authenticator Method
tags:
- Authenticator
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/authorizationServers:
get:
description: Lists all custom authorization servers in the org
operationId: listAuthorizationServers
parameters:
- description: Searches the `name` and `audiences` of authorization servers
for matching values
example: customasone
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: "Specifies the number of authorization server results on a page.\
\ Maximum value: 200"
explode: true
in: query
name: limit
required: false
schema:
default: 200
format: int32
type: integer
style: form
- description: Specifies the pagination cursor for the next page of authorization
servers. Treat as an opaque value and obtain through the next link relationship.
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListAuthServers:
$ref: '#/components/examples/ListAuthServersResponse'
schema:
items:
$ref: '#/components/schemas/AuthorizationServer'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Authorization Servers
tags:
- AuthorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates an authorization server
operationId: createAuthorizationServer
requestBody:
content:
application/json:
examples:
CreateAuthServer:
$ref: '#/components/examples/CreateAuthServerBody'
schema:
$ref: '#/components/schemas/AuthorizationServer'
required: true
responses:
"201":
content:
application/json:
examples:
CreateAuthServer:
$ref: '#/components/examples/CreateAuthServerResponse'
schema:
$ref: '#/components/schemas/AuthorizationServer'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create an Authorization Server
tags:
- AuthorizationServer
x-codegen-request-body-name: authorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}:
delete:
description: Deletes an authorization server
operationId: deleteAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete an Authorization Server
tags:
- AuthorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves an authorization server
operationId: getAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RetrieveAuthServer:
$ref: '#/components/examples/RetrieveAuthServerResponse'
schema:
$ref: '#/components/schemas/AuthorizationServer'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve an Authorization Server
tags:
- AuthorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
put:
description: Replaces an authorization server
operationId: replaceAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceAuthServer:
$ref: '#/components/examples/ReplaceAuthServerBody'
schema:
$ref: '#/components/schemas/AuthorizationServer'
required: true
responses:
"200":
content:
application/json:
examples:
ReplaceAuthServer:
$ref: '#/components/examples/ReplaceAuthServerResponse'
schema:
$ref: '#/components/schemas/AuthorizationServer'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Replace an Authorization Server
tags:
- AuthorizationServer
x-codegen-request-body-name: authorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/associatedServers:
get:
description: Lists all associated Authorization Servers by trusted type for
the given `authServerId`
operationId: listAssociatedServersByTrustedType
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: Searches trusted authorization servers when `true` or searches
untrusted authorization servers when `false`
explode: true
in: query
name: trusted
required: false
schema:
type: boolean
style: form
- description: Searches for the name or audience of the associated authorization
servers
example: customasone
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: Specifies the number of results for a page
explode: true
in: query
name: limit
required: false
schema:
default: 200
format: int32
type: integer
style: form
- description: Specifies the pagination cursor for the next page of the associated
authorization servers
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListAssocAuthServer:
$ref: '#/components/examples/ListAssocAuthServerResponse'
schema:
items:
$ref: '#/components/schemas/AuthorizationServer'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all associated Authorization Servers
tags:
- AuthorizationServerAssoc
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates trusted relationships between the given authorization server
and other authorization servers
operationId: createAssociatedServers
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
examples:
CreateAssocAuthServer:
$ref: '#/components/examples/CreateAssocAuthServerBody'
schema:
$ref: '#/components/schemas/AssociatedServerMediated'
required: true
responses:
"200":
content:
application/json:
examples:
CreateAssocAuthServer:
$ref: '#/components/examples/CreateAssocAuthServerResponse'
schema:
items:
$ref: '#/components/schemas/AuthorizationServer'
type: array
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create an associated Authorization Server
tags:
- AuthorizationServerAssoc
x-codegen-request-body-name: associatedServerMediated
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/associatedServers/{associatedServerId}:
delete:
description: Deletes an associated Authorization Server
operationId: deleteAssociatedServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the associated Authorization Server'
explode: false
in: path
name: associatedServerId
required: true
schema:
example: aus6xt9jKPmCyn6kg0g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete an associated Authorization Server
tags:
- AuthorizationServerAssoc
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/claims:
get:
description: Lists all custom token Claims defined for a specified custom authorization
server
operationId: listOAuth2Claims
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListCustomTokenClaims:
$ref: '#/components/examples/ListCustomTokenClaimsResponse'
schema:
items:
$ref: '#/components/schemas/OAuth2Claim'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all custom token Claims
tags:
- AuthorizationServerClaims
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates a custom token Claim for a custom authorization server
operationId: createOAuth2Claim
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
examples:
CreateCustomTokenClaim:
$ref: '#/components/examples/CreateCustomTokenClaimBody'
schema:
$ref: '#/components/schemas/OAuth2Claim'
required: true
responses:
"201":
content:
application/json:
examples:
CreateCustomTokenClaim:
$ref: '#/components/examples/CreateCustomTokenClaimResponse'
schema:
$ref: '#/components/schemas/OAuth2Claim'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create a custom token Claim
tags:
- AuthorizationServerClaims
x-codegen-request-body-name: oAuth2Claim
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/claims/{claimId}:
delete:
description: Deletes a custom token Claim specified by the `claimId`
operationId: deleteOAuth2Claim
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Claim'
explode: false
in: path
name: claimId
required: true
schema:
example: hNJ3Uk76xLagWkGx5W3N
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete a custom token Claim
tags:
- AuthorizationServerClaims
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves a custom token Claim by the specified `claimId`
operationId: getOAuth2Claim
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Claim'
explode: false
in: path
name: claimId
required: true
schema:
example: hNJ3Uk76xLagWkGx5W3N
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RetrieveCustomTokenClaim:
$ref: '#/components/examples/RetrieveCustomTokenClaimResponse'
schema:
$ref: '#/components/schemas/OAuth2Claim'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve a custom token Claim
tags:
- AuthorizationServerClaims
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
put:
description: Replaces a custom token Claim specified by the `claimId`
operationId: replaceOAuth2Claim
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Claim'
explode: false
in: path
name: claimId
required: true
schema:
example: hNJ3Uk76xLagWkGx5W3N
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceCustomTokenClaim:
$ref: '#/components/examples/ReplaceCustomTokenClaimBody'
schema:
$ref: '#/components/schemas/OAuth2Claim'
required: true
responses:
"200":
content:
application/json:
examples:
ReplaceCustomTokenClaim:
$ref: '#/components/examples/ReplaceCustomTokenClaimResponse'
schema:
$ref: '#/components/schemas/OAuth2Claim'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Replace a custom token Claim
tags:
- AuthorizationServerClaims
x-codegen-request-body-name: oAuth2Claim
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/clients:
get:
description: Lists all Client resources for which the specified authorization
server has tokens
operationId: listOAuth2ClientsForAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListClients:
$ref: '#/components/examples/ListClientsResponse'
schema:
items:
$ref: '#/components/schemas/OAuth2Client'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Client resources for an authorization server
tags:
- AuthorizationServerClients
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/clients/{clientId}/tokens:
delete:
description: Revokes all refresh tokens for a Client
operationId: revokeRefreshTokensForAuthorizationServerAndClient
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Revoke all refresh tokens for a Client
tags:
- AuthorizationServerClients
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Lists all refresh tokens issued by an authorization server for
a specific Client
operationId: listRefreshTokensForAuthorizationServerAndClient
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
- description: Specifies the pagination cursor for the next page of tokens
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: The maximum number of tokens to return (maximum 200)
explode: true
in: query
name: limit
required: false
schema:
default: -1
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ListRefreshTokenClients:
$ref: '#/components/examples/ListRefreshTokensClientsResponse'
schema:
items:
$ref: '#/components/schemas/OAuth2RefreshToken'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all refresh tokens for a Client
tags:
- AuthorizationServerClients
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/clients/{clientId}/tokens/{tokenId}:
delete:
description: Revokes a refresh token for a Client
operationId: revokeRefreshTokenForAuthorizationServerAndClient
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Revoke a refresh token for a Client
tags:
- AuthorizationServerClients
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves a refresh token for a Client
operationId: getRefreshTokenForAuthorizationServerAndClient
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
RetrieveRefreshTokenClient:
$ref: '#/components/examples/RetrieveRefreshTokenClientResponse'
schema:
$ref: '#/components/schemas/OAuth2RefreshToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve a refresh token for a Client
tags:
- AuthorizationServerClients
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/credentials/keys:
get:
description: "Lists all of the current, future, and expired Keys used by the\
\ Custom Authorization Server"
operationId: listAuthorizationServerKeys
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListAuthorizationServerKeys:
$ref: '#/components/examples/ListAuthorizationServerKeys'
schema:
items:
$ref: '#/components/schemas/AuthorizationServerJsonWebKey'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Credential Keys
tags:
- AuthorizationServerKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/credentials/keys/{keyId}:
get:
description: Retrieves an Authorization Server Key specified by the `keyId`
operationId: getAuthorizationServerKey
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the certificate key'
explode: false
in: path
name: keyId
required: true
schema:
example: P7jXpG-LG2ObNgY9C0Mn2uf4InCQTmRZMDCZoVNxdrk
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ActiveAuthorizationServerKey:
$ref: '#/components/examples/ActiveAuthorizationServerKey'
NextAuthorizationServerKey:
$ref: '#/components/examples/NextAuthorizationServerKey'
ExpiredAuthorizationServerKey:
$ref: '#/components/examples/ExpiredAuthorizationServerKey'
schema:
$ref: '#/components/schemas/AuthorizationServerJsonWebKey'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve an Authorization Server Key
tags:
- AuthorizationServerKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/credentials/lifecycle/keyRotate:
post:
description: "Rotates the current Keys for a Custom Authorization Server. If\
\ you rotate Keys, \nthe `ACTIVE` Key becomes the `EXPIRED` Key, the `NEXT`\
\ Key becomes the `ACTIVE` Key, \nand the Custom Authorization Server immediately\
\ begins using the new active \nKey to sign tokens.\n\n> **Note:** Okta rotates\
\ your Keys automatically in `AUTO` mode. You can rotate Keys \nyourself in\
\ either mode. If Keys are rotated manually, you should invalidate any intermediate\
\ cache \nand fetch the Keys again using the Keys endpoint."
operationId: rotateAuthorizationServerKeys
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/JwkUse'
required: true
responses:
"200":
content:
application/json:
examples:
RotateAuthorizationServerKeys:
$ref: '#/components/examples/ListAuthorizationServerKeys'
schema:
items:
$ref: '#/components/schemas/AuthorizationServerJsonWebKey'
type: array
description: Success
"400":
content:
application/json:
examples:
InvalidRotateUse:
$ref: '#/components/examples/InvalidRotateUse'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Rotate all Credential Keys
tags:
- AuthorizationServerKeys
x-codegen-request-body-name: use
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/lifecycle/activate:
post:
description: Activates an authorization server
operationId: activateAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Activate an Authorization Server
tags:
- AuthorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/lifecycle/deactivate:
post:
description: Deactivates an authorization server
operationId: deactivateAuthorizationServer
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Deactivate an Authorization Server
tags:
- AuthorizationServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies:
get:
description: Lists all policies
operationId: listAuthorizationServerPolicies
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListAuthorizationServerPolicies:
$ref: '#/components/examples/ListAuthorizationServerPolicies'
schema:
items:
$ref: '#/components/schemas/AuthorizationServerPolicy'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Policies
tags:
- AuthorizationServerPolicies
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates a policy
operationId: createAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
examples:
CreateAuthorizationServerPolicyRule:
$ref: '#/components/examples/CreateAuthorizationServerPolicyRequest'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicy'
required: true
responses:
"201":
content:
application/json:
examples:
AuthorizationServerPolicy:
$ref: '#/components/examples/AuthorizationServerPolicy'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicy'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create a Policy
tags:
- AuthorizationServerPolicies
x-codegen-request-body-name: policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}:
delete:
description: Deletes a policy
operationId: deleteAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete a Policy
tags:
- AuthorizationServerPolicies
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves a policy
operationId: getAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
AuthorizationServerPolicy:
$ref: '#/components/examples/AuthorizationServerPolicy'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicy'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve a Policy
tags:
- AuthorizationServerPolicies
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
put:
description: Replaces a policy
operationId: replaceAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
UpdateAuthorizationServerPolicyRule:
$ref: '#/components/examples/UpdateAuthorizationServerPolicyRequest'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicy'
required: true
responses:
"200":
content:
application/json:
examples:
AuthorizationServerPolicy:
$ref: '#/components/examples/AuthorizationServerPolicy'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicy'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Replace a Policy
tags:
- AuthorizationServerPolicies
x-codegen-request-body-name: policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/lifecycle/activate:
post:
description: Activates an authorization server policy
operationId: activateAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Activate a Policy
tags:
- AuthorizationServerPolicies
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/lifecycle/deactivate:
post:
description: Deactivates an authorization server policy
operationId: deactivateAuthorizationServerPolicy
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Deactivate a Policy
tags:
- AuthorizationServerPolicies
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules:
get:
description: Lists all policy rules for the specified Custom Authorization Server
and Policy
operationId: listAuthorizationServerPolicyRules
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListAuthorizationServerPolicyRules:
$ref: '#/components/examples/ListAuthorizationServerPolicyRules'
schema:
items:
$ref: '#/components/schemas/AuthorizationServerPolicyRule'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Policy Rules
tags:
- AuthorizationServerRules
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates a policy rule for the specified Custom Authorization Server
and Policy
operationId: createAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
CreateAuthorizationServerPolicyRule:
$ref: '#/components/examples/CreateAuthorizationServerPolicyRuleRequest'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleRequest'
required: true
responses:
"201":
content:
application/json:
examples:
AuthorizationServerPolicyRule:
$ref: '#/components/examples/AuthorizationServerPolicyRule'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicyRule'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create a Policy Rule
tags:
- AuthorizationServerRules
x-codegen-request-body-name: policyRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/{ruleId}:
delete:
description: Deletes a Policy Rule defined in the specified Custom Authorization
Server and Policy
operationId: deleteAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete a Policy Rule
tags:
- AuthorizationServerRules
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves a policy rule by `ruleId`
operationId: getAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
AuthorizationServerPolicyRule:
$ref: '#/components/examples/AuthorizationServerPolicyRule'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicyRule'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve a Policy Rule
tags:
- AuthorizationServerRules
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
put:
description: Replaces the configuration of the Policy Rule defined in the specified
Custom Authorization Server and Policy
operationId: replaceAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
UpdateAuthorizationServerPolicyRule:
$ref: '#/components/examples/UpdateAuthorizationServerPolicyRuleRequest'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleRequest'
required: true
responses:
"200":
content:
application/json:
examples:
AuthorizationServerPolicyRule:
$ref: '#/components/examples/AuthorizationServerPolicyRule'
schema:
$ref: '#/components/schemas/AuthorizationServerPolicyRule'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Replace a Policy Rule
tags:
- AuthorizationServerRules
x-codegen-request-body-name: policyRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/{ruleId}/lifecycle/activate:
post:
description: Activates an authorization server policy rule
operationId: activateAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Activate a Policy Rule
tags:
- AuthorizationServerRules
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate:
post:
description: Deactivates an authorization server policy rule
operationId: deactivateAuthorizationServerPolicyRule
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Deactivate a Policy Rule
tags:
- AuthorizationServerRules
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/scopes:
get:
description: Lists all custom token scopes
operationId: listOAuth2Scopes
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: Searches the `name` of Custom Token Scopes for matching values
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: Filter expression for Custom Token Scopes
explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- description: |-
Specifies the pagination cursor for the next page of scopes.
Treat the after cursor as an opaque value and obtain it through the next link relationship. See [Pagination](https://developer.okta.com/docs/api/#pagination).
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: |-
Specifies the number of objects to return per page.
If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it). See [Pagination](https://developer.okta.com/docs/api/#pagination).
explode: true
in: query
name: limit
required: false
schema:
maximum: 200
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ExampleScopes:
$ref: '#/components/examples/ExampleOAuth2Scopes'
schema:
items:
$ref: '#/components/schemas/OAuth2Scope'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: List all Custom Token Scopes
tags:
- AuthorizationServerScopes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
post:
description: Creates a custom token scope
operationId: createOAuth2Scope
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
requestBody:
content:
application/json:
examples:
CreateOAuth2ScopeRequest:
$ref: '#/components/examples/CreateOAuth2ScopeRequest'
schema:
$ref: '#/components/schemas/OAuth2Scope'
required: true
responses:
"201":
content:
application/json:
examples:
ExampleOAuth2Scope:
$ref: '#/components/examples/ExampleOAuth2Scope'
schema:
$ref: '#/components/schemas/OAuth2Scope'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Create a Custom Token Scope
tags:
- AuthorizationServerScopes
x-codegen-request-body-name: oAuth2Scope
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/authorizationServers/{authServerId}/scopes/{scopeId}:
delete:
description: Deletes a custom token scope
operationId: deleteOAuth2Scope
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Scope'
explode: false
in: path
name: scopeId
required: true
schema:
example: 0TMRpCWXRKFjP7HiPFNM
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Delete a Custom Token Scope
tags:
- AuthorizationServerScopes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
get:
description: Retrieves a custom token scope
operationId: getOAuth2Scope
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Scope'
explode: false
in: path
name: scopeId
required: true
schema:
example: 0TMRpCWXRKFjP7HiPFNM
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ExampleOAuth2Scope:
$ref: '#/components/examples/ExampleOAuth2Scope'
schema:
$ref: '#/components/schemas/OAuth2Scope'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.read
summary: Retrieve a Custom Token Scope
tags:
- AuthorizationServerScopes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-accepts:
- application/json
put:
description: Replaces a custom token scope
operationId: replaceOAuth2Scope
parameters:
- description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
- description: '`id` of Scope'
explode: false
in: path
name: scopeId
required: true
schema:
example: 0TMRpCWXRKFjP7HiPFNM
type: string
style: simple
requestBody:
content:
application/json:
examples:
UpdateOAuth2Scope:
$ref: '#/components/examples/UpdateOAuth2ScopeRequest'
schema:
$ref: '#/components/schemas/OAuth2Scope'
required: true
responses:
"200":
content:
application/json:
examples:
UpdatedOAuth2Scope:
$ref: '#/components/examples/UpdatedOAuth2ScopeResponse'
schema:
$ref: '#/components/schemas/OAuth2Scope'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.authorizationServers.manage
summary: Replace a Custom Token Scope
tags:
- AuthorizationServerScopes
x-codegen-request-body-name: oAuth2Scope
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- API Access Management
x-content-type: application/json
x-accepts:
- application/json
/api/v1/behaviors:
get:
description: Lists all behavior detection rules with pagination support
operationId: listBehaviorDetectionRules
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/BehaviorRule'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.read
summary: List all Behavior Detection Rules
tags:
- Behavior
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a new behavior detection rule
operationId: createBehaviorDetectionRule
requestBody:
content:
application/json:
examples:
BehaviorRuleRequest:
$ref: '#/components/examples/BehaviorRuleRequest'
schema:
$ref: '#/components/schemas/BehaviorRule'
required: true
responses:
"201":
content:
application/json:
examples:
BehaviorRuleReSponse:
$ref: '#/components/examples/BehaviorRuleResponse'
schema:
$ref: '#/components/schemas/BehaviorRule'
description: Created
"400":
content:
application/json:
examples:
API Validation Failed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.manage
summary: Create a Behavior Detection Rule
tags:
- Behavior
x-codegen-request-body-name: rule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/behaviors/{behaviorId}:
delete:
description: Deletes a Behavior Detection Rule by `behaviorId`
operationId: deleteBehaviorDetectionRule
parameters:
- description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
Resource Not Found:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.manage
summary: Delete a Behavior Detection Rule
tags:
- Behavior
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Behavior Detection Rule by `behaviorId`
operationId: getBehaviorDetectionRule
parameters:
- description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/BehaviorRule'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
Resource Not Found:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.read
summary: Retrieve a Behavior Detection Rule
tags:
- Behavior
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces a Behavior Detection Rule by `behaviorId`
operationId: replaceBehaviorDetectionRule
parameters:
- description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
requestBody:
content:
application/json:
examples:
BehaviorRuleRequest:
$ref: '#/components/examples/BehaviorRuleRequest'
schema:
$ref: '#/components/schemas/BehaviorRule'
required: true
responses:
"200":
content:
application/json:
examples:
BehaviorRuleReSponse:
$ref: '#/components/examples/BehaviorRuleResponse'
schema:
$ref: '#/components/schemas/BehaviorRule'
description: Created
"400":
content:
application/json:
examples:
API Validation Failed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
Resource Not Found:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.manage
summary: Replace a Behavior Detection Rule
tags:
- Behavior
x-codegen-request-body-name: rule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/behaviors/{behaviorId}/lifecycle/activate:
post:
description: Activates a behavior detection rule
operationId: activateBehaviorDetectionRule
parameters:
- description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
BehaviorRuleReSponse:
$ref: '#/components/examples/BehaviorRuleResponse'
schema:
$ref: '#/components/schemas/BehaviorRule'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.manage
summary: Activate a Behavior Detection Rule
tags:
- Behavior
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/behaviors/{behaviorId}/lifecycle/deactivate:
post:
description: Deactivates a behavior detection rule
operationId: deactivateBehaviorDetectionRule
parameters:
- description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
BehaviorRuleReSponse:
$ref: '#/components/examples/BehaviorRuleResponse'
schema:
$ref: '#/components/schemas/BehaviorRule'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.behaviors.manage
summary: Deactivate a Behavior Detection Rule
tags:
- Behavior
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands:
get:
description: Lists all the brands in your org
operationId: listBrands
parameters:
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- themes
- domains
- emailDomain
type: string
type: array
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: Searches the records for matching value
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Get brands response:
$ref: '#/components/examples/ListBrandsResponse'
schema:
items:
$ref: '#/components/schemas/BrandWithEmbedded'
type: array
description: Successfully returned the list of brands
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: List all Brands
tags:
- Brands
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a new brand in your org
operationId: createBrand
requestBody:
content:
application/json:
examples:
Create brand request:
$ref: '#/components/examples/CreateBrandRequest'
schema:
$ref: '#/components/schemas/CreateBrandRequest'
responses:
"201":
content:
application/json:
examples:
Create brand response:
$ref: '#/components/examples/CreateBrandResponse'
schema:
$ref: '#/components/schemas/Brand'
description: Successfully created the brand
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"409":
content:
application/json:
examples:
Cannot create brand with the same name:
$ref: '#/components/examples/ErrorCreateBrandExists'
schema:
$ref: '#/components/schemas/Error'
description: Could not create the new brand because same name already exist.
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Create a Brand
tags:
- Brands
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}:
delete:
description: Deletes a brand by `brandId`
operationId: deleteBrand
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"204":
description: Successfully deleted the brand.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Cannot delete default brand:
$ref: '#/components/examples/ErrorDeleteDefaultBrand'
Cannot delete brand associated with a domain:
$ref: '#/components/examples/ErrorDeleteBrandAssociatedWithDomain'
schema:
$ref: '#/components/schemas/Error'
description: Conflict
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete a brand
tags:
- Brands
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a brand by `brandId`
operationId: getBrand
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- themes
- domains
- emailDomain
type: string
type: array
style: form
responses:
"200":
content:
application/json:
examples:
Get brand response:
$ref: '#/components/examples/GetBrandResponse'
schema:
$ref: '#/components/schemas/BrandWithEmbedded'
description: Successfully retrieved the brand
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve a Brand
tags:
- Brands
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |+
Replaces a brand by `brandId`
Passing an invalid `brandId` returns a `404 Not Found` status code with the error code `E0000007`.
Not providing `agreeToCustomPrivacyPolicy` with `customPrivacyPolicyUrl` returns a `400 Bad Request` status code with the error code `E0000001`.
operationId: replaceBrand
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Update brand request:
$ref: '#/components/examples/UpdateBrandRequest'
schema:
$ref: '#/components/schemas/BrandRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Update brand response:
$ref: '#/components/examples/UpdateBrandResponse'
schema:
$ref: '#/components/schemas/Brand'
description: Successfully replaced the brand
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace a Brand
tags:
- Brands
x-codegen-request-body-name: brand
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/domains:
get:
description: Lists all domains associated with a brand by `brandId`
operationId: listBrandDomains
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/BrandDomains'
description: Successfully returned the list of domains for the brand
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: List all Domains associated with a Brand
tags:
- Brands
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/error:
get:
description: Retrieves the error page sub-resources. The `expand` query parameter
specifies which sub-resources to include in the response.
operationId: getErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- default
- customized
- customizedUrl
- preview
- previewUrl
type: string
type: array
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/PageRoot'
description: Successfully retrieved the error page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Error Page Sub-Resources
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/error/customized:
delete:
description: "Deletes the customized error page. As a result, the default error\
\ page appears in your live environment."
operationId: deleteCustomizedErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted the customized error page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Customized Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves the customized error page. The customized error page
appears in your live environment.
operationId: getCustomizedErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
description: Successfully retrieved the customized error page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Customized Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the customized error page. The customized error page appears
in your live environment.
operationId: replaceCustomizedErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
description: Successfully replaced the customized error page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace the Customized Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/error/default:
get:
description: Retrieves the default error page. The default error page appears
when no customized error page exists.
operationId: getDefaultErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
description: Successfully retrieved the default error page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Default Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/error/preview:
delete:
description: "Deletes the preview error page. The preview error page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/error/preview`."
operationId: deletePreviewErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted the preview error page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Preview Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: "Retrieves the preview error page. The preview error page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/error/preview`."
operationId: getPreviewErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
description: Successfully retrieved the preview error page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Preview Error Page Preview
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Replaces the preview error page. The preview error page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/error/preview`."
operationId: replacePreviewErrorPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorPage'
description: Successfully replaced the preview error page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace the Preview Error Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-in:
get:
description: Retrieves the sign-in page sub-resources. The `expand` query parameter
specifies which sub-resources to include in the response.
operationId: getSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- default
- customized
- customizedUrl
- preview
- previewUrl
type: string
type: array
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/PageRoot'
description: Successfully retrieved the sign-in page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Sign-in Page Sub-Resources
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-in/customized:
delete:
description: "Deletes the customized sign-in page. As a result, the default\
\ sign-in page appears in your live environment."
operationId: deleteCustomizedSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted the sign-in page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Customized Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves the customized sign-in page. The customized sign-in page
appears in your live environment.
operationId: getCustomizedSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
description: Successfully retrieved the customized sign-in page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Customized Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the customized sign-in page. The customized sign-in page
appears in your live environment.
operationId: replaceCustomizedSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
description: Successfully replaced the customized sign-in page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace the Customized Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-in/default:
get:
description: Retrieves the default sign-in page. The default sign-in page appears
when no customized sign-in page exists.
operationId: getDefaultSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
description: Successfully retrieved the default sign-in page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Default Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-in/preview:
delete:
description: "Deletes the preview sign-in page. The preview sign-in page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/login/preview`."
operationId: deletePreviewSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted the preview sign-in page.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Preview Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: "Retrieves the preview sign-in page. The preview sign-in page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/login/preview`."
operationId: getPreviewSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
description: Successfully retrieved the preview sign-in page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Preview Sign-in Page Preview
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Replaces the preview sign-in page. The preview sign-in page contains\
\ unpublished changes and isn't shown in your live environment. Preview it\
\ at `${yourOktaDomain}/login/preview`."
operationId: replacePreviewSignInPage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/SignInPage'
description: Successfully replaced the preview sign-in page.
headers:
Location:
explode: false
schema:
format: uri
type: string
style: simple
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace the Preview Sign-in Page
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-in/widget-versions:
get:
description: Lists all sign-in widget versions supported by the current org
operationId: listAllSignInWidgetVersions
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
items:
pattern: ^\d+\.\d+$
type: string
type: array
description: Successfully listed the sign-in widget versions.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: List all Sign-in Widget Versions
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/pages/sign-out/customized:
get:
description: Retrieves the sign-out page settings
operationId: getSignOutPageSettings
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/HostedPage'
description: Successfully retrieved the sign-out page settings.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve the Sign-out Page Settings
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the sign-out page settings
operationId: replaceSignOutPageSettings
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/HostedPage'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/HostedPage'
description: Successfully replaced the sign-out page settings.
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace the Sign-out Page Settings
tags:
- CustomPages
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email:
get:
description: Lists all supported email templates
operationId: listEmailTemplates
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- settings
- customizationCount
type: string
type: array
style: form
responses:
"200":
content:
application/json:
examples:
List email templates response:
$ref: '#/components/examples/ListEmailTemplateResponse'
schema:
items:
$ref: '#/components/schemas/EmailTemplateResponse'
type: array
description: Successfully returned the list of email templates.
headers:
Link:
description: "The pagination header containing links to the current\
\ and next page of results. See [Pagination](/#pagination) for more\
\ information."
explode: false
schema:
type: string
style: simple
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: List all Email Templates
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}:
get:
description: Retrieves the details of an email template by name
operationId: getEmailTemplate
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- settings
- customizationCount
type: string
type: array
style: form
responses:
"200":
content:
application/json:
examples:
Get email template response:
$ref: '#/components/examples/GetEmailTemplateResponse'
schema:
$ref: '#/components/schemas/EmailTemplateResponse'
description: Successfully retrieved the email template.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve an Email Template
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/customizations:
delete:
description: |
Deletes all customizations for an email template
If Custom languages for Okta Email Templates is enabled, all customizations are deleted, including customizations for additional languages. If disabled, only customizations in Okta-supported languages are deleted.
operationId: deleteAllCustomizations
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted all customizations for the email template.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Delete all Email Customizations
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |
Lists all customizations of an email template
If Custom languages for Okta Email Templates is enabled, all existing customizations are retrieved, including customizations for additional languages. If disabled, only customizations for Okta-supported languages are returned.
operationId: listEmailCustomizations
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
List Email customizations response:
$ref: '#/components/examples/ListEmailCustomizationResponse'
schema:
items:
$ref: '#/components/schemas/EmailCustomization'
type: array
description: Successfully retrieved all email customizations for the specified
email template.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: List all Email Customizations
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |
Creates a new Email Customization
If Custom languages for Okta Email Templates is enabled, you can create a customization for any BCP47 language in addition to the Okta-supported languages.
operationId: createEmailCustomization
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Create email customization request:
$ref: '#/components/examples/CreateUpdateEmailCustomizationRequest'
schema:
$ref: '#/components/schemas/EmailCustomization'
responses:
"201":
content:
application/json:
examples:
Create email customization response:
$ref: '#/components/examples/CreateUpdateEmailCustomizationResponse'
schema:
$ref: '#/components/schemas/EmailCustomization'
description: Successfully created the email customization.
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Default email customization already exists:
$ref: '#/components/examples/ErrorEmailCustomizationDefaultAlreadyExists'
Email customization already exists for the specified language:
$ref: '#/components/examples/ErrorEmailCustomizationLanguageAlreadyExists'
schema:
$ref: '#/components/schemas/Error'
description: Could not create the email customization because it conflicts
with an existing email customization.
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Create an Email Customization
tags:
- CustomTemplates
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/customizations/{customizationId}:
delete:
description: |
Deletes an Email Customization by its unique identifier
If Custom languages for Okta Email Templates is disabled, deletion of an existing additional language customization by ID doesn't register.
operationId: deleteEmailCustomization
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The ID of the email customization
explode: false
in: path
name: customizationId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Successfully deleted the email customization.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Cannot delete default email customization:
$ref: '#/components/examples/ErrorEmailCustomizationCannotDeleteDefault'
schema:
$ref: '#/components/schemas/Error'
description: Could not delete the email customization deleted because it
is the default email customization.
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Delete an Email Customization
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |
Retrieves an email customization by its unique identifier
If Custom languages for Okta Email Templates is disabled, requests to retrieve an additional language customization by ID result in a `404 Not Found` error response.
operationId: getEmailCustomization
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The ID of the email customization
explode: false
in: path
name: customizationId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Get email customization response:
$ref: '#/components/examples/EmailCustomizationResponse'
schema:
$ref: '#/components/schemas/EmailCustomization'
description: Successfully retrieved the email customization.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve an Email Customization
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Replaces an email customization using property values
If Custom languages for Okta Email Templates is disabled, requests to update a customization for an additional language return a `404 Not Found` error response.
operationId: replaceEmailCustomization
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The ID of the email customization
explode: false
in: path
name: customizationId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Update email customization request:
$ref: '#/components/examples/CreateUpdateEmailCustomizationRequest'
schema:
$ref: '#/components/schemas/EmailCustomization'
description: Request
responses:
"200":
content:
application/json:
examples:
Update email customization response:
$ref: '#/components/examples/CreateUpdateEmailCustomizationResponse'
schema:
$ref: '#/components/schemas/EmailCustomization'
description: Successfully updated the email customization.
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Default email customization already exists:
$ref: '#/components/examples/ErrorEmailCustomizationDefaultAlreadyExists'
Email customization already exists for the specified language:
$ref: '#/components/examples/ErrorEmailCustomizationLanguageAlreadyExists'
Cannot set the default email customization's isDefault to false:
$ref: '#/components/examples/ErrorEmailCustomizationCannotClearDefault'
schema:
$ref: '#/components/schemas/Error'
description: Could not update the email customization because the update
would cause a conflict with an existing email customization.
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Replace an Email Customization
tags:
- CustomTemplates
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/customizations/{customizationId}/preview:
get:
description: |
Retrieves a Preview of an Email Customization. All variable references are populated from the current user's context. For example, `${user.profile.firstName}`.
If Custom languages for Okta Email Templates is disabled, requests for the preview of an additional language customization by ID return a `404 Not Found` error response.
operationId: getCustomizationPreview
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The ID of the email customization
explode: false
in: path
name: customizationId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Preview email customization response:
$ref: '#/components/examples/PreviewEmailCustomizationResponse'
schema:
$ref: '#/components/schemas/EmailPreview'
description: Successfully generated a preview of the email customization.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve a Preview of an Email Customization
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/default-content:
get:
description: "Retrieves an email template's default content\n\n Defaults to the current user's language given\
\ the following: \n- Custom languages for Okta Email Templates is enabled\n\
- An additional language is specified for the `language` parameter\n"
operationId: getEmailDefaultContent
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The language to use for the email. Defaults to the current user's
language if unspecified.
explode: true
in: query
name: language
required: false
schema:
$ref: '#/components/schemas/Language'
style: form
responses:
"200":
content:
application/json:
examples:
Get email template default content response:
$ref: '#/components/examples/EmailTemplateDefaultContentResponse'
schema:
$ref: '#/components/schemas/EmailDefaultContent'
description: Successfully retrieved the email template's default content.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve an Email Template Default Content
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/default-content/preview:
get:
description: |
Retrieves a preview of an Email Template's default content. All variable references are populated using the current user's context. For example, `${user.profile.firstName}`.
Defaults to the current user's language given the following:
- Custom languages for Okta Email Templates is enabled
- An additional language is specified for the `language` parameter
operationId: getEmailDefaultPreview
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The language to use for the email. Defaults to the current user's
language if unspecified.
explode: true
in: query
name: language
required: false
schema:
$ref: '#/components/schemas/Language'
style: form
responses:
"200":
content:
application/json:
examples:
Preview email template default content response:
$ref: '#/components/examples/PreviewEmailTemplateDefaultContentResponse'
schema:
$ref: '#/components/schemas/EmailPreview'
description: Successfully generated a preview of the email template's default
content.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve a Preview of the Email Template default content
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/settings:
get:
description: Retrieves an email template's settings
operationId: getEmailSettings
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Get email template settings response:
$ref: '#/components/examples/EmailSettingsResponse'
schema:
$ref: '#/components/schemas/EmailSettingsResponse'
description: Successfully retrieved the email template's settings.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve the Email Template Settings
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces an email template's settings
operationId: replaceEmailSettings
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EmailSettings'
responses:
"200":
content:
application/json:
examples:
Update email template settings:
$ref: '#/components/examples/EmailSettingsResponse'
schema:
$ref: '#/components/schemas/EmailSettings'
description: Successfully updated the email template's settings.
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"422":
content:
application/json:
examples:
Invalid email template recipients:
$ref: '#/components/examples/ErrorInvalidEmailTemplateRecipients'
schema:
$ref: '#/components/schemas/Error'
description: Could not update the email template's settings due to an invalid
setting value.
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Replace the Email Template Settings
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/templates/email/{templateName}/test:
post:
description: |-
Sends a test email to the current user’s primary and secondary email addresses. The email content is selected based on the following priority:
1. The email customization for the language specified in the `language` query parameter.
If Custom languages for Okta Email Templates is enabled and the `language` parameter is an additional language, the test email uses the customization corresponding to the language.
2. The email template's default customization.
3. The email template’s default content, translated to the current user's language.
operationId: sendTestEmail
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
- description: The language to use for the email. Defaults to the current user's
language if unspecified.
explode: true
in: query
name: language
required: false
schema:
$ref: '#/components/schemas/Language'
style: form
responses:
"204":
content: {}
description: Successfully sent a test email.
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Send a Test Email
tags:
- CustomTemplates
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/themes:
get:
description: |-
Lists all the themes in your brand.
> **Important:** Currently each org supports only one Theme, therefore this contains a single object only.
operationId: listBrandThemes
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Get themes response:
$ref: '#/components/examples/ListThemesResponse'
schema:
items:
$ref: '#/components/schemas/ThemeResponse'
type: array
description: Successfully returned the list of themes
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: List all Themes
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/brands/{brandId}/themes/{themeId}:
get:
description: Retrieves a theme for a brand
operationId: getBrandTheme
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Get theme response:
$ref: '#/components/examples/GetThemeResponse'
schema:
$ref: '#/components/schemas/ThemeResponse'
description: Successfully retrieved the theme
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.read
summary: Retrieve a Theme
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces a theme for a brand
operationId: replaceBrandTheme
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Update theme request:
$ref: '#/components/examples/UpdateThemeRequest'
schema:
$ref: '#/components/schemas/UpdateThemeRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Update theme response:
$ref: '#/components/examples/UpdateThemeResponse'
schema:
$ref: '#/components/schemas/ThemeResponse'
description: Successfully replaced the theme
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Replace a Theme
tags:
- Themes
x-codegen-request-body-name: theme
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/brands/{brandId}/themes/{themeId}/background-image:
delete:
description: Deletes a Theme background image
operationId: deleteBrandThemeBackgroundImage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Background Image
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Uploads and replaces the background image for the theme. The file\
\ must be in PNG, JPG, or GIF format and less than 2 MB in size."
operationId: uploadBrandThemeBackgroundImage
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
requestBody:
content:
multipart/form-data:
schema:
$ref: '#/components/schemas/uploadBrandThemeBackgroundImage_request'
description: background image file
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/ImageUploadResponse'
description: Content Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Upload the Background Image
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: multipart/form-data
x-accepts:
- application/json
/api/v1/brands/{brandId}/themes/{themeId}/favicon:
delete:
description: Deletes a Theme favicon. The theme will use the default Okta favicon.
operationId: deleteBrandThemeFavicon
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Favicon
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Uploads and replaces the favicon for the theme
operationId: uploadBrandThemeFavicon
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
requestBody:
content:
multipart/form-data:
schema:
$ref: '#/components/schemas/uploadBrandThemeFavicon_request'
description: favicon file
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/ImageUploadResponse'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Upload the Favicon
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: multipart/form-data
x-accepts:
- application/json
/api/v1/brands/{brandId}/themes/{themeId}/logo:
delete:
description: Deletes a Theme logo. The theme will use the default Okta logo.
operationId: deleteBrandThemeLogo
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Delete the Logo
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Uploads and replaces the logo for the theme. The file must be\
\ in PNG, JPG, or GIF format and less than 100kB in size. For best results\
\ use landscape orientation, a transparent background, and a minimum size\
\ of 300px by 50px to prevent upscaling."
operationId: uploadBrandThemeLogo
parameters:
- description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
- description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
requestBody:
content:
multipart/form-data:
schema:
$ref: '#/components/schemas/uploadBrandThemeLogo_request'
description: logo file
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ImageUploadResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.brands.manage
summary: Upload the Logo
tags:
- Themes
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: multipart/form-data
x-accepts:
- application/json
/api/v1/captchas:
get:
description: Lists all CAPTCHA instances with pagination support. A subset of
CAPTCHA instances can be returned that match a supported filter expression
or query.
operationId: listCaptchaInstances
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/CAPTCHAInstance'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.read
summary: List all CAPTCHA Instances
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: "Creates a new CAPTCHA instance. Currently, an org can only configure\
\ a single CAPTCHA instance."
operationId: createCaptchaInstance
requestBody:
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
required: true
responses:
"201":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
Error Limit of One CAPTCHA instance per org:
$ref: '#/components/examples/ErrorCAPTCHALimitOfOne'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Create a CAPTCHA instance
tags:
- CAPTCHA
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/captchas/{captchaId}:
delete:
description: |-
Deletes a specified CAPTCHA instance
> **Note:** If your CAPTCHA instance is still associated with your org, the request fails. You must first update your Org-wide CAPTCHA settings to remove the CAPTCHA instance.
operationId: deleteCaptchaInstance
parameters:
- description: The unique key used to identify your CAPTCHA instance
explode: false
in: path
name: captchaId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
Cannot remove CAPTCHA in use:
$ref: '#/components/examples/ErrorCAPTCHAOrgWideSetting'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Delete a CAPTCHA Instance
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves the properties of a specified CAPTCHA instance
operationId: getCaptchaInstance
parameters:
- description: The unique key used to identify your CAPTCHA instance
explode: false
in: path
name: captchaId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.read
summary: Retrieve a CAPTCHA Instance
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Partially updates the properties of a specified CAPTCHA instance
operationId: updateCaptchaInstance
parameters:
- description: The unique key used to identify your CAPTCHA instance
explode: false
in: path
name: captchaId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
required: true
responses:
"200":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Update a CAPTCHA Instance
tags:
- CAPTCHA
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
put:
description: Replaces the properties for a specified CAPTCHA instance
operationId: replaceCaptchaInstance
parameters:
- description: The unique key used to identify your CAPTCHA instance
explode: false
in: path
name: captchaId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceRequestReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
required: true
responses:
"200":
content:
application/json:
examples:
HCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseHCaptcha'
ReCaptcha:
$ref: '#/components/examples/CAPTCHAInstanceResponseReCaptcha'
schema:
$ref: '#/components/schemas/CAPTCHAInstance'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Replace a CAPTCHA Instance
tags:
- CAPTCHA
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/device-assurances:
get:
description: Lists all device assurance policies
operationId: listDeviceAssurancePolicies
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/DeviceAssurance'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.deviceAssurance.read
summary: List all Device Assurance Policies
tags:
- DeviceAssurance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates a new Device Assurance Policy
operationId: createDeviceAssurancePolicy
requestBody:
content:
application/json:
examples:
Android:
$ref: '#/components/examples/DeviceAssuranceAndroidRequest'
iOS:
$ref: '#/components/examples/DeviceAssuranceIosRequest'
MacOS:
$ref: '#/components/examples/DeviceAssuranceMacOSRequest'
Windows:
$ref: '#/components/examples/DeviceAssuranceWindowsRequest'
ChromeOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceChromeOSWithThirdPartySignalProvidersRequest'
MacOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceMacOSWithThirdPartySignalProvidersRequest'
WindowsWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceWindowsWithThirdPartySignalProvidersRequest'
AndroidWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceAndroidWithDynamicVersionRequirementRequest'
iOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceIosWithDynamicVersionRequirementRequest'
MacOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceMacOSWithDynamicVersionRequirementRequest'
WindowsWithDynamicVersionRequirements:
$ref: '#/components/examples/DeviceAssuranceWindowsWithDynamicVersionRequirementsRequest'
WindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionString:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringRequest'
WindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementRequest'
schema:
$ref: '#/components/schemas/DeviceAssurance'
required: true
responses:
"200":
content:
application/json:
examples:
Android:
$ref: '#/components/examples/DeviceAssuranceAndroidResponse'
iOS:
$ref: '#/components/examples/DeviceAssuranceIosResponse'
MacOS:
$ref: '#/components/examples/DeviceAssuranceMacOSResponse'
Windows:
$ref: '#/components/examples/DeviceAssuranceWindowsResponse'
ChromeOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceChromeOSWithThirdPartySignalProvidersResponse'
MacOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceMacOSWithThirdPartySignalProvidersResponse'
WindowsWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceWindowsWithThirdPartySignalProvidersResponse'
AndroidWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceAndroidWithDynamicVersionRequirementResponse'
iOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceIosWithDynamicVersionRequirementResponse'
MacOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceMacOSWithDynamicVersionRequirementResponse'
WindowsWithDynamicVersionRequirements:
$ref: '#/components/examples/DeviceAssuranceWindowsWithDynamicVersionRequirementsResponse'
WindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionString:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringResponse'
WindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementResponse'
schema:
$ref: '#/components/schemas/DeviceAssurance'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.deviceAssurance.manage
summary: Create a Device Assurance Policy
tags:
- DeviceAssurance
x-codegen-request-body-name: deviceAssurance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/device-assurances/{deviceAssuranceId}:
delete:
description: "Deletes a Device Assurance Policy by `deviceAssuranceId`. If the\
\ Device Assurance Policy is currently being used in the org Authentication\
\ Policies, the delete will not be allowed."
operationId: deleteDeviceAssurancePolicy
parameters:
- description: Id of the Device Assurance Policy
explode: false
in: path
name: deviceAssuranceId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
ErrorDeviceAssuranceInUse:
$ref: '#/components/examples/ErrorDeviceAssuranceInUse'
schema:
$ref: '#/components/schemas/Error'
description: Conflict
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.deviceAssurance.manage
summary: Delete a Device Assurance Policy
tags:
- DeviceAssurance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves a Device Assurance Policy by `deviceAssuranceId`
operationId: getDeviceAssurancePolicy
parameters:
- description: Id of the Device Assurance Policy
explode: false
in: path
name: deviceAssuranceId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Android:
$ref: '#/components/examples/DeviceAssuranceAndroidResponse'
iOS:
$ref: '#/components/examples/DeviceAssuranceIosResponse'
MacOS:
$ref: '#/components/examples/DeviceAssuranceMacOSResponse'
Windows:
$ref: '#/components/examples/DeviceAssuranceWindowsResponse'
ChromeOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceChromeOSWithThirdPartySignalProvidersResponse'
MacOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceMacOSWithThirdPartySignalProvidersResponse'
WindowsWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceWindowsWithThirdPartySignalProvidersResponse'
AndroidWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceAndroidWithDynamicVersionRequirementResponse'
iOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceIosWithDynamicVersionRequirementResponse'
MacOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceMacOSWithDynamicVersionRequirementResponse'
WindowsWithDynamicVersionRequirements:
$ref: '#/components/examples/DeviceAssuranceWindowsWithDynamicVersionRequirementsResponse'
WindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionString:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringResponse'
WindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementResponse'
schema:
$ref: '#/components/schemas/DeviceAssurance'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.deviceAssurance.read
summary: Retrieve a Device Assurance Policy
tags:
- DeviceAssurance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces a Device Assurance Policy by `deviceAssuranceId`
operationId: replaceDeviceAssurancePolicy
parameters:
- description: Id of the Device Assurance Policy
explode: false
in: path
name: deviceAssuranceId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Android:
$ref: '#/components/examples/DeviceAssuranceAndroidRequest'
iOS:
$ref: '#/components/examples/DeviceAssuranceIosRequest'
MacOS:
$ref: '#/components/examples/DeviceAssuranceMacOSRequest'
Windows:
$ref: '#/components/examples/DeviceAssuranceWindowsRequest'
ChromeOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceChromeOSWithThirdPartySignalProvidersRequest'
MacOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceMacOSWithThirdPartySignalProvidersRequest'
WindowsWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceWindowsWithThirdPartySignalProvidersRequest'
AndroidWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceAndroidWithDynamicVersionRequirementRequest'
iOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceIosWithDynamicVersionRequirementRequest'
MacOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceMacOSWithDynamicVersionRequirementRequest'
WindowsWithDynamicVersionRequirements:
$ref: '#/components/examples/DeviceAssuranceWindowsWithDynamicVersionRequirementsRequest'
WindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionString:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringRequest'
WindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementRequest'
schema:
$ref: '#/components/schemas/DeviceAssurance'
required: true
responses:
"200":
content:
application/json:
examples:
Android:
$ref: '#/components/examples/DeviceAssuranceAndroidResponse'
iOS:
$ref: '#/components/examples/DeviceAssuranceIosResponse'
MacOS:
$ref: '#/components/examples/DeviceAssuranceMacOSResponse'
Windows:
$ref: '#/components/examples/DeviceAssuranceWindowsResponse'
ChromeOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceChromeOSWithThirdPartySignalProvidersResponse'
MacOSWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceMacOSWithThirdPartySignalProvidersResponse'
WindowsWithThirdPartySignalProviders:
$ref: '#/components/examples/DeviceAssuranceWindowsWithThirdPartySignalProvidersResponse'
AndroidWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceAndroidWithDynamicVersionRequirementResponse'
iOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceIosWithDynamicVersionRequirementResponse'
MacOSWithDynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceMacOSWithDynamicVersionRequirementResponse'
WindowsWithDynamicVersionRequirements:
$ref: '#/components/examples/DeviceAssuranceWindowsWithDynamicVersionRequirementsResponse'
WindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionString:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringResponse'
WindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirement:
$ref: '#/components/examples/DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementResponse'
schema:
$ref: '#/components/schemas/DeviceAssurance'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.deviceAssurance.manage
summary: Replace a Device Assurance Policy
tags:
- DeviceAssurance
x-codegen-request-body-name: deviceAssurance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/device-checks/{deviceCheckId}: {}
/api/v1/devices:
get:
description: |-
Lists all devices with pagination support.
You can return a subset of Devices that match a supported search criteria using the `search` query parameter.
Searches for devices based on the properties specified in the `search` parameter conforming SCIM filter specifications (case-insensitive). This data is eventually consistent. The API returns different results depending on specified queries in the request. Empty list is returned if no objects match `search` request.
> **Note:** Listing devices with `search` should not be used as a part of any critical flows—such as authentication or updates—to prevent potential data loss. `search` results may not reflect the latest information, as this endpoint uses a search index which may not be up-to-date with recent updates to the object.
Don't use search results directly for record updates, as the data might be stale and therefore overwrite newer data, resulting in data loss.
Use an `id` lookup for records that you update to ensure your results contain the latest data.
This operation requires [URL encoding](https://www.w3.org/TR/html4/interact/forms.html#h-17.13.4.1). For example, `search=profile.displayName eq "Bob"` is encoded as `search=profile.displayName%20eq%20%22Bob%22`.
operationId: listDevices
parameters:
- explode: true
in: query
name: after
required: false
schema:
description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the\
\ `Link` response header. See [Pagination](/#pagination) for more information."
example: 200u3des4afA47rYJu1d7
type: string
style: form
- description: A limit on the number of objects to return (recommend `20`)
explode: true
in: query
name: limit
required: false
schema:
default: 200
example: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: "A SCIM filter expression that filters the results. Searches\
\ include all Device `profile` properties and the Device `id`, `status`,\
\ and `lastUpdated` properties."
examples:
Devices that have a `status` of `ACTIVE`:
value: status eq "ACTIVE"
Devices last updated after a specific timestamp:
value: lastUpdated gt "yyyy-MM-dd'T'HH:mm:ss.SSSZ"
Devices with a specified `id`:
value: id eq "guo4a5u7JHHhjXrMK0g4"
Devices that have a `displayName` of `Bob`:
value: profile.displayName eq "Bob"
Devices that have an `platform` of `WINDOWS`:
value: profile.platform eq "WINDOWS"
Devices whose `sid` starts with `S-1`:
value: profile.sid sw "S-1"
explode: true
in: query
name: search
required: false
schema:
example: lastUpdated gt "2019-06-01T09:00:00.000Z"
type: string
style: form
- description: Includes associated user details and management status for the
device in the `_embedded` attribute
examples:
UserFullDetails:
summary: Get a detailed list of associated users
value: user
UserSummaries:
summary: Get the list of associated user summaries
value: userSummary
explode: true
in: query
name: expand
required: false
schema:
enum:
- user
- userSummary
example: userSummary
type: string
x-enumDescriptions:
user: Lists full details for associated users
userSummary: Lists summaries for associated users
style: form
responses:
"200":
content:
application/json:
examples:
APIDevicesResponseUserSummaryExample:
$ref: '#/components/examples/APIDevicesListAllUserSummaryResponse'
APIDevicesResponseExample:
$ref: '#/components/examples/APIDevicesListAllResponse'
schema:
items:
$ref: '#/components/schemas/DeviceList'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.read
summary: List all Devices
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}:
delete:
description: |-
Deletes (permanently) a device by `deviceId` if it has a status of `DEACTIVATED`. You can transition the device to `DEACTIVATED` status using the [Deactivate a Device](/openapi/okta-management/management/tag/Device/#tag/Device/operation/deactivateDevice) endpoint.
This request is destructive and deletes all of the profile data related to the device. Once deleted, device data can't be recovered. However, reenrollment creates a new device record.
> **Note:** Attempts to delete a device that isn't in a `DEACTIVATED` state raise an error.
operationId: deleteDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.manage
summary: Delete a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves a device by `deviceId`
operationId: getDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
APIDevicesResponseExample:
$ref: '#/components/examples/DeviceResponse'
schema:
$ref: '#/components/schemas/Device'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.read
summary: Retrieve a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}/lifecycle/activate:
post:
description: |-
Activates a Device by setting its status to ACTIVE by `deviceId`.
Activated devices are used to create and delete Device user links.
operationId: activateDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.manage
summary: Activate a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}/lifecycle/deactivate:
post:
description: |-
Deactivates a Device by setting its status to DEACTIVATED by `deviceId`.
Deactivation causes a Device to lose all device user links.
Set the Device status to DEACTIVATED before deleting it.
> **Note:** When deactivating a Device, keep in mind the following:
- Device deactivation is a destructive operation for device factors and client certificates. Device reenrollment using Okta Verify allows end users to set up new factors on the device.
- Device deletion removes the device record from Okta. Reenrollment creates a new device record.
operationId: deactivateDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.manage
summary: Deactivate a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}/lifecycle/suspend:
post:
description: |-
Suspends a Device by setting its status to SUSPENDED.
Use suspended devices to create and delete device user links.
You can only unsuspend or deactivate suspended devices.
> **Note:** SUSPENDED status is meant to be temporary, so it isn't destructive.
operationId: suspendDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.manage
summary: Suspend a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}/lifecycle/unsuspend:
post:
description: |-
Unsuspends a Device by returning its `status` to ACTIVE.
>**Note:** Only devices with a SUSPENDED status can be unsuspended.
operationId: unsuspendDevice
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.manage
summary: Unsuspend a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/devices/{deviceId}/users:
get:
description: Lists all Users for a Device by `deviceId`
operationId: listDeviceUsers
parameters:
- description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
APIDevicesListAllUsersResponseExample:
$ref: '#/components/examples/APIDevicesListAllUsersResponse'
schema:
items:
$ref: '#/components/schemas/DeviceUser'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.devices.read
summary: List all Users for a Device
tags:
- Device
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/directories/{appInstanceId}/groups/modify:
post:
description: Updates an AD Group membership directly in AD
operationId: updateADGroupMembership
parameters:
- description: ID of the AD AppInstance in Okta
explode: false
in: path
name: appInstanceId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AgentAction'
required: true
responses:
"200":
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"502":
content:
application/json:
examples:
AgentTimeOut:
$ref: '#/components/examples/ErrorAgentTimeOut'
schema:
$ref: '#/components/schemas/Error'
description: There are no connected agents.
"504":
content:
application/json:
examples:
AgentTimeOut:
$ref: '#/components/examples/ErrorNoConnectedAgents'
schema:
$ref: '#/components/schemas/Error'
description: Timed out waiting for agent.
security:
- oauth2:
- okta.directories.groups.manage
summary: Update an AD Group membership
tags:
- DirectoriesIntegration
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/domains:
get:
description: Lists all verified custom domains for the org
operationId: listCustomDomains
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DomainListResponse'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.read
summary: List all Custom Domains
tags:
- CustomDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates your custom domain
operationId: createCustomDomain
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/DomainRequest'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DomainResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.manage
summary: Create a Custom Domain
tags:
- CustomDomain
x-codegen-request-body-name: domain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/domains/{domainId}:
delete:
description: Deletes a custom domain by `domainId`
operationId: deleteCustomDomain
parameters:
- description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.manage
summary: Delete a Custom Domain
tags:
- CustomDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a custom domain by `domainId`
operationId: getCustomDomain
parameters:
- description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DomainResponse'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.read
summary: Retrieve a Custom Domain
tags:
- CustomDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces a custom domain's brand
operationId: replaceCustomDomain
parameters:
- description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/UpdateDomain'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DomainResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.manage
summary: Replace a Custom Domain's Brand
tags:
- CustomDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/domains/{domainId}/certificate:
put:
description: |-
Upserts (creates or renews) the `MANUAL` certificate for the custom domain
> **Notes:**
> * If the existing `certificateSourceType` is `OKTA_MANAGED`, this operation changes the source type to `MANUAL`. Okta no longer manages and renews certificates for this domain after you provide a user-managed certificate.
> * Okta supports TLS certificates and private keys that are PEM-encoded and 2048, 3072, or 4096 bits. See the [Custom domain guide](https://developer.okta.com/docs/guides/custom-url-domain/main/) for more details.
operationId: upsertCertificate
parameters:
- description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/DomainCertificate'
required: true
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.manage
summary: Upsert the Custom Domain's Certificate
tags:
- CustomDomain
x-codegen-request-body-name: certificate
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/domains/{domainId}/verify:
post:
description: "Verifies the custom domain and validity of DNS records by `domainId`.\
\ Furthermore, if the `certificateSourceType` in the domain is `OKTA_MANAGED`,\
\ then an attempt is made to obtain and install a certificate. After a certificate\
\ is obtained and installed by Okta, Okta manages the certificate including\
\ certificate renewal."
operationId: verifyDomain
parameters:
- description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DomainResponse'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.domains.manage
summary: Verify a Custom Domain
tags:
- CustomDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/email-domains:
get:
description: Lists all the Email Domains in your org
operationId: listEmailDomains
parameters:
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
responses:
"200":
content:
application/json:
examples:
List email domain response:
$ref: '#/components/examples/EmailDomainResponse'
schema:
items:
$ref: '#/components/schemas/EmailDomainResponseWithEmbedded'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.read
summary: List all Email Domains
tags:
- EmailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates an Email Domain in your org
operationId: createEmailDomain
parameters:
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
requestBody:
content:
application/json:
examples:
Create email domain request:
$ref: '#/components/examples/CreateEmailDomainRequest'
schema:
$ref: '#/components/schemas/EmailDomain'
required: true
responses:
"200":
content:
application/json:
examples:
Create email domain response:
$ref: '#/components/examples/EmailDomainResponse'
schema:
$ref: '#/components/schemas/EmailDomainResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Email domain already exists:
$ref: '#/components/examples/ErrorEmailDomainAlreadyExists'
schema:
$ref: '#/components/schemas/Error'
description: Conflict
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.manage
summary: Create an Email Domain
tags:
- EmailDomain
x-codegen-request-body-name: emailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/email-domains/{emailDomainId}:
delete:
description: Deletes an Email Domain by `emailDomainId`
operationId: deleteEmailDomain
parameters:
- explode: false
in: path
name: emailDomainId
required: true
schema:
description: The ID of the email domain.
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
Email domain in use:
$ref: '#/components/examples/ErrorEmailDomainInUse'
schema:
$ref: '#/components/schemas/Error'
description: Unable to delete custom email domain due to mail provider specific
restrictions
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.manage
summary: Delete an Email Domain
tags:
- EmailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an Email Domain by `emailDomainId`
operationId: getEmailDomain
parameters:
- explode: false
in: path
name: emailDomainId
required: true
schema:
description: The ID of the email domain.
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
responses:
"200":
content:
application/json:
examples:
Retrieve email domain response:
$ref: '#/components/examples/EmailDomainResponse'
schema:
$ref: '#/components/schemas/EmailDomainResponseWithEmbedded'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.read
summary: Retrieve an Email Domain
tags:
- EmailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces associated username and sender display name by `emailDomainId`
operationId: replaceEmailDomain
parameters:
- explode: false
in: path
name: emailDomainId
required: true
schema:
description: The ID of the email domain.
type: string
style: simple
- description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
requestBody:
content:
application/json:
examples:
Update email domain request:
$ref: '#/components/examples/UpdateEmailDomainRequest'
schema:
$ref: '#/components/schemas/UpdateEmailDomain'
required: true
responses:
"200":
content:
application/json:
examples:
Update email domain response:
$ref: '#/components/examples/UpdatedEmailDomainResponse'
schema:
$ref: '#/components/schemas/EmailDomainResponse'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.manage
summary: Replace an Email Domain
tags:
- EmailDomain
x-codegen-request-body-name: updateEmailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/email-domains/{emailDomainId}/verify:
post:
description: Verifies an Email Domain by `emailDomainId`
operationId: verifyEmailDomain
parameters:
- explode: false
in: path
name: emailDomainId
required: true
schema:
description: The ID of the email domain.
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Verified email domain response:
$ref: '#/components/examples/VerifiedEmailDomainResponse'
schema:
$ref: '#/components/schemas/EmailDomainResponse'
description: Success
"400":
content:
application/json:
examples:
Email domain could not be verified:
$ref: '#/components/examples/ErrorEmailDomainNotVerified'
Email domain invalid status:
$ref: '#/components/examples/ErrorEmailDomainInvalidStatus'
schema:
$ref: '#/components/schemas/Error'
description: Email domain could not be verified by mail provider
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailDomains.manage
summary: Verify an Email Domain
tags:
- EmailDomain
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/email-servers:
get:
description: Lists all the enrolled custom SMTP server configurations
operationId: listEmailServers
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerListResponse'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.read
summary: List all enrolled SMTP servers
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates a custom email SMTP server configuration for your org
operationId: createEmailServer
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerPost'
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerResponse'
description: Successfully enrolled server credentials
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.manage
summary: Create a custom SMTP server
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/email-servers/{emailServerId}:
delete:
description: Deletes the specified custom SMTP server configuration
operationId: deleteEmailServer
parameters:
- explode: false
in: path
name: emailServerId
required: true
schema:
description: ID of your SMTP Server configuration
type: string
style: simple
responses:
"204":
description: No content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.manage
summary: Delete an SMTP Server configuration
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves the specified custom SMTP server configuration
operationId: getEmailServer
parameters:
- explode: false
in: path
name: emailServerId
required: true
schema:
description: ID of your SMTP Server configuration
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerListResponse'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.read
summary: Retrieve an SMTP Server configuration
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
patch:
description: Updates the specified custom SMTP server configuration
operationId: updateEmailServer
parameters:
- explode: false
in: path
name: emailServerId
required: true
schema:
description: ID of your SMTP Server configuration
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerRequest'
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/EmailServerResponse'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.manage
summary: Update an SMTP Server configuration
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/email-servers/{emailServerId}/test:
post:
description: Tests the specified custom SMTP Server configuration
operationId: testEmailServer
parameters:
- explode: false
in: path
name: emailServerId
required: true
schema:
description: ID of your SMTP Server configuration
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EmailTestAddresses'
responses:
"204":
description: No content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.emailServers.manage
summary: Test an SMTP Server configuration
tags:
- EmailServer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/eventHooks:
get:
description: Lists all event hooks
operationId: listEventHooks
responses:
"200":
content:
application/json:
examples:
RetrieveAllEventHooks:
$ref: '#/components/examples/RetrieveAllEventHooks'
schema:
items:
$ref: '#/components/schemas/EventHook'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.read
summary: List all Event Hooks
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a new event hook for your organization in `ACTIVE` status. You pass an event hook object in the JSON payload
of your request. That object represents the set of required information about the event hook you're registering, including:
* The URI of your external service
* The [events](https://developer.okta.com/docs/reference/api/event-types/) in Okta you want to subscribe to
* An optional event hook filter that can reduce the number of event hook calls. This is a self-service Early Access (EA) feature.
See [Create an event hook filter](https://developer.okta.com/docs/concepts/event-hooks/#create-an-event-hook-filter).
Additionally, you can specify a secret API key for Okta to pass to your external service endpoint for security verification. Note that the API key you set here is unrelated to the Okta API token
you must supply when making calls to Okta APIs. Optionally, you can specify extra headers that Okta passes to your external
service with each call.
Your external service must use a valid HTTPS endpoint.
operationId: createEventHook
requestBody:
content:
application/json:
examples:
CreateAnEventHook:
$ref: '#/components/examples/CreateAnEventHook'
CreateAnEventHookWithFilter:
$ref: '#/components/examples/CreateAnEventHookWithFilter'
schema:
$ref: '#/components/schemas/EventHook'
required: true
responses:
"200":
content:
application/json:
examples:
CreateAnEventHook:
$ref: '#/components/examples/RetrieveAnEventHook'
CreateAnEventHookWithFilter:
$ref: '#/components/examples/RetrieveAnEventHookWithFilter'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Create an Event Hook
tags:
- EventHook
x-codegen-request-body-name: eventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/eventHooks/{eventHookId}:
delete:
description: |-
Deletes the event hook that matches the provided `id`. After deletion, the event hook is unrecoverable.
As a safety precaution, you can only delete event hooks with a status of `INACTIVE`.
operationId: deleteEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Delete an Event Hook
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an event hook
operationId: getEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RetrieveAnEventHook:
$ref: '#/components/examples/RetrieveAnEventHook'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.read
summary: Retrieve an Event Hook
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Replaces an event hook. Okta validates the new properties before replacing the existing values.
Some event hook properties are immutable and can't be updated. Refer to the parameter description in the request body schema.
>**Note:** Updating the `channel` property requires you to verify the hook again.
operationId: replaceEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceAnEventHook:
$ref: '#/components/examples/ReplaceAnEventHookWithFilter'
schema:
$ref: '#/components/schemas/EventHook'
required: true
responses:
"200":
content:
application/json:
examples:
ReplaceAnEventHook:
$ref: '#/components/examples/RetrieveAnEventHookWithFilter'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Replace an Event Hook
tags:
- EventHook
x-codegen-request-body-name: eventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/eventHooks/{eventHookId}/lifecycle/activate:
post:
description: Activates the event hook that matches the provided `id`
operationId: activateEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ActivateAnEventHook:
$ref: '#/components/examples/RetrieveAnEventHook'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Activate an Event Hook
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/eventHooks/{eventHookId}/lifecycle/deactivate:
post:
description: Deactivates the event hook that matches the provided `id`
operationId: deactivateEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
DeactivateAnEventHook:
$ref: '#/components/examples/RetrieveADeactivatedEventHook'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Deactivate an Event Hook
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/eventHooks/{eventHookId}/lifecycle/verify:
post:
description: |-
Verifies that the event hook matches the provided `eventHookId`. To verify ownership, your endpoint must send information back to Okta in JSON format. See [Event hooks](https://developer.okta.com/docs/concepts/event-hooks/#one-time-verification-request).
Only `ACTIVE` and `VERIFIED` event hooks can receive events from Okta.
If a response is not received within 3 seconds, the outbound request times out. One retry is attempted after a timeout or error response.
If a successful response still isn't received, this operation returns a 400 error with more information about the failure.
operationId: verifyEventHook
parameters:
- description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
VerifyAnEventHook:
$ref: '#/components/examples/RetrieveAnEventHook'
schema:
$ref: '#/components/schemas/EventHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.eventHooks.manage
summary: Verify an Event Hook
tags:
- EventHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/features:
get:
description: Lists all self-service features for your org
operationId: listFeatures
responses:
"200":
content:
application/json:
examples:
FeaturesList:
$ref: '#/components/examples/ListFeaturesResponse'
schema:
items:
$ref: '#/components/schemas/Feature'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.features.read
summary: List all Features
tags:
- Feature
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/features/{featureId}:
get:
description: Retrieves a feature by ID
operationId: getFeature
parameters:
- description: '`id` of the feature'
explode: false
in: path
name: featureId
required: true
schema:
example: R5HjqNn1pEqWGy48E9jg
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
FeaturesRetrieve:
$ref: '#/components/examples/RetrieveFeaturesResponse'
schema:
$ref: '#/components/schemas/Feature'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.features.read
summary: Retrieve a Feature
tags:
- Feature
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/features/{featureId}/dependencies:
get:
description: |-
Lists all feature dependencies for a specified feature.
A feature's dependencies are the features that it requires to be enabled in order for itself to be enabled.
operationId: listFeatureDependencies
parameters:
- description: '`id` of the feature'
explode: false
in: path
name: featureId
required: true
schema:
example: R5HjqNn1pEqWGy48E9jg
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
FeaturesDependenciesList:
$ref: '#/components/examples/ListFeatureDependenciesResponse'
schema:
items:
$ref: '#/components/schemas/Feature'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.features.read
summary: List all dependencies
tags:
- Feature
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/features/{featureId}/dependents:
get:
description: |-
Lists all feature dependents for the specified feature.
A feature's dependents are the features that need to be disabled in order for the feature itself to be disabled.
operationId: listFeatureDependents
parameters:
- description: '`id` of the feature'
explode: false
in: path
name: featureId
required: true
schema:
example: R5HjqNn1pEqWGy48E9jg
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
FeaturesDependentsList:
$ref: '#/components/examples/ListFeatureDependentsResponse'
schema:
items:
$ref: '#/components/schemas/Feature'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.features.read
summary: List all dependents
tags:
- Feature
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/features/{featureId}/{lifecycle}:
post:
description: |-
Updates a feature's lifecycle status. Use this endpoint to enable or disable a feature for your org.
Use the `mode=force` parameter to override dependency restrictions for a particular feature. Normally, you can't enable a feature if it has one or more dependencies that aren't enabled.
When you use the `mode=force` parameter while enabling a feature, Okta first tries to enable any disabled features that this feature may have as dependencies. If you don't pass the `mode=force` parameter and the feature has dependencies that need to be enabled before the feature is enabled, a 400 error is returned.
When you use the `mode=force` parameter while disabling a feature, Okta first tries to disable any enabled features that this feature may have as dependents. If you don't pass the `mode=force` parameter and the feature has dependents that need to be disabled before the feature is disabled, a 400 error is returned.
The following chart shows the different state transitions for a feature.

operationId: updateFeatureLifecycle
parameters:
- description: '`id` of the feature'
explode: false
in: path
name: featureId
required: true
schema:
example: R5HjqNn1pEqWGy48E9jg
type: string
style: simple
- description: Whether to `ENABLE` or `DISABLE` the feature
explode: false
in: path
name: lifecycle
required: true
schema:
$ref: '#/components/schemas/FeatureLifecycle'
style: simple
- description: Indicates if you want to force enable or disable a feature. Supported
value is `force`.
explode: true
in: query
name: mode
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
FeaturesUpdate:
$ref: '#/components/examples/UpdateFeatureLifecycleResponse'
schema:
$ref: '#/components/schemas/Feature'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.features.manage
summary: Update a Feature lifecycle
tags:
- Feature
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/first-party-app-settings/{appName}:
get:
description: Retrieves the settings for an Okta app (also known as an Okta first-party
app)
operationId: getFirstPartyAppSettings
parameters:
- description: |
The key name for the Okta app.
Supported apps:
* Okta Admin Console (`admin-console`)
explode: false
in: path
name: appName
required: true
schema:
example: admin-console
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
exampleSettings:
$ref: '#/components/examples/AdminConsoleSettingsExample'
schema:
$ref: '#/components/schemas/AdminConsoleSettings'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.read
summary: Retrieve the Okta Application Settings
tags:
- OktaApplicationSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the settings for an Okta app (also known as an Okta first-party
app)
operationId: replaceFirstPartyAppSettings
parameters:
- description: |
The key name for the Okta app.
Supported apps:
* Okta Admin Console (`admin-console`)
explode: false
in: path
name: appName
required: true
schema:
example: admin-console
type: string
style: simple
requestBody:
content:
application/json:
examples:
exampleSettings:
$ref: '#/components/examples/AdminConsoleSettingsExample'
schema:
$ref: '#/components/schemas/AdminConsoleSettings'
required: true
responses:
"200":
content:
application/json:
examples:
exampleSettings:
$ref: '#/components/examples/AdminConsoleSettingsExample'
schema:
$ref: '#/components/schemas/AdminConsoleSettings'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Replace the Okta Application Settings
tags:
- OktaApplicationSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups:
get:
description: |-
Lists all Groups with pagination support.
The number of Groups returned depends on the specified [`limit`](/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups!in=query&path=limit&t=request), if you have a search, filter, and/or query parameter set, and if that parameter is not null. We recommend using a limit less than or equal to 200.
A subset of Groups can be returned that match a supported filter expression, query, or search criteria.
> **Note:** Results from the filter or query parameter are driven from an eventually consistent datasource. The synchronization lag is typically less than one second.
See [Filtering](https://developer.okta.com/docs/api/#filter) for more information on expressions.
operationId: listGroups
parameters:
- description: |-
Finds a Group that matches the `name` property
> **Note:** Paging and searching are currently mutually exclusive. You can't page a query. The default limit for a query is 300 results. Query is intended for an auto-complete picker use case where users refine their search string to constrain the results.
explode: true
in: query
name: q
required: false
schema:
example: West&limit=10
type: string
style: form
- description: |-
[Filter expression](https://developer.okta.com/docs/reference/core-okta-api/#filter) for Groups
> **Note:** All filters must be [URL encoded](https://developer.mozilla.org/en-US/docs/Glossary/Percent-encoding). For example, `filter=lastUpdated gt "2013-06-01T00:00:00.000Z"` is encoded as `filter=lastUpdated%20gt%20%222013-06-01T00:00:00.000Z%22`.
examples:
filterById:
summary: Filter group with a specific ID
value: id eq "00g1emaKYZTWRYYRRTSK"
filterByType:
summary: Filter groups that are of the type `OKTA_GROUP`
value: type eq "OKTA_GROUP"
filterByTypeAndProfileLastUpdatedAfterDate:
summary: Filter groups that are of the type `OKTA_GROUP` with Profile
updated after 11/11/2015
value: type eq "OKTA_GROUP" and lastUpdated gt "2016-11-11T00:00:00.000Z"
filterByTypeAndProfileOrMembershipUpdatedBeforeDate:
summary: Filter groups that are of the type `OKTA_GROUP` with Profile
or memberships updated before 11/11/2015
value: type eq "OKTA_GROUP" and (lastUpdated lt "2015-11-11T00:00:00.000Z"
or lastMembershipUpdated lt "2015-11-11T00:00:00.000Z")
explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- description: "Specifies the pagination cursor for the next page of Groups.\
\ The `after` cursor should be treated as an opaque value and obtained through\
\ the next link relation. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: |-
Specifies the number of Group results in a page.
Don't write code that depends on the default or maximum value, as it might change. If you receive an `HTTP 500` status code, you likely exceeded the request timeout. Retry your request with a smaller `limit` and [page the results](https://developer.okta.com/docs/api/#pagination).
The Okta default Everyone group isn't returned for users with a Group Admin role.
>**Note:** We strongly encourage using a limit that's less than or equal to 200. Any number greater than 200 affects performance and accuracy.
explode: true
in: query
name: limit
required: false
schema:
format: int32
maximum: 10000
type: integer
style: form
- description: "If specified, additional metadata is included in the response.\
\ Possible values are `stats` and `app`."
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
- description: |-
Searches for groups with a supported [filtering](https://developer.okta.com/docs/reference/core-okta-api/#filter) expression for all attributes except for `_embedded`, `_links`, and `objectClass`.
Search currently performs a `startsWith` match but it should be considered an implementation detail and might change without notice in the future. This operation supports [pagination](https://developer.okta.com/docs/api/#pagination).
Using search requires [URL encoding](https://developer.mozilla.org/en-US/docs/Glossary/Percent-encoding), for example, `search=type eq "OKTA_GROUP"` is encoded as `search=type+eq+%22OKTA_GROUP%22`.
This operation searches many properties:
* Any group profile property, including imported app group profile properties.
* The top-level properties `id`, `created`, `lastMembershipUpdated`, `lastUpdated`, and `type`.
* The [source](/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups!c=200&path=_links/source&t=response) of groups with type of `APP_GROUP`, accessed as `source.id`.
You can also use `sortBy` and `sortOrder` parameters.
examples:
searchByType:
summary: Search for Groups that have a type of `APP_GROUP`
value: type eq "APP_GROUP"
searchByLastMembershipUpdatedAfterDate:
summary: Search for Groups whose memberships were last updated after a
specific timestamp
value: lastMembershipUpdated gt "2014-01-01T00:00:00.000Z"
searchById:
summary: Search for Groups with the specified ID (`00gak46y5hydV6NdM0g4`)
value: id eq "00gak46y5hydV6NdM0g4"
searchByProfileName:
summary: Search for Groups that have a `name` of `West Coast Users`
value: profile.name eq "West Coast Users"
searchBySamAccountName:
summary: Search for Groups whose `samAccountName` starts with `West Coast`
value: profile.samAccountName sw "West Coast"
searchBySourceId:
summary: Search for Groups that have the source app with a specified `source.id`
(`0oa2v0el0gP90aqjJ0g7`)
value: source.id eq "0oa2v0el0gP90aqjJ0g7"
searchByIdTypeAndCreationDate:
summary: List groups of type `APP_GROUP` that were created before 01/01/2014
and whose source app has the ID 0oa2v0el0gP90aqjJ0g7
value: type eq "APP_GROUP" and (created lt "2014-01-01T00:00:00.000Z"
and source.id eq "0oa2v0el0gP90aqjJ0g7")
explode: true
in: query
name: search
required: false
schema:
type: string
style: form
- description: "Specifies field to sort by **(for search queries only)**. `sortBy`\
\ can be any single property, for example `sortBy=profile.name`."
explode: true
in: query
name: sortBy
required: false
schema:
example: lastUpdated
type: string
style: form
- description: "Specifies sort order: `asc` or `desc` (for search queries only).\
\ This parameter is ignored if if `sortBy` is not present. Groups with the\
\ same value for the `sortBy` property will be ordered by `id`"
explode: true
in: query
name: sortOrder
required: false
schema:
default: asc
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListGroupExample:
$ref: '#/components/examples/list-groups-examples'
schema:
items:
$ref: '#/components/schemas/Group'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: List all Groups
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Adds a new Group with the `OKTA_GROUP` type to your org
> **Note:** App import operations are responsible for syncing Groups with `APP_GROUP` type such as Active Directory Groups. See
[About groups](https://help.okta.com/okta_help.htm?id=Directory_Groups).
operationId: addGroup
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/addGroup_request'
required: true
responses:
"200":
content:
application/json:
examples:
GroupExample:
$ref: '#/components/examples/group-example'
schema:
$ref: '#/components/schemas/Group'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Add a Group
tags:
- Group
x-codegen-request-body-name: group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/rules:
get:
description: Lists all Group rules for your org
operationId: listGroupRules
parameters:
- description: Specifies the number of rule results in a page
explode: true
in: query
name: limit
required: false
schema:
default: 50
format: int32
maximum: 200
minimum: 1
type: integer
style: form
- description: Specifies the pagination cursor for the next page of rules
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the keyword to search rules for
explode: true
in: query
name: search
required: false
schema:
type: string
style: form
- description: "If specified as `groupIdToGroupNameMap`, then displays group\
\ names"
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
x-okta-added-version: 1.3.0
responses:
"200":
content:
application/json:
examples:
ListGroupRulesExample:
$ref: '#/components/examples/list-group-rules-example'
schema:
items:
$ref: '#/components/schemas/GroupRule'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: List all Group rules
tags:
- GroupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a Group rule to dynamically add Users to the specified Group if they match the condition
> **Note:** Group rules are created with the status set to `'INACTIVE'`.
operationId: createGroupRule
requestBody:
content:
application/json:
examples:
GroupRuleExample:
$ref: '#/components/examples/create-group-rule-request-example'
schema:
$ref: '#/components/schemas/CreateGroupRuleRequest'
required: true
responses:
"200":
content:
application/json:
examples:
GroupRuleExample:
$ref: '#/components/examples/group-rule-example'
schema:
$ref: '#/components/schemas/GroupRule'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Create a Group rule
tags:
- GroupRule
x-codegen-request-body-name: groupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/rules/{groupRuleId}:
delete:
description: Deletes a specific group rule by `groupRuleId`
operationId: deleteGroupRule
parameters:
- description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
- description: "If set to `true`, removes Users from Groups assigned by this\
\ rule"
explode: true
in: query
name: removeUsers
required: false
schema:
default: false
type: boolean
style: form
responses:
"202":
content: {}
description: Accepted
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Delete a Group Rule
tags:
- GroupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific Group rule by ID from your org
operationId: getGroupRule
parameters:
- description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
- description: "If specified as `groupIdToGroupNameMap`, then show Group names"
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
GroupRuleExample:
$ref: '#/components/examples/group-rule-example'
schema:
$ref: '#/components/schemas/GroupRule'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: Retrieve a Group rule
tags:
- GroupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Replaces a Group rule
> **Notes:** You only can update rules with a Group whose status is set to `'INACTIVE'`.
>
> You currently can't update the `action` section.
operationId: replaceGroupRule
parameters:
- description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
requestBody:
content:
application/json:
examples:
GroupRuleExample:
$ref: '#/components/examples/group-rule-example'
schema:
$ref: '#/components/schemas/GroupRule'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/GroupRule'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Replace a Group rule
tags:
- GroupRule
x-codegen-request-body-name: groupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/rules/{groupRuleId}/lifecycle/activate:
post:
description: Activates a specific Group rule by ID from your org
operationId: activateGroupRule
parameters:
- description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Activate a Group Rule
tags:
- GroupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/rules/{groupRuleId}/lifecycle/deactivate:
post:
description: Deactivates a specific Group rule by ID from your org
operationId: deactivateGroupRule
parameters:
- description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Deactivate a Group Rule
tags:
- GroupRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}:
delete:
description: |-
Deletes a Group of the `OKTA_GROUP` or `APP_GROUP` type from your org
> **Note:** You can't remove Groups of type `APP_GROUP` if they are used in a group push mapping.
operationId: deleteGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Delete a Group
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific Group by `id` from your org
operationId: getGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
GroupExample:
$ref: '#/components/examples/group-example'
schema:
$ref: '#/components/schemas/Group'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: Retrieve a Group
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Replaces the profile for a Group of `OKTA_GROUP` type from your org
> **Note :** You only can modify profiles for groups of the `OKTA_GROUP` type.
>
> App imports are responsible for updating profiles for groups of the `APP_GROUP` type, such as Active Directory groups.
operationId: replaceGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/addGroup_request'
required: true
responses:
"200":
content:
application/json:
examples:
GroupExample:
$ref: '#/components/examples/group-example'
schema:
$ref: '#/components/schemas/Group'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Replace a Group
tags:
- Group
x-codegen-request-body-name: group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/{groupId}/apps:
get:
description: "Lists all apps that are assigned to a Group. See [Application\
\ Groups API](/openapi/okta-management/management/tag/ApplicationGroups/)."
operationId: listAssignedApplicationsForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: Specifies the pagination cursor for the next page of apps
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of app results for a page
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ListAppsExample:
$ref: '#/components/examples/list-apps-example'
schema:
items:
$ref: '#/components/schemas/Application'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: List all Assigned Applications
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/owners:
get:
description: Lists all owners for a specific group
operationId: listGroupOwners
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: SCIM Filter expression for group owners. Allows to filter owners
by type.
explode: true
in: query
name: search
required: false
schema:
type: string
style: form
- description: Specifies the pagination cursor for the next page of owners
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of owner results in a page
explode: true
in: query
name: limit
required: false
schema:
default: 1000
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ListsOneOwnerOfaGroup:
$ref: '#/components/examples/ListsOwnerOneResponse'
ListsMultipleOwnersOfaGroup:
$ref: '#/components/examples/ListsOwnersMultipleResponse'
schema:
items:
$ref: '#/components/schemas/GroupOwner'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: List all Group Owners
tags:
- GroupOwner
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Assigns a group owner
operationId: assignGroupOwner
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
requestBody:
content:
application/json:
examples:
AssignAGroupOwner:
$ref: '#/components/examples/AssignGroupOwnerRequest'
schema:
$ref: '#/components/schemas/AssignGroupOwnerRequestBody'
required: true
responses:
"201":
content:
application/json:
examples:
AssignAGroupOwner:
$ref: '#/components/examples/AssignGroupOwnerResponse'
schema:
$ref: '#/components/schemas/GroupOwner'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Assign a Group Owner
tags:
- GroupOwner
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/{groupId}/owners/{ownerId}:
delete:
description: Deletes a group owner from a specific group
operationId: deleteGroupOwner
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the group owner
explode: false
in: path
name: ownerId
required: true
schema:
example: 00u1emaK22TWRYd3TtG
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Delete a Group Owner
tags:
- GroupOwner
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles:
get:
description: Lists all assigned roles of a Group by `groupId`
operationId: listGroupAssignedRoles
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: "An optional parameter used to return targets configured for\
\ the standard Role Assignment in the `embedded` property. Supported values:\
\ `targets/groups` or `targets/catalog/apps`"
examples:
groupTarget:
summary: Return Group targets
value: targets/groups
appTarget:
summary: Return App targets
value: targets/catalog/apps
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/StandardRolesListResponseGroup'
Custom Roles:
$ref: '#/components/examples/CustomRolesListResponseGroup'
IAM-Based Standard Roles:
$ref: '#/components/examples/IAMStandardRolesListResponseGroup'
schema:
items:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Group Role Assignments
tags:
- RoleAssignmentBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Assigns a [standard role](/openapi/okta-management/guides/roles/#standard-roles) to a Group.
You can also assign a custom role to a Group, but the preferred method to assign a custom role to a Group is to create a binding between the Custom Role, the Resource Set, and the Group. See [Create a Role Resource Set Binding](/openapi/okta-management/management/tag/RoleDResourceSetBinding/#tag/RoleDResourceSetBinding/operation/createResourceSetBinding).
> **Notes:**
> * The request payload is different for standard and custom role assignments.
> * For IAM-based standard role assignments, use the request payload for standard roles. However, the response payload for IAM-based role assignments is similar to the custom role's assignment response.
operationId: assignRoleToGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: Grants the Group third-party admin status when set to `true`
explode: true
in: query
name: disableNotifications
required: false
schema:
default: false
type: boolean
style: form
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/assignRoleToGroup_request'
required: true
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/CreateStandardRoleAssignmentResponseGroup'
Custom Roles:
$ref: '#/components/examples/CreateCustomRoleResponseGroup'
IAM-based Standard Roles:
$ref: '#/components/examples/CreateIAMStandardRoleResponseGroup'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"201":
content: {}
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Role to a Group
tags:
- RoleAssignmentBGroup
x-codegen-request-body-name: assignRoleRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}:
delete:
description: Unassigns a Role Assignment (identified by `roleAssignmentId`)
from a Group (identified by the `groupId`)
operationId: unassignRoleFromGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Group Role
tags:
- RoleAssignmentBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Role assigned to a Group (identified by the `groupId`).
The `roleAssignmentId` is the unique identifier for either a standard role
Group Assignment object or a custom role Resource Set Binding object.
operationId: getGroupAssignedRole
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/CreateStandardRoleAssignmentResponseGroup'
Custom Roles:
$ref: '#/components/examples/CreateCustomRoleResponseGroup'
IAM-based Standard Roles:
$ref: '#/components/examples/CreateIAMStandardRoleResponseGroup'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Group Role Assignment
tags:
- RoleAssignmentBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}/targets/catalog/apps:
get:
description: "Lists all app targets for an `APP_ADMIN` Role Assignment to a\
\ Group. The response includes a list of OIN-cataloged apps or app instances.\
\ The response payload for an app instance contains the `id` property, but\
\ an OIN-cataloged app doesn't."
operationId: listApplicationTargetsForApplicationAdministratorRoleForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/CatalogApplication'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Group Role Application Targets
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}:
delete:
description: |
Unassigns an OIN app target from an `APP_ADMIN` Role Assignment to a Group
> **Note:** You can't remove the last app target from a Role Assignment, since this causes an exception.
> If you need a Role Assignment that applies to all apps, delete the `APP_ADMIN` Role Assignment and recreate a new one. See [Unassign a Group Role](/openapi/okta-management/management/tag/RoleAssignmentBGroup/#tag/RoleAssignmentBGroup/operation/unassignRoleFromGroup).
operationId: unassignAppTargetToAdminRoleForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Group Role Application Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Assigns an OIN app target to an `APP_ADMIN` Role Assignment to\
\ a Group. When you assign the first OIN app target, you reduce the scope\
\ of the Role Assignment. The Role no longer applies to all app targets but\
\ applies only to the specified target. An OIN app target that's assigned\
\ to the Role overrides any existing instance targets of the OIN app. For\
\ example, if a user is assigned to administer a specific Facebook instance,\
\ a successful request to add an OIN app with `facebook` for `appName` makes\
\ that user the administrator for all Facebook instances."
operationId: assignAppTargetToAdminRoleForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"200":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign an Group Role Application Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}/{appId}:
delete:
description: |-
Unassigns an app instance target from an `APP_ADMIN` Role Assignment to a Group
> **Note:** You can't remove the last app instance target from a Role Assignment since this causes an exception. > If you need a Role Assignment that applies to all apps, delete the `APP_ADMIN` Role Assignment and recreate a new one. See [Unassign a Group Role](/openapi/okta-management/management/tag/RoleAssignmentBGroup/#tag/RoleAssignmentBGroup/operation/unassignRoleFromGroup).
operationId: unassignAppInstanceTargetToAppAdminRoleForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign an Group Role Application Instance Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Assigns an app instance target to an `APP_ADMIN` Role Assignment to a Group. When you assign the first OIN app or app instance target, you reduce the scope of the Role Assignment. The Role no longer applies to all app targets, but applies only to the specified target.
> **Note:** You can target a mixture of both OIN app and app instance targets, but you can't assign permissions to manage all instances of an OIN app and then assign a subset of permissions to the same app. For example, you can't specify that an admin has access to manage all instances of the Salesforce app and then also manage specific configurations of the Salesforce app.
operationId: assignAppInstanceTargetToAppAdminRoleForGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign an Group Role Application Instance Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}/targets/groups:
get:
description: |
Lists all Group targets for a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a Group.
If the Role isn't scoped to specific Group targets, an empty array `[]` is returned.
operationId: listGroupTargetsForGroupRole
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Group'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Group Role Group Targets
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/roles/{roleAssignmentId}/targets/groups/{targetGroupId}:
delete:
description: "Unassigns a Group target from a `USER_ADMIN`, `HELP_DESK_ADMIN`,\
\ or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a Group."
operationId: unassignGroupTargetFromGroupAdminRole
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: false
in: path
name: targetGroupId
required: true
schema:
example: 00g1e9dfjHeLAsdX983d
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Group Role Group Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Assigns a Group target to a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a Group.
When you assign the first Group target, you reduce the scope of the Role Assignment. The Role no longer applies to all targets but applies only to the specified target.
operationId: assignGroupTargetToGroupAdminRole
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: false
in: path
name: targetGroupId
required: true
schema:
example: 00g1e9dfjHeLAsdX983d
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Group Role Group Target
tags:
- RoleBTargetBGroup
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/users:
get:
description: |-
Lists all users that are a member of a Group.
The default user limit is set to a very high number due to historical reasons that are no longer valid for most orgs. This will change in a future version of this API. The recommended page limit is now `limit=200`.
operationId: listGroupUsers
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of user results in a page
explode: true
in: query
name: limit
required: false
schema:
default: 1000
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ListMemberUserResponse:
$ref: '#/components/examples/ListUsersResponse'
schema:
items:
$ref: '#/components/schemas/User'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.read
summary: List all Member Users
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/groups/{groupId}/users/{userId}:
delete:
description: |-
Unassigns a User from a Group with the `OKTA_GROUP` type
> **Note:** You only can modify memberships for groups of the `OKTA_GROUP` type.
>
> App imports are responsible for managing group memberships for groups of the `APP_GROUP` type, such as Active Directory groups.
operationId: unassignUserFromGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Unassign a User from a Group
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Assigns a User to a Group with the `OKTA_GROUP` type
> **Note:** You only can modify memberships for Groups of the `OKTA_GROUP` type. App imports are responsible for managing group memberships for Groups of the `APP_GROUP` type, such as Active Directory groups.
operationId: assignUserToGroup
parameters:
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.groups.manage
summary: Assign a User to a Group
tags:
- Group
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/hook-keys:
get:
description: Lists all keys
operationId: listHookKeys
responses:
"200":
content:
application/json:
examples:
ResponseExample:
$ref: '#/components/examples/ListAllKeysResponse'
schema:
items:
$ref: '#/components/schemas/HookKey'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.read
summary: List all keys
tags:
- HookKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a key for use with other parts of the application, such as inline hooks
> **Note:** Use the key name to access this key for inline hook operations.
The total number of keys that you can create in an Okta org is limited to 50.
operationId: createHookKey
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/KeyRequest'
required: true
responses:
"200":
content:
application/json:
examples:
ResponseExample:
$ref: '#/components/examples/CreateHookKeyResponse'
schema:
$ref: '#/components/schemas/DetailedHookKeyInstance'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Create a key
tags:
- HookKey
x-codegen-request-body-name: keyRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/hook-keys/public/{keyId}:
get:
description: |-
Retrieves a public key by `keyId`
>**Note:** keyId is the alias of the public key.
operationId: getPublicKey
parameters:
- description: id" of the Public Key
explode: false
in: path
name: keyId
required: true
schema:
example: FcH2P9Eg7wr0o8N2FuV0
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ResponseExample:
$ref: '#/components/examples/RetrievePublicKeyResponse'
schema:
$ref: '#/components/schemas/_embedded'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.read
summary: Retrieve a public key
tags:
- HookKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/hook-keys/{id}:
delete:
description: |
Deletes a key by `id`. After being deleted, the key is unrecoverable.
As a safety precaution, only keys that aren't being used are eligible for deletion.
operationId: deleteHookKey
parameters:
- description: ID of the Hook Key
explode: false
in: path
name: id
required: true
schema:
example: XreKU5laGwBkjOTehusG
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Delete a key
tags:
- HookKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |-
Retrieves the public portion of the Key object using the `id` parameter
>**Note:** The `?expand=publickey` query parameter optionally returns the full object including the details of the public key in the response body's `_embedded` property.
operationId: getHookKey
parameters:
- description: ID of the Hook Key
explode: false
in: path
name: id
required: true
schema:
example: XreKU5laGwBkjOTehusG
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ResponseExample:
$ref: '#/components/examples/RetrieveKeyResponse'
schema:
$ref: '#/components/schemas/HookKey'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.read
summary: Retrieve a key by ID
tags:
- HookKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Replaces a key by `id`
This request replaces existing properties after passing validation.
> **Note:** The only parameter that you can update is the name of the key, which must be unique at all times.
operationId: replaceHookKey
parameters:
- description: ID of the Hook Key
explode: false
in: path
name: id
required: true
schema:
example: XreKU5laGwBkjOTehusG
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/KeyRequest'
required: true
responses:
"200":
content:
application/json:
examples:
ResponseExample:
$ref: '#/components/examples/ReplaceKeyResponse'
schema:
$ref: '#/components/schemas/DetailedHookKeyInstance'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Replace a key
tags:
- HookKey
x-codegen-request-body-name: keyRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/assignees/users:
get:
description: Lists all users with Role Assignments
operationId: listUsersWithRoleAssignments
parameters:
- description: Specifies the pagination cursor for the next page of targets
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of results returned. Defaults to `100`.
explode: true
in: query
name: limit
required: false
schema:
default: 100
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
User List:
$ref: '#/components/examples/RoleAssignedUsersResponseExample'
schema:
$ref: '#/components/schemas/RoleAssignedUsers'
description: Success
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Users with Role Assignments
tags:
- RoleAssignmentAUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/iam/resource-sets:
get:
description: Lists all Resource Sets with pagination support
operationId: listResourceSets
parameters:
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetsResponse'
schema:
$ref: '#/components/schemas/ResourceSets'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Resource Sets
tags:
- RoleCResourceSet
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a new Resource Set. See [Supported Resources](/openapi/okta-management/guides/roles/#supported-resources).
> **Note:** The maximum number of `resources` allowed in a Resource Set object is 1000. Resources are identified by either an Okta Resource Name (ORN) or by a REST URL format. See [Okta Resource Name](/openapi/okta-management/guides/roles/#okta-resource-name-orn).
operationId: createResourceSet
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ResourceSetRequest'
schema:
$ref: '#/components/schemas/CreateResourceSetRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetResponse'
schema:
$ref: '#/components/schemas/ResourceSet'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Create a Resource Set
tags:
- RoleCResourceSet
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}:
delete:
description: Deletes a Resource Set by `resourceSetIdOrLabel`
operationId: deleteResourceSet
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Delete a Resource Set
tags:
- RoleCResourceSet
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Resource Set by `resourceSetIdOrLabel`
operationId: getResourceSet
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetResponse'
schema:
$ref: '#/components/schemas/ResourceSet'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Resource Set
tags:
- RoleCResourceSet
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the label and description of a Resource Set
operationId: replaceResourceSet
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ReplaceResourceSetRequest'
schema:
$ref: '#/components/schemas/ResourceSet'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetResponse'
schema:
$ref: '#/components/schemas/ResourceSet'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Replace a Resource Set
tags:
- RoleCResourceSet
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/bindings:
get:
description: Lists all Bindings for a Resource Set with pagination support
operationId: listBindings
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingsResponse'
schema:
$ref: '#/components/schemas/ResourceSetBindings'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Role Resource Set Bindings
tags:
- RoleDResourceSetBinding
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates a Binding for the Resource Set, Custom Role, and members\
\ (Users or Groups)"
operationId: createResourceSetBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ResourceSetBindingCreateRequestExample'
schema:
$ref: '#/components/schemas/ResourceSetBindingCreateRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingResponseExample'
schema:
$ref: '#/components/schemas/ResourceSetBindingResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Create a Role Resource Set Binding
tags:
- RoleDResourceSetBinding
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/bindings/{roleIdOrLabel}:
delete:
description: Deletes a Binding of a Role (identified by `roleIdOrLabel`) and
a Resource Set (identified by `resourceSetIdOrLabel`)
operationId: deleteBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Delete a Role Resource Set Binding
tags:
- RoleDResourceSetBinding
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves the Binding of a Role (identified by `roleIdOrLabel`)
in a Resource Set (identified by `resourceSetIdOrLabel`)
operationId: getBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingResponseWithIdExample'
schema:
$ref: '#/components/schemas/ResourceSetBindingResponse'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Role Resource Set Binding
tags:
- RoleDResourceSetBinding
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/bindings/{roleIdOrLabel}/members:
get:
description: Lists all members of a Role Resource Set Binding with pagination
support
operationId: listMembersOfBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingMembersResponse'
schema:
$ref: '#/components/schemas/ResourceSetBindingMembers'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Role Resource Set Binding Members
tags:
- RoleDResourceSetBindingMember
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
patch:
description: Adds more members to a Role Resource Set Binding
operationId: addMembersToBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ResourceSetBindingAddMembersRequestExample'
schema:
$ref: '#/components/schemas/ResourceSetBindingAddMembersRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingResponseExample'
schema:
$ref: '#/components/schemas/ResourceSetBindingResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Add more Role Resource Set Binding Members
tags:
- RoleDResourceSetBindingMember
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/bindings/{roleIdOrLabel}/members/{memberId}:
delete:
description: Unassigns a Member (identified by `memberId`) from a Role Resource
Set Binding
operationId: unassignMemberFromBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: '`id` of the Member'
explode: false
in: path
name: memberId
required: true
schema:
example: irb1qe6PGuMc7Oh8N0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Role Resource Set Bindiing Member
tags:
- RoleDResourceSetBindingMember
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Member (identified by `memberId`) that belongs to a
Role Resource Set Binding
operationId: getMemberOfBinding
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: '`id` of the Member'
explode: false
in: path
name: memberId
required: true
schema:
example: irb1qe6PGuMc7Oh8N0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetBindingMemberResponse'
schema:
$ref: '#/components/schemas/ResourceSetBindingMember'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Role Resource Set Binding Member
tags:
- RoleDResourceSetBindingMember
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/resources:
get:
description: Lists all Resources for the Resource Set
operationId: listResourceSetResources
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetResourcesResponse'
schema:
$ref: '#/components/schemas/ResourceSetResources'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Resource Set Resources
tags:
- RoleCResourceSetResource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
patch:
description: Adds more Resources to a Resource Set
operationId: addResourceSetResources
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ResourceSetResourcePatchRequestExample'
schema:
$ref: '#/components/schemas/ResourceSetResourcePatchRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/ResourceSetResponse'
schema:
$ref: '#/components/schemas/ResourceSet'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Add more Resources to a Resource Set
tags:
- RoleCResourceSetResource
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/resource-sets/{resourceSetIdOrLabel}/resources/{resourceId}:
delete:
description: Deletes a Resource (identified by `resourceId`) from a Resource
Set
operationId: deleteResourceSetResource
parameters:
- description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
- description: '`id` of the Resource'
explode: false
in: path
name: resourceId
required: true
schema:
example: ire106sQKoHoXXsAe0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Delete a Resource Set Resource
tags:
- RoleCResourceSetResource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/iam/roles:
get:
description: Lists all Custom Roles with pagination support
operationId: listRoles
parameters:
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/RolesResponse'
schema:
$ref: '#/components/schemas/IamRoles'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Custom Roles
tags:
- RoleECustom
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a Custom Role
operationId: createRole
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/RoleRequest'
schema:
$ref: '#/components/schemas/CreateIamRoleRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/RoleResponse'
schema:
$ref: '#/components/schemas/IamRole'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Create a Custom Role
tags:
- RoleECustom
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/roles/{roleIdOrLabel}:
delete:
description: Deletes a Custom Role by `roleIdOrLabel`
operationId: deleteRole
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Delete a Custom Role
tags:
- RoleECustom
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a role by `roleIdOrLabel`
operationId: getRole
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/RoleResponse'
schema:
$ref: '#/components/schemas/IamRole'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Role
tags:
- RoleECustom
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the label and description for a Custom Role by `roleIdOrLabel`
operationId: replaceRole
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request:
$ref: '#/components/examples/ReplaceRoleRequest'
schema:
$ref: '#/components/schemas/UpdateIamRoleRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/RoleResponse'
schema:
$ref: '#/components/schemas/IamRole'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Replace a Custom Role
tags:
- RoleECustom
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/iam/roles/{roleIdOrLabel}/permissions:
get:
description: Lists all permissions for a Custom Role by `roleIdOrLabel`
operationId: listRolePermissions
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/PermissionsResponse'
schema:
$ref: '#/components/schemas/Permissions'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Custom Role Permissions
tags:
- RoleECustomPermission
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/iam/roles/{roleIdOrLabel}/permissions/{permissionType}:
delete:
description: Deletes a permission (identified by `permissionType`) from a Custom
Role
operationId: deleteRolePermission
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: An okta permission type
explode: false
in: path
name: permissionType
required: true
schema:
example: okta.users.manage
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Delete a Custom Role Permission
tags:
- RoleECustomPermission
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a permission (identified by `permissionType`) for a Custom
Role
operationId: getRolePermission
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: An okta permission type
explode: false
in: path
name: permissionType
required: true
schema:
example: okta.users.manage
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Example Response without conditions:
$ref: '#/components/examples/PermissionResponse'
Example Response with conditions:
$ref: '#/components/examples/PermissionResponseWithConditions'
schema:
$ref: '#/components/schemas/Permission'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Custom Role Permission
tags:
- RoleECustomPermission
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a permission (specified by `permissionType`) for a Custom
Role
operationId: createRolePermission
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: An okta permission type
explode: false
in: path
name: permissionType
required: true
schema:
example: okta.users.manage
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request with include:
$ref: '#/components/examples/CreateUpdateIamRolePermissionRequestExampleWithInclude'
Example Request with exclude:
$ref: '#/components/examples/CreateUpdateIamRolePermissionRequestExampleWithExclude'
schema:
$ref: '#/components/schemas/CreateUpdateIamRolePermissionRequest'
required: false
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
responses:
"204":
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Create a Custom Role Permission
tags:
- RoleECustomPermission
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: Replaces a permission (specified by `permissionType`) for a Custom
Role
operationId: replaceRolePermission
parameters:
- description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
- description: An okta permission type
explode: false
in: path
name: permissionType
required: true
schema:
example: okta.users.manage
type: string
style: simple
requestBody:
content:
application/json:
examples:
Example Request with include:
$ref: '#/components/examples/CreateUpdateIamRolePermissionRequestExampleWithInclude'
Example Request with exclude:
$ref: '#/components/examples/CreateUpdateIamRolePermissionRequestExampleWithExclude'
schema:
$ref: '#/components/schemas/CreateUpdateIamRolePermissionRequest'
required: false
responses:
"200":
content:
application/json:
examples:
Example Response:
$ref: '#/components/examples/PermissionResponseWithConditions'
schema:
$ref: '#/components/schemas/Permission'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Replace a Custom Role Permission
tags:
- RoleECustomPermission
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-codegen-request-body-name: instance
x-content-type: application/json
x-accepts:
- application/json
/api/v1/identity-sources/{identitySourceId}/sessions:
get:
description: Lists all Identity Source Sessions for the given Identity Source
instance
operationId: listIdentitySourceSessions
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
sessionsList:
$ref: '#/components/examples/ListSessionsResponseForGetSessions'
schema:
items:
$ref: '#/components/schemas/IdentitySourceSession'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.read
summary: List all Identity Source Sessions
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Creates an Identity Source Session for the given Identity Source
instance
operationId: createIdentitySourceSession
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
session:
$ref: '#/components/examples/GetSessionResponse'
schema:
$ref: '#/components/schemas/IdentitySourceSession'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.manage
summary: Create an Identity Source Session
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/identity-sources/{identitySourceId}/sessions/{sessionId}:
delete:
description: Deletes an Identity Source Session for a given `identitySourceId`
and `sessionId`
operationId: deleteIdentitySourceSession
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
- description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.manage
summary: Delete an Identity Source Session
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
get:
description: Retrieves an Identity Source Session for a given Identity Source
ID and session ID
operationId: getIdentitySourceSession
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
- description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
session:
$ref: '#/components/examples/GetSessionResponse'
schema:
$ref: '#/components/schemas/IdentitySourceSession'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.read
summary: Retrieve an Identity Source Session
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/identity-sources/{identitySourceId}/sessions/{sessionId}/bulk-delete:
post:
description: Uploads external IDs of entities that need to be deleted in Okta
from the Identity Source for the given session
operationId: uploadIdentitySourceDataForDelete
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
- description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
bulkDeletePayload:
$ref: '#/components/examples/bulkDeletePayload'
schema:
$ref: '#/components/schemas/BulkDeleteRequestBody'
responses:
"202":
description: Accepted
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.manage
summary: Upload the data to be deleted in Okta
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/identity-sources/{identitySourceId}/sessions/{sessionId}/bulk-upsert:
post:
description: Uploads entities that need to be inserted or updated in Okta from
the Identity Source for the given session
operationId: uploadIdentitySourceDataForUpsert
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
- description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
bulkUpsertPayload:
$ref: '#/components/examples/bulkUpsertPayload'
schema:
$ref: '#/components/schemas/BulkUpsertRequestBody'
responses:
"202":
description: Accepted
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.manage
summary: Upload the data to be upserted in Okta
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/identity-sources/{identitySourceId}/sessions/{sessionId}/start-import:
post:
description: Starts the import from the Identity Source described by the uploaded
bulk operations
operationId: startImportFromIdentitySource
parameters:
- description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
- description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
triggeredSession:
$ref: '#/components/examples/TriggerSessionResponse'
schema:
$ref: '#/components/schemas/IdentitySourceSession'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.identitySources.manage
summary: Start the import from the Identity Source
tags:
- IdentitySource
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/idps:
get:
description: Lists all identity provider integrations with pagination. A subset
of IdPs can be returned that match a supported filter expression or query.
operationId: listIdentityProviders
parameters:
- description: Searches the `name` property of IdPs for matching value
example: Example SAML
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: Filters IdPs by `type`
explode: true
in: query
name: type
required: false
schema:
$ref: '#/components/schemas/IdentityProviderType'
style: form
responses:
"200":
content:
application/json:
examples:
MultipleIdPsResponse:
$ref: '#/components/examples/MultipleIdPsResponse'
schema:
items:
$ref: '#/components/schemas/IdentityProvider'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all Identity Providers
tags:
- IdentityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates a new Identity Provider integration.\n\n#### SAML 2.0\
\ Identity Provider\n\nYou must first add the IdP's signature certificate\
\ to the IdP key store before you can add a SAML 2.0 IdP with a `kid` credential\
\ reference. \n\nDon't use `fromURI` to automatically redirect a user to a\
\ particular app after successfully authenticating with a third-party IdP.\
\ Instead, use SAML deep links. Using `fromURI` isn't tested or supported.\
\ For more information about using deep links when signing users in using\
\ an SP-initiated flow, see [Understanding SP-Initiated Login flow](https://developer.okta.com/docs/concepts/saml/#understanding-sp-initiated-login-flow).\n\
\nUse SAML deep links to automatically redirect the user to an app after successfully\
\ authenticating with a third-party IdP. To use deep links, assemble these\
\ three parts into a URL:\n\n* SP ACS URL
\nFor example: `https://${yourOktaDomain}/sso/saml2/:idpId`\n\
* The app to which the user is automatically redirected after successfully\
\ authenticating with the IdP
\nFor example: `/app/:app-location/:appId/sso/saml`\n\
* Optionally, if the app is an outbound SAML app, you can specify the `relayState`\
\ passed to it.
\nFor example: `?RelayState=:anyUrlEncodedValue`\n\nThe\
\ deep link for the above three parts is:
\n`https://${yourOktaDomain}/sso/saml2/:idpId/app/:app-location/:appId/sso/saml?RelayState=:anyUrlEncodedValue`\n\
\n#### Smart Card X509 Identity Provider\n\nYou must first add the IdP's server\
\ certificate to the IdP key store before you can add a Smart Card `X509`\
\ IdP with a `kid` credential reference. \nYou need to upload the whole trust\
\ chain as a single key using the [Key Store API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProviderKeys/#tag/IdentityProviderKeys/operation/createIdentityProviderKey).\n\
Depending on the information stored in the smart card, select the proper [template](https://developer.okta.com/docs/reference/okta-expression-language/#idp-user-profile)\
\ `idpuser.subjectAltNameEmail` or `idpuser.subjectAltNameUpn`."
operationId: createIdentityProvider
requestBody:
content:
application/json:
examples:
CreateGenericOidcIdPRequest:
$ref: '#/components/examples/CreateGenericOidcIdPRequest'
CreateSamlIdPRequest:
$ref: '#/components/examples/CreateSamlIdPRequest'
CreateAppleIdPRequest:
$ref: '#/components/examples/CreateAppleIdPRequest'
CreateFacebookIdPRequest:
$ref: '#/components/examples/CreateFacebookIdPRequest'
CreateGoogleIdPRequest:
$ref: '#/components/examples/CreateGoogleIdPRequest'
CreateMicrosoftIdPRequest:
$ref: '#/components/examples/CreateMicrosoftIdPRequest'
CreateSmartCardIdPRequest:
$ref: '#/components/examples/CreateSmartCardIdPRequest'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: IdP settings
required: true
responses:
"200":
content:
application/json:
examples:
CreateGenericOidcIdpResponse:
$ref: '#/components/examples/GenericOidcIdpResponse'
CreateSamlIdPResponse:
$ref: '#/components/examples/SamlIdPResponse'
CreateAppleIdPResponse:
$ref: '#/components/examples/AppleIdPResponse'
CreateFacebookIdPResponse:
$ref: '#/components/examples/FacebookIdPResponse'
CreateGoogleIdPResponse:
$ref: '#/components/examples/GoogleIdPResponse'
CreateMicrosoftIdPResponse:
$ref: '#/components/examples/MicrosoftIdPResponse'
CreateSmartCardIdPResponse:
$ref: '#/components/examples/SmartCardIdPResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Create an Identity Provider
tags:
- IdentityProvider
x-codegen-request-body-name: identityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/idps/credentials/keys:
get:
description: Lists all IdP Key Credentials
operationId: listIdentityProviderKeys
parameters:
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
ListIdPKeyCredentialsResponse:
$ref: '#/components/examples/MultipleIdPKeyCredentialsResponse'
schema:
items:
$ref: '#/components/schemas/IdPKeyCredential'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all IdP Key Credentials
tags:
- IdentityProviderKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a new X.509 certificate credential in the IdP key store
> **Note:** RSA-based certificates are supported for all IdP types. Okta currently supports EC-based certificates only for the `X509` IdP type. For EC-based certificates we support only P-256, P-384, and P-521 curves.
operationId: createIdentityProviderKey
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/IdPCertificateCredential'
required: true
responses:
"200":
content:
application/json:
examples:
IdPKeyCredentialResponse:
$ref: '#/components/examples/IdPKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Create an IdP Key Credential
tags:
- IdentityProviderKeys
x-codegen-request-body-name: jsonWebKey
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/idps/credentials/keys/{kid}:
delete:
description: Deletes a specific IdP Key Credential by `kid` if it isn't currently
being used by an active or inactive IdP
operationId: deleteIdentityProviderKey
parameters:
- description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Delete an IdP Key Credential
tags:
- IdentityProviderKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific IdP Key Credential by `kid`
operationId: getIdentityProviderKey
parameters:
- description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
IdPKeyCredentialResponse:
$ref: '#/components/examples/IdPKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: Retrieve an IdP Key Credential
tags:
- IdentityProviderKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces an IdP Key Credential by `kid`
operationId: replaceIdentityProviderKey
parameters:
- description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
requestBody:
content:
application/json:
examples:
IdPKeyCredentialRequest:
$ref: '#/components/examples/IdPKeyCredentialRequest'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Updated IdP Key Credential
required: true
responses:
"200":
content:
application/json:
examples:
IdPKeyCredentialResponse:
$ref: '#/components/examples/IdPKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Replace an IdP Key Credential
tags:
- IdentityProviderKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/idps/{idpId}:
delete:
description: |-
Deletes an identity provider integration by `idpId`
* All existing IdP users are unlinked with the highest order profile source taking precedence for each IdP user.
* Unlinked users keep their existing authentication provider such as `FEDERATION` or `SOCIAL`.
operationId: deleteIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Delete an Identity Provider
tags:
- IdentityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an identity provider integration by `idpId`
operationId: getIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
GenericOidcIdpResponse:
$ref: '#/components/examples/GenericOidcIdpResponse'
SamlIdPResponse:
$ref: '#/components/examples/SamlIdPResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: Retrieve an Identity Provider
tags:
- IdentityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces an identity provider integration by `idpId`
operationId: replaceIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceIdPRequest:
$ref: '#/components/examples/ReplaceIdPRequestResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Updated configuration for the IdP
required: true
responses:
"200":
content:
application/json:
examples:
ReplaceIdPResponse:
$ref: '#/components/examples/ReplaceIdPRequestResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Replace an Identity Provider
tags:
- IdentityProvider
x-codegen-request-body-name: identityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/idps/{idpId}/credentials/csrs:
get:
description: Lists all Certificate Signing Requests for an IdP
operationId: listCsrsForIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
MultipleIdPCsrsResponse:
$ref: '#/components/examples/MultipleIdPCsrsResponse'
schema:
items:
$ref: '#/components/schemas/IdPCsr'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all Certificate Signing Requests
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Generates a new key pair and returns a Certificate Signing Request (CSR) for it
> **Note:** The private key isn't listed in the [Signing Key Credentials for IdP](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProviderSigningKeys/#tag/IdentityProviderSigningKeys/operation/listIdentityProviderSigningKeys) until it's published.
operationId: generateCsrForIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/CsrMetadata'
required: true
responses:
"201":
content:
application/json:
examples:
CsrJsonResponse:
$ref: '#/components/examples/CsrJsonResponse'
schema:
$ref: '#/components/schemas/IdPCsr'
application/pkcs10:
examples:
CsrPkcs10Response:
$ref: '#/components/examples/CsrPkcs10Response'
schema:
$ref: '#/components/schemas/IdPCsrPkcs10'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Generate a Certificate Signing Request
tags:
- IdentityProviderSigningKeys
x-codegen-request-body-name: metadata
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
- application/pkcs10
/api/v1/idps/{idpId}/credentials/csrs/{idpCsrId}:
delete:
description: Revokes a CSR and deletes the key pair from the IdP
operationId: revokeCsrForIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: '`id` of the IdP CSR'
explode: false
in: path
name: idpCsrId
required: true
schema:
example: 1uEhyE65oV3H6KM9gYcN
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Revoke a Certificate Signing Request
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific Certificate Signing Request by `id`
operationId: getCsrForIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: '`id` of the IdP CSR'
explode: false
in: path
name: idpCsrId
required: true
schema:
example: 1uEhyE65oV3H6KM9gYcN
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
CsrJsonResponse:
$ref: '#/components/examples/CsrJsonResponse'
schema:
$ref: '#/components/schemas/IdPCsr'
application/pkcs10:
examples:
CsrPkcs10Response:
$ref: '#/components/examples/CsrPkcs10Response'
schema:
$ref: '#/components/schemas/IdPCsrPkcs10'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: Retrieve a Certificate Signing Request
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
- application/pkcs10
/api/v1/idps/{idpId}/credentials/csrs/{idpCsrId}/lifecycle/publish:
post:
description: |-
Publishes the CSR with a signed X.509 certificate and adds it into the signing Key Credentials for the IdP
> **Notes:**
> * Publishing a certificate completes the lifecycle of the CSR, and it's no longer accessible.
> * If the validity period of the certificate is less than 90 days, a 400 error response is returned.
operationId: publishCsrForIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: '`id` of the IdP CSR'
explode: false
in: path
name: idpCsrId
required: true
schema:
example: 1uEhyE65oV3H6KM9gYcN
type: string
style: simple
requestBody:
content:
application/pkix-cert:
schema:
description: "X.509 certificate in `DER` format. \nThe client can either\
\ post in binary or Base64URL-encoded. If the post is Base64URL-encoded,\
\ set the `Content-Transfer-Encoding` header to `base64`."
example: !!binary |-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format: binary
type: string
x-okta-operationId: publishBinaryDerCertForIdentityProvider
application/x-x509-ca-cert:
schema:
description: |-
X.509 certificate in `CER` format.
The client can either post in binary or Base64URL-encoded. If the post is Base64URL-encoded, set the `Content-Transfer-Encoding` header to `base64`.
example: !!binary |-
QGNlcnRpZmljYXRlLmNlcg==
format: binary
type: string
x-okta-operationId: publishBinaryCerCertForIdentityProvider
application/x-pem-file:
schema:
description: X.509 certificate in `PEM` format
example: !!binary |-
QGNlcnRpZmljYXRlLnBlbQ==
format: binary
type: string
x-okta-operationId: publishBinaryPemCertForIdentityProvider
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Publish a Certificate Signing Request
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/pkix-cert
x-accepts:
- application/json
/api/v1/idps/{idpId}/credentials/keys:
get:
description: Lists all signing Key Credentials for an IdP
operationId: listIdentityProviderSigningKeys
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
MultipleIdPSigningKeyCredentialsResponse:
$ref: '#/components/examples/MultipleIdPSigningKeyCredentialsResponse'
schema:
items:
$ref: '#/components/schemas/IdPKeyCredential'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all signing Key Credentials for IdP
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/credentials/keys/generate:
post:
description: |-
Generates a new X.509 certificate for an IdP signing Key Credential to be used for signing assertions sent to the IdP. IdP signing keys are read-only.
> **Note:** To update an IdP with the newly generated Key Credential, [update your IdP](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/replaceIdentityProvider) using the returned key's `kid` in the [signing credential](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/replaceIdentityProvider!path=protocol/0/credentials/signing/kid&t=request).
operationId: generateIdentityProviderSigningKey
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: expiry of the IdP Key Credential
explode: true
in: query
name: validityYears
required: true
schema:
format: int32
maximum: 10
minimum: 2
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
IdPSigningKeyCredentialResponse:
$ref: '#/components/examples/IdPSigningKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Generate a new signing Key Credential for IdP
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/credentials/keys/{kid}:
get:
description: Retrieves a specific IdP Key Credential by `kid`
operationId: getIdentityProviderSigningKey
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
IdPSigningKeyCredentialResponse:
$ref: '#/components/examples/IdPSigningKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: Retrieve a signing Key Credential for IdP
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/credentials/keys/{kid}/clone:
post:
description: |-
Clones an X.509 certificate for an IdP signing Key Credential from a source IdP to target IdP
> **Caution:** Sharing certificates isn't a recommended security practice.
> **Note:** If the key is already present in the list of Key Credentials for the target IdP, you receive a 400 error response.
operationId: cloneIdentityProviderKey
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
- description: '`id` of the target IdP'
explode: true
in: query
name: targetIdpId
required: true
schema:
type: string
style: form
responses:
"201":
content:
application/json:
examples:
IdPSigningKeyCredentialResponse:
$ref: '#/components/examples/IdPSigningKeyCredentialResponse'
schema:
$ref: '#/components/schemas/IdPKeyCredential'
description: Created
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Clone a signing Key Credential for IdP
tags:
- IdentityProviderSigningKeys
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/lifecycle/activate:
post:
description: Activates an inactive IdP
operationId: activateIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ActivateIdPResponse:
$ref: '#/components/examples/ActivateIdPResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Activate an Identity Provider
tags:
- IdentityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/lifecycle/deactivate:
post:
description: Deactivates an active IdP
operationId: deactivateIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
DeactivateIdPResponse:
$ref: '#/components/examples/DeactivateIdPResponse'
schema:
$ref: '#/components/schemas/IdentityProvider'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Deactivate an Identity Provider
tags:
- IdentityProvider
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/users:
get:
description: Lists all the Users linked to an Identity Provider
operationId: listIdentityProviderApplicationUsers
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: Searches the records for matching value
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: Expand user data
explode: true
in: query
name: expand
required: false
schema:
example: user
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListIdPUsersResponse:
$ref: '#/components/examples/ListIdPUsersResponse'
schema:
items:
$ref: '#/components/schemas/IdentityProviderApplicationUser'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all Users for IdP
tags:
- IdentityProviderUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/idps/{idpId}/users/{userId}:
delete:
description: "Unlinks the Okta User and the IdP User. The next time the User\
\ federates into Okta through this IdP, they have to re-link their account\
\ according to the account link policy."
operationId: unlinkUserFromIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.manage
summary: Unlink a User from IdP
tags:
- IdentityProviderUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a linked IdP User by ID
operationId: getIdentityProviderApplicationUser
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
IdPAppUserResponse:
$ref: '#/components/examples/IdPAppUserResponse'
schema:
$ref: '#/components/schemas/IdentityProviderApplicationUser'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: Retrieve a User for IdP
tags:
- IdentityProviderUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Links an Okta User to an existing SAML or social Identity Provider.\
\ \n\nThe SAML Identity Provider must have `honorPersistentNameId` set to\
\ `true` to use this API. \nThe [Name Identifier Format](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/replaceIdentityProvider!path=protocol/0/settings&t=request)\
\ of the incoming assertion must be `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`."
operationId: linkUserToIdentityProvider
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/UserIdentityProviderLinkRequest'
required: true
responses:
"200":
content:
application/json:
examples:
LinkIdPAppUserResponse:
$ref: '#/components/examples/LinkIdPAppUserResponse'
schema:
$ref: '#/components/schemas/IdentityProviderApplicationUser'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Link a User to IdP
tags:
- IdentityProviderUsers
x-codegen-request-body-name: userIdentityProviderLinkRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/idps/{idpId}/users/{userId}/credentials/tokens:
get:
description: |-
Lists the tokens minted by the Social Authentication Provider when the user authenticates with Okta via Social Auth.
Okta doesn't import all the User information from a social provider. If the app needs information that isn't imported, it can get the User token from this endpoint. Then the app can make an API call to the social provider with the token to request the additional information.
operationId: listSocialAuthTokens
parameters:
- description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SocialAuthTokensResponse:
$ref: '#/components/examples/SocialAuthTokensResponse'
schema:
items:
$ref: '#/components/schemas/SocialAuthToken'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.idps.read
summary: List all Tokens from OIDC IdP
tags:
- IdentityProviderUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/inlineHooks:
get:
description: Lists all inline hooks
operationId: listInlineHooks
parameters:
- explode: true
in: query
name: type
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
AuthenticatorConfiguration:
$ref: '#/components/examples/InlineHookTelephony'
schema:
items:
$ref: '#/components/schemas/InlineHook'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.read
summary: List all Inline Hooks
tags:
- InlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates an inline hook
operationId: createInlineHook
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Create an Inline Hook
tags:
- InlineHook
x-codegen-request-body-name: inlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/inlineHooks/{inlineHookId}:
delete:
description: "Deletes an inline hook by `inlineHookId`. Once deleted, the Inline\
\ Hook is unrecoverable. As a safety precaution, only Inline Hooks with a\
\ status of INACTIVE are eligible for deletion."
operationId: deleteInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Delete an Inline Hook
tags:
- InlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an inline hook by `inlineHookId`
operationId: getInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
AuthenticatorConfiguration:
$ref: '#/components/examples/InlineHookTelephony'
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.read
summary: Retrieve an Inline Hook
tags:
- InlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates an inline hook by `inlineHookId`
operationId: updateInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Update an Inline Hook
tags:
- InlineHook
x-codegen-request-body-name: inlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: Replaces an inline hook by `inlineHookId`
operationId: replaceInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Replace an Inline Hook
tags:
- InlineHook
x-codegen-request-body-name: inlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/inlineHooks/{inlineHookId}/execute:
post:
description: Executes the inline hook by `inlineHookId` using the request body
as the input. This will send the provided data through the Channel and return
a response if it matches the correct data contract. This execution endpoint
should only be used for testing purposes.
operationId: executeInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHookPayload'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHookResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Execute an Inline Hook
tags:
- InlineHook
x-codegen-request-body-name: payloadData
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/inlineHooks/{inlineHookId}/lifecycle/activate:
post:
description: Activates the inline hook by `inlineHookId`
operationId: activateInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Activate an Inline Hook
tags:
- InlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/inlineHooks/{inlineHookId}/lifecycle/deactivate:
post:
description: Deactivates the inline hook by `inlineHookId`
operationId: deactivateInlineHook
parameters:
- description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/InlineHook'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.inlineHooks.manage
summary: Deactivate an Inline Hook
tags:
- InlineHook
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/logStreams:
get:
description: Lists all Log Stream objects in your org. You can request a paginated
list or a subset of Log Streams that match a supported filter expression.
operationId: listLogStreams
parameters:
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: "An expression that [filters](/#filter) the returned objects.\
\ You can only use the `eq` operator on either the `status` or `type` properties\
\ in the filter expression."
explode: true
in: query
name: filter
required: false
schema:
example: type eq "aws_eventbridge"
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ExampleGetAllResponse:
$ref: '#/components/examples/LogStreamGetAllResponse'
schema:
items:
$ref: '#/components/schemas/LogStream'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.read
summary: List all Log Streams
tags:
- LogStream
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Creates a new Log Stream object
operationId: createLogStream
requestBody:
content:
application/json:
examples:
LogStreamPostRequestExample:
$ref: '#/components/examples/LogStreamPostRequest'
schema:
$ref: '#/components/schemas/LogStream'
required: true
responses:
"200":
content:
application/json:
examples:
LogStreamPostResponseExample:
$ref: '#/components/examples/LogStreamPostResponse'
schema:
$ref: '#/components/schemas/LogStream'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.manage
summary: Create a Log Stream
tags:
- LogStream
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/logStreams/{logStreamId}:
delete:
description: Deletes a Log Stream object from your org by ID
operationId: deleteLogStream
parameters:
- description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.manage
summary: Delete a Log Stream
tags:
- LogStream
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
get:
description: Retrieves a Log Stream object by ID
operationId: getLogStream
parameters:
- description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
LogStreamGetRequestExample:
$ref: '#/components/examples/LogStreamPostResponse'
schema:
$ref: '#/components/schemas/LogStream'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.read
summary: Retrieve a Log Stream
tags:
- LogStream
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
put:
description: |-
Replaces the Log Stream object properties for a given ID.
This operation is typically used to update the configuration of a Log Stream.
Depending on the type of Log Stream you want to update, certain properties can't be modified after the Log Stream is initially created.
Use the [Retrieve the Log Stream Schema for the schema type](/openapi/okta-management/management/tag/Schema/#tag/Schema/operation/getLogStreamSchema) request to determine which properties you can update for the specific Log Stream type.
Log Stream properties with the `"writeOnce" : true` attribute can't be updated after creation.
You must still specify these `writeOnce` properties in the request body with the original values in the PUT request.
> **Note:** You don't have to specify properties that have both the `"writeOnce": true` and the `"writeOnly": true` attributes in the PUT request body. These property values are ignored even if you add them in the PUT request body.
operationId: replaceLogStream
parameters:
- description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
requestBody:
content:
application/json:
examples:
LogStreamPutRequestExample:
$ref: '#/components/examples/LogStreamPutRequest'
schema:
$ref: '#/components/schemas/LogStreamPutSchema'
required: true
responses:
"200":
content:
application/json:
examples:
LogStreamPostResponseExample:
$ref: '#/components/examples/LogStreamPutResponse'
schema:
$ref: '#/components/schemas/LogStream'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.manage
summary: Replace a Log Stream
tags:
- LogStream
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/logStreams/{logStreamId}/lifecycle/activate:
post:
description: Activates a log stream by `logStreamId`
operationId: activateLogStream
parameters:
- description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
LogStreamActivateResponseExample:
$ref: '#/components/examples/LogStreamActivateResponse'
schema:
$ref: '#/components/schemas/LogStream'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.manage
summary: Activate a Log Stream
tags:
- LogStream
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/logStreams/{logStreamId}/lifecycle/deactivate:
post:
description: Deactivates a log stream by `logStreamId`
operationId: deactivateLogStream
parameters:
- description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
LogStreamDeactivateResponseExample:
$ref: '#/components/examples/LogStreamDeactivateResponse'
schema:
$ref: '#/components/schemas/LogStream'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.manage
summary: Deactivate a Log Stream
tags:
- LogStream
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/logs:
get:
description: Lists all System Log Events
operationId: listLogEvents
parameters:
- description: Filters the lower time bound of the log events `published` property
for bounded queries or persistence time for polling queries
explode: true
in: query
name: since
required: false
schema:
default: 7 days prior to until
format: ISO 8601 compliant timestamp
type: string
style: form
- description: Filters the upper time bound of the log events `published` property
for bounded queries or persistence time for polling queries.
explode: true
in: query
name: until
required: false
schema:
default: current time
format: ISO 8601 compliant timestamp
type: string
style: form
- description: Retrieves the next page of results. Okta returns a link in the
HTTP Header (`rel=next`) that includes the after query parameter
explode: true
in: query
name: after
required: false
schema:
format: Opaque token
type: string
style: form
- description: "Filter expression that filters the results. All operators except\
\ [ ] are supported. See [Filter](https://developer.okta.com/docs/api/#filter)."
explode: true
in: query
name: filter
required: false
schema:
format: SCIM Filter expression
type: string
style: form
- description: Filters log events results by one or more case insensitive keywords.
explode: true
in: query
name: q
required: false
schema:
format: "URL encoded string. Max length is 40 characters per keyword, with\
\ a maximum of 10 keyword filters per query (before encoding)"
type: string
style: form
- description: Sets the number of results that are returned in the response
explode: true
in: query
name: limit
required: false
schema:
default: 100
format: Integer between 0 and 1000
type: integer
style: form
- description: The order of the returned events that are sorted by the `published`
property
explode: true
in: query
name: sortOrder
required: false
schema:
default: ASCENDING
enum:
- ASCENDING
- DESCENDING
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListLogs:
$ref: '#/components/examples/ListLogs'
LogTargetChangeDetails:
$ref: '#/components/examples/LogTargetChangeDetails'
schema:
items:
$ref: '#/components/schemas/LogEvent'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logs.read
summary: List all System Log Events
tags:
- SystemLog
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/mappings:
get:
description: |-
Lists all profile mappings in your organization with [pagination](https://developer.okta.com/docs/api/#pagination). You can return a subset of profile mappings that match a supported `sourceId` and/or `targetId`.
The results are [paginated](/#pagination) according to the limit parameter. If there are multiple pages of results, the Link header contains a `next` link that should be treated as an opaque value (follow it, don't parse it).
The response is a collection of profile mappings that include a subset of the profile mapping object's parameters. The profile mapping object describes
the properties mapping between an Okta User and an App User Profile using [JSON Schema Draft 4](https://datatracker.ietf.org/doc/html/draft-zyp-json-schema-04).
operationId: listProfileMappings
parameters:
- description: Mapping `id` that specifies the pagination cursor for the next
page of mappings
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of results per page (maximum 200)
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
- description: "The UserType or App Instance `id` that acts as the source of\
\ expressions in a mapping. If this parameter is included, all returned\
\ mappings have this as their `source.id`."
explode: true
in: query
name: sourceId
required: false
schema:
type: string
style: form
- description: "The UserType or App Instance `id` that acts as the target of\
\ expressions in a mapping. If this parameter is included, all returned\
\ mappings have this as their `target.id`."
explode: true
in: query
name: targetId
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
MappingList:
$ref: '#/components/examples/ListMappingsResponse'
schema:
items:
$ref: '#/components/schemas/ListProfileMappings'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.profileMappings.read
summary: List all Profile Mappings
tags:
- ProfileMapping
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/mappings/{mappingId}:
get:
description: Retrieves a single Profile Mapping referenced by its ID
operationId: getProfileMapping
parameters:
- description: '`id` of the Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: cB6u7X8mptebWkffatKA
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
MappingRetrieve:
$ref: '#/components/examples/RetrieveMappingsResponse'
schema:
$ref: '#/components/schemas/ProfileMapping'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.profileMappings.read
summary: Retrieve a Profile Mapping
tags:
- ProfileMapping
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: "Updates an existing profile mapping by adding, updating, or removing\
\ one or many property mappings"
operationId: updateProfileMapping
parameters:
- description: '`id` of the Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: cB6u7X8mptebWkffatKA
type: string
style: simple
requestBody:
content:
application/json:
examples:
Addpropertymapping:
$ref: '#/components/examples/AddMappingBody'
Updatepropertymapping:
$ref: '#/components/examples/UpdateMappingBody'
Removepropertymapping:
$ref: '#/components/examples/RemoveMappingBody'
schema:
$ref: '#/components/schemas/ProfileMappingRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Addpropertymapping:
$ref: '#/components/examples/AddMappingResponse'
Updatepropertymapping:
$ref: '#/components/examples/UpdateMappingResponse'
Removepropertymapping:
$ref: '#/components/examples/RemoveMappingResponse'
schema:
$ref: '#/components/schemas/ProfileMapping'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.profileMappings.manage
summary: Update a Profile Mapping
tags:
- ProfileMapping
x-codegen-request-body-name: profileMapping
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/layouts/apps/{appName}: {}
/api/v1/meta/layouts/apps/{appName}/sections/{section}/{operation}: {}
/api/v1/meta/schemas/apps/{appId}/default:
get:
description: |-
Retrieves the default Schema for an App User.
The [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) feature does not extend to apps. All users assigned to a given app use the same App User Schema. Therefore, unlike the User Schema operations, the App User Schema operations all specify `default` and don't accept a Schema ID.
operationId: getApplicationUserSchema
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/UserSchema'
description: successful operation
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.read
summary: Retrieve the default App User Schema for an App
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Updates the App User Schema. This updates, adds, or removes one or more custom profile properties or the nullability of a base property in the App User Schema for an app. Changing a base property's nullability (for example, the value of its `required` field) is allowed only if it is nullable in the default predefined Schema for the App.
The [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) feature does not extend to apps. All users assigned to a given app use the same App User Schema. Therefore, unlike the User Schema operations, the App User Schema operations all specify `default` and don't accept a Schema ID.
operationId: updateApplicationUserProfile
parameters:
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
requestBody:
content:
application/json:
examples:
Add a custom property to the app user schema:
$ref: '#/components/examples/AppUserSchemaAddRequest'
schema:
$ref: '#/components/schemas/UserSchema'
required: false
responses:
"200":
content:
application/json:
examples:
Response with a subset of properties for brevity:
$ref: '#/components/examples/AppUserSchemaResponse'
schema:
$ref: '#/components/schemas/UserSchema'
description: successful operation
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.manage
summary: Update the App User Profile Schema for an App
tags:
- Schema
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/schemas/group/default:
get:
description: |-
Retrieves the Group Schema
The [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) feature does not extend to groups. All groups use the same Group Schema. Unlike User Schema operations, Group Schema operations all specify `default` and don't accept a Schema ID.
operationId: getGroupSchema
parameters: []
responses:
"200":
content:
application/json:
examples:
Response with a subset of properties for brevity:
$ref: '#/components/examples/GroupSchemaResponse'
schema:
$ref: '#/components/schemas/GroupSchema'
description: successful operation
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.read
summary: Retrieve the default Group Schema
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Updates the Group Profile schema. This updates, adds, or removes one or more custom profile properties in a Group Schema. Currently Okta does not support changing base Group Profile properties.
The [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) feature does not extend to groups. All groups use the same Group Schema. Unlike User Schema operations, Group Schema operations all specify `default` and don't accept a Schema ID.
**Note:** Since POST is interpreted as a partial update, you must set properties explicitly to null to remove them from the Schema.
operationId: updateGroupSchema
requestBody:
content:
application/json:
examples:
Add a custom property to the group schema:
$ref: '#/components/examples/GroupSchemaAddRequest'
schema:
$ref: '#/components/schemas/GroupSchema'
responses:
"200":
content:
application/json:
example:
Response with a subset of properties for brevity:
$ref: '#/components/examples/GroupSchemaResponse'
schema:
$ref: '#/components/schemas/GroupSchema'
description: successful operation
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.manage
summary: Update the Group Profile Schema
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/schemas/logStream:
get:
description: Lists the Schema for all Log Stream types visible for this org
operationId: listLogStreamSchemas
responses:
"200":
content:
application/json:
examples:
All log stream schemas for your org:
$ref: '#/components/examples/LogStreamSchemaList'
schema:
items:
$ref: '#/components/schemas/LogStreamSchema'
type: array
description: successful operation
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.read
summary: List the Log Stream Schemas
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/meta/schemas/logStream/{logStreamType}:
get:
description: "Retrieves the Schema for a Log Stream type. The `logStreamType`\
\ element in the URL specifies the Log Stream type, which is either `aws_eventbridge`\
\ or `splunk_cloud_logstreaming`. Use the `aws_eventbridge` literal to retrieve\
\ the AWS EventBridge type schema, and use the `splunk_cloud_logstreaming`\
\ literal retrieve the Splunk Cloud type schema."
operationId: getLogStreamSchema
parameters:
- explode: false
in: path
name: logStreamType
required: true
schema:
$ref: '#/components/schemas/LogStreamType'
style: simple
responses:
"200":
content:
application/json:
examples:
Schema for type `aws_eventbridge`:
$ref: '#/components/examples/LogStreamSchemaAws'
Schema for type `splunk_cloud_logstreaming`:
$ref: '#/components/examples/LogStreamSchemaSplunk'
schema:
$ref: '#/components/schemas/LogStreamSchema'
description: successful operation
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.logStreams.read
summary: Retrieve the Log Stream Schema for the schema type
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/meta/schemas/user/linkedObjects:
get:
description: Lists all Linked Object definitions
operationId: listLinkedObjectDefinitions
responses:
"200":
content:
application/json:
examples:
ListLinkedObjectsEx:
$ref: '#/components/examples/ListLinkedObjects'
schema:
items:
$ref: '#/components/schemas/LinkedObject'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.linkedObjects.read
summary: List all Linked Object Definitions
tags:
- LinkedObject
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a Linked Object definition
operationId: createLinkedObjectDefinition
requestBody:
content:
application/json:
examples:
CreateLinkedObjectRequestEx:
$ref: '#/components/examples/CreateLinkedObjectRequest'
schema:
$ref: '#/components/schemas/LinkedObject'
required: true
responses:
"201":
content:
application/json:
examples:
CreateLinkedObjectResponseEx:
$ref: '#/components/examples/CreateLinkedObjectResponse'
schema:
$ref: '#/components/schemas/LinkedObject'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"409":
content:
application/json:
examples:
ErrorInvalidLinkedObjectDefEx:
$ref: '#/components/examples/ErrorInvalidLinkedObjectDef'
schema:
$ref: '#/components/schemas/Error'
description: Conflict
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.linkedObjects.manage
summary: Create a Linked Object Definition
tags:
- LinkedObject
x-codegen-request-body-name: linkedObject
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/schemas/user/linkedObjects/{linkedObjectName}:
delete:
description: "Deletes the Linked Object definition specified by either the `primary`\
\ or `associated` name. The entire definition is removed, regardless of which\
\ name that you specify."
operationId: deleteLinkedObjectDefinition
parameters:
- description: Primary or Associated name
explode: false
in: path
name: linkedObjectName
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.linkedObjects.manage
summary: Delete a Linked Object Definition
tags:
- LinkedObject
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Linked Object definition
operationId: getLinkedObjectDefinition
parameters:
- description: Primary or Associated name
explode: false
in: path
name: linkedObjectName
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
CreateLinkedObjectResponseEx:
$ref: '#/components/examples/CreateLinkedObjectResponse'
schema:
$ref: '#/components/schemas/LinkedObject'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.linkedObjects.read
summary: Retrieve a Linked Object Definition
tags:
- LinkedObject
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/meta/schemas/user/{schemaId}:
get:
description: Retrieves the Schema for a User Type
operationId: getUserSchema
parameters:
- explode: false
in: path
name: schemaId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Response with a subset of properties for brevity:
$ref: '#/components/examples/UserSchemaResponse'
schema:
$ref: '#/components/schemas/UserSchema'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.read
summary: Retrieve a User Schema
tags:
- Schema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Updates a User Schema. This updates, adds, or removes one or more\
\ profile properties in a User Schema. \n\nUnlike custom User Profile properties,\
\ limited changes are allowed to base User Profile properties (permissions,\
\ nullability of the `firstName` and `lastName` properties, or pattern for\
\ `login`). A property cannot be removed from the default Schema if it is\
\ being referenced as a [matchAttribute](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/)\
\ in SAML2 IdPs. Currently, all validation of SAML assertions is only performed\
\ against the default user type."
operationId: updateUserProfile
parameters:
- explode: false
in: path
name: schemaId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
Add a custom property to the user schema:
$ref: '#/components/examples/UserSchemaAddRequest'
schema:
$ref: '#/components/schemas/UserSchema'
required: true
responses:
"200":
content:
application/json:
examples:
Response with a subset of properties for brevity:
$ref: '#/components/examples/UserSchemaResponse'
schema:
$ref: '#/components/schemas/UserSchema'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.schemas.manage
summary: Update a User Schema
tags:
- Schema
x-codegen-request-body-name: userSchema
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/types/user:
get:
description: Lists all User Types in your org
operationId: listUserTypes
responses:
"200":
content:
application/json:
examples:
ListsAllUserTypes:
$ref: '#/components/examples/ListsAllUserTypes'
schema:
items:
$ref: '#/components/schemas/UserType'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.read
summary: List all User Types
tags:
- UserType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a new User Type. Okta automatically creates a `default` User Type for your org. You may add up to nine additional User Types.
> **Note**: New User Types are based on the current default schema template. Modifications to this schema do not automatically propagate to previously created User Types.
operationId: createUserType
requestBody:
content:
application/json:
examples:
CreateUserRequest:
$ref: '#/components/examples/CreateUserRequest'
schema:
$ref: '#/components/schemas/CreateUserTypeRequest'
required: true
responses:
"200":
content:
application/json:
examples:
CreateUserResponse:
$ref: '#/components/examples/CreateUserResponse'
schema:
$ref: '#/components/schemas/UserType'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.manage
summary: Create a User Type
tags:
- UserType
x-codegen-request-body-name: userType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/types/user/{typeId}:
delete:
description: |-
Deletes a User Type permanently.
> **Note**: You can't delete the default User Type or a User Type that is currently assigned to users.
operationId: deleteUserType
parameters:
- explode: false
in: path
name: typeId
required: true
schema:
description: The unique key for the User Type
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.manage
summary: Delete a User Type
tags:
- UserType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a User Type by ID. Use `default` to fetch the default
User Type.
operationId: getUserType
parameters:
- explode: false
in: path
name: typeId
required: true
schema:
description: The unique key for the User Type
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
GetUserResponse:
$ref: '#/components/examples/GetUserResponse'
schema:
$ref: '#/components/schemas/UserType'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.read
summary: Retrieve a User Type
tags:
- UserType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Updates an existing User Type. This operation is a partial update.
> **Note**: You can only update the `displayName` and `description` elements. The `name` of an existing User Type can't be changed.
operationId: updateUserType
parameters:
- explode: false
in: path
name: typeId
required: true
schema:
description: The unique key for the User Type
type: string
style: simple
requestBody:
content:
application/json:
examples:
UpdateUserTypePostRequest:
$ref: '#/components/examples/UpdateUserTypePostRequest'
schema:
$ref: '#/components/schemas/UserTypePostRequest'
required: true
responses:
"200":
content:
application/json:
examples:
UpdateUserTypePutRequest:
$ref: '#/components/examples/UpdateUserTypePostResponse'
schema:
$ref: '#/components/schemas/UserType'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.manage
summary: Update a User Type
tags:
- UserType
x-codegen-request-body-name: userType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: |-
Replaces an existing User Type. This operation is a full update.
> **Note**: The `name` of an existing User Type can't be changed, but must be part of the request body. You can only replace the `displayName` and `description` elements.
operationId: replaceUserType
parameters:
- explode: false
in: path
name: typeId
required: true
schema:
description: The unique key for the User Type
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceUserTypePutRequest:
$ref: '#/components/examples/ReplaceUserTypePutRequest'
schema:
$ref: '#/components/schemas/UserTypePutRequest'
responses:
"200":
content:
application/json:
examples:
ReplaceUserTypePutResponse:
$ref: '#/components/examples/ReplaceUserTypePutResponse'
schema:
$ref: '#/components/schemas/UserType'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.userTypes.manage
summary: Replace a User Type
tags:
- UserType
x-codegen-request-body-name: userType
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/uischemas:
get:
description: Lists all UI Schemas in your org
operationId: listUISchemas
responses:
"200":
content:
application/json:
examples:
UIISchemaList:
$ref: '#/components/examples/ListUISchemaResponse'
schema:
items:
$ref: '#/components/schemas/UISchemasResponseObject'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.uischemas.read
summary: List all UI Schemas
tags:
- UISchema
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates an input for an enrollment form
operationId: createUISchema
requestBody:
content:
application/json:
examples:
UISchemaCreate:
$ref: '#/components/examples/CreateUISchemaBody'
schema:
$ref: '#/components/schemas/CreateUISchema'
required: true
responses:
"200":
content:
application/json:
examples:
UISchemaCreate:
$ref: '#/components/examples/CreateUISchemaResponse'
schema:
$ref: '#/components/schemas/UISchemasResponseObject'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.uischemas.manage
summary: Create a UI Schema
tags:
- UISchema
x-codegen-request-body-name: uischemabody
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/meta/uischemas/{id}:
delete:
description: Deletes a UI Schema by `id`
operationId: deleteUISchemas
parameters:
- description: The unique ID of the UI Schema
explode: false
in: path
name: id
required: true
schema:
example: uis4a7liocgcRgcxZ0g7
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.uischemas.manage
summary: Delete a UI Schema
tags:
- UISchema
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves a UI Schema by `id`
operationId: getUISchema
parameters:
- description: The unique ID of the UI Schema
explode: false
in: path
name: id
required: true
schema:
example: uis4a7liocgcRgcxZ0g7
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
UISchemaRetrieve:
$ref: '#/components/examples/RetrieveUISchemaResponse'
schema:
$ref: '#/components/schemas/UISchemasResponseObject'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.uischemas.read
summary: Retrieve a UI Schema
tags:
- UISchema
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces a UI Schema by `id`
operationId: replaceUISchemas
parameters:
- description: The unique ID of the UI Schema
explode: false
in: path
name: id
required: true
schema:
example: uis4a7liocgcRgcxZ0g7
type: string
style: simple
requestBody:
content:
application/json:
examples:
UISchemaPUT:
$ref: '#/components/examples/CreateUISchemaBody'
schema:
$ref: '#/components/schemas/UpdateUISchema'
required: true
responses:
"200":
content:
application/json:
examples:
UISchemaUpdate:
$ref: '#/components/examples/CreateUISchemaResponse'
schema:
$ref: '#/components/schemas/UISchemasResponseObject'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.uischemas.manage
summary: Replace a UI Schema
tags:
- UISchema
x-codegen-request-body-name: updateUISchemaBody
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org:
get:
description: Retrieves the Org General Settings
operationId: getOrgSettings
parameters: []
responses:
"200":
content:
application/json:
examples:
example-1:
$ref: '#/components/examples/OrgSettingResponse'
schema:
$ref: '#/components/schemas/OrgSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Org General Settings
tags:
- OrgSettingGeneral
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates partial Org General Settings
operationId: updateOrgSettings
requestBody:
content:
application/json:
examples:
example-1:
$ref: '#/components/examples/UpdateOrgSettingEx'
schema:
$ref: '#/components/schemas/OrgSetting'
responses:
"200":
content:
application/json:
examples:
example-1:
$ref: '#/components/examples/OrgSettingResponse'
schema:
$ref: '#/components/schemas/OrgSetting'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Update the Org General Settings
tags:
- OrgSettingGeneral
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: Replaces the Org General Settings for your Okta org
operationId: replaceOrgSettings
requestBody:
content:
application/json:
examples:
example-1:
$ref: '#/components/examples/UpdateOrgSettingEx'
schema:
$ref: '#/components/schemas/OrgSetting'
required: true
responses:
"200":
content:
application/json:
examples:
example-1:
$ref: '#/components/examples/OrgSettingResponse'
schema:
$ref: '#/components/schemas/OrgSetting'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Replace the Org General Settings
tags:
- OrgSettingGeneral
x-codegen-request-body-name: orgSetting
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/captcha:
delete:
description: Deletes the CAPTCHA settings object for your organization
operationId: deleteOrgCaptchaSettings
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Delete the Org-wide CAPTCHA Settings
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: |-
Retrieves the CAPTCHA settings object for your organization
> **Note**: If the current organization hasn't configured CAPTCHA Settings, the request returns an empty object.
operationId: getOrgCaptchaSettings
responses:
"200":
content:
application/json:
examples:
configured:
$ref: '#/components/examples/OrgCAPTCHASettingsConfigured'
empty:
$ref: '#/components/examples/OrgCAPTCHASettingsEmpty'
schema:
$ref: '#/components/schemas/OrgCAPTCHASettings'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.read
summary: Retrieve the Org-wide CAPTCHA Settings
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: |-
Replaces the CAPTCHA settings object for your organization
> **Note**: You can disable CAPTCHA for your organization by setting `captchaId` and `enabledPages` to `null`.
operationId: replacesOrgCaptchaSettings
requestBody:
content:
application/json:
examples:
Update:
$ref: '#/components/examples/OrgCAPTCHASettingsUpdate'
Disable:
$ref: '#/components/examples/OrgCAPTCHASettingsDisable'
schema:
$ref: '#/components/schemas/OrgCAPTCHASettings'
required: true
responses:
"200":
content:
application/json:
examples:
Update:
$ref: '#/components/examples/OrgCAPTCHASettingsUpdated'
Disable:
$ref: '#/components/examples/OrgCAPTCHASettingsDisabled'
schema:
$ref: '#/components/schemas/OrgCAPTCHASettings'
description: Success
"400":
content:
application/json:
examples:
NoDisable:
$ref: '#/components/examples/ErrorCAPTCHAOrgWideSettingNull'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.captchas.manage
summary: Replace the Org-wide CAPTCHA Settings
tags:
- CAPTCHA
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/contacts:
get:
description: Lists all Org Contact Types for your Okta org
operationId: listOrgContactTypes
parameters: []
responses:
"200":
content:
application/json:
examples:
orgContactTypeEx:
$ref: '#/components/examples/orgContactTypeResponse'
schema:
items:
$ref: '#/components/schemas/OrgContactTypeObj'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: List all Org Contact Types
tags:
- OrgSettingContact
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/contacts/{contactType}:
get:
description: Retrieves the ID and the User resource associated with the specified
Contact Type
operationId: getOrgContactUser
parameters:
- explode: false
in: path
name: contactType
required: true
schema:
description: Type of contact
enum:
- BILLING
- TECHNICAL
example: BILLING
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
contactTypeUserEx:
$ref: '#/components/examples/orgContactUserResponse'
schema:
$ref: '#/components/schemas/OrgContactUser'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Contact Type User
tags:
- OrgSettingContact
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the User associated with the specified Contact Type
operationId: replaceOrgContactUser
parameters:
- explode: false
in: path
name: contactType
required: true
schema:
description: Type of contact
enum:
- BILLING
- TECHNICAL
example: BILLING
type: string
style: simple
requestBody:
content:
application/json:
examples:
contactTypeUserEx:
summary: Contact User
value:
userId: 00ux3u0ujW1r5AfZC1d7
schema:
$ref: '#/components/schemas/OrgContactUser'
required: true
responses:
"200":
content:
application/json:
examples:
contactTypeUserEx:
$ref: '#/components/examples/orgContactUserResponse'
schema:
$ref: '#/components/schemas/OrgContactUser'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Replace the Contact Type User
tags:
- OrgSettingContact
x-codegen-request-body-name: orgContactUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/email/bounces/remove-list:
post:
description: |
Removes emails from an email service bounce list.
The emails submitted in this operation are removed from the bounce list by an asynchronous job.
Any email address that passes validation is accepted for the removal process, even if there are other email addresses in the request that failed validation.
> **Note:** If there are validation errors for all email addresses, a `200 OK` HTTP status is still returned.
operationId: bulkRemoveEmailAddressBounces
requestBody:
content:
application/json:
examples:
example-1:
summary: Request example
value:
emailAddresses:
- [email protected]
- [email protected]
- name@okta@com
schema:
$ref: '#/components/schemas/BouncesRemoveListObj'
responses:
"200":
content:
application/json:
examples:
example-1:
summary: Response example
value:
errors:
- emailAddress: [email protected]
reason: This email address does not belong to any user in your
organization.
- emailAddress: name@okta@com
reason: Invalid email address. The provided email address failed
validation against RFC 3696.
schema:
$ref: '#/components/schemas/BouncesRemoveListResult'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Remove Bounced Emails
tags:
- EmailCustomization
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/factors/yubikey_token/tokens:
get:
description: Lists all YubiKey OTP Tokens
operationId: listYubikeyOtpTokens
parameters:
- description: Specifies the pagination cursor for the next page of tokens
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: "Embeds the [User](/openapi/okta-management/management/tag/User/)\
\ resource if the YubiKey Token is assigned to a user and `expand` is set\
\ to `user`"
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
- description: The expression used to filter tokens
explode: true
in: query
name: filter
required: false
schema:
enum:
- profile.email
- profile.serial
- activated
- user.id
- created
- status
- lastVerified
type: string
style: form
- description: "Returns tokens in a CSV to download instead of in the response.\
\ When you use this query parameter, the `limit` default changes to 1000."
explode: true
in: query
name: forDownload
required: false
schema:
default: false
type: boolean
style: form
- description: Specifies the number of results per page
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
type: integer
style: form
- description: The value of how the tokens are sorted
explode: true
in: query
name: sortBy
required: false
schema:
enum:
- profile.email
- profile.serial
- activated
- user.id
- created
- status
- lastVerified
type: string
style: form
- description: "Specifies the sort order, either `ASC` or `DESC`"
explode: true
in: query
name: sortOrder
required: false
schema:
enum:
- ASC
- DESC
type: string
style: form
responses:
"200":
content:
application/json:
examples:
ListYubikeyOptTokensResponse:
$ref: '#/components/examples/ListYubikeyOptTokensResponse'
schema:
items:
$ref: '#/components/schemas/UserFactorYubikeyOtpToken'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all YubiKey OTP Tokens
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Uploads a seed for a user to enroll a YubiKey OTP
operationId: uploadYubikeyOtpTokenSeed
parameters:
- description: Specifies the pagination cursor for the next page of tokens
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: "Embeds the [User](/openapi/okta-management/management/tag/User/)\
\ resource if the YubiKey Token is assigned to a user and `expand` is set\
\ to `user`"
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
- description: The expression used to filter tokens
explode: true
in: query
name: filter
required: false
schema:
enum:
- profile.email
- profile.serial
- activated
- user.id
- created
- status
- lastVerified
type: string
style: form
- description: "Returns tokens in a CSV to download instead of in the response.\
\ When you use this query parameter, the `limit` default changes to 1000."
explode: true
in: query
name: forDownload
required: false
schema:
default: false
type: boolean
style: form
- description: Specifies the number of results per page
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
type: integer
style: form
- description: The value of how the tokens are sorted
explode: true
in: query
name: sortBy
required: false
schema:
enum:
- profile.email
- profile.serial
- activated
- user.id
- created
- status
- lastVerified
type: string
style: form
- description: "Specifies the sort order, either `ASC` or `DESC`"
explode: true
in: query
name: sortOrder
required: false
schema:
enum:
- ASC
- DESC
type: string
style: form
requestBody:
content:
application/json:
examples:
uploadYubikeyOtpSeedRequest:
$ref: '#/components/examples/UploadYubikeyTokenSeedRequest'
schema:
$ref: '#/components/schemas/uploadYubikeyOtpTokenSeed_request'
required: true
responses:
"200":
content:
application/json:
examples:
yubikeyToken:
$ref: '#/components/examples/UploadYubikeyTokenSeedResponse'
schema:
$ref: '#/components/schemas/UserFactorYubikeyOtpToken'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Upload a YubiKey OTP Seed
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/factors/yubikey_token/tokens/{tokenId}:
get:
description: Retrieves the specified YubiKey OTP Token by `id`
operationId: getYubikeyOtpTokenById
parameters:
- description: ID of a Yubikey token
explode: false
in: path
name: tokenId
required: true
schema:
example: ykkxdtCA1fKVxyu6R0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Token:
$ref: '#/components/examples/GetYubikeyOptTokenResponse'
schema:
$ref: '#/components/schemas/UserFactorYubikeyOtpToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a YubiKey OTP Token
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/logo:
post:
description: Uploads and replaces the logo for your organization
operationId: uploadOrgLogo
requestBody:
content:
multipart/form-data:
schema:
$ref: '#/components/schemas/uploadOrgLogo_request'
description: logo file
responses:
"201":
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.apps.manage
summary: Upload the Org Logo
tags:
- OrgSettingCustomization
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: multipart/form-data
x-accepts:
- application/json
/api/v1/org/orgSettings/thirdPartyAdminSetting:
get:
description: "Retrieves the Third-Party Admin Setting. See [Configure third-party\
\ administrators](https://help.okta.com/okta_help.htm?type=oie&id=csh_admin-third)\
\ in the Okta product documentation."
operationId: getThirdPartyAdminSetting
parameters: []
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ThirdPartyAdminSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Org Third-Party Admin Setting
tags:
- OrgSettingAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |
Updates the Third-Party Admin Setting.
This setting allows third-party admins to perform administrative actions in the Admin Console, but they can't do any of the following:
* Receive Okta admin email notifications
* Contact Okta support
* Sign in to the Okta Help Center
See [Configure third-party administrators](https://help.okta.com/okta_help.htm?type=oie&id=csh_admin-third) in the Okta product documentation.
operationId: updateThirdPartyAdminSetting
parameters: []
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/ThirdPartyAdminSetting'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ThirdPartyAdminSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Update the Org Third-Party Admin Setting
tags:
- OrgSettingAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/preferences:
get:
description: Retrieves preferences of your Okta org
operationId: getOrgPreferences
parameters: []
responses:
"200":
content:
application/json:
examples:
retrieveOrgPrefEx:
$ref: '#/components/examples/orgShowFooterPrefResponse'
schema:
$ref: '#/components/schemas/OrgPreferences'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Org Preferences
tags:
- OrgSettingCustomization
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/preferences/hideEndUserFooter:
post:
description: Sets the preference to hide the Okta UI footer for all end users
of your org
operationId: setOrgHideOktaUIFooter
parameters: []
responses:
"200":
content:
application/json:
examples:
hideOrgPrefEx:
$ref: '#/components/examples/orgHideFooterPrefResponse'
schema:
$ref: '#/components/schemas/OrgPreferences'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Set the Hide Dashboard Footer Preference
tags:
- OrgSettingCustomization
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/preferences/showEndUserFooter:
post:
description: Sets the preference to show the Okta UI footer for all end users
of your org
operationId: setOrgShowOktaUIFooter
parameters: []
responses:
"200":
content:
application/json:
examples:
showOrgPrefEx:
$ref: '#/components/examples/orgShowFooterPrefResponse'
schema:
$ref: '#/components/schemas/OrgPreferences'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Set the Show Dashboard Footer Preference
tags:
- OrgSettingCustomization
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/aerial:
get:
description: Retrieves the Okta Aerial consent grant details for your Org. Returns
a 404 Not Found error if no consent has been granted.
operationId: getAerialConsent
parameters: []
responses:
"200":
content:
application/json:
examples:
example-read-grant-response:
$ref: '#/components/examples/AerialConsentDetails'
schema:
$ref: '#/components/schemas/OrgAerialConsentDetails'
description: Success
"400":
content:
application/json:
examples:
example-no-already-present-response:
$ref: '#/components/examples/AerialGrantAlreadyPresentErrorResponse'
schema:
$ref: '#/components/schemas/Error'
description: Can't complete request due to errors
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
example-no-grant-found-response:
$ref: '#/components/examples/AerialGrantNotFoundResponse'
schema:
$ref: '#/components/schemas/Error'
description: Consent hasn't been given and there are no grants to any Aerial
Accounts
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Retrieve Okta Aerial consent for your Org
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/org/privacy/aerial/grant:
post:
description: "Grants an Okta Aerial account access to your Org. If the org is\
\ a child org, consent is taken from the parent org. Grant calls directly\
\ to the child are not allowed."
operationId: grantAerialConsent
parameters: []
requestBody:
content:
application/json:
examples:
example-grant-call:
description: Request body to grant an Okta Aerial account access to
your Org
value:
accountId: 0200bs0617vvhv2v675mch1cukp
schema:
$ref: '#/components/schemas/OrgAerialConsent'
responses:
"200":
content:
application/json:
examples:
example-grant-success-response:
$ref: '#/components/examples/AerialConsentDetails'
schema:
$ref: '#/components/schemas/OrgAerialConsentDetails'
description: Success
"400":
content:
application/json:
examples:
example-invalid-account-id:
$ref: '#/components/examples/AerialConsentInvalidAccountIdResponse'
schema:
$ref: '#/components/schemas/Error'
description: Can't complete request due to errors
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Grant Okta Aerial access to your Org
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/privacy/aerial/revoke:
post:
description: Revokes access of an Okta Aerial account to your Org. The revoke
operation will fail if the org has already been added to an Aerial account.
operationId: revokeAerialConsent
parameters: []
requestBody:
content:
application/json:
examples:
example-revoke-request:
description: Request body for revoking an Okta Aerial account
value:
accountId: 0200bs0617vvhv2v675mch1cukp
schema:
$ref: '#/components/schemas/OrgAerialConsent'
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/OrgAerialConsentRevoked'
description: Success
"400":
content:
application/json:
examples:
example-org-is-linked:
$ref: '#/components/examples/AerialConsentOrgAlreadyLinkedResponse'
schema:
$ref: '#/components/schemas/Error'
description: Can't complete request due to errors
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Revoke Okta Aerial access to your Org
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/org/privacy/oktaCommunication:
get:
description: Retrieves Okta Communication Settings of your org
operationId: getOktaCommunicationSettings
parameters: []
responses:
"200":
content:
application/json:
examples:
retrieveOktaCommSettingsEx:
$ref: '#/components/examples/orgCommunicationOptOutResponse'
schema:
$ref: '#/components/schemas/OrgOktaCommunicationSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Okta Communication Settings
tags:
- OrgSettingCommunication
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaCommunication/optIn:
post:
description: Opts in all users of this org to Okta communication emails
operationId: optInUsersToOktaCommunicationEmails
parameters: []
responses:
"200":
content:
application/json:
examples:
optInOktaCommSettingsEx:
$ref: '#/components/examples/orgCommunicationOptInResponse'
schema:
$ref: '#/components/schemas/OrgOktaCommunicationSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Opt in to Okta User Communication Emails
tags:
- OrgSettingCommunication
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaCommunication/optOut:
post:
description: Opts out all users of this org from Okta communication emails
operationId: optOutUsersFromOktaCommunicationEmails
parameters: []
responses:
"200":
content:
application/json:
examples:
optOutOktaCommSettingsEx:
$ref: '#/components/examples/orgCommunicationOptOutResponse'
schema:
$ref: '#/components/schemas/OrgOktaCommunicationSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Opt out of Okta User Communication Emails
tags:
- OrgSettingCommunication
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaSupport:
get:
description: Retrieves Okta Support Settings for your org
operationId: getOrgOktaSupportSettings
parameters: []
responses:
"200":
content:
application/json:
examples:
RetrieveOktaSupportEx:
$ref: '#/components/examples/orgSupportSettingsResponse'
schema:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Okta Support Settings
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaSupport/extend:
post:
description: Extends the length of time that Okta Support can access your org
by 24 hours. This means that 24 hours are added to the remaining access time.
operationId: extendOktaSupport
parameters: []
responses:
"200":
content:
application/json:
examples:
ExtendOktaSupportEx:
$ref: '#/components/examples/orgSupportSettingsResponse'
schema:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Extend Okta Support Access
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaSupport/grant:
post:
description: Grants Okta Support temporary access your org as an administrator
for eight hours
operationId: grantOktaSupport
parameters: []
responses:
"200":
content:
application/json:
examples:
GrantOktaSupportEx:
$ref: '#/components/examples/orgSupportSettingsResponse'
schema:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Grant Okta Support Access
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/privacy/oktaSupport/revoke:
post:
description: Revokes Okta Support access to your org
operationId: revokeOktaSupport
parameters: []
responses:
"200":
content:
application/json:
examples:
RevokeOktaSupportEx:
$ref: '#/components/examples/orgSupportSettingsRevokeResponse'
schema:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Revoke Okta Support Access
tags:
- OrgSettingSupport
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/org/settings/clientPrivilegesSetting:
get:
description: "Retrieves the org setting to assign the [Super Admin role](https://help.okta.com/okta_help.htm?type=oie&id=ext_superadmin)\
\ to new public client apps"
operationId: getClientPrivilegesSetting
parameters: []
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ClientPrivilegesSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Default Public Client App Role Setting
tags:
- OrgSettingAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Assigns the [Super Admin role](https://help.okta.com/okta_help.htm?type=oie&id=ext_superadmin)\
\ as the default role for new public client apps"
operationId: assignClientPrivilegesSetting
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/ClientPrivilegesSetting'
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/ClientPrivilegesSetting'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Assign the Default Public Client App Role Setting
tags:
- OrgSettingAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/orgs:
post:
description: |-
Creates an Org (child org) that has the same features as the current requesting org (parent org).
A child org inherits any new features added to the parent org, but new features added to the child org aren't propagated back to the parent org.
> **Notes:**
> * Some features associated with products, such as Atspoke, Workflows, and Okta Identity Governance, aren't propagated to the child Org.
> * Wait at least 30 seconds after a 201-Created response before you make API requests to the new child Org.
> * For rate limits, see [Org creation rate limits](https://developer.okta.com/docs/reference/rl-additional-limits/#org-creation-rate-limits).
operationId: createChildOrg
requestBody:
content:
application/json:
examples:
CreateChildOrg:
$ref: '#/components/examples/CreateChildOrgRequestEx'
schema:
$ref: '#/components/schemas/ChildOrg'
responses:
"201":
content:
application/json:
examples:
CreateChildOrg:
$ref: '#/components/examples/CreateChildOrgResponseEx'
schema:
$ref: '#/components/schemas/ChildOrg'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
"500":
content:
application/json:
examples:
InternalServerError:
$ref: '#/components/examples/ErrorInternalServer'
schema:
$ref: '#/components/schemas/Error'
description: Internal Server Error
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Create an Org
tags:
- OrgCreator
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies:
get:
description: Lists all policies with the specified type
operationId: listPolicies
parameters:
- description: |-
Specifies the type of policy to return. The following policy types are available only with the Okta Identity Engine - `ACCESS_POLICY`, `PROFILE_ENROLLMENT`, `POST_AUTH_SESSION`, and `ENTITY_RISK`.
The `POST_AUTH_SESSION` and `ENTITY_RISK` policy types are in . Contact your Okta account team to enable these features.
explode: true
in: query
name: type
required: true
schema:
enum:
- OKTA_SIGN_ON
- PASSWORD
- MFA_ENROLL
- IDP_DISCOVERY
- ACCESS_POLICY
- PROFILE_ENROLLMENT
- POST_AUTH_SESSION
- ENTITY_RISK
type: string
style: form
- description: Refines the query by the `status` of the policy - `ACTIVE` or
`INACTIVE`
explode: true
in: query
name: status
required: false
schema:
type: string
style: form
- description: Refines the query by policy name prefix (startWith method) passed
in as `q=string`
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- explode: true
in: query
name: expand
required: false
schema:
default: ""
type: string
style: form
- description: Refines the query by sorting on the policy `name` in ascending
order
explode: true
in: query
name: sortBy
required: false
schema:
type: string
style: form
- description: "Defines the number of policies returned, see [Pagination](https://developer.okta.com/docs/api/#pagination)"
explode: true
in: query
name: limit
required: false
schema:
type: string
style: form
- description: Reference to the associated authorization server
explode: true
in: query
name: resourceId
required: false
schema:
type: string
style: form
- description: "End page cursor for pagination, see [Pagination](https://developer.okta.com/docs/api/#pagination)"
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
password:
$ref: '#/components/examples/password-policy-response'
mfa-enroll:
$ref: '#/components/examples/mfa-enroll-policy-response'
idp-discovery:
$ref: '#/components/examples/idp-discovery-policy-response'
profile-enrollment:
$ref: '#/components/examples/profile-enrollment-policy-response'
schema:
items:
$ref: '#/components/schemas/Policy'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: List all Policies
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates a policy. There are many types of policies that you can\
\ create. See [Policies](https://developer.okta.com/docs/concepts/policies/)\
\ for an overview of the types of policies available and then links to more\
\ indepth information."
operationId: createPolicy
parameters:
- description: This query parameter is only valid for Classic Engine orgs.
explode: true
in: query
name: activate
required: false
schema:
default: true
type: boolean
style: form
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/Policy'
required: true
responses:
"200":
content:
application/json:
examples:
password:
$ref: '#/components/examples/password-policy-response'
mfa-enroll:
$ref: '#/components/examples/mfa-enroll-policy-response'
idp-discovery:
$ref: '#/components/examples/idp-discovery-policy-response'
profile-enrollment:
$ref: '#/components/examples/profile-enrollment-policy-response'
schema:
$ref: '#/components/schemas/Policy'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Create a Policy
tags:
- Policy
x-codegen-request-body-name: policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/simulate:
post:
description: |-
Creates a policy or policy rule simulation. The access simulation evaluates policy and policy rules based on the existing policy rule configuration.
The evaluation result simulates what the real-world authentication flow is and what policy rules have been applied or matched to the authentication flow.
operationId: createPolicySimulation
parameters:
- description: Use `expand=EVALUATED` to include a list of evaluated but not
matched policies and policy rules. Use `expand=RULE` to include details
about why a rule condition wasn't matched.
explode: true
in: query
name: expand
required: false
schema:
example: EVALUATED
type: string
style: form
requestBody:
content:
application/json:
examples:
SimulatePolicy:
$ref: '#/components/examples/SimulatePolicyBody'
schema:
items:
$ref: '#/components/schemas/SimulatePolicyBody'
type: array
required: true
responses:
"200":
content:
application/json:
examples:
SimulatePolicy:
$ref: '#/components/examples/SimulatePolicyResponse'
schema:
$ref: '#/components/schemas/SimulatePolicyResponse'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: Create a Policy Simulation
tags:
- Policy
x-codegen-request-body-name: simulatePolicy
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/{policyId}:
delete:
description: Deletes a policy
operationId: deletePolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Delete a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a policy
operationId: getPolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- explode: true
in: query
name: expand
required: false
schema:
default: ""
type: string
style: form
responses:
"200":
content:
application/json:
examples:
password:
$ref: '#/components/examples/password-policy-response'
mfa-enroll:
$ref: '#/components/examples/mfa-enroll-policy-response'
idp-discovery:
$ref: '#/components/examples/idp-discovery-policy-response'
profile-enrollment:
$ref: '#/components/examples/profile-enrollment-policy-response'
schema:
$ref: '#/components/schemas/Policy'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: Retrieve a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the properties of a Policy identified by `policyId`
operationId: replacePolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/Policy'
required: true
responses:
"200":
content:
application/json:
examples:
password:
$ref: '#/components/examples/password-policy-response'
mfa-enroll:
$ref: '#/components/examples/mfa-enroll-policy-response'
idp-discovery:
$ref: '#/components/examples/idp-discovery-policy-response'
profile-enrollment:
$ref: '#/components/examples/profile-enrollment-policy-response'
schema:
$ref: '#/components/schemas/Policy'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Replace a Policy
tags:
- Policy
x-codegen-request-body-name: policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/{policyId}/app:
get:
deprecated: true
description: |-
Lists all applications mapped to a policy identified by `policyId`
> **Note:** Use [List all resources mapped to a Policy](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Policy/#tag/Policy/operation/listPolicyMappings) to list all applications mapped to a policy.
operationId: listPolicyApps
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Application'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: List all Applications mapped to a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/policies/{policyId}/clone:
post:
description: Clones an existing policy
operationId: clonePolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
password:
$ref: '#/components/examples/password-policy-response'
mfa-enroll:
$ref: '#/components/examples/mfa-enroll-policy-response'
idp-discovery:
$ref: '#/components/examples/idp-discovery-policy-response'
profile-enrollment:
$ref: '#/components/examples/profile-enrollment-policy-response'
schema:
$ref: '#/components/schemas/Policy'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Clone an existing Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/policies/{policyId}/lifecycle/activate:
post:
description: Activates a policy
operationId: activatePolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Activate a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/policies/{policyId}/lifecycle/deactivate:
post:
description: Deactivates a policy
operationId: deactivatePolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Deactivate a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/policies/{policyId}/mappings:
get:
description: Lists all resources mapped to a Policy identified by `policyId`
operationId: listPolicyMappings
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
policy-mapping-response:
$ref: '#/components/examples/policy-mapping-list-response'
schema:
items:
$ref: '#/components/schemas/PolicyMapping'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: List all resources mapped to a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Maps a resource to a Policy identified by `policyId`
operationId: mapResourceToPolicy
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/PolicyMappingRequest'
required: true
responses:
"200":
content:
application/json:
examples:
policy-mapping-response:
$ref: '#/components/examples/policy-mapping-response'
schema:
$ref: '#/components/schemas/PolicyMapping'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Map a resource to a Policy
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/{policyId}/mappings/{mappingId}:
delete:
description: Deletes the resource Mapping for a Policy identified by `policyId`
and `mappingId`
operationId: deletePolicyResourceMapping
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the policy resource Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: maplr2rLjZ6NsGn1P0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Delete a policy resource Mapping
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a resource Mapping for a Policy identified by `policyId`
and `mappingId`
operationId: getPolicyMapping
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the policy resource Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: maplr2rLjZ6NsGn1P0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
policy-mapping-response:
$ref: '#/components/examples/policy-mapping-response'
schema:
$ref: '#/components/schemas/PolicyMapping'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: Retrieve a policy resource Mapping
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/policies/{policyId}/rules:
get:
description: Lists all policy rules
operationId: listPolicyRules
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: "Defines the number of policy rules returned. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: limit
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
SignOnPolicy:
$ref: '#/components/examples/list-all-policy-rule-response-array'
schema:
items:
$ref: '#/components/schemas/PolicyRule'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: List all Policy Rules
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a policy rule
> **Note:** You can't create additional rules for the `PROFILE_ENROLLMENT` or `POST_AUTH_SESSION` policies.
operationId: createPolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: "Defines the number of policy rules returned. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: limit
required: false
schema:
type: string
style: form
- description: Set this parameter to `false` to create an `INACTIVE` rule.
explode: true
in: query
name: activate
required: false
schema:
default: true
type: boolean
style: form
requestBody:
content:
application/json:
examples:
EnableSsprSecurityQuestionStepUp:
$ref: '#/components/examples/sspr-enabled-sq-step-up'
EnableSsprSSOStepUp:
$ref: '#/components/examples/sspr-enabled-sso-step-up'
EnableSsprNoStepUp:
$ref: '#/components/examples/sspr-enabled-no-step-up'
EnableSsprOAMP:
$ref: '#/components/examples/sspr-enabled-OAMP'
Enable2FAPreciseAuth:
$ref: '#/components/examples/twofa-enabled-disallow-password-allow-phishing'
EnableSpecificRoutingRule:
$ref: '#/components/examples/idp-discovery-specific-routing-rule'
EnableDynamicRoutingRule:
$ref: '#/components/examples/idp-discovery-dynamic-routing-rule'
CreateAuthPolicyRuleDevicePlatformCondition:
$ref: '#/components/examples/create-auth-policy-rule-condition'
SignOnPolicy:
$ref: '#/components/examples/sign-on-policy-rule'
SkipFactorChallengeOnPremRule:
$ref: '#/components/examples/skip-factor-challenge-on-prem-rule'
RadiusRule:
$ref: '#/components/examples/radius-rule'
CloudRule:
$ref: '#/components/examples/cloud-rule'
DenyRule:
$ref: '#/components/examples/deny-rule'
EnableSsprWithConstraints:
$ref: '#/components/examples/sspr-enabled-sso-step-up-with-constraints'
schema:
$ref: '#/components/schemas/PolicyRule'
required: true
responses:
"200":
content:
application/json:
examples:
EnableSsprSecurityQuestionStepUp:
$ref: '#/components/examples/sspr-enabled-sq-step-up-response'
EnableSsprSSOStepUp:
$ref: '#/components/examples/sspr-enabled-sso-step-up-response'
EnableSsprNoStepUp:
$ref: '#/components/examples/sspr-enabled-no-step-up-response'
EnableSsprWithOAMP:
$ref: '#/components/examples/sspr-enabled-OAMP-response'
Enable2FAPreciseAuth:
$ref: '#/components/examples/twofa-enabled-disallow-password-allow-phishing-response'
EnableSpecificRoutingRule:
$ref: '#/components/examples/idp-discovery-specific-routing-rule-response'
EnableDynamicRoutingRule:
$ref: '#/components/examples/idp-discovery-dynamic-routing-rule-response'
CreateAuthPolicyRuleDevicePlatformCondition:
$ref: '#/components/examples/create-auth-policy-rule-condition-response'
SignOnPolicy:
$ref: '#/components/examples/sign-on-policy-rule-response'
SkipFactorChallengeOnPremRule:
$ref: '#/components/examples/skip-factor-challenge-on-prem-rule-response'
RadiusRule:
$ref: '#/components/examples/radius-rule-response'
CloudRule:
$ref: '#/components/examples/cloud-rule-response'
DenyRule:
$ref: '#/components/examples/deny-rule-response'
EnableSsprWithConstraints:
$ref: '#/components/examples/sspr-enabled-sso-step-up-with-constraints-response'
schema:
$ref: '#/components/schemas/PolicyRule'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Create a Policy Rule
tags:
- Policy
x-codegen-request-body-name: policyRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/{policyId}/rules/{ruleId}:
delete:
description: Deletes a Policy Rule identified by `policyId` and `ruleId`
operationId: deletePolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Delete a Policy Rule
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a policy rule
operationId: getPolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
EnableSsprSecurityQuestionStepUp:
$ref: '#/components/examples/sspr-enabled-sq-step-up-update'
EnableSsprSSOStepUp:
$ref: '#/components/examples/sspr-enabled-sso-step-up-update'
EnableSsprNoStepUp:
$ref: '#/components/examples/sspr-enabled-no-step-up-update'
EnableSsprWithOAMP:
$ref: '#/components/examples/sspr-enabled-OAMP-update'
EnableSpecificRoutingRule:
$ref: '#/components/examples/idp-discovery-specific-routing-rule-response'
EnableDynamicRoutingRule:
$ref: '#/components/examples/idp-discovery-dynamic-routing-rule-response'
SignOnPolicy:
$ref: '#/components/examples/sign-on-policy-rule-response'
SkipFactorChallengeOnPremRule:
$ref: '#/components/examples/skip-factor-challenge-on-prem-rule-response'
RadiusRule:
$ref: '#/components/examples/radius-rule-response'
CloudRule:
$ref: '#/components/examples/cloud-rule-response'
DenyRule:
$ref: '#/components/examples/deny-rule-response'
EnableSsprWithConstraints:
$ref: '#/components/examples/sspr-enabled-sso-step-up-with-constraints-update'
schema:
$ref: '#/components/schemas/PolicyRule'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.read
summary: Retrieve a Policy Rule
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the properties for a Policy Rule identified by `policyId`
and `ruleId`
operationId: replacePolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
requestBody:
content:
application/json:
examples:
EnableSsprSecurityQuestionStepUp:
$ref: '#/components/examples/sspr-enabled-sq-step-up-update'
EnableSsprSSOStepUp:
$ref: '#/components/examples/sspr-enabled-sso-step-up-update'
EnableSsprNoStepUp:
$ref: '#/components/examples/sspr-enabled-no-step-up-update'
UpdateAuthenticationPolicyRuleWithPlatformDeviceConstraints:
$ref: '#/components/examples/update-auth-policy-rule-condition'
EnableSpecificRoutingRule:
$ref: '#/components/examples/idp-discovery-specific-routing-rule'
EnableDynamicRoutingRule:
$ref: '#/components/examples/idp-discovery-dynamic-routing-rule'
SignOnPolicy:
$ref: '#/components/examples/sign-on-policy-rule'
SkipFactorChallengeOnPremRule:
$ref: '#/components/examples/skip-factor-challenge-on-prem-rule'
RadiusRule:
$ref: '#/components/examples/radius-rule'
CloudRule:
$ref: '#/components/examples/cloud-rule'
DenyRule:
$ref: '#/components/examples/deny-rule'
EnableSsprWithConstraints:
$ref: '#/components/examples/sspr-enabled-sso-step-up-with-constraints-update'
schema:
$ref: '#/components/schemas/PolicyRule'
required: true
responses:
"200":
content:
application/json:
examples:
EnableSsprSecurityQuestionStepUp:
$ref: '#/components/examples/sspr-enabled-sq-step-up-response'
EnableSsprSSOStepUp:
$ref: '#/components/examples/sspr-enabled-sso-step-up-response'
EnableSsprNoStepUp:
$ref: '#/components/examples/sspr-enabled-no-step-up-response'
UpdateAuthenticationPolicyRuleWithPlatformDeviceConstraints:
$ref: '#/components/examples/update-auth-policy-rule-condition-response'
EnableSpecificRoutingRule:
$ref: '#/components/examples/idp-discovery-specific-routing-rule-response'
EnableDynamicRoutingRule:
$ref: '#/components/examples/idp-discovery-dynamic-routing-rule-response'
SignOnPolicy:
$ref: '#/components/examples/sign-on-policy-rule-response'
SkipFactorChallengeOnPremRule:
$ref: '#/components/examples/skip-factor-challenge-on-prem-rule-response'
RadiusRule:
$ref: '#/components/examples/radius-rule-response'
CloudRule:
$ref: '#/components/examples/cloud-rule-response'
DenyRule:
$ref: '#/components/examples/deny-rule-response'
EnableSsprWithConstraints:
$ref: '#/components/examples/sspr-enabled-sso-step-up-with-constraints-response'
schema:
$ref: '#/components/schemas/PolicyRule'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Replace a Policy Rule
tags:
- Policy
x-codegen-request-body-name: policyRule
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/activate:
post:
description: Activates a Policy Rule identified by `policyId` and `ruleId`
operationId: activatePolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Activate a Policy Rule
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate:
post:
description: Deactivates a Policy Rule identified by `policyId` and `ruleId`
operationId: deactivatePolicyRule
parameters:
- description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
- description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.policies.manage
summary: Deactivate a Policy Rule
tags:
- Policy
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/principal-rate-limits:
get:
description: Lists all Principal Rate Limit entities considering the provided
parameters
operationId: listPrincipalRateLimitEntities
parameters:
- explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 50
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
type: array
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.principalRateLimits.read
summary: List all Principal Rate Limits
tags:
- PrincipalRateLimit
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates a new Principal Rate Limit entity. In the current release,\
\ we only allow one Principal Rate Limit entity per org and principal."
operationId: createPrincipalRateLimitEntity
requestBody:
content:
application/json:
examples:
SSWSToken:
$ref: '#/components/examples/PrincipalRateLimitEntityRequestSSWSToken'
EmptyPercentages:
$ref: '#/components/examples/PrincipalRateLimitEntityRequestEmptyPercentages'
schema:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
required: true
responses:
"201":
content:
application/json:
examples:
SSWSToken:
$ref: '#/components/examples/PrincipalRateLimitEntityResponseSSWSToken'
schema:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.principalRateLimits.manage
summary: Create a Principal Rate Limit
tags:
- PrincipalRateLimit
x-codegen-request-body-name: entity
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/principal-rate-limits/{principalRateLimitId}:
get:
description: Retrieves a Principal Rate Limit entity by `principalRateLimitId`
operationId: getPrincipalRateLimitEntity
parameters:
- description: id of the Principal Rate Limit
explode: false
in: path
name: principalRateLimitId
required: true
schema:
example: abcd1234
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SSWSToken:
$ref: '#/components/examples/PrincipalRateLimitEntityResponseSSWSToken'
schema:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.principalRateLimits.read
summary: Retrieve a Principal Rate Limit
tags:
- PrincipalRateLimit
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces a principal rate limit entity by `principalRateLimitId`
operationId: replacePrincipalRateLimitEntity
parameters:
- description: id of the Principal Rate Limit
explode: false
in: path
name: principalRateLimitId
required: true
schema:
example: abcd1234
type: string
style: simple
requestBody:
content:
application/json:
examples:
SSWSToken:
$ref: '#/components/examples/PrincipalRateLimitEntityRequestSSWSToken'
EmptyPercentages:
$ref: '#/components/examples/PrincipalRateLimitEntityRequestEmptyPercentages'
schema:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
required: true
responses:
"200":
content:
application/json:
examples:
SSWSToken:
$ref: '#/components/examples/PrincipalRateLimitEntityResponseSSWSToken'
schema:
$ref: '#/components/schemas/PrincipalRateLimitEntity'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.principalRateLimits.manage
summary: Replace a Principal Rate Limit
tags:
- PrincipalRateLimit
x-codegen-request-body-name: entity
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/push-providers:
get:
description: Lists all push providers
operationId: listPushProviders
parameters:
- description: Filters push providers by `providerType`
explode: true
in: query
name: type
required: false
schema:
$ref: '#/components/schemas/ProviderType'
style: form
responses:
"200":
content:
application/json:
example:
value:
- id: ppchvbeucdTgqeiGxR0g4
providerType: APNS
name: Example Push Provider 1
lastUpdatedDate: 2022-01-00T00:00:00.000Z
configuration:
keyId: ABC123DEFG
teamId: DEF123GHIJ
fileName: fileName.p8
_links:
self:
href: "https://your-subdomain.okta.com/api/v1/push-providers/{pushProviderId}"
hints:
allow:
- DELETE
- GET
- PUT
- id: ppctekcmngGaqeiBxB0g4
providerType: FCM
name: Example Push Provider 2
lastUpdatedDate: 2022-01-00T00:00:00.000Z
configuration:
projectId: PROJECT_ID
fileName: fileName.json
_links:
self:
href: "https://your-subdomain.okta.com/api/v1/push-providers/{pushProviderId}"
hints:
allow:
- DELETE
- GET
- PUT
schema:
items:
$ref: '#/components/schemas/PushProvider'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.pushProviders.read
summary: List all Push Providers
tags:
- PushProvider
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates a new push provider. Each Push Provider must have a unique
`name`.
operationId: createPushProvider
requestBody:
content:
application/json:
examples:
APNs:
$ref: '#/components/examples/PushProviderAPNsRequest'
FCM:
$ref: '#/components/examples/PushProviderFCMRequest'
schema:
$ref: '#/components/schemas/PushProvider'
required: true
responses:
"200":
content:
application/json:
examples:
APNs:
$ref: '#/components/examples/PushProviderAPNsResponse'
FCM:
$ref: '#/components/examples/PushProviderFCMResponse'
schema:
$ref: '#/components/schemas/PushProvider'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.pushProviders.manage
summary: Create a Push Provider
tags:
- PushProvider
x-codegen-request-body-name: pushProvider
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/push-providers/{pushProviderId}:
delete:
description: "Deletes a push provider by `pushProviderId`. If the push provider\
\ is currently being used in the org by a custom authenticator, the delete\
\ will not be allowed."
operationId: deletePushProvider
parameters:
- description: Id of the push provider
explode: false
in: path
name: pushProviderId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"409":
content:
application/json:
examples:
Cannot remove push provider in use by a custom app authenticator:
$ref: '#/components/examples/ErrorPushProviderUsedByCustomAppAuthenticator'
schema:
$ref: '#/components/schemas/Error'
description: Conflict
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.pushProviders.manage
summary: Delete a Push Provider
tags:
- PushProvider
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves a push provider by `pushProviderId`
operationId: getPushProvider
parameters:
- description: Id of the push provider
explode: false
in: path
name: pushProviderId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
APNs:
$ref: '#/components/examples/PushProviderAPNsResponse'
FCM:
$ref: '#/components/examples/PushProviderFCMResponse'
schema:
$ref: '#/components/schemas/PushProvider'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.pushProviders.read
summary: Retrieve a Push Provider
tags:
- PushProvider
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces a push provider by `pushProviderId`
operationId: replacePushProvider
parameters:
- description: Id of the push provider
explode: false
in: path
name: pushProviderId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
APNs:
$ref: '#/components/examples/PushProviderAPNsRequest'
FCM:
$ref: '#/components/examples/PushProviderFCMRequest'
schema:
$ref: '#/components/schemas/PushProvider'
required: true
responses:
"200":
content:
application/json:
examples:
APNs:
$ref: '#/components/examples/PushProviderAPNsResponse'
FCM:
$ref: '#/components/examples/PushProviderFCMResponse'
schema:
$ref: '#/components/schemas/PushProvider'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.pushProviders.manage
summary: Replace a Push Provider
tags:
- PushProvider
x-codegen-request-body-name: pushProvider
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/rate-limit-settings/admin-notifications:
get:
description: Retrieves the currently configured Rate Limit Admin Notification
Settings
operationId: getRateLimitSettingsAdminNotifications
responses:
"200":
content:
application/json:
examples:
Enabled:
$ref: '#/components/examples/RateLimitAdminNotificationsEnabled'
Disabled:
$ref: '#/components/examples/RateLimitAdminNotificationsDisabled'
schema:
$ref: '#/components/schemas/RateLimitAdminNotifications'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.read
summary: Retrieve the Rate Limit Admin Notification Settings
tags:
- RateLimitSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the Rate Limit Admin Notification Settings and returns
the configured properties
operationId: replaceRateLimitSettingsAdminNotifications
requestBody:
content:
application/json:
examples:
Enabled:
$ref: '#/components/examples/RateLimitAdminNotificationsEnabled'
Disabled:
$ref: '#/components/examples/RateLimitAdminNotificationsDisabled'
schema:
$ref: '#/components/schemas/RateLimitAdminNotifications'
required: true
responses:
"200":
content:
application/json:
examples:
Enabled:
$ref: '#/components/examples/RateLimitAdminNotificationsEnabled'
Disabled:
$ref: '#/components/examples/RateLimitAdminNotificationsDisabled'
schema:
$ref: '#/components/schemas/RateLimitAdminNotifications'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.manage
summary: Replace the Rate Limit Admin Notification Settings
tags:
- RateLimitSettings
x-codegen-request-body-name: RateLimitAdminNotifications
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/rate-limit-settings/per-client:
get:
description: Retrieves the currently configured Per-Client Rate Limit Settings
operationId: getRateLimitSettingsPerClient
responses:
"200":
content:
application/json:
examples:
EnforceDefault:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefault'
EnforceDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefaultWithOverrides'
PreviewDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsPreviewDefaultWithOverrides'
schema:
$ref: '#/components/schemas/PerClientRateLimitSettings'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.read
summary: Retrieve the Per-Client Rate Limit Settings
tags:
- RateLimitSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the Per-Client Rate Limit Settings and returns the configured
properties
operationId: replaceRateLimitSettingsPerClient
requestBody:
content:
application/json:
examples:
EnforceDefault:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefault'
EnforceDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefaultWithOverrides'
PreviewDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsPreviewDefaultWithOverrides'
schema:
$ref: '#/components/schemas/PerClientRateLimitSettings'
required: true
responses:
"200":
content:
application/json:
examples:
EnforceDefault:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefault'
EnforceDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsEnforceDefaultWithOverrides'
PreviewDefaultWithOverrides:
$ref: '#/components/examples/PerClientRateLimitSettingsPreviewDefaultWithOverrides'
schema:
$ref: '#/components/schemas/PerClientRateLimitSettings'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.manage
summary: Replace the Per-Client Rate Limit Settings
tags:
- RateLimitSettings
x-codegen-request-body-name: perClientRateLimitSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/rate-limit-settings/warning-threshold:
get:
description: Retrieves the currently configured threshold for warning notifications
when the API's rate limit is exceeded
operationId: getRateLimitSettingsWarningThreshold
responses:
"200":
content:
application/json:
examples:
ExampleThreshold:
$ref: '#/components/examples/RateLimitWarningThresholdValidExample'
schema:
$ref: '#/components/schemas/RateLimitWarningThresholdResponse'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.read
summary: Retrieve the Rate Limit Warning Threshold Percentage
tags:
- RateLimitSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the Rate Limit Warning Threshold Percentage and returns
the configured property
operationId: replaceRateLimitSettingsWarningThreshold
requestBody:
content:
application/json:
examples:
ExampleThreshold:
$ref: '#/components/examples/RateLimitWarningThresholdValidExample'
schema:
$ref: '#/components/schemas/RateLimitWarningThresholdRequest'
responses:
"200":
content:
application/json:
examples:
ExampleThreshold:
$ref: '#/components/examples/RateLimitWarningThresholdValidExample'
schema:
$ref: '#/components/schemas/RateLimitWarningThresholdResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.rateLimits.manage
summary: Replace the Rate Limit Warning Threshold Percentage
tags:
- RateLimitSettings
x-codegen-request-body-name: RateLimitWarningThreshold
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/realm-assignments:
get:
description: Lists all Realm Assignments
operationId: listRealmAssignments
parameters:
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
AssignmentLists:
$ref: '#/components/examples/ListRealmAssignmentsResponse'
schema:
items:
$ref: '#/components/schemas/RealmAssignment'
type: array
description: OK
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.read
summary: List all Realm Assignments
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Creates a new Realm Assignment
operationId: createRealmAssignment
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/CreateRealmAssignmentRequest'
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/RealmAssignment'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Create a Realm Assignment
tags:
- RealmAssignment
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/realm-assignments/operations:
get:
description: Lists all Realm Assignment operations. The upper limit is 200 and
operations are sorted in descending order from most recent to oldest by id
operationId: listRealmAssignmentOperations
parameters:
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Executions:
value:
- id: rre4mje4ez6B2a7B60g7
type: realm:assignment
status: COMPLETED
created: 2023-10-25T21:02:54.000Z
started: 2023-10-25T21:02:54.000Z
completed: 2023-10-25T21:02:54.000Z
realmId: 00g1b7rvh0xPLKXFf0g5
realmName: Realm Name
assignmentOperation:
configuration:
id: 0pr1b7rxZj2ibQzfP0g5
name: Realm Assignment 1
conditions:
profileSourceId: 0oa4enoRyjwSCy5hx0g4
expression:
value: string
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf0g5
numUserMoved: 50
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/operations/rre4mje4ez6B2a7B60g7
method: GET
- id: rre4mje4ez7B2a7B60g7
type: realm:assignment
status: COMPLETED
created: 2023-10-25T21:02:54.000Z
started: 2023-10-25T21:02:54.000Z
completed: 2023-10-25T21:02:54.000Z
assignmentOperation:
configuration:
id: ALL
name: All Assignments
numUserMoved: 50
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/operations/rre4mje4ez7B2a7B60g7
method: GET
schema:
items:
$ref: '#/components/schemas/OperationResponse'
type: array
description: OK
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.read
summary: List all Realm Assignment operations
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Executes a Realm Assignment
operationId: executeRealmAssignment
requestBody:
content:
application/json:
examples:
ExecuteSpecificAssignment:
value:
assignmentId: 0pr1b7rxZj2ibQzfP0g5
ExecuteAllAssignments:
value:
assignmentId: ALL
schema:
$ref: '#/components/schemas/OperationRequest'
required: true
responses:
"201":
content:
application/json:
examples:
Execution:
$ref: '#/components/examples/OperationResponse'
schema:
$ref: '#/components/schemas/OperationResponse'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Execute a Realm Assignment
tags:
- RealmAssignment
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/realm-assignments/{assignmentId}:
delete:
description: Deletes a Realm Assignment
operationId: deleteRealmAssignment
parameters:
- description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Delete a Realm Assignment
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
get:
description: Retrieves a Realm Assignment
operationId: getRealmAssignment
parameters:
- description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RealmAssignment:
$ref: '#/components/examples/GetRealmAssignmentResponse'
CatchAllRealmAssignment:
$ref: '#/components/examples/DefaultRealmAssignment'
schema:
$ref: '#/components/schemas/RealmAssignment'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.read
summary: Retrieve a Realm Assignment
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
put:
description: Replaces a Realm Assignment
operationId: replaceRealmAssignment
parameters:
- description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/UpdateRealmAssignmentRequest'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/RealmAssignment'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Replace a Realm Assignment
tags:
- RealmAssignment
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/realm-assignments/{assignmentId}/lifecycle/activate:
post:
description: Activates a Realm Assignment
operationId: activateRealmAssignment
parameters:
- description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Activate a Realm Assignment
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/realm-assignments/{assignmentId}/lifecycle/deactivate:
post:
description: Deactivates a Realm Assignment
operationId: deactivateRealmAssignment
parameters:
- description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realmAssignments.manage
summary: Deactivate a Realm Assignment
tags:
- RealmAssignment
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
/api/v1/realms:
get:
description: Lists all Realms
operationId: listRealms
parameters:
- description: Specifies the number of results returned. Defaults to 10 if `search`
is provided.
explode: true
in: query
name: limit
required: false
schema:
default: 200
format: int32
type: integer
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Searches for Realms with a supported filtering expression for
most properties
explode: true
in: query
name: search
required: false
schema:
type: string
style: form
- description: Specifies field to sort by and can be any single property (for
search queries only).
explode: true
in: query
name: sortBy
required: false
schema:
example: profile.name
type: string
style: form
- description: Specifies sort order `asc` or `desc` (for search queries only).
This parameter is ignored if `sortBy` isn't present.
explode: true
in: query
name: sortOrder
required: false
schema:
default: asc
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Realm Lists:
$ref: '#/components/examples/ListRealmsResponse'
schema:
items:
$ref: '#/components/schemas/Realm'
type: array
description: OK
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realms.read
summary: List all Realms
tags:
- Realm
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Creates a new Realm
operationId: createRealm
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/CreateRealmRequest'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/Realm'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realms.manage
summary: Create a Realm
tags:
- Realm
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/realms/{realmId}:
delete:
description: Deletes a Realm permanently. This operation can only be performed
after disassociating other entities like Users and Identity Providers from
a Realm.
operationId: deleteRealm
parameters:
- description: '`id` of the Realm'
explode: false
in: path
name: realmId
required: true
schema:
example: vvrcFogtKCrK9aYq3fgV
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realms.manage
summary: Delete a Realm
tags:
- Realm
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
get:
description: Retrieves a Realm
operationId: getRealm
parameters:
- description: '`id` of the Realm'
explode: false
in: path
name: realmId
required: true
schema:
example: vvrcFogtKCrK9aYq3fgV
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
DefaultRealm:
$ref: '#/components/examples/DefaultRealmResponse'
NonDefaultRealm:
$ref: '#/components/examples/RealmResponse'
schema:
$ref: '#/components/schemas/Realm'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realms.read
summary: Retrieve a Realm
tags:
- Realm
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
put:
description: Replaces the realm profile
operationId: replaceRealm
parameters:
- description: '`id` of the Realm'
explode: false
in: path
name: realmId
required: true
schema:
example: vvrcFogtKCrK9aYq3fgV
type: string
style: simple
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/UpdateRealmRequest'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/Realm'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.realms.manage
summary: Replace the realm profile
tags:
- Realm
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/resource-selectors/{resourceSelectorId}: {}
/api/v1/risk/events/ip:
post:
description: |-
Sends multiple IP risk events to Okta.
This request is used by a third-party risk provider to send IP risk events to Okta. The third-party risk provider needs to be registered with Okta before they can send events to Okta. See [Risk Providers](/openapi/okta-management/management/tag/RiskProvider/).
This API has a rate limit of 30 requests per minute. You can include multiple risk events (up to a maximum of 20 events) in a single payload to reduce the number of API calls. Prioritize sending high risk signals if you have a burst of signals to send that would exceed the maximum request limits.
operationId: sendRiskEvents
requestBody:
content:
application/json:
examples:
RiskEventsRequestExample:
$ref: '#/components/examples/RiskEventsRequestExample'
schema:
items:
$ref: '#/components/schemas/RiskEvent'
type: array
required: true
responses:
"202":
description: Accepted
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskEvents.manage
summary: Send multiple Risk Events
tags:
- RiskEvent
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/risk/providers:
get:
description: Lists all Risk Provider objects
operationId: listRiskProviders
responses:
"200":
content:
application/json:
examples:
RiskProviderList:
$ref: '#/components/examples/ListRiskProviderResponse'
schema:
items:
$ref: '#/components/schemas/RiskProvider'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskProviders.read
summary: List all Risk Providers
tags:
- RiskProvider
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
post:
description: Creates a Risk Provider object. A maximum of three Risk Provider
objects can be created.
operationId: createRiskProvider
requestBody:
content:
application/json:
examples:
RiskProviderRequestExample:
$ref: '#/components/examples/RiskProviderRequest'
schema:
$ref: '#/components/schemas/RiskProvider'
required: true
responses:
"201":
content:
application/json:
examples:
RiskProviderPostResponseExample:
$ref: '#/components/examples/RiskProviderResponse'
schema:
$ref: '#/components/schemas/RiskProvider'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskProviders.manage
summary: Create a Risk Provider
tags:
- RiskProvider
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/risk/providers/{riskProviderId}:
delete:
description: Deletes a Risk Provider object by its ID
operationId: deleteRiskProvider
parameters:
- description: '`id` of the Risk Provider object'
explode: false
in: path
name: riskProviderId
required: true
schema:
example: 00rp12r4skkjkjgsn
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskProviders.manage
summary: Delete a Risk Provider
tags:
- RiskProvider
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
get:
description: Retrieves a Risk Provider object by ID
operationId: getRiskProvider
parameters:
- description: '`id` of the Risk Provider object'
explode: false
in: path
name: riskProviderId
required: true
schema:
example: 00rp12r4skkjkjgsn
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RiskProviderGetResponseExample:
$ref: '#/components/examples/RiskProviderResponse'
schema:
$ref: '#/components/schemas/RiskProvider'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskProviders.read
summary: Retrieve a Risk Provider
tags:
- RiskProvider
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-accepts:
- application/json
put:
description: Replaces the properties for a given Risk Provider object ID
operationId: replaceRiskProvider
parameters:
- description: '`id` of the Risk Provider object'
explode: false
in: path
name: riskProviderId
required: true
schema:
example: 00rp12r4skkjkjgsn
type: string
style: simple
requestBody:
content:
application/json:
examples:
RiskProviderPutRequestExample:
$ref: '#/components/examples/RiskProviderPutRequest'
schema:
$ref: '#/components/schemas/RiskProvider'
required: true
responses:
"200":
content:
application/json:
examples:
RiskProviderPutResponseExample:
$ref: '#/components/examples/RiskProviderPutResponse'
schema:
$ref: '#/components/schemas/RiskProvider'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.riskProviders.manage
summary: Replace a Risk Provider
tags:
- RiskProvider
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
x-content-type: application/json
x-accepts:
- application/json
/api/v1/roles/{roleRef}/subscriptions:
get:
description: Lists all subscriptions available to a specified Role
operationId: listSubscriptionsRole
parameters:
- description: "A reference to an existing role. Standard roles require a `roleType`,\
\ while Custom Roles require a `roleId`. See [Standard Roles](/openapi/okta-management/guides/roles/#standard-roles)."
explode: false
in: path
name: roleRef
required: true
schema:
$ref: '#/components/schemas/listSubscriptionsRole_roleRef_parameter'
style: simple
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Subscription'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Subscriptions for a Role
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/roles/{roleRef}/subscriptions/{notificationType}:
get:
description: Retrieves a subscription by `notificationType` for a specified
Role
operationId: getSubscriptionsNotificationTypeRole
parameters:
- description: "A reference to an existing role. Standard roles require a `roleType`,\
\ while Custom Roles require a `roleId`. See [Standard Roles](/openapi/okta-management/guides/roles/#standard-roles)."
explode: false
in: path
name: roleRef
required: true
schema:
$ref: '#/components/schemas/listSubscriptionsRole_roleRef_parameter'
style: simple
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/Subscription'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Subscription for a Role
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/roles/{roleRef}/subscriptions/{notificationType}/subscribe:
post:
description: Subscribes a Role to a specified notification type. Changes to
Role subscriptions override the subscription status of any individual users
with the Role.
operationId: subscribeByNotificationTypeRole
parameters:
- description: "A reference to an existing role. Standard roles require a `roleType`,\
\ while Custom Roles require a `roleId`. See [Standard Roles](/openapi/okta-management/guides/roles/#standard-roles)."
explode: false
in: path
name: roleRef
required: true
schema:
$ref: '#/components/schemas/listSubscriptionsRole_roleRef_parameter'
style: simple
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
responses:
"200":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Subscribe a Role to a Specific Notification Type
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/roles/{roleRef}/subscriptions/{notificationType}/unsubscribe:
post:
description: Unsubscribes a Role from a specified notification type. Changes
to Role subscriptions override the subscription status of any individual users
with the Role.
operationId: unsubscribeByNotificationTypeRole
parameters:
- description: "A reference to an existing role. Standard roles require a `roleType`,\
\ while Custom Roles require a `roleId`. See [Standard Roles](/openapi/okta-management/guides/roles/#standard-roles)."
explode: false
in: path
name: roleRef
required: true
schema:
$ref: '#/components/schemas/listSubscriptionsRole_roleRef_parameter'
style: simple
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
responses:
"200":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unsubscribe a Role from a Specific Notification Type
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/security-events-providers:
get:
description: Lists all Security Events Provider instances
operationId: listSecurityEventsProviderInstances
responses:
"200":
content:
application/json:
examples:
list:
$ref: '#/components/examples/ListOfSecurityEventsProviderInstances'
schema:
items:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
type: array
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.read
summary: List all Security Events Providers
tags:
- SSFReceiver
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
post:
description: Creates a Security Events Provider instance
operationId: createSecurityEventsProviderInstance
requestBody:
content:
application/json:
examples:
well-known-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderRequestWellKnownUrl'
issuer-and-JWKS-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderRequestIssuerAndJwksUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderRequest'
required: true
responses:
"200":
content:
application/json:
examples:
well-known-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderResponseWellKnownUrl'
issuer-and-JWKS-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderResponseIssuerAndJwksUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.manage
summary: Create a Security Events Provider
tags:
- SSFReceiver
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/security-events-providers/{securityEventProviderId}:
delete:
description: Deletes a Security Events Provider instance specified by `id`
operationId: deleteSecurityEventsProviderInstance
parameters:
- description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.manage
summary: Delete a Security Events Provider
tags:
- SSFReceiver
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: Retrieves the Security Events Provider instance specified by `id`
operationId: getSecurityEventsProviderInstance
parameters:
- description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
get:
$ref: '#/components/examples/SecurityEventsProviderResponseWellKnownUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.read
summary: Retrieve the Security Events Provider
tags:
- SSFReceiver
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces a Security Events Provider instance specified by `id`
operationId: replaceSecurityEventsProviderInstance
parameters:
- description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
requestBody:
content:
application/json:
examples:
well-known-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderRequestWellKnownUrl'
issuer-and-JWKS-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderRequestIssuerAndJwksUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderRequest'
required: true
responses:
"200":
content:
application/json:
examples:
well-known-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderResponseWellKnownUrl'
issuer-and-JWKS-URL-provided:
$ref: '#/components/examples/SecurityEventsProviderResponseIssuerAndJwksUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.manage
summary: Replace a Security Events Provider
tags:
- SSFReceiver
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/security-events-providers/{securityEventProviderId}/lifecycle/activate:
post:
description: |-
Activates a Security Events Provider instance by setting its status to `ACTIVE`.
This operation resumes the flow of events from the Security Events Provider to Okta.
operationId: activateSecurityEventsProviderInstance
parameters:
- description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
activatedInstance:
$ref: '#/components/examples/SecurityEventsProviderResponseWellKnownUrl'
schema:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.manage
summary: Activate a Security Events Provider
tags:
- SSFReceiver
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/security-events-providers/{securityEventProviderId}/lifecycle/deactivate:
post:
description: |-
Deactivates a Security Events Provider instance by setting its status to `INACTIVE`.
This operation stops the flow of events from the Security Events Provider to Okta.
operationId: deactivateSecurityEventsProviderInstance
parameters:
- description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
deactivatedInstance:
$ref: '#/components/examples/DeactivatedSecurityEventsProviderResponse'
schema:
$ref: '#/components/schemas/SecurityEventsProviderResponse'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.securityEventsProviders.manage
summary: Deactivate a Security Events Provider
tags:
- SSFReceiver
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/api/v1/sessions:
post:
description: "Creates a new Session for a user with a valid session token. Use\
\ this API if, for example, you want to set the session cookie yourself instead\
\ of allowing Okta to set it, or want to hold the session ID to delete a session\
\ through the API instead of visiting the logout URL."
operationId: createSession
requestBody:
content:
application/json:
examples:
SessionsCreate:
$ref: '#/components/examples/CreateSessionBody'
schema:
$ref: '#/components/schemas/CreateSessionRequest'
required: true
responses:
"200":
content:
application/json:
examples:
SessionsCreate:
$ref: '#/components/examples/CreateSessionResponse'
schema:
$ref: '#/components/schemas/Session'
description: Success
"400":
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
summary: Create a Session with session token
tags:
- Session
x-codegen-request-body-name: createSessionRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/sessions/me:
delete:
description: |-
Closes the Session for the user who is currently signed in. Use this method in a browser-based application to sign out a user.
> **Note:** This operation requires a session cookie for the user. An API token isn't allowed for this operation.
operationId: closeCurrentSession
parameters:
- example: sid=abcde-123 or idx=abcde-123
explode: false
in: header
name: Cookie
required: false
schema:
description: Session ID (`sid`) or Identity Engine (`idx`) cookie
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
security: []
summary: Close the current Session
tags:
- Session
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: "Retrieves Session information for the current user. Use this method\
\ in a browser-based application to determine if the user is signed in. \n\
\n> **Note:** This operation requires a session cookie for the user. An API\
\ token isn't allowed for this operation. "
operationId: getCurrentSession
parameters:
- example: sid=abcde-123 or idx=abcde-123
explode: false
in: header
name: Cookie
required: false
schema:
description: Session ID (`sid`) or Identity Engine (`idx`) cookie
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
CurrentSessionsRetrieve:
$ref: '#/components/examples/RetrieveCurrentSessionResponse'
schema:
$ref: '#/components/schemas/Session'
description: Success
"404":
description: Not Found
security: []
summary: Retrieve the current Session
tags:
- Session
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/sessions/me/lifecycle/refresh:
post:
description: |-
Refreshes the Session for the current user
> **Note:** This operation requires a session cookie for the user. An API token isn't allowed for this operation.
operationId: refreshCurrentSession
parameters:
- example: sid=abcde-123 or idx=abcde-123
explode: false
in: header
name: Cookie
required: false
schema:
description: Session ID (`sid`) or Identity Engine (`idx`) cookie
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
CurrentSessionsRefresh:
$ref: '#/components/examples/RefreshCurrentSessionResponse'
schema:
$ref: '#/components/schemas/Session'
description: Success
"404":
description: Not Found
security: []
summary: Refresh the current Session
tags:
- Session
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/sessions/{sessionId}:
delete:
description: Revokes the specified Session
operationId: revokeSession
parameters:
- description: '`id` of the Session'
explode: false
in: path
name: sessionId
required: true
schema:
example: l7FbDVqS8zHSy65uJD85
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.sessions.manage
summary: Revoke a Session
tags:
- Session
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves information about the Session specified by the given
session ID
operationId: getSession
parameters:
- description: '`id` of the Session'
explode: false
in: path
name: sessionId
required: true
schema:
example: l7FbDVqS8zHSy65uJD85
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SessionsRetrieve:
$ref: '#/components/examples/RetrieveSessionResponse'
schema:
$ref: '#/components/schemas/Session'
description: Success
"400":
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.sessions.read
summary: Retrieve a Session
tags:
- Session
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/sessions/{sessionId}/lifecycle/refresh:
post:
description: Refreshes an existing Session using the `id` for that Session.
A successful response contains the refreshed Session with an updated `expiresAt`
timestamp.
operationId: refreshSession
parameters:
- description: '`id` of the Session'
explode: false
in: path
name: sessionId
required: true
schema:
example: l7FbDVqS8zHSy65uJD85
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SessionsRefresh:
$ref: '#/components/examples/RefreshSessionResponse'
schema:
$ref: '#/components/schemas/Session'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.sessions.manage
summary: Refresh a Session
tags:
- Session
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/ssf/stream:
delete:
description: |-
Deletes the specified SSF Stream.
If the `stream_id` is not provided in the query string, the associated stream with the Client ID (through the request OAuth 2.0 access token) is deleted. Otherwise, the SSF Stream with the `stream_id` is deleted, if found.
operationId: deleteSsfStream
parameters:
- description: The ID of the specified SSF Stream configuration
example: esc1k235GIIztAuGK0g5
explode: true
in: query
name: stream_id
required: false
schema:
type: string
style: form
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- ssf.manage
summary: Delete an SSF Stream
tags:
- SSFTransmitter
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
get:
description: |-
Retrieves either a list of all known SSF Stream configurations or the individual configuration if specified by ID.
As Stream configurations are tied to a Client ID, only the Stream associated with the Client ID of the request OAuth 2.0 access token can be viewed.
operationId: getSsfStreams
parameters:
- description: The ID of the specified SSF Stream configuration
example: esc1k235GIIztAuGK0g5
explode: true
in: query
name: stream_id
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
listResponse:
$ref: '#/components/examples/listStreamConfigurationExample'
individualStreamResponse:
$ref: '#/components/examples/streamConfigurationExample'
schema:
$ref: '#/components/schemas/getSsfStreams_200_response'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- ssf.read
summary: Retrieve the SSF Stream configuration(s)
tags:
- SSFTransmitter
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
patch:
description: |-
Updates properties for an existing SSF Stream configuration.
If the `stream_id` isn't provided in the request body, the associated stream with the Client ID (through the request OAuth 2.0 access token) is updated.
operationId: updateSsfStream
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfiguration'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfiguration'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- ssf.manage
summary: Update an SSF Stream
tags:
- SSFTransmitter
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
post:
description: |-
Creates an SSF Stream for an event receiver to start receiving security events in the form of Security Event Tokens (SETs) from Okta.
An SSF Stream is associated with the Client ID of the OAuth 2.0 access token used to create the stream. The Client ID is provided by Okta for an [OAuth 2.0 app integration](https://help.okta.com/okta_help.htm?id=ext_Apps_App_Integration_Wizard-oidc). One SSF Stream is allowed for each Client ID, hence, one SSF Stream is allowed for each app integration in Okta.
A maximum of 10 SSF Stream configurations can be created for one org.
operationId: createSsfStream
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfigurationCreateRequest'
required: true
responses:
"201":
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfiguration'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- ssf.manage
summary: Create an SSF Stream
tags:
- SSFTransmitter
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
put:
description: |-
Replaces all properties for an existing SSF Stream configuration.
If the `stream_id` isn't provided in the request body, the associated stream with the Client ID (through the request OAuth 2.0 access token) is replaced.
operationId: replaceSsfStream
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfiguration'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/StreamConfiguration'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- ssf.manage
summary: Replace an SSF Stream
tags:
- SSFTransmitter
x-codegen-request-body-name: instance
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/api/v1/templates/sms:
get:
description: Lists all custom SMS templates. A subset of templates can be returned
that match a template type.
operationId: listSmsTemplates
parameters:
- explode: true
in: query
name: templateType
required: false
schema:
$ref: '#/components/schemas/SmsTemplateType'
style: form
responses:
"200":
content:
application/json:
examples:
SMS Template List response:
$ref: '#/components/examples/SMSTemplateListResponse'
schema:
items:
$ref: '#/components/schemas/SmsTemplate'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: List all SMS Templates
tags:
- Template
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a new custom SMS template
operationId: createSmsTemplate
requestBody:
content:
application/json:
examples:
Create an SMS Template request:
$ref: '#/components/examples/CreateOrReplaceSMSTemplateRequest'
schema:
$ref: '#/components/schemas/SmsTemplate'
required: true
responses:
"200":
content:
application/json:
examples:
Create an SMS Template response:
$ref: '#/components/examples/CreateOrReplaceSMSTemplateResponse'
schema:
$ref: '#/components/schemas/SmsTemplate'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Create an SMS Template
tags:
- Template
x-codegen-request-body-name: smsTemplate
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/templates/sms/{templateId}:
delete:
description: Deletes an SMS template
operationId: deleteSmsTemplate
parameters:
- description: '`id` of the Template'
explode: false
in: path
name: templateId
required: true
schema:
example: 6NQUJ5yR3bpgEiYmq8IC
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Delete an SMS Template
tags:
- Template
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a specific template by `id`
operationId: getSmsTemplate
parameters:
- description: '`id` of the Template'
explode: false
in: path
name: templateId
required: true
schema:
example: 6NQUJ5yR3bpgEiYmq8IC
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Get an SMS template response:
$ref: '#/components/examples/CreateOrReplaceSMSTemplateResponse'
schema:
$ref: '#/components/schemas/SmsTemplate'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.read
summary: Retrieve an SMS Template
tags:
- Template
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |
Updates only some of the SMS Template properties:
* All properties within the custom SMS Template that have values are updated.
* Any translation that doesn't exist is added.
* Any translation with a null or empty value is removed.
* Any translation with non-empty/null value is updated.
operationId: updateSmsTemplate
parameters:
- description: '`id` of the Template'
explode: false
in: path
name: templateId
required: true
schema:
example: 6NQUJ5yR3bpgEiYmq8IC
type: string
style: simple
requestBody:
content:
application/json:
examples:
Update an SMS Template request:
$ref: '#/components/examples/UpdateSMSTemplateRequest'
schema:
$ref: '#/components/schemas/SmsTemplate'
required: true
responses:
"200":
content:
application/json:
examples:
Update an SMS Template response:
$ref: '#/components/examples/UpdateSMSTemplateResponse'
schema:
$ref: '#/components/schemas/SmsTemplate'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Update an SMS Template
tags:
- Template
x-codegen-request-body-name: smsTemplate
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: |
Replaces the SMS Template
> **Notes:** You can't update the default SMS Template.
operationId: replaceSmsTemplate
parameters:
- description: '`id` of the Template'
explode: false
in: path
name: templateId
required: true
schema:
example: 6NQUJ5yR3bpgEiYmq8IC
type: string
style: simple
requestBody:
content:
application/json:
examples:
Replace an SMS Template request:
$ref: '#/components/examples/CreateOrReplaceSMSTemplateRequest'
schema:
$ref: '#/components/schemas/SmsTemplate'
required: true
responses:
"200":
content:
application/json:
examples:
Replace an SMS Template response:
$ref: '#/components/examples/CreateOrReplaceSMSTemplateResponse'
schema:
$ref: '#/components/schemas/SmsTemplate'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.templates.manage
summary: Replace an SMS Template
tags:
- Template
x-codegen-request-body-name: smsTemplate
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/threats/configuration:
get:
description: Retrieves the ThreatInsight configuration for the org
operationId: getCurrentConfiguration
responses:
"200":
content:
application/json:
examples:
ThreatInsightResponseEx:
$ref: '#/components/examples/ThreatInsightResponseExample'
schema:
$ref: '#/components/schemas/ThreatInsightConfiguration'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.threatInsights.read
summary: Retrieve the ThreatInsight Configuration
tags:
- ThreatInsight
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Updates the ThreatInsight configuration for the org
operationId: updateConfiguration
requestBody:
content:
application/json:
examples:
ThreatInsightUpdateEx:
$ref: '#/components/examples/ThreatInsightUpdateRequestExample'
schema:
$ref: '#/components/schemas/ThreatInsightConfiguration'
required: true
responses:
"200":
content:
application/json:
examples:
ThreatInsightUpdateEx:
$ref: '#/components/examples/ThreatInsightUpdateResponseExample'
schema:
$ref: '#/components/schemas/ThreatInsightConfiguration'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.threatInsights.manage
summary: Update the ThreatInsight Configuration
tags:
- ThreatInsight
x-codegen-request-body-name: threatInsightConfiguration
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/trustedOrigins:
get:
description: Lists all trusted origins
operationId: listTrustedOrigins
parameters:
- description: A search string that will prefix match against the `name` and
`origin`
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: |
[Filter](/#filter) Trusted Origins with a supported expression for a subset of properties. You can filter on the following properties: `name`, `origin`, `status`, and `type` (type of scopes).
examples:
By name:
value: name eq "Example Trusted Origin"
explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- description: The after cursor provided by a prior request.
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of results.
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
type: integer
style: form
responses:
"200":
content:
application/json:
examples:
TrustedOriginsResponse:
$ref: '#/components/examples/TrustedOriginsResponse'
schema:
items:
$ref: '#/components/schemas/TrustedOrigin'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.read
summary: List all Trusted Origins
tags:
- TrustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates a trusted origin
operationId: createTrustedOrigin
requestBody:
content:
application/json:
examples:
TrustedOriginBody:
$ref: '#/components/examples/TrustedOriginBody'
TrustedOriginBodyWithIframeEmbedding:
$ref: '#/components/examples/TrustedOriginBodyWithIframeEmbedding'
TrustedOriginBodyWithIframeEmbeddingSignIn:
$ref: '#/components/examples/TrustedOriginBodyWithIframeEmbeddingSignIn'
schema:
$ref: '#/components/schemas/TrustedOriginWrite'
required: true
responses:
"200":
content:
application/json:
examples:
TrustedOriginResponse:
$ref: '#/components/examples/TrustedOriginResponse'
TrustedOriginResponseWithIframeEmbedding:
$ref: '#/components/examples/TrustedOriginResponseWithIframeEmbedding'
TrustedOriginResponseWithIframeEmbeddingSignIn:
$ref: '#/components/examples/TrustedOriginResponseWithIframeEmbeddingSignIn'
schema:
$ref: '#/components/schemas/TrustedOrigin'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.manage
summary: Create a Trusted Origin
tags:
- TrustedOrigin
x-codegen-request-body-name: trustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/trustedOrigins/{trustedOriginId}:
delete:
description: Deletes a trusted origin
operationId: deleteTrustedOrigin
parameters:
- description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
responses:
"204":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.manage
summary: Delete a Trusted Origin
tags:
- TrustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a trusted origin
operationId: getTrustedOrigin
parameters:
- description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
TrustedOriginResponse:
$ref: '#/components/examples/TrustedOriginResponse'
TrustedOriginResponseWithIframeEmbedding:
$ref: '#/components/examples/TrustedOriginResponseWithIframeEmbedding'
TrustedOriginResponseWithIframeEmbeddingSignIn:
$ref: '#/components/examples/TrustedOriginResponseWithIframeEmbeddingSignIn'
schema:
$ref: '#/components/schemas/TrustedOrigin'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.read
summary: Retrieve a Trusted Origin
tags:
- TrustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces a trusted origin
operationId: replaceTrustedOrigin
parameters:
- description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
requestBody:
content:
application/json:
examples:
TrustedOriginPutBody:
$ref: '#/components/examples/TrustedOriginPutBody'
TrustedOriginPutBodyWithIframeEmbedding:
$ref: '#/components/examples/TrustedOriginPutBodyWithIframeEmbedding'
schema:
$ref: '#/components/schemas/TrustedOrigin'
required: true
responses:
"200":
content:
application/json:
examples:
TrustedOriginPutResponse:
$ref: '#/components/examples/TrustedOriginPutResponse'
TrustedOriginPutResponseWithIFrameEmbedding:
$ref: '#/components/examples/TrustedOriginPutResponseWithIframeEmbedding'
schema:
$ref: '#/components/schemas/TrustedOrigin'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.manage
summary: Replace a Trusted Origin
tags:
- TrustedOrigin
x-codegen-request-body-name: trustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/trustedOrigins/{trustedOriginId}/lifecycle/activate:
post:
description: Activates a Trusted Origin. Sets the `status` to `ACTIVE`.
operationId: activateTrustedOrigin
parameters:
- description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
TrustedOriginResponse:
$ref: '#/components/examples/TrustedOriginResponse'
schema:
$ref: '#/components/schemas/TrustedOrigin'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.manage
summary: Activate a Trusted Origin
tags:
- TrustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/trustedOrigins/{trustedOriginId}/lifecycle/deactivate:
post:
description: Deactivates a Trusted Origin. Sets the `status` to `INACTIVE`.
operationId: deactivateTrustedOrigin
parameters:
- description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
TrustedOriginInactiveResponse:
$ref: '#/components/examples/TrustedOriginInactiveResponse'
schema:
$ref: '#/components/schemas/TrustedOrigin'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.trustedOrigins.manage
summary: Deactivate a Trusted Origin
tags:
- TrustedOrigin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users:
get:
description: |-
Lists Users in your org, with pagination in most cases.
A subset of Users can be returned that match a supported filter expression or search criteria.
operationId: listUsers
parameters:
- description: |-
Specifies the media type of the resource. Optional `okta-response` value can be included for performance optimization.
Complex DelAuth configurations may degrade performance when fetching specific parts of the response, and passing this parameter can omit these parts, bypassing the bottleneck.
Enum values for `okta-response`:
* `omitCredentials`: Omits the credentials subobject from the response.
* `omitCredentialsLinks`: Omits the following HAL links from the response: Change Password, Change Recovery Question, Forgot Password, Reset Password, Reset Factors, Unlock.
* `omitTransitioningToStatus`: Omits the `transitioningToStatus` field from the response.
examples:
Omit credentials subobject and credentials links:
summary: Omits the credentials subobject and credentials links from the
response. Does not apply performance optimization.
value: "application/json; okta-response=omitCredentials,omitCredentialsLinks"
Omit credentials, credentials links, and `transitioningToStatus` field:
summary: "Omits the credentials, credentials links, and `transitioningToStatus`\
\ field from the response. Applies performance optimization."
value: "application/json; okta-response=\"omitCredentials,omitCredentialsLinks,\
\ omitTransitioningToStatus\""
explode: false
in: header
name: Content-Type
required: false
schema:
type: string
style: simple
- description: |-
Finds users who match the specified query. This doesn't support pagination.
This might not deliver optimal performance for large orgs, and is deprecated for such use cases. To ensure optimal performance, use a [`search` parameter](/openapi/okta-management/management/tag/User/#tag/User/operation/listUsers!in=query&path=search&t=request) instead.
Use the `q` parameter for a simple lookup of users by name, for example when creating a people picker. The value of `q` is matched against `firstName`, `lastName`, or `email`. This performs a `startsWith` match, but this is an implementation detail and can change without notice. You don't need to specify `firstName`, `lastName`, or `email`.
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of results returned. Defaults to 10 if `q`
is provided.
explode: true
in: query
name: limit
required: false
schema:
default: 200
format: int32
type: integer
style: form
- description: |-
Filters users with a supported expression for a subset of properties.
This requires [URL encoding](https://developer.mozilla.org/en-US/docs/Glossary/Percent-encoding). For example, `filter=lastUpdated gt "2013-06-01T00:00:00.000Z"` is encoded as `filter=lastUpdated%20gt%20%222013-06-01T00:00:00.000Z%22`. Filtering is case-sensitive for attribute names and query values, while attribute operators are case-insensitive.
Filtering supports the following limited number of properties: `status`, `lastUpdated`, `id`, `profile.login`, `profile.email`, `profile.firstName`, and `profile.lastName`. Additionally, filtering supports only the equal `eq` operator from the standard Okta API filtering semantics, except in the case of the `lastUpdated` property. This property can also use the inequality operators (`gt`, `ge`, `lt`, and `le`). For logical operators, only the logical operators `and` and `or` are supported. The `not` operator isn't supported.
examples:
filterByStatus:
summary: Filter users with status of `LOCKED_OUT`
value: status eq "LOCKED_OUT"
filterByLogin:
summary: Filter Users with a specified `login`
value: profile.login eq "[email protected]"
filterByDateRange:
summary: Filter users updated after 06/01/2013 but before 01/01/2014
value: filter=lastUpdated gt "2013-06-01T00:00:00.000Z" and lastUpdated
lt "2014-01-01T00:00:00.000Z"
filterByTypeAndProfileLastUpdatedAfterDate:
summary: Filter users updated after 06/01/2013 but with a status of `LOCKED_OUT`
or `RECOVERY`
value: lastUpdated gt "2013-06-01T00:00:00.000Z" and (status eq "LOCKED_OUT"
or status eq "RECOVERY")
explode: true
in: query
name: filter
required: false
schema:
type: string
style: form
- description: |-
Searches for users with a supported filtering expression for most properties. Okta recommends using this parameter for search for best performance. This operation supports [pagination](https://developer.okta.com/docs/api/#pagination). Use an ID lookup for records that you update to ensure your results contain the latest data.
Property names in the search parameter are case sensitive, whereas operators (`eq`, `sw`, and so on) and string values are case insensitive. Unlike with user logins, diacritical marks are significant in search string values: a search for `isaac.brock` finds `Isaac.Brock`, but doesn't find a property whose value is `isáàc.bröck`. This operation requires [URL encoding](https://developer.mozilla.org/en-US/docs/Glossary/Percent-encoding). For example, `search=profile.department eq "Engineering"` is encoded as `search=profile.department%20eq%20%22Engineering%22`.
> **Note:** If you use the special character `"` within a quoted string, it must also be escaped `\` and encoded. For example, `search=profile.lastName eq "bob"smith"` is encoded as `search=profile.lastName%20eq%20%22bob%5C%22smith%22`.
This operation searches many properties:
* Any user profile property, including custom-defined properties
* The top-level properties `id`, `status`, `created`, `activated`, `statusChanged`, and `lastUpdated`
* The [User Type](https://developer.okta.com/docs/reference/api/user-types/) accessed as `type.id`
You can also use `sortBy` and `sortOrder` parameters. The `ne` (not equal) operator isn't supported, but you can obtain the same result by using `lt ... or ... gt`. For example, to see all users except those that have a status of `STAGED`, use `(status lt "STAGED" or status gt "STAGED")`.
You can search properties that are arrays. If any element matches the search term, the entire array (object) is returned. Okta follows the [SCIM Protocol Specification](https://tools.ietf.org/html/rfc7644#section-3.4.2.2) for searching arrays. You can search multiple arrays, multiple values in an array, as well as using the standard logical and filtering operators. See [Filter](https://developer.okta.com/docs/reference/core-okta-api/#filter).
examples:
searchByStatus:
summary: Search for Users that have a status of `STAGED`
value: status eq "STAGED"
searchByLastUpdatedAfterDate:
summary: Search for Users that have last updated after a specific timestamp
value: lastUpdated gt "2014-01-01T00:00:00.000Z"
searchById:
summary: Search for Groups with the specified ID (`00gak46y5hydV6NdM0g4`)
value: id eq "00u1ero7vZFVEIYLWPBN"
searchByProfileDepartmentCreatedAndStatus:
summary: Search for users in the department of `Engineering` who were
created before `01/01/2014` or have a status of `ACTIVE`
value: profile.department eq "Engineering" and (created lt "2014-01-01T00:00:00.000Z"
or status eq "ACTIVE")
searchArrayAttributes:
summary: "Searches for properties that are arrays. Custom User attribute\
\ `arrayAttr` that contains values [\"arrayAttrVal1\", \"arrayAttrVal2\"\
...]"
value: profile.arrayAttr eq "arrayAttrVal1"
explode: true
in: query
name: search
required: false
schema:
type: string
style: form
- description: "Specifies field to sort by (for search queries only). This can\
\ be any single property, for example `sortBy=profile.lastName`. Users with\
\ the same value for the `sortBy` property will be ordered by `id`."
explode: true
in: query
name: sortBy
required: false
schema:
type: string
style: form
- description: "Specifies sort order asc or desc (for search queries only).\
\ Sorting is done in ASCII sort order (that is, by ASCII character value),\
\ but isn't case sensitive. `sortOrder` is ignored if `sortBy` is not present."
explode: true
in: query
name: sortOrder
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
UserList:
$ref: '#/components/examples/ListRealmAwareUsersResponse'
schema:
items:
$ref: '#/components/schemas/User'
type: array
description: Success
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Users
tags:
- User
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: "Creates a new User in your Okta org with or without credentials.
\n\
> **Legal Disclaimer**\n> \n> After a User is added to the Okta directory,\
\ they receive an activation email. As part of signing up for this service,\n\
> you agreed not to use Okta's service/product to spam and/or send unsolicited\
\ messages.\n> Please refrain from adding unrelated accounts to the directory\
\ as Okta is not responsible for, and disclaims any and all\n> liability associated\
\ with, the activation email's content. You, and you alone, bear responsibility\
\ for the emails sent to any recipients.\n\nAll responses return the created\
\ User. Activation of a User is an asynchronous operation. The system performs\
\ group reconciliation during activation and assigns the User to all apps\
\ via direct or indirect relationships (group memberships).\n* The user's\
\ `transitioningToStatus` property is `ACTIVE` during activation to indicate\
\ that the User hasn't completed the asynchronous operation.\n* The user's\
\ `status` is `ACTIVE` when the activation process is complete.\n\nThe User\
\ is emailed a one-time activation token if activated without a password.\n\
\n> **Note:** If the User is assigned to an app that is configured for provisioning,\
\ the activation process triggers downstream provisioning to the app. It\
\ is possible for a User to sign in before these apps have been successfully\
\ provisioned for the User.\n\n> **Important:** Do not generate or send a\
\ one-time activation token when activating Users with an assigned password.\
\ Users should sign in with their assigned password.\n\nFor more information\
\ about the various scenarios of creating a user listed in the examples, see\
\ User Scenario Creations section in the [Users API](/openapi/okta-management/management/tag/User)\
\ description."
operationId: createUser
parameters:
- description: "Executes an [activation lifecycle](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/activateUser)\
\ operation when creating the User"
explode: true
in: query
name: activate
required: false
schema:
default: true
type: boolean
style: form
- description: Indicates whether to create a User with a specified authentication
provider
explode: true
in: query
name: provider
required: false
schema:
default: false
type: boolean
style: form
- description: "With `activate=true`, if `nextLogin=changePassword`, a User\
\ is created, activated, and the password is set to `EXPIRED`. The User\
\ must change it the next time they sign in."
explode: true
in: query
name: nextLogin
required: false
schema:
$ref: '#/components/schemas/UserNextLogin'
style: form
x-okta-added-version: 0.14.0
requestBody:
content:
application/json:
examples:
Create User without credentials:
$ref: '#/components/examples/create-user-without-credentials-request'
Create User with recovery question:
$ref: '#/components/examples/create-user-with-recovery-question-request'
Create User with Password:
$ref: '#/components/examples/create-user-with-password-request'
Create User with imported hashed password:
$ref: '#/components/examples/create-user-with-imported-hashed-password-request'
Create User with password import inline hook:
$ref: '#/components/examples/create-user-with-password-import-inline-hook-request'
Create User with Password and Recovery Question:
$ref: '#/components/examples/create-user-with-password-and-recovery-question-request'
Create User with Authentication Provider:
$ref: '#/components/examples/create-user-with-authentication-provider-request'
Create User in Group:
$ref: '#/components/examples/create-user-in-group-request'
Create User with non-default User Type:
$ref: '#/components/examples/create-user-with-non-default-user-type-request'
schema:
$ref: '#/components/schemas/CreateUserRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Create User without credentials:
$ref: '#/components/examples/create-user-without-credentials-response'
Create User with recovery question:
$ref: '#/components/examples/create-user-with-recovery-question-response'
Create User with Password:
$ref: '#/components/examples/create-user-with-password-response'
Create User with imported hashed password:
$ref: '#/components/examples/create-user-with-imported-hashed-password-response'
Create User with password import inline hook:
$ref: '#/components/examples/create-user-with-password-import-inline-hook-response'
Create User with Password and Recovery Question:
$ref: '#/components/examples/create-user-with-password-and-recovery-question-response'
Create User with Authentication Provider:
$ref: '#/components/examples/create-user-with-authentication-provider-response'
Create User in Group:
$ref: '#/components/examples/create-user-in-group-response'
Create User with non-default User Type:
$ref: '#/components/examples/create-user-with-non-default-user-type-response'
schema:
$ref: '#/components/schemas/User'
description: Success
"400":
content:
application/json:
examples:
Create User with too many groups specified:
$ref: '#/components/examples/ErrorCreateUserWithTooManyManyGroupsResponse'
Create User with expired password and activate set to `false`:
$ref: '#/components/examples/ErrorCreateUserWithExpiredPasswordWithoutActivation'
Create User with expired password and `null` password:
$ref: '#/components/examples/ErrorCreateUserWithExpiredPasswordWithNullPassword'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Create a User
tags:
- User
x-codegen-request-body-name: body
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/me/lifecycle/delete_sessions:
post:
description: |-
Ends Okta sessions for the currently signed in User. By default, the current session remains active. Use this method in a browser-based app.
> **Note:** This operation requires a session cookie for the User. The API token isn't allowed for this operation.
operationId: endUserSessions
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/KeepCurrent'
responses:
"200":
content: {}
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2: []
summary: End a current User session
tags:
- UserSessions
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{id}:
delete:
description: "Deletes a User permanently. This operation can only be performed\
\ on Users that have a `DEPROVISIONED` status. **This action can't be recovered!**\n\
\nThis operation on a User that hasn't been deactivated causes that User to\
\ be deactivated. A second delete operation is required to delete the User.\n\
\n> **Note:** You can also perform user deletion asynchronously. To invoke\
\ asynchronous user deletion, pass an HTTP header `Prefer: respond-async`\
\ with the request. \nThis header is also supported by user deactivation,\
\ which is performed if the delete endpoint is invoked on a User that hasn't\
\ been deactivated."
operationId: deleteUser
parameters:
- description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
- description: Sends a deactivation email to the admin if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: false
type: boolean
style: form
x-okta-added-version: 1.5.0
- explode: false
in: header
name: Prefer
required: false
schema:
enum:
- respond-async
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Delete a User
tags:
- User
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |-
Retrieves a User from your Okta org.
> **Note:** You can substitute `me` for the `id` to fetch the current User linked to an API token or session cookie.
> * The request returns the User linked to the API token that is specified in the Authorization header, not the User linked to the active session. Details of the Admin User who granted the API token is returned.
> * When the end User has an active Okta session, it is typically a CORS request from the browser. Therefore, it's possible to retrieve the current User without the Authorization header.
> **Note:** Some browsers block third-party cookies by default, which disrupts Okta functionality in certain flows. See [Mitigate the impact of third-party cookie deprecation](https://help.okta.com/okta_help.htm?type=oie&id=ext-third-party-cookies).
> **Note:** When fetching a User by `login` or `login shortname`, [URL encode](https://developer.mozilla.org/en-US/docs/Glossary/Percent-encoding) the request parameter to ensure that special characters are escaped properly. Logins with a `/` character can only be fetched by `id` due to URL issues with escaping the `/` character.
operationId: getUser
parameters:
- description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
- description: |-
Specifies the media type of the resource. Optional `okta-response` value can be included for performance optimization.
Complex DelAuth configurations may degrade performance when fetching specific parts of the response, and passing this parameter can omit these parts, bypassing the bottleneck.
Enum values for `okta-response`:
* `omitCredentials`: Omits the credentials subobject from the response.
* `omitCredentialsLinks`: Omits the following HAL links from the response: Change Password, Change Recovery Question, Forgot Password, Reset Password, Reset Factors, Unlock.
* `omitTransitioningToStatus`: Omits the `transitioningToStatus` field from the response.
examples:
Omit credentials subobject and credentials links:
summary: Omits the credentials subobject and credentials links from the
response. Does not apply performance optimization.
value: "application/json; okta-response=omitCredentials,omitCredentialsLinks"
Omit credentials, credentials links, and `transitioningToStatus` field:
summary: "Omits the credentials, credentials links, and `transitioningToStatus`\
\ field from the response. Applies performance optimization."
value: "application/json; okta-response=\"omitCredentials,omitCredentialsLinks,\
\ omitTransitioningToStatus\""
explode: false
in: header
name: Content-Type
required: false
schema:
type: string
style: simple
- description: "An optional parameter to include metadata in the `_embedded`\
\ attribute. Valid value: `blocks`"
explode: true
in: query
name: expand
required: false
schema:
example: blocks
type: string
style: form
responses:
"200":
content:
application/json:
examples:
GetUserExample:
$ref: '#/components/examples/user-example'
schema:
$ref: '#/components/schemas/UserGetSingleton'
description: Success
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a User
tags:
- User
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Updates a user's profile or credentials with partial update semantics.
> **Important:** Use the `POST` method for partial updates. Unspecified properties are set to null with `PUT`.
`profile` and `credentials` can be updated independently or together with a single request.
> **Note**: Currently, the User Type of a User can only be changed via a full replacement PUT operation. If the request parameters of a partial update include the type element from the User object,
the value must match the existing type of the User. Only admins are permitted to change the User type of a User; end users are not allowed to change their own User type.
> **Note**: To update a current user's profile with partial semantics, the `/api/v1/users/me` endpoint can be invoked.
>
> A User can only update profile properties for which the User has write access. Within the profile, if the User tries to update the primary or the secondary email IDs, verification emails are sent to those email IDs, and the fields are updated only upon verification.
If you are using this endpoint to set a password, it sets a password without validating existing user credentials. This is an administrative operation. For operations that validate credentials, refer to the `Reset Password`, `Forgot Password`, and `Change Password` endpoints.
operationId: updateUser
parameters:
- description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
- description: "If true, validates against minimum age and history password\
\ policy"
explode: true
in: query
name: strict
required: false
schema:
type: boolean
style: form
requestBody:
content:
application/json:
examples:
Update User Profile:
$ref: '#/components/examples/update-user-profile-request'
Update User Password:
$ref: '#/components/examples/update-user-set-password-request'
Set Recovery Question and Answer:
$ref: '#/components/examples/update-user-set-recovery-question-and-answer'
schema:
$ref: '#/components/schemas/UpdateUserRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Update User Response:
$ref: '#/components/examples/user-example'
schema:
$ref: '#/components/schemas/User'
description: Success
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Update a User
tags:
- User
x-codegen-request-body-name: user
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
put:
description: |-
Replaces a User's profile, credentials, or both using strict-update semantics.
All profile properties must be specified when updating a User's profile with a `PUT` method. Any property not specified in the request is deleted.
> **Important:** Don't use a `PUT` method for partial updates.
operationId: replaceUser
parameters:
- description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
- description: "If `true`, validates against minimum age and history password\
\ policy"
explode: true
in: query
name: strict
required: false
schema:
type: boolean
style: form
x-okta-added-version: 1.10.0
requestBody:
content:
application/json:
examples:
Replace User Request:
$ref: '#/components/examples/replace-user-request'
schema:
$ref: '#/components/schemas/UpdateUserRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Replace User Response:
$ref: '#/components/examples/user-example'
schema:
$ref: '#/components/schemas/User'
description: Success
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Replace a User
tags:
- User
x-codegen-request-body-name: user
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{id}/lifecycle/reactivate:
post:
description: |-
Reactivates a user.
This operation can only be performed on Users with a `PROVISIONED` or `RECOVERY` [status](/openapi/okta-management/management/tag/User/#tag/User/operation/listUsers!c=200&path=status&t=response).
This operation restarts the activation workflow if for some reason the user activation wasn't completed when using the `activationToken` from [Activate User](/openapi/okta-management/management/tag/UserLifecycle/#tag/UserLifecycle/operation/activateUser).
Users that don't have a password must complete the flow by completing [Reset Password](/openapi/okta-management/management/tag/UserCred/#tag/UserCred/operation/resetPassword) and MFA enrollment steps to transition the user to `ACTIVE` status.
If `sendEmail` is `false`, returns an activation link for the user to set up their account. The activation token can be used to create a custom activation link.
operationId: reactivateUser
parameters:
- description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
- description: Sends an activation email to the user if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: false
type: boolean
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/UserActivationToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Reactivate a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userIdOrLogin}/linkedObjects/{primaryRelationshipName}/{primaryUserId}:
put:
description: |-
Assigns the first User as the `associated` and the second User as the `primary` for the specified relationship.
If the first User is already associated with a different `primary` for this relationship, the previous link is removed. A Linked Object relationship can specify only one primary User for an associated User.
operationId: assignLinkedObjectValueForPrimary
parameters:
- description: |-
If for the `self` link, the ID of the User for whom you want to get the primary User ID. If for the `associated` relation, the User ID or login value of the User assigned the associated relationship.
This can be `me` to represent the current session User.
examples:
manager:
summary: Example ID of `primary`
value: 00u5zex6ztMbOZhF50h7
subordinate:
summary: Example ID of `associated`
value: 00u5zex6ztMbOZhF50h7
explode: false
in: path
name: userIdOrLogin
required: true
schema:
type: string
style: simple
- description: Name of the `primary` relationship being assigned
explode: false
in: path
name: primaryRelationshipName
required: true
schema:
example: manager
type: string
style: simple
- description: User ID to be assigned to the `primary` relationship for the
`associated` user
explode: false
in: path
name: primaryUserId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- oauth2:
- okta.users.manage
summary: Assign a Linked Object value for primary
tags:
- UserLinkedObject
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userIdOrLogin}/linkedObjects/{relationshipName}:
delete:
description: |-
Deletes any existing relationship between the `associated` and `primary` user. For the `associated` User, this is specified by the ID. The `primary` name specifies the relationship.
The operation is successful if the relationship is deleted or if the specified User isn't in the `associated` relationship for any instance of the specified `primary` and thus, no relationship is found.
operationId: deleteLinkedObjectForUser
parameters:
- description: |-
If for the `self` link, the ID of the User for whom you want to get the primary User ID. If for the `associated` relation, the User ID or login value of the User assigned the associated relationship.
This can be `me` to represent the current session User.
examples:
manager:
summary: Example ID of `primary`
value: 00u5zex6ztMbOZhF50h7
subordinate:
summary: Example ID of `associated`
value: 00u5zex6ztMbOZhF50h7
explode: false
in: path
name: userIdOrLogin
required: true
schema:
type: string
style: simple
- description: Name of the `primary` or `associated` relationship being queried
examples:
manager:
summary: Example of a `primary` name
value: manager
subordinate:
summary: Example of an `associated` name
value: subordinate
explode: false
in: path
name: relationshipName
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Delete a Linked Object value
tags:
- UserLinkedObject
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: |-
Lists either the `self` link for the primary User or all associated Users in the relationship specified by `relationshipName`. If the specified User isn't associated in any relationship, an empty array is returned.
Use `me` instead of `id` to specify the current session User.
operationId: listLinkedObjectsForUser
parameters:
- description: |-
If for the `self` link, the ID of the User for whom you want to get the primary User ID. If for the `associated` relation, the User ID or login value of the User assigned the associated relationship.
This can be `me` to represent the current session User.
examples:
manager:
summary: Example ID of `primary`
value: 00u5zex6ztMbOZhF50h7
subordinate:
summary: Example ID of `associated`
value: 00u5zex6ztMbOZhF50h7
explode: false
in: path
name: userIdOrLogin
required: true
schema:
type: string
style: simple
- description: Name of the `primary` or `associated` relationship being queried
examples:
manager:
summary: Example of a `primary` name
value: manager
subordinate:
summary: Example of an `associated` name
value: subordinate
explode: false
in: path
name: relationshipName
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
GetPrimaryLinkedObjectResponse:
$ref: '#/components/examples/GetPrimaryLinkedObjectResponse'
GetAssociatedLinkedObjectResponse:
$ref: '#/components/examples/GetAssociatedLinkedObjectsResponse'
schema:
items:
$ref: '#/components/schemas/ResponseLinks'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List the primary or all of the associated Linked Object values
tags:
- UserLinkedObject
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/appLinks:
get:
description: Lists all App Links for all direct or indirect (via group membership)
assigned apps
operationId: listAppLinks
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
List App Links:
$ref: '#/components/examples/ListAppLinks'
schema:
items:
$ref: '#/components/schemas/AppLink'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Assigned App Links
tags:
- UserResources
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/blocks:
get:
description: Lists information about how the User is blocked from accessing
their account
operationId: listUserBlocks
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
BlocksUnknownDevices:
$ref: '#/components/examples/ListUserBlocksUnknownDevicesResponse'
BlocksAnyDevices:
$ref: '#/components/examples/ListUserBlocksAnyDevicesResponse'
schema:
items:
$ref: '#/components/schemas/UserBlock'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all User Blocks
tags:
- User
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/clients:
get:
description: Lists all Client resources for which the specified User has grants
or tokens
operationId: listUserClients
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
List User Clients:
$ref: '#/components/examples/ListUserClients'
schema:
items:
$ref: '#/components/schemas/OAuth2Client'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Clients
tags:
- UserResources
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/clients/{clientId}/grants:
delete:
description: Revokes all Grants for the specified User and client
operationId: revokeGrantsForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke all Grants for a Client
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Lists all Grants for a specified User and client
operationId: listGrantsForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of tokens to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Grants for a Client
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/clients/{clientId}/tokens:
delete:
description: Revokes all refresh Tokens issued for the specified User and client
operationId: revokeTokensForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke all Refresh Tokens for a Client
tags:
- UserOAuth
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Lists all refresh Tokens issued for the specified User and client
operationId: listRefreshTokensForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of tokens to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/OAuth2RefreshToken'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Refresh Tokens for a Client
tags:
- UserOAuth
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/clients/{clientId}/tokens/{tokenId}:
delete:
description: Revokes the specified refresh Token
operationId: revokeTokenForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke a Token for a Client
tags:
- UserOAuth
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a refresh Token issued for the specified User and client
operationId: getRefreshTokenForUserAndClient
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/OAuth2RefreshToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a Refresh Token for a Client
tags:
- UserOAuth
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/credentials/change_password:
post:
description: |-
Updates a User's password by validating the User's current Password.
This operation provides an option to delete all the sessions of the specified User. However, if the request is made in the context of a session owned by the specified User, that session isn't cleared.
You can only perform this operation on Users in `STAGED`, `ACTIVE`, `PASSWORD_EXPIRED`, or `RECOVERY` status that have a valid [Password credential](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/createUser!path=credentials/password&t=request).
The User transitions to `ACTIVE` status when successfully invoked in `RECOVERY` status.
operationId: changePassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: "If true, validates against password minimum age policy"
explode: true
in: query
name: strict
required: false
schema:
default: false
type: boolean
style: form
x-okta-added-version: 1.10.0
requestBody:
content:
application/json:
examples:
Change Password Request:
$ref: '#/components/examples/ChangePwdRequest'
schema:
$ref: '#/components/schemas/ChangePasswordRequest'
required: true
responses:
"200":
content:
application/json:
examples:
Change Password Response:
$ref: '#/components/examples/ChangePwdResponse'
schema:
$ref: '#/components/schemas/UserCredentials'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Update Password
tags:
- UserCred
x-codegen-request-body-name: changePasswordRequest
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/credentials/change_recovery_question:
post:
description: |-
Updates a User's Recovery Question and answer credential by validating the User's current Password.
You can only perform this operation on Users in `STAGED`, `ACTIVE`, or `RECOVERY` status that have a valid [Password credential](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/createUser!path=credentials/password&t=request).
operationId: changeRecoveryQuestion
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
requestBody:
content:
application/json:
examples:
Update Recovery Question Request:
$ref: '#/components/examples/UpdateRecQuestionRequest'
schema:
$ref: '#/components/schemas/UserCredentials'
required: true
responses:
"200":
content:
application/json:
examples:
Update Recovery Question Response:
$ref: '#/components/examples/UpdateRecQuestionResponse'
schema:
$ref: '#/components/schemas/UserCredentials'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Update Recovery Question
tags:
- UserCred
x-codegen-request-body-name: userCredentials
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/credentials/forgot_password:
post:
description: |-
Starts the forgot password flow.
Generates a one-time token (OTT) that you can use to reset a User's Password.
The User must validate their security question's answer when visiting the reset link. This operation can only be performed on Users with an ACTIVE status and
a valid [Recovery Question credential](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/createUser!path=credentials/recovery_question&t=request).
> **Note:** If you have migrated to Identity Engine, you can allow Users to recover passwords with any enrolled MFA authenticator. See [Self-service account recovery](https://help.okta.com/oie/en-us/content/topics/identity-engine/authenticators/configure-sspr.htm?cshid=ext-config-sspr)
If an email address is associated with multiple Users, keep in mind the following to ensure a successful password recovery lookup:
* Okta no longer includes deactivated Users in the lookup.
* The lookup searches sign-in IDs first, then primary email addresses, and then secondary email addresses.
If `sendEmail` is `false`, returns a link for the User to reset their Password. This operation doesn't affect the status of the User.
operationId: forgotPassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Sends a forgot password email to the User if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: true
type: boolean
style: form
responses:
"200":
content:
application/json:
examples:
Forgot Password Response:
$ref: '#/components/examples/ForgotPwdResponse'
schema:
$ref: '#/components/schemas/ForgotPasswordResponse'
description: Reset URL
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Start forgot password flow
tags:
- UserCred
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/credentials/forgot_password_recovery_question:
post:
description: |-
Resets the User's password to the specified password if the provided answer to the recovery question is correct.
You must include the Recovery Question answer with the submission.
operationId: forgotPasswordSetNewPassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- explode: true
in: query
name: sendEmail
required: false
schema:
default: true
type: boolean
style: form
requestBody:
content:
application/json:
examples:
Forgot Password Recovery Question Request:
$ref: '#/components/examples/ForgotPwdRecoveryQuestionRequest'
schema:
$ref: '#/components/schemas/UserCredentials'
required: true
responses:
"200":
content:
application/json:
examples:
Forgot Password Recovery Question Response:
$ref: '#/components/examples/ForgotPwdRecoveryQuestionResponse'
schema:
$ref: '#/components/schemas/UserCredentials'
description: Credentials
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Reset Password with Recovery Question
tags:
- UserCred
x-codegen-request-body-name: userCredentials
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/factors:
get:
description: Lists all enrolled Factors for the specified user
operationId: listFactors
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ListFactorsResponse:
$ref: '#/components/examples/ListFactorsResults'
schema:
items:
$ref: '#/components/schemas/UserFactor'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all enrolled Factors
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Enrolls a supported Factor for the specified user
> **Note:** All responses return the enrolled Factor with a status of either `PENDING_ACTIVATION`` or `ACTIVE`.
#### Additional SMS/Call Factor information
* **Rate limits**: Okta may return a `429 Too Many Requests` status code if you attempt to resend an SMS or a voice call challenge (OTP) within the same time window. The current [rate limit](https://developer.okta.com/docs/reference/rate-limits/) is one SMS/CALL challenge per phone number every 30 seconds.
* **Existing phone numbers**: Okta may return a `400 Bad Request` status code if a user attempts to enroll with a different phone number when the user has an existing mobile phone or has an existing phone with voice call capability. A user can enroll only one mobile phone for `sms` and enroll only one voice call capable phone for `call` factor.
#### Additional WebAuthn Factor information
**Enroll WebAuthn response parameters**
* For detailed information on the Webauthn standard, including an up-to-date list of supported browsers, see [webauthn.me](https://a0.to/webauthnme-okta-docs).
* In the enroll API response, the `response._embedded.activation` object contains properties used to help the client to create a new WebAuthn credential for use with Okta. See the [WebAuthn spec for PublicKeyCredentialCreationOptions](https://www.w3.org/TR/webauthn/#dictionary-makecredentialoptions).
#### Additional Custom TOTP Factor information
**Enroll Custom TOTP Factor**
* The enrollment process involves passing both the `factorProfileId` and `sharedSecret` properties for a token.
* A Factor Profile represents a particular configuration of the Custom TOTP factor. It includes certain properties that match the hardware token that end users possess, such as the HMAC algorithm, passcode length, and time interval. There can be multiple Custom TOTP factor profiles per org, but users can only enroll in one Custom TOTP factor. Admins can [create Custom TOTP factor profiles](https://help.okta.com/okta_help.htm?id=ext-mfa-totp) in the Admin Console. Then, copy the `factorProfileId` from the Admin Console into the API request.
*
For Custom TOTP enrollment, Okta automaticaly enrolls a user with a `token:software:totp` factor and the `push` factor if the user isn't currently enrolled with these factors.
operationId: enrollFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: "If `true`, indicates that you are replacing the currently registered\
\ phone number for the specified user. This parameter is ignored if the\
\ existing phone number is used by an activated Factor."
explode: true
in: query
name: updatePhone
required: false
schema:
default: false
type: boolean
style: form
- description: "ID of an existing custom SMS template. See the [SMS Templates\
\ API](../Template). This parameter is only used by `sms` Factors. If the\
\ provided ID doesn't exist, the default template is used instead."
explode: true
in: query
name: templateId
required: false
schema:
example: cstk2flOtuCMDJK4b0g3
type: string
style: form
- description: Defines how long the token remains valid
explode: true
in: query
name: tokenLifetimeSeconds
required: false
schema:
default: 300
format: int32
maximum: 86400
minimum: 1
type: integer
style: form
x-okta-added-version: 1.3.0
- description: "If `true`, the factor is immediately activated as part of the\
\ enrollment. An activation process isn't required. Currently auto-activation\
\ is supported by `sms`, `call`, `email` and `token:hotp` (Custom TOTP)\
\ Factor."
explode: true
in: query
name: activate
required: false
schema:
default: false
type: boolean
style: form
x-okta-added-version: 1.3.0
- description: "An ISO 639-1 two-letter language code that defines a localized\
\ message to send. This parameter is only used by `sms` Factors. If a localized\
\ message doesn't exist or the `templateId` is incorrect, the default template\
\ is used instead."
explode: false
in: header
name: Accept-Language
required: false
schema:
example: fr
type: string
style: simple
requestBody:
content:
application/json:
examples:
question:
$ref: '#/components/examples/EnrollFactorQuestionRequest'
sms:
$ref: '#/components/examples/EnrollFactorSmsRequest'
call:
$ref: '#/components/examples/EnrollFactorCallRequest'
token:software:totp:
$ref: '#/components/examples/EnrollFactorOVTotpRequest'
push:
$ref: '#/components/examples/EnrollFactorOVPushRequest'
google:
$ref: '#/components/examples/EnrollFactorGoogleRequest'
rsa_securId:
$ref: '#/components/examples/EnrollFactorRsaSecurIdRequest'
symantec_vip:
$ref: '#/components/examples/EnrollFactorSymantecVipRequest'
yubikey:
$ref: '#/components/examples/EnrollFactorYubikeyRequest'
email:
$ref: '#/components/examples/EnrollFactorEmailRequest'
u2f:
$ref: '#/components/examples/EnrollFactorU2fRequest'
webAuthn:
$ref: '#/components/examples/EnrollFactorWebauthnRequest'
customTotp:
$ref: '#/components/examples/EnrollFactorCustomTotpRequest'
schema:
$ref: '#/components/schemas/UserFactor'
description: Factor
required: true
responses:
"200":
content:
application/json:
examples:
question:
$ref: '#/components/examples/EnrollFactorQuestionResponse'
sms:
$ref: '#/components/examples/EnrollFactorSmsResponse'
call:
$ref: '#/components/examples/EnrollFactorCallResponse'
token:software:totp:
$ref: '#/components/examples/EnrollFactorOVTotpResponse'
push:
$ref: '#/components/examples/EnrollFactorOVPushResponse'
google:
$ref: '#/components/examples/EnrollFactorGoogleResponse'
rsa_securId:
$ref: '#/components/examples/EnrollFactorRsaSecurIdResponse'
symantec_vip:
$ref: '#/components/examples/EnrollFactorSymantecVipResponse'
yubikey:
$ref: '#/components/examples/EnrollFactorYubikeyResponse'
email:
$ref: '#/components/examples/EnrollFactorEmailResponse'
u2f:
$ref: '#/components/examples/EnrollFactorU2fResponse'
webAuthn:
$ref: '#/components/examples/EnrollFactorWebauthnResponse'
customTotp:
$ref: '#/components/examples/EnrollFactorCustomTotpResponse'
schema:
$ref: '#/components/schemas/UserFactor'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Enroll a Factor
tags:
- UserFactor
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/factors/catalog:
get:
description: Lists all the supported Factors that can be enrolled for the specified
user
operationId: listSupportedFactors
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SupportedFactorResponse:
$ref: '#/components/examples/SupportedFactorResults'
schema:
items:
$ref: '#/components/schemas/UserFactorSupported'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all supported Factors
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/factors/questions:
get:
description: Lists all available Security Questions for the specified user
operationId: listSupportedSecurityQuestions
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
example:
- question: disliked_food
questionText: What is the food you least liked as a child?
- question: name_of_first_plush_toy
questionText: What is the name of your first stuffed animal?
- question: first_award
questionText: What did you earn your first medal or award for?
schema:
items:
$ref: '#/components/schemas/UserFactorSecurityQuestionProfile'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
summary: List all supported Security Questions
tags:
- UserFactor
x-okta-no-scope-required: true
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/factors/{factorId}:
delete:
description: |-
Unenrolls an existing Factor for the specified user. This allows the user to enroll a new Factor.
> **Note**: If you unenroll the `push` or the `signed_nonce` Factors, Okta also unenrolls any other `totp`, `signed_nonce`, or Okta Verify `push` Factors associated with the user.
operationId: unenrollFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
- description: "If `true`, removes the phone number as both a recovery method\
\ and a Factor. This parameter is only used for the `sms` and `call` Factors."
explode: true
in: query
name: removeRecoveryEnrollment
required: false
schema:
default: false
type: boolean
style: form
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Unenroll a Factor
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an existing Factor for the specified user
operationId: getFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
SMS:
$ref: '#/components/examples/FactorResponseSms'
Email:
$ref: '#/components/examples/FactorEmail'
schema:
$ref: '#/components/schemas/UserFactor'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a Factor
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/factors/{factorId}/lifecycle/activate:
post:
description: |-
Activates a Factor. Some Factors (`call`, `email`, `push`, `sms`, `token:software:totp`, `u2f`, and `webauthn`) require activation to complete the enrollment process.
Okta enforces a rate limit of five activation attempts within five minutes. After a user exceeds the rate limit, Okta returns an error message.
> **Note**: If the user exceeds their SMS, call, or email factor activate rate limit, then an OTP resend request (`/api/v1/users/${userId}}/factors/${factorId}/resend`) isn't allowed for the same Factor.
operationId: activateFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
requestBody:
content:
application/json:
examples:
token:software:totp:
$ref: '#/components/examples/FactorPasscodeRequest'
sms:
$ref: '#/components/examples/FactorPasscodeRequest'
call:
$ref: '#/components/examples/FactorPasscodeRequest'
email:
$ref: '#/components/examples/FactorPasscodeRequest'
u2f:
$ref: '#/components/examples/ActivateFactorU2fRequest'
webauthn:
$ref: '#/components/examples/ActivateFactorWebauthnRequest'
schema:
$ref: '#/components/schemas/UserFactorActivateRequest'
required: false
responses:
"200":
content:
application/json:
examples:
token:software:totp:
$ref: '#/components/examples/ActivateFactorTotpResponse'
sms:
$ref: '#/components/examples/ActivateFactorSmsResponse'
call:
$ref: '#/components/examples/ActivateFactorCallResponse'
push:
$ref: '#/components/examples/ActivateFactorPushResponse'
email:
$ref: '#/components/examples/ActivateFactorEmailResponse'
u2f:
$ref: '#/components/examples/ActivateFactorU2fResponse'
webauthn:
$ref: '#/components/examples/ActivateFactorWebauthnResponse'
schema:
$ref: '#/components/schemas/UserFactorActivateResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Activate a Factor
tags:
- UserFactor
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/factors/{factorId}/resend:
post:
description: |-
Resends an `sms`, `call`, or `email` factor challenge as part of an enrollment flow
For `call` and `sms` factors, Okta enforces a rate limit of one OTP challenge per device every 30 seconds. You can configure your `sms` and `call` factors to use a third-party telephony provider. See the [Telephony inline hook reference](https://developer.okta.com/docs/reference/telephony-hook/). Okta round-robins between SMS providers with every resend request to help ensure delivery of an SMS and Call OTPs across different carriers.
> **Note**: Resend operations aren't allowed after a factor exceeds the activation rate limit. See [Activate a Factor](./#tag/UserFactor/operation/activateFactor).
operationId: resendEnrollFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
- description: "ID of an existing custom SMS template. See the [SMS Templates\
\ API](../Template). This parameter is only used by `sms` Factors."
explode: true
in: query
name: templateId
required: false
schema:
example: cstk2flOtuCMDJK4b0g3
type: string
style: form
requestBody:
content:
application/json:
examples:
sms:
value:
factorType: sms
provider: OKTA
profile:
phoneNumber: +1-555-415-1337
schema:
$ref: '#/components/schemas/ResendUserFactor'
required: true
responses:
"200":
content:
application/json:
examples:
sms:
$ref: '#/components/examples/EnrollFactorSmsResponse'
schema:
$ref: '#/components/schemas/ResendUserFactor'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Resend a Factor enrollment
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/factors/{factorId}/transactions/{transactionId}:
get:
description: Retrieves the status of a `push` Factor verification transaction
operationId: getFactorTransactionStatus
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
- description: ID of an existing Factor verification transaction
explode: false
in: path
name: transactionId
required: true
schema:
example: gPAQcN3NDjSGOCAeG2Jv
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
WAITING:
$ref: '#/components/examples/UserFactorVerifyPushTransactionWaiting'
SUCCESS:
$ref: '#/components/examples/UserFactorVerifyPushTransactionApproved'
REJECTED:
$ref: '#/components/examples/UserFactorVerifyPushTransactionRejected'
TIMEOUT:
$ref: '#/components/examples/UserFactorVerifyPushTransactionTimeout'
schema:
$ref: '#/components/schemas/UserFactorPushTransaction'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a Factor transaction status
tags:
- UserFactor
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/factors/{factorId}/verify:
post:
description: |-
Verifies an OTP for a Factor. Some Factors (`call`, `email`, `push`, `sms`, `u2f`, and `webauthn`) must first issue a challenge before you can verify the Factor. Do this by making a request without a body. After a challenge is issued, make another request to verify the Factor.
**Note**: To verify a `push` factor, use the **poll** link returned when you issue the challenge. See [Retrieve a Factor Transaction Status](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/getFactorTransactionStatus).
operationId: verifyFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
- description: "ID of an existing custom SMS template. See the [SMS Templates\
\ API](../Template). This parameter is only used by `sms` Factors."
explode: true
in: query
name: templateId
required: false
schema:
example: cstk2flOtuCMDJK4b0g3
type: string
style: form
- description: Defines how long the token remains valid
explode: true
in: query
name: tokenLifetimeSeconds
required: false
schema:
default: 300
format: int32
maximum: 86400
minimum: 1
type: integer
style: form
x-okta-added-version: 1.3.0
- description: Public IP address for the user agent
explode: false
in: header
name: X-Forwarded-For
required: false
schema:
type: string
style: simple
x-okta-added-version: 1.11.0
- description: Type of user agent detected when the request is made. Required
to verify `push` Factors.
explode: false
in: header
name: User-Agent
required: false
schema:
type: string
style: simple
x-okta-added-version: 1.11.0
- description: "An ISO 639-1 two-letter language code that defines a localized\
\ message to send. This parameter is only used by `sms` Factors. If a localized\
\ message doesn't exist or the `templateId` is incorrect, the default template\
\ is used instead."
explode: false
in: header
name: Accept-Language
required: false
schema:
example: fr
type: string
style: simple
requestBody:
content:
application/json:
examples:
sms verify:
$ref: '#/components/examples/FactorPasscodeRequest'
call verify:
$ref: '#/components/examples/FactorPasscodeRequest'
email verify:
$ref: '#/components/examples/FactorPasscodeRequest'
u2f verify:
$ref: '#/components/examples/UserFactorVerifyU2fRequest'
webAuthn verify:
$ref: '#/components/examples/UserFactorVerifyWebauthnRequest'
security question verify:
$ref: '#/components/examples/UserFactorVerifySecurityQuestionRequest'
totp verify:
$ref: '#/components/examples/FactorPasscodeRequest'
token verify:
$ref: '#/components/examples/FactorPasscodeRequest'
yubikey verify:
$ref: '#/components/examples/FactorPasscodeRequest'
schema:
$ref: '#/components/schemas/UserFactorVerifyRequest'
description: "Some Factors (`call`, `email`, `push`, `sms`, `u2f`, and `webauthn`)\
\ must first issue a challenge before you can verify the Factor. Do this\
\ by making a request without a body. After a challenge is issued, make\
\ another request to verify the Factor."
required: false
responses:
"200":
content:
application/json:
examples:
sms challenge:
$ref: '#/components/examples/UserFactorChallengeSmsResponse'
sms verify:
$ref: '#/components/examples/UserFactorVerifySuccessSmsResponse'
call challenge:
$ref: '#/components/examples/UserFactorChallengeCallResponse'
call verify:
$ref: '#/components/examples/UserFactorVerifyCallSuccessResponse'
push challenge:
$ref: '#/components/examples/UserFactorChallengePushResponse'
email challenge:
$ref: '#/components/examples/UserFactorChallengeEmailResponse'
email verify:
$ref: '#/components/examples/UserFactorVerifyEmailSuccessResponse'
u2f challenge:
$ref: '#/components/examples/UserFactorChallengeU2fResponse'
u2f verify:
$ref: '#/components/examples/UserFactorVerifyU2fResponse'
webAuthn challenge:
$ref: '#/components/examples/UserFactorChallengeWebauthnResponse'
webAuthn verify:
$ref: '#/components/examples/UserFactorVerifyWebauthnResponse'
security question verify:
$ref: '#/components/examples/UserFactorVerifySuccessSqResponse'
totp verify:
$ref: '#/components/examples/UserFactorVerifySuccessTotpResponse'
token verify:
$ref: '#/components/examples/UserFactorVerifySuccessTokenResponse'
yubikey verify:
$ref: '#/components/examples/UserFactorVerifySuccessYubikeyResponse'
schema:
$ref: '#/components/schemas/UserFactorVerifyResponse'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Verify a Factor
tags:
- UserFactor
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/grants:
delete:
description: Revokes all Grants for a specified User
operationId: revokeUserGrants
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke all User Grants
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Lists all Grants for the specified user
operationId: listUserGrants
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The scope ID to filter on
explode: true
in: query
name: scopeId
required: false
schema:
type: string
style: form
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: Specifies the number of grants to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all User Grants
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/grants/{grantId}:
delete:
description: Revokes one Grant for a specified User
operationId: revokeUserGrant
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Grant ID
explode: false
in: path
name: grantId
required: true
schema:
example: iJoqkwx50mrgX4T9LcaH
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke a User Grant
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Grant for the specified User
operationId: getUserGrant
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Grant ID
explode: false
in: path
name: grantId
required: true
schema:
example: iJoqkwx50mrgX4T9LcaH
type: string
style: simple
- description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a User Grant
tags:
- UserGrant
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/groups:
get:
description: Lists all Groups of which the User is a member
operationId: listUserGroups
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
List User Groups:
$ref: '#/components/examples/ListUserGroups'
schema:
items:
$ref: '#/components/schemas/Group'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Groups
tags:
- UserResources
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/idps:
get:
description: Lists the IdPs associated with the User
operationId: listUserIdentityProviders
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
MultipleIdPsResponse:
$ref: '#/components/examples/MultipleIdPsResponse'
schema:
items:
$ref: '#/components/schemas/IdentityProvider'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Identity Providers for User
tags:
- IdentityProviderUsers
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/activate:
post:
description: |-
Activates a User.
This operation can only be performed on Users with a `STAGED` or `DEPROVISIONED` status. Activation of a User is an asynchronous operation.
* The User will have the `transitioningToStatus` property with an `ACTIVE` value during activation to indicate that the user hasn't completed the asynchronous operation.
* The User will have an `ACTIVE` status when the activation process completes.
Users who don't have a password must complete the welcome flow by visiting the activation link to complete the transition to `ACTIVE` status.
> **Note:** If you want to send a branded User Activation email, change the subdomain of your request to the custom domain that's associated with the brand.
> For example, change `subdomain.okta.com` to `custom.domain.one`. See [Multibrand and custom domains](https://developer.okta.com/docs/concepts/brands/#multibrand-and-custom-domains).
> **Note:** If you have Optional Password enabled, visiting the activation link is optional for users who aren't required to enroll a password.
> See [Create user with Optional Password enabled](https://developer.okta.com/docs/reference/api/users/#create-user-with-optional-password-enabled).
> **Legal disclaimer**
> After a user is added to the Okta directory, they receive an activation email. As part of signing up for this service,
> you agreed not to use Okta's service/product to spam and/or send unsolicited messages.
> Please refrain from adding unrelated accounts to the directory as Okta is not responsible for, and disclaims any and all
> liability associated with, the activation email's content. You, and you alone, bear responsibility for the emails sent to any recipients.
operationId: activateUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Sends an activation email to the user if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: true
type: boolean
style: form
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/UserActivationToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Activate a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/deactivate:
post:
description: |-
Deactivates a User.
This operation can only be performed on Users that do not have a `DEPROVISIONED` status.
* The User's `transitioningToStatus` property is `DEPROVISIONED` during deactivation to indicate that the user hasn't completed the asynchronous operation.
* The User's status is `DEPROVISIONED` when the deactivation process is complete.
> **Important:** Deactivating a User is a **destructive** operation. The User is deprovisioned from all assigned apps, which might destroy their data such as email or files.
**This action cannot be recovered!**
You can also perform user deactivation asynchronously. To invoke asynchronous user deactivation, pass an HTTP header `Prefer: respond-async` with the request.
operationId: deactivateUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Sends a deactivation email to the admin if `true`
explode: true
in: query
name: sendEmail
required: false
schema:
default: false
type: boolean
style: form
x-okta-added-version: 1.5.0
- description: Request asynchronous processing
explode: false
in: header
name: Prefer
required: false
schema:
enum:
- respond-async
type: string
style: simple
responses:
"200":
content: {}
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Deactivate a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/expire_password:
post:
description: |-
Expires the password. This operation transitions the User status to `PASSWORD_EXPIRED` so that the User must change their password the next time that they sign in.
If you have integrated Okta with your on-premises Active Directory (AD), then setting a User's Password as expired in Okta also expires the Password in AD.
When the User tries to sign in to Okta, delegated authentication finds the password-expired status in AD,
and the User is presented with the password-expired page where they can change their Password.
operationId: expirePassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Expire Password Response:
$ref: '#/components/examples/ExpirePwdResponse'
schema:
$ref: '#/components/schemas/User'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Expire Password
tags:
- UserCred
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/expire_password_with_temp_password:
post:
description: |-
Expires the password and resets the User's Password to a temporary password. This operation transitions the User status to `PASSWORD_EXPIRED` so that the User must change their password the next time that they sign in.
User's Password is reset to a temporary password that is returned, and then the User's Password is expired.
If `revokeSessions` is included in the request with a value of `true`, the User's current outstanding sessions are revoked and require re-authentication.
If you have integrated Okta with your on-premises Active Directory (AD), then setting a User's Password as expired in Okta also expires the Password in AD.
When the User tries to sign in to Okta, delegated authentication finds the password-expired status in AD,
and the User is presented with the password-expired page where they can change their Password.
operationId: expirePasswordWithTempPassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Revokes the User's existing sessions if `true`
explode: true
in: query
name: revokeSessions
required: false
schema:
default: false
type: boolean
style: form
responses:
"200":
content:
application/json:
examples:
Expire Password with Temp Password Response:
$ref: '#/components/examples/ExpirePwdWithTempPwdResponse'
schema:
$ref: '#/components/schemas/User'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Expire Password with temporary password
tags:
- UserCred
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/reset_factors:
post:
description: Resets all factors for the specified User. All MFA factor enrollments
return to the unenrolled state. The User's status remains `ACTIVE`. This link
is present only if the User is currently enrolled in one or more MFA factors.
operationId: resetFactors
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content: {}
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Reset Factors
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/reset_password:
post:
description: |-
Resets password. Generates a one-time token (OTT) that you can use to reset a User's password. You can automatically email the OTT link to the User or return the OTT to the API caller and distribute using a custom flow.
This operation transitions the User to the `RECOVERY` status. The User is then not able to sign in or initiate a forgot password flow until they complete the reset flow.
This operation provides an option to delete all the User's sessions. However, if the request is made in the context of a session owned by the specified User, that session isn't cleared.
> **Note:** You can also use this API to convert a User with the Okta Credential Provider to use a Federated Provider. After this conversion, the User can't directly sign in with a password.
> To convert a federated User back to an Okta User, use the default API call.
If an email address is associated with multiple Users, keep in mind the following to ensure a successful password recovery lookup:
* Okta no longer includes deactivated Users in the lookup.
* The lookup searches sign-in IDs first, then primary email addresses, and then secondary email addresses.
If `sendEmail` is `false`, returns a link for the User to reset their password.
operationId: resetPassword
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- explode: true
in: query
name: sendEmail
required: true
schema:
type: boolean
style: form
- description: "Revokes all User sessions, except for the current session, if\
\ set to `true`"
explode: true
in: query
name: revokeSessions
required: false
schema:
default: false
type: boolean
style: form
responses:
"200":
content:
application/json:
examples:
Reset Password without Sending Email Response:
$ref: '#/components/examples/ResetPwdWithoutSendingEmailResponse'
schema:
$ref: '#/components/schemas/ResetPasswordToken'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Reset password
tags:
- UserCred
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/suspend:
post:
description: |-
Suspends a user. This operation can only be performed on Users with an `ACTIVE` status. The User has a `SUSPENDED` status when the process completes.
Suspended users can't sign in to Okta. They can only be unsuspended or deactivated. Their group and app assignments are retained.
operationId: suspendUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content: {}
description: OK
"400":
content:
application/json:
examples:
MissingRequiredParameter:
$ref: '#/components/examples/ErrorMissingRequiredParameter'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Suspend a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/unlock:
post:
description: |-
Unlocks a User with a `LOCKED_OUT` status or unlocks a User with an `ACTIVE` status that is blocked from unknown devices. Unlocked Users have an `ACTIVE` status and can sign in with their current password.
> **Note:** This operation works with Okta-sourced users. It doesn't support directory-sourced accounts such as Active Directory.
operationId: unlockUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Unlock a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/lifecycle/unsuspend:
post:
description: Unsuspends a user and returns them to the `ACTIVE` state. This
operation can only be performed on users that have a `SUSPENDED` status.
operationId: unsuspendUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content: {}
description: Success
"400":
content:
application/json:
examples:
MissingRequiredParameter:
$ref: '#/components/examples/ErrorMissingRequiredParameter'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Unsuspend a User
tags:
- UserLifecycle
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles:
get:
description: Lists all roles assigned to a User (identified by `userId`)
operationId: listAssignedRolesForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: "An optional parameter used to return targets configured for\
\ the standard Role Assignment in the `embedded` property. Supported values:\
\ `targets/groups` or `targets/catalog/apps`"
examples:
groupTarget:
summary: Return Group targets
value: targets/groups
appTarget:
summary: Return App targets
value: targets/catalog/apps
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/StandardRolesListResponse'
Custom Roles:
$ref: '#/components/examples/StandardAndCustomRolesListResponse'
IAM-based Standard Roles:
$ref: '#/components/examples/IAMStandardRolesListResponse'
schema:
items:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all User Role Assignments
tags:
- RoleAssignmentAUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Assigns a [standard role](/openapi/okta-management/guides/roles/#standard-roles) to a User.
You can also assign a custom role to a User, but the preferred method to assign a custom role to a User is to create a binding between the Custom Role, the Resource Set, and the User. See [Create a Role Resource Set Binding](/openapi/okta-management/management/tag/RoleDResourceSetBinding/#tag/RoleDResourceSetBinding/operation/createResourceSetBinding).
> **Notes:**
> * The request payload is different for standard and custom role assignments.
> * For IAM-based standard role assignments, use the request payload for standard roles. However, the response payload for IAM-based role assignments is similar to the custom role's assignment response.
operationId: assignRoleToUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Setting this to `true` grants the User third-party admin status
explode: true
in: query
name: disableNotifications
required: false
schema:
default: false
type: boolean
style: form
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/assignRoleToUser_request'
required: true
responses:
"201":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/StandardRoleResponseUser'
Custom Roles:
$ref: '#/components/examples/CustomRoleResponseUser'
IAM-based Standard Roles:
$ref: '#/components/examples/IAMStandardRoleResponseUser'
schema:
$ref: '#/components/schemas/assignRoleToUser_201_response'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a User Role
tags:
- RoleAssignmentAUser
x-codegen-request-body-name: assignRoleRequest
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}:
delete:
description: Unassigns a Role Assignment (identified by `roleAssignmentId`)
from a User (identified by `userId`)
operationId: unassignRoleFromUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a User Role
tags:
- RoleAssignmentAUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Role assigned to a User (identified by `userId`). The
`roleAssignmentId` parameter is the unique identifier for either a standard
Role Assignment object or a custom role Resource Set Binding object.
operationId: getUserAssignedRole
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/StandardRoleResponseUser'
Custom Roles:
$ref: '#/components/examples/CustomRoleResponseUser'
IAM-based Standard Roles:
$ref: '#/components/examples/IAMStandardRoleResponseUser'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a User Role Assignment
tags:
- RoleAssignmentAUser
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}/governance: {}
/api/v1/users/{userId}/roles/{roleAssignmentId}/governance/{grantId}: {}
/api/v1/users/{userId}/roles/{roleAssignmentId}/governance/{grantId}/resources: {}
/api/v1/users/{userId}/roles/{roleAssignmentId}/targets/catalog/apps:
get:
description: "Lists all app targets for an `APP_ADMIN` Role Assigned to a User.\
\ The response is a list that includes OIN-cataloged apps or app instances.\
\ The response payload for an app instance contains the `id` property, but\
\ an OIN-cataloged app payload doesn't."
operationId: listApplicationTargetsForApplicationAdministratorRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/CatalogApplication'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Admin Role Application Targets
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Assigns all Apps as Target to Role
operationId: assignAllAppsAsTargetToRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"200":
content: {}
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign all Apps as Target to Role
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}:
delete:
description: |
Unassigns an OIN app target from an `APP_ADMIN` Role Assignment to an admin User.
> **Note:** You can't remove the last OIN app target from a Role Assignment since this causes an exception.
> If you need a Role Assignment that applies to all apps, delete the `APP_ADMIN` Role Assignment to the User and recreate a new one.
operationId: unassignAppTargetFromAppAdminRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign an Admin Role Application Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Assigns an OIN app target for an `APP_ADMIN` Role Assignment to an admin User. When you assign the first app target, you reduce the scope of the Role Assignment.
The Role no longer applies to all app targets, but applies only to the specified target. Assigning an OIN app target overrides any existing app instance targets of the OIN app.
For example, if a user was assigned to administer a specific Facebook instance, a successful request to add an OIN app target with `facebook` for `appName` makes that user the administrator for all Facebook instances.
operationId: assignAppTargetToAdminRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign an Admin Role Application Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}/{appId}:
delete:
description: |-
Unassigns an app instance target from an `APP_ADMIN` Role Assignment to an admin User.
> **Note:** You can't remove the last app instance target from a Role Assignment since this causes an exception.
> If you need a Role Assignment that applies to all apps, delete the `APP_ADMIN` Role Assignment and recreate a new one.
operationId: unassignAppInstanceTargetFromAdminRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign an Admin Role Application Instance Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Assigns an app instance target to an `APP_ADMIN` Role Assignment\
\ to an admin User. When you assign the first OIN app or app instance target,\
\ you reduce the scope of the Role Assignment.\nThe Role no longer applies\
\ to all app targets, but applies only to the specified target.\n \
\ \n> **Note:** You can target a mixture of both OIN app and app instance\
\ targets, but can't assign permissions to manage all instances of an OIN\
\ app and then assign a subset of permission to the same OIN app.\n> For example,\
\ you can't specify that an admin has access to manage all instances of the\
\ Salesforce app and then also manage specific configurations of the Salesforce\
\ app.\n"
operationId: assignAppInstanceTargetToAppAdminRoleForUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign an Admin Role Application Instance Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}/targets/groups:
get:
description: |
Lists all Group targets for a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to an admin User.
If the Role isn't scoped to specific Group targets, an empty array `[]` is returned.
operationId: listGroupTargetsForRole
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Group'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Admin Role Group Targets
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/roles/{roleAssignmentId}/targets/groups/{groupId}:
delete:
description: |
Unassigns a Group target from a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to an admin User.
> **Note:** You can't remove the last Group target from a Role Assignment since this causes an exception.
> If you need a Role Assignment that applies to all Groups, delete the Role Assignment to the User and recreate a new one.
operationId: unassignGroupTargetFromUserAdminRole
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign an Admin Role Group Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |
Assigns a Group target for a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to an admin User.
When you assign the first Group target, you reduce the scope of the Role Assignment. The Role no longer applies to all targets but applies only to the specified target.
operationId: assignGroupTargetToUserRole
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign an Admin Role Group Target
tags:
- RoleBTargetAdmin
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/sessions:
delete:
description: |-
Revokes all active Identity Provider sessions of the User. This forces the user to authenticate on the next operation. Optionally revokes OpenID Connect and OAuth refresh and access tokens issued to the User.
> **Note:** This operation doesn't clear the sessions created for web or native apps.
operationId: revokeUserSessions
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: Revoke issued OpenID Connect and OAuth refresh and access tokens
explode: true
in: query
name: oauthTokens
required: false
schema:
default: false
type: boolean
style: form
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Revoke all User sessions
tags:
- UserSessions
x-okta-lifecycle:
isCorsEnabled: true
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/subscriptions:
get:
description: Lists all subscriptions available to a specified User. Returns
an `AccessDeniedException` message if requests are made for another user.
operationId: listSubscriptionsUser
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Subscription'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all Subscriptions for a User
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/subscriptions/{notificationType}:
get:
description: Retrieves a subscription by `notificationType` for a specified
User. Returns an `AccessDeniedException` message if requests are made for
another user.
operationId: getSubscriptionsNotificationTypeUser
parameters:
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/Subscription'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: Retrieve a Subscription for a User
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/subscriptions/{notificationType}/subscribe:
post:
description: Subscribes the current User to a specified notification type. Returns
an `AccessDeniedException` message if requests are made for another user.
operationId: subscribeByNotificationTypeUser
parameters:
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Subscribe a User to a Specific Notification Type
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/users/{userId}/subscriptions/{notificationType}/unsubscribe:
post:
description: Unsubscribes the current User from a specified notification type.
Returns an `AccessDeniedException` message if requests are made for another
user.
operationId: unsubscribeByNotificationTypeUser
parameters:
- explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Unsubscribe a User from a Specific Notification Type
tags:
- Subscription
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/zones:
get:
description: |-
Lists all Network Zones with pagination. A subset of zones can be returned that match a supported filter expression or query.
This operation requires URL encoding. For example, `filter=(id eq "nzoul0wf9jyb8xwZm0g3" or id eq "nzoul1MxmGN18NDQT0g3")` is encoded as `filter=%28id+eq+%22nzoul0wf9jyb8xwZm0g3%22+or+id+eq+%22nzoul1MxmGN18NDQT0g3%22%29`.
Okta supports filtering on the `id` and `usage` properties. See [Filtering](https://developer.okta.com/docs/reference/core-okta-api/#filter) for more information on the expressions that are used in filtering.
operationId: listNetworkZones
parameters:
- explode: true
in: query
name: after
required: false
schema:
description: Specifies the pagination cursor for the next page of Network
Zones
example: BlockedIpZones
type: string
style: form
- explode: true
in: query
name: limit
required: false
schema:
default: -1
description: Specifies the number of results for a page
example: 5
format: int32
type: integer
style: form
- explode: true
in: query
name: filter
required: false
schema:
description: Filters zones by usage or ID expression
example: id eq "nzowc1U5Jh5xuAK0o0g3"
type: string
style: form
responses:
"200":
content:
application/json:
examples:
RetrieveAllZonesWithFilter:
$ref: '#/components/examples/RetrieveAllZonesWithFilter'
RetrieveAllZones:
$ref: '#/components/examples/RetrieveAllZones'
schema:
items:
$ref: '#/components/schemas/NetworkZone'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.read
summary: List all Network Zones
tags:
- NetworkZone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Creates a Network Zone
* For an IP Network Zone, you must define either `gateways` or `proxies`.
* For a Dynamic Network Zone, you must define at least one of the following: `asns`, `locations`, or `proxyType`.
* For an Enhanced Dynamic Network Zone, you must define at least one of the following: `asns`, `locations`, or `ipServiceCategories`.
operationId: createNetworkZone
requestBody:
content:
application/json:
examples:
CreateIPPolicyNetworkZone:
$ref: '#/components/examples/CreateIPPolicyNetworkZone'
CreateIPPolicyBlocklistNetworkZone:
$ref: '#/components/examples/CreateIPPolicyBlockListNetworkZone'
CreateEDNetworkZone:
$ref: '#/components/examples/CreateEDNZRequest'
schema:
$ref: '#/components/schemas/NetworkZone'
required: true
responses:
"200":
content:
application/json:
examples:
CreateIPPolicyNetworkZone:
$ref: '#/components/examples/CreateIPPolicyNetworkZoneResponse'
CreateIPPolicyBlocklistNetworkZone:
$ref: '#/components/examples/CreateIPPolicyBlockListNetworkZoneResponse'
CreateEDNetworkZone:
$ref: '#/components/examples/CreateEDNZResponse'
schema:
$ref: '#/components/schemas/NetworkZone'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/NzErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.manage
summary: Create a Network Zone
tags:
- NetworkZone
x-codegen-request-body-name: zone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/zones/{zoneId}:
delete:
description: |-
Deletes a Network Zone by `zoneId`
> **Notes:**
> * You can't delete a Network Zone that's used by a [Policy](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Policy/) or [Rule](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Policy/#tag/Policy/operation/listPolicyRules).
> * For Okta Identity Engine orgs, you can't delete a Network Zone with an ACTIVE `status`.
operationId: deleteNetworkZone
parameters:
- description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.manage
summary: Delete a Network Zone
tags:
- NetworkZone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Network Zone by `zoneId`
operationId: getNetworkZone
parameters:
- description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
RetrieveNetworkZoneIP:
$ref: '#/components/examples/RetrieveNetworkZoneIP'
RetrieveNetworkZoneDynamic:
$ref: '#/components/examples/RetrieveNetworkZoneDynamic'
RetrieveNetworkZoneEnhancedDynamic:
$ref: '#/components/examples/CreateEDNZResponse'
schema:
$ref: '#/components/schemas/NetworkZone'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.read
summary: Retrieve a Network Zone
tags:
- NetworkZone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Replaces a Network Zone by `zoneId`. The replaced Network Zone type must be the same as the existing type.
You can replace the usage (`POLICY`, `BLOCKLIST`) of a Network Zone by updating the `usage` attribute.
operationId: replaceNetworkZone
parameters:
- description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
requestBody:
content:
application/json:
examples:
ReplaceNetworkZone:
$ref: '#/components/examples/ReplaceNetworkZone'
schema:
$ref: '#/components/schemas/NetworkZone'
required: true
responses:
"200":
content:
application/json:
examples:
ReplaceNetworkZone:
$ref: '#/components/examples/ReplaceNetworkZoneResponse'
schema:
$ref: '#/components/schemas/NetworkZone'
description: Success
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/NzErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.manage
summary: Replace a Network Zone
tags:
- NetworkZone
x-codegen-request-body-name: zone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/api/v1/zones/{zoneId}/lifecycle/activate:
post:
description: Activates a Network Zone by `zoneId`
operationId: activateNetworkZone
parameters:
- description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
ActivateNetworkZone:
$ref: '#/components/examples/ActivateNetworkZone'
schema:
$ref: '#/components/schemas/NetworkZone'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.manage
summary: Activate a Network Zone
tags:
- NetworkZone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/api/v1/zones/{zoneId}/lifecycle/deactivate:
post:
description: Deactivates a Network Zone by `zoneId`
operationId: deactivateNetworkZone
parameters:
- description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
DeactivateNetworkZone:
$ref: '#/components/examples/DeactivateNetworkZone'
schema:
$ref: '#/components/schemas/NetworkZone'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.networkZones.manage
summary: Deactivate a Network Zone
tags:
- NetworkZone
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/attack-protection/api/v1/authenticator-settings:
get:
description: Retrieves the Authenticator Settings for an org
operationId: getAuthenticatorSettings
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/AttackProtectionAuthenticatorSettings'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Authenticator Settings
tags:
- AttackProtection
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces the Authenticator Settings for an org
operationId: replaceAuthenticatorSettings
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/AttackProtectionAuthenticatorSettings'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/AttackProtectionAuthenticatorSettings'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Replace the Authenticator Settings
tags:
- AttackProtection
x-codegen-request-body-name: authenticatorSettings
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/attack-protection/api/v1/user-lockout-settings:
get:
description: Retrieves the User Lockout Settings for an org
operationId: getUserLockoutSettings
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/UserLockoutSettings'
type: array
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the User Lockout Settings
tags:
- AttackProtection
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: Replaces the User Lockout Settings for an org
operationId: replaceUserLockoutSettings
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/UserLockoutSettings'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/UserLockoutSettings'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Replace the User Lockout Settings
tags:
- AttackProtection
x-codegen-request-body-name: lockoutSettings
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/device-access/api/v1/desktop-mfa/recovery-pin-settings:
get:
description: "Retrieves the status of the Desktop MFA Recovery PIN feature.\
\ That is, whether or not the feature is enabled for your org."
operationId: getDesktopMFARecoveryPinOrgSetting
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DesktopMFARecoveryPinOrgSetting'
description: OK
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.read
summary: Retrieve the Desktop MFA Recovery PIN Org setting
tags:
- DeviceAccess
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
put:
description: Replaces the Desktop MFA Recovery PIN feature for your org
operationId: replaceDesktopMFARecoveryPinOrgSetting
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/DesktopMFARecoveryPinOrgSetting'
required: true
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/DesktopMFARecoveryPinOrgSetting'
description: OK
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"403":
content:
application/json:
examples:
Access Denied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.orgs.manage
summary: Replace the Desktop MFA Recovery PIN Org Setting
tags:
- DeviceAccess
x-codegen-request-body-name: DesktopMFARecoveryPinOrgSetting
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/integrations/api/v1/api-services:
get:
description: Lists all API Service Integration instances with a pagination option
operationId: listApiServiceIntegrationInstances
parameters:
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
responses:
"200":
content:
application/json:
examples:
APIServiceIntegrationResponseExample:
$ref: '#/components/examples/APIServiceIntegrationListResponse'
schema:
items:
$ref: '#/components/schemas/APIServiceIntegrationInstance'
type: array
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.read
summary: List all API Service Integration instances
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates and authorizes an API Service Integration instance
operationId: createApiServiceIntegrationInstance
requestBody:
content:
application/json:
examples:
postAPIServiceIntegrationRequestExample:
$ref: '#/components/examples/postAPIServiceIntegrationRequest'
schema:
$ref: '#/components/schemas/postAPIServiceIntegrationInstanceRequest'
required: true
responses:
"201":
content:
application/json:
examples:
APIServiceIntegrationResponseExample:
$ref: '#/components/examples/postAPIServiceIntegrationResponse'
schema:
$ref: '#/components/schemas/postAPIServiceIntegrationInstance'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
summary: Create an API Service Integration instance
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/integrations/api/v1/api-services/{apiServiceId}:
delete:
description: Deletes an API Service Integration instance by `id`. This operation
also revokes access to scopes that were previously granted to this API Service
Integration instance.
operationId: deleteApiServiceIntegrationInstance
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.manage
summary: Delete an API Service Integration instance
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves an API Service Integration instance by `id`
operationId: getApiServiceIntegrationInstance
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
APIServiceIntegrationResponseExample:
$ref: '#/components/examples/APIServiceIntegrationResponse'
schema:
$ref: '#/components/schemas/APIServiceIntegrationInstance'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.read
summary: Retrieve an API Service Integration instance
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/integrations/api/v1/api-services/{apiServiceId}/credentials/secrets:
get:
description: Lists all client secrets for an API Service Integration instance
by `apiServiceId`
operationId: listApiServiceIntegrationInstanceSecrets
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
APIServiceIntegrationResponseExample:
$ref: '#/components/examples/APIServiceIntegrationInstanceSecretListResponse'
schema:
items:
$ref: '#/components/schemas/APIServiceIntegrationInstanceSecret'
type: array
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.read
summary: List all API Service Integration instance Secrets
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: Creates an API Service Integration instance Secret object with
a new active client secret. You can create up to two Secret objects. An error
is returned if you attempt to create more than two Secret objects.
operationId: createApiServiceIntegrationInstanceSecret
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
responses:
"201":
content:
application/json:
examples:
newAPIServiceIntegrationInstanceSecretResponse:
$ref: '#/components/examples/newAPIServiceIntegrationInstanceSecretResponse'
schema:
$ref: '#/components/schemas/APIServiceIntegrationInstanceSecret'
description: Created
"400":
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.manage
summary: Create an API Service Integration instance Secret
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/integrations/api/v1/api-services/{apiServiceId}/credentials/secrets/{secretId}:
delete:
description: Deletes an API Service Integration instance Secret by `secretId`.
You can only delete an inactive Secret.
operationId: deleteApiServiceIntegrationInstanceSecret
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
- description: '`id` of the API Service Integration instance Secret'
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.manage
summary: Delete an API Service Integration instance Secret
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/integrations/api/v1/api-services/{apiServiceId}/credentials/secrets/{secretId}/lifecycle/activate:
post:
description: Activates an API Service Integration instance Secret by `secretId`
operationId: activateApiServiceIntegrationInstanceSecret
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
- description: '`id` of the API Service Integration instance Secret'
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
activeAPIServiceIntegrationInstanceSecretResponse:
$ref: '#/components/examples/activeAPIServiceIntegrationInstanceSecretResponse'
schema:
$ref: '#/components/schemas/APIServiceIntegrationInstanceSecret'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.manage
summary: Activate an API Service Integration instance Secret
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/integrations/api/v1/api-services/{apiServiceId}/credentials/secrets/{secretId}/lifecycle/deactivate:
post:
description: Deactivates an API Service Integration instance Secret by `secretId`
operationId: deactivateApiServiceIntegrationInstanceSecret
parameters:
- description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
- description: '`id` of the API Service Integration instance Secret'
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
inactiveAPIServiceIntegrationInstanceSecretResponse:
$ref: '#/components/examples/inactiveAPIServiceIntegrationInstanceSecretResponse'
schema:
$ref: '#/components/schemas/APIServiceIntegrationInstanceSecret'
description: OK
"401":
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.oauthIntegrations.manage
summary: Deactivate an API Service Integration instance Secret
tags:
- ApiServiceIntegrations
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/integrations/api/v1/submissions/{submissionId}: {}
/integrations/api/v1/submissions/{submissionId}/submit: {}
/integrations/api/v1/submissions/{submissionId}/testing: {}
/oauth2/v1/clients/{clientId}/roles:
get:
description: Lists all roles assigned to a Client Application identified by
`clientId`
operationId: listRolesForClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Standard Roles:
$ref: '#/components/examples/StandardRolesListResponseClient'
Custom Roles:
$ref: '#/components/examples/CustomRolesListResponseClient'
IAM-based Standard Roles:
$ref: '#/components/examples/IAMStandardRolesListResponseClient'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Client Role Assignments
tags:
- RoleAssignmentClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
post:
description: |-
Assigns a [standard role](/openapi/okta-management/guides/roles/#standard-roles) to a Client Application.
You can also assign a custom role to a Client Application, but the preferred method to assign a custom role to a client is to create a binding between the Custom Role, the Resource Set, and the Client Application. See [Create a Role Resource Set Binding](/openapi/okta-management/management/tag/RoleDResourceSetBinding/#tag/RoleDResourceSetBinding/operation/createResourceSetBinding).
> **Notes:**
> * The request payload is different for standard and custom role assignments.
> * For IAM-based standard role assignments, use the request payload for standard roles. However, the response payload for IAM-based role assignments is similar to the custom role's assignment response.
operationId: assignRoleToClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
requestBody:
content:
application/json:
examples:
Standard Role:
$ref: '#/components/examples/StandardRoleAssignmentRequest'
Custom Role Assignment:
$ref: '#/components/examples/CustomRoleAssignmentRequest'
schema:
$ref: '#/components/schemas/assignRoleToGroup_request'
required: true
responses:
"200":
content:
application/json:
examples:
Standard Role:
$ref: '#/components/examples/StandardRoleResponseClient'
Custom Role Assignment:
$ref: '#/components/examples/CustomRoleResponseClient'
IAM-based Role Assignment:
$ref: '#/components/examples/IAMStandardRolesListResponseClient'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Client Role
tags:
- RoleAssignmentClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-content-type: application/json
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}:
delete:
description: Unassigns a Role Assignment (identified by `roleAssignmentId`)
from a Client Application (identified by `clientId`)
operationId: deleteRoleFromClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Client Role
tags:
- RoleAssignmentClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
get:
description: Retrieves a Role Assignment (identified by `roleAssignmentId`)
for a Client Application (identified by `clientId`)
operationId: retrieveClientRole
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
responses:
"200":
content:
application/json:
examples:
Standard Role:
$ref: '#/components/examples/StandardRoleResponseClient'
Custom Role Assignment:
$ref: '#/components/examples/CustomRoleResponseClient'
IAM-based Standard Role Assignment:
$ref: '#/components/examples/IAMStandardRoleResponseClient'
schema:
$ref: '#/components/schemas/listGroupAssignedRoles_200_response_inner'
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: Retrieve a Client Role
tags:
- RoleAssignmentClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}/targets/catalog/apps:
get:
description: Lists all OIN app targets for an `APP_ADMIN` Role that's assigned
to a client Application (by `clientId`).
operationId: listAppTargetRoleToClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/CatalogApplication'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Client Role Application Targets
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}:
delete:
description: |-
Unassigns an OIN app target for a Role Assignment to a client Application
> **Note:** You can't remove the last OIN app target from a Role Assignment since operation causes an exception.
> If you need a Role assignment that applies to all apps, delete the Role Assignment and recreate a new one. See [Unassign a Client Role](/openapi/okta-management/management/tag/RoleAssignmentClient/#tag/RoleAssignmentClient/operation/deleteRoleFromClient).
operationId: removeAppTargetRoleFromClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Client Role Application Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Assigns an OIN app target for an `APP_ADMIN` Role Assignment to a client Application. When you assign an app target from the OIN catalog, you reduce the scope of the Role Assignment.
The Role applies to only app instances that are included in the specified OIN app target.
An assigned OIN app target overrides any existing app instance targets.
For example, if a user is assigned to administer a specific Facebook instance, a successful request to add an OIN app target with `facebook` for `appName` makes that user the administrator for all Facebook instances.
operationId: assignAppTargetRoleToClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Client Role Application Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}/targets/catalog/apps/{appName}/{appId}:
delete:
description: |-
Unassigns an OIN app instance target from a Role Assignment to a client Application
> **Note:** You can't remove the last app instance target from a Role Assignment since this causes an exception.
> If you need a Role Assignment that applies to all the apps, delete the Role Assignment and recreate a new one. See [Unassign a Client Role](/openapi/okta-management/management/tag/RoleAssignmentClient/#tag/RoleAssignmentClient/operation/deleteRoleFromClient).
operationId: removeAppTargetInstanceRoleForClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Client Role Application Instance Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: |-
Assigns an app instance target to an `APP_ADMIN` Role Assignment to a client Application. When you assign the first OIN app or app instance target, you reduce the scope of the Role Assignment.
The Role no longer applies to all app targets, but applies only to the specified target.
> **Note:** You can target a mixture of both OIN app and app instance targets, but you can't assign permissions to manage all instances of an OIN app and then assign a subset of permissions to the same app.
For example, you can't specify that an admin has access to manage all instances of the Salesforce app and then also manage only specific configurations of the Salesforce app.
operationId: assignAppTargetInstanceRoleForClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
- description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Client Role Application Instance Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}/targets/groups:
get:
description: "Lists all Group targets for a `USER_ADMIN`, `HELP_DESK_ADMIN`,\
\ or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a client. If the Role isn't\
\ scoped to specific Group targets, an empty array `[]` is returned."
operationId: listGroupTargetRoleForClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
- description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
responses:
"200":
content:
application/json:
schema:
items:
$ref: '#/components/schemas/Group'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.read
summary: List all Client Role Group Targets
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/oauth2/v1/clients/{clientId}/roles/{roleAssignmentId}/targets/groups/{groupId}:
delete:
description: |-
Unassigns a Group target from a `USER_ADMIN`, `HELP_DESK_ADMIN`, or `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a client Application.
> **Note:** You can't remove the last Group target from a Role Assignment, as it causes an exception. If you need a Role Assignment that applies to all Groups, delete the Role Assignment and recreate a new one. See [Unassign a Client Role](/openapi/okta-management/management/tag/RoleAssignmentClient/#tag/RoleAssignmentClient/operation/deleteRoleFromClient).
operationId: removeGroupTargetRoleFromClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Unassign a Client Role Group Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
put:
description: "Assigns a Group target to a `USER_ADMIN`, `HELP_DESK_ADMIN`, or\
\ `GROUP_MEMBERSHIP_ADMIN` Role Assignment to a client Application. When you\
\ assign the first Group target, you reduce the scope of the Role Assignment.\
\ The Role no longer applies to all targets, but applies only to the specified\
\ target."
operationId: assignGroupTargetRoleForClient
parameters:
- description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
- description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
- description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
responses:
"204":
content: {}
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.roles.manage
summary: Assign a Client Role Group Target
tags:
- RoleBTargetClient
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
x-accepts:
- application/json
/privileged-access/api/v1/accounts/{id}: {}
/privileged-access/api/v1/resources/{id}: {}
/privileged-access/api/v1/resources/{id}/claim: {}
/privileged-access/api/v1/resources/{id}/rotate-password: {}
/security/api/v1/security-events:
post:
description: "Publishes a Security Event Token (SET) sent by a Security Events\
\ Provider. After the token is verified, Okta ingests the event and performs\
\ any appropriate action."
operationId: publishSecurityEventTokens
requestBody:
content:
application/secevent+jwt:
examples:
SET:
value: eyJraWQiOiJzYW1wbGVfa2lkIiwidHlwIjoic2ZXZlbnQra ... mrtmw
schema:
type: string
description: |
The request body is a signed [SET](https://datatracker.ietf.org/doc/html/rfc8417), which is a type of JSON Web Token (JWT).
For SET JWT header and body descriptions, see [SET JWT header](/openapi/okta-management/management/tag/SSFSecurityEventToken/#tag/SSFSecurityEventToken/schema/SecurityEventTokenRequestJwtHeader) and [SET JWT body payload](/openapi/okta-management/management/tag/SSFSecurityEventToken/#tag/SSFSecurityEventToken/schema/SecurityEventTokenRequestJwtBody).
required: true
responses:
"202":
description: Accepted
"400":
content:
application/json:
schema:
$ref: '#/components/schemas/SecurityEventTokenError'
description: Bad Request
security: []
summary: Publish a Security Event Token
tags:
- SSFSecurityEventToken
x-codegen-request-body-name: Security Event Token
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/secevent+jwt
x-accepts:
- application/json
/webauthn-registration/api/v1/activate:
post:
description: "Activates a preregistered WebAuthn Factor. As part of this operation,\
\ Okta first decrypts and verifies the Factor PIN and enrollment data sent\
\ by the fulfillment provider."
operationId: activatePreregistrationEnrollment
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EnrollmentActivationRequest'
description: Enrollment Activation Request
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/EnrollmentActivationResponse'
description: Success
"400":
content:
application/json:
examples:
NoDisable:
$ref: '#/components/examples/ErrorPinOrCredResponsesProcessingFailure'
schema:
$ref: '#/components/schemas/Error'
description: PIN or Cred Requests Generation Failed
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Activate a Preregistered WebAuthn Factor
tags:
- WebAuthnPreregistration
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/webauthn-registration/api/v1/enroll:
post:
description: "Enrolls a preregistered WebAuthn Factor. This WebAuthn Factor\
\ has a longer challenge timeout period to accommodate the fulfillment request\
\ process. As part of this operation, Okta generates EC key-pairs used to\
\ encrypt the Factor PIN and enrollment data sent by the fulfillment provider."
operationId: enrollPreregistrationEnrollment
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/EnrollmentInitializationRequest'
description: Enrollment Initialization Request
responses:
"200":
content:
application/json:
schema:
$ref: '#/components/schemas/EnrollmentInitializationResponse'
description: Success
"400":
content:
application/json:
examples:
NoDisable:
$ref: '#/components/examples/ErrorPinOrCredRequestsGenerationFailure'
schema:
$ref: '#/components/schemas/Error'
description: PIN or Cred Requests Generation Failed
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Enroll a Preregistered WebAuthn Factor
tags:
- WebAuthnPreregistration
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/webauthn-registration/api/v1/initiate-fulfillment-request:
post:
description: Generates a fulfillment request by sending a WebAuthn Preregistration
event to start the flow. The Okta Workflows WebAuthn preregistration integration
uses this to populate the fulfillment request.
operationId: generateFulfillmentRequest
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/FulfillmentRequest'
description: Fulfillment Request
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Generate a Fulfillment Request
tags:
- WebAuthnPreregistration
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/webauthn-registration/api/v1/send-pin:
post:
description: "Sends the decoded PIN for the specified WebAuthn Preregistration\
\ Enrollment. PINs are sent to the user's email. To resend the PIN, call this\
\ operation again."
operationId: sendPin
requestBody:
content:
application/json:
schema:
$ref: '#/components/schemas/PinRequest'
description: Send PIN Request
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Send a PIN to user
tags:
- WebAuthnPreregistration
x-codegen-request-body-name: body
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-content-type: application/json
x-accepts:
- application/json
/webauthn-registration/api/v1/users/{userId}/enrollments:
get:
description: Lists all WebAuthn Preregistration Factors for the specified user
operationId: listWebAuthnPreregistrationFactors
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
responses:
"200":
content:
application/json:
example:
- id: fwf23789dfs9asdf782
factorType: webauthn
provider: FIDO
vendorName: FIDO
fulfillmentProvider: yubico
status: ACTIVE
created: 2018-05-24T20:43:19.000Z
lastUpdated: 2018-05-24T21:43:32.000Z
profile:
credentialId: l3Br0n-7H3g047NqESqJynFtIgf3Ix9OfaRoNwLoloso99Xl2zS_O7EXUkmPeAIzTVtEL4dYjicJWBz7NpqhGA
authenticatorName: YubiKey 5C
presetPinAvailable: true
_links:
self:
href: https://example.okta.com/webauthn-registration/api/v1/users/00u15s1KDETTQMQYABRL/enrollments/fwf23789dfs9asdf782
hints:
allow:
- DELETE
schema:
items:
$ref: '#/components/schemas/WebAuthnPreregistrationFactor'
type: array
description: Success
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.read
summary: List all WebAuthn Preregistration Factors
tags:
- WebAuthnPreregistration
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
/webauthn-registration/api/v1/users/{userId}/enrollments/{authenticatorEnrollmentId}:
delete:
description: Deletes a specific WebAuthn Preregistration Factor for a user
operationId: deleteWebAuthnPreregistrationFactor
parameters:
- description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
- description: ID for a WebAuthn Preregistration Factor in Okta
explode: false
in: path
name: authenticatorEnrollmentId
required: true
schema:
type: string
style: simple
responses:
"204":
description: No Content
"403":
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
"404":
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
"429":
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
security:
- apiToken: []
- oauth2:
- okta.users.manage
summary: Delete a WebAuthn Preregistration Factor
tags:
- WebAuthnPreregistration
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
x-accepts:
- application/json
components:
examples:
APIDevicesListAllResponse:
summary: List all devices with embedded users
value:
- id: guo4a5u7YAHhjXrMK0g4
status: CREATED
created: 2019-10-02T18:03:07.000Z
lastUpdated: 2019-10-02T18:03:07.000Z
profile:
displayName: Example Device name 1
platform: WINDOWS
serialNumber: XXDDRFCFRGF3M8MD6D
sid: S-1-11-111
registered: true
secureHardwarePresent: false
diskEncryptionType: ALL_INTERNAL_VOLUMES
resourceType: UDDevice
resourceDisplayName:
value: Example Device name 1
sensitive: false
resourceAlternateId: null
resourceId: guo4a5u7YAHhjXrMK0g4
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4"
hints:
allow:
- GET
- PATCH
- PUT
users:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4/users"
hints:
allow:
- GET
_embedded:
users: []
- id: guo4a5u7YAHhjXrMK0g5
status: ACTIVE
created: 2023-06-21T23:24:02.000Z
lastUpdated: 2023-06-21T23:24:02.000Z
profile:
displayName: Example Device name 2
platform: ANDROID
manufacturer: Google
model: Pixel 6
osVersion: 13:2023-05-05
registered: true
secureHardwarePresent: true
diskEncryptionType: USER
resourceType: UDDevice
resourceDisplayName:
value: Example Device name 2
sensitive: false
resourceAlternateId: null
resourceId: guo4a5u7YAHhjXrMK0g5
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5"
hints:
allow:
- GET
- PATCH
- PUT
users:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5/users"
hints:
allow:
- GET
_embedded:
users:
- managementStatus: MANAGED
created: 2021-10-01T16:52:41.000Z
screenLockType: BIOMETRIC
user:
id: 00u17vh0q8ov8IU881d7
status: ACTIVE
created: 2020-08-12T06:46:50.000Z
activated: 2020-08-12T06:46:50.000Z
statusChanged: 2021-01-27T21:05:32.000Z
lastLogin: 2021-10-14T09:04:48.000Z
lastUpdated: 2021-01-27T21:05:32.000Z
passwordChanged: 2020-08-12T06:46:50.000Z
type:
id: oty7ut9Uu76oHVUZc0w4
profile:
firstName: fname
lastName: lname
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
credentials:
password: {}
recovery_question:
question: What is the food you least liked as a child?
provider:
type: OKTA
name: OKTA
_links:
suspend:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/suspend"
method: POST
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/osc7ut9Uu76oHVUZc0w4"
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/reset_password"
method: POST
forgotPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/forgot_password"
method: POST
expirePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/expire_password"
method: POST
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/change_recovery_question"
method: POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7"
type:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/oty7ut9Uu76oHVUZc0w4"
changePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/change_password"
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/deactivate"
APIDevicesListAllUserSummaryResponse:
summary: List all devices with embedded user summaries
value:
- id: guo4a5u7YAHhjXrMK0g4
status: CREATED
created: 2019-10-02T18:03:07.000Z
lastUpdated: 2019-10-02T18:03:07.000Z
profile:
displayName: Example Device name 1
platform: WINDOWS
serialNumber: XXDDRFCFRGF3M8MD6D
sid: S-1-11-111
registered: true
secureHardwarePresent: false
diskEncryptionType: ALL_INTERNAL_VOLUMES
resourceType: UDDevice
resourceDisplayName:
value: Example Device name 1
sensitive: false
resourceAlternateId: null
resourceId: guo4a5u7YAHhjXrMK0g4
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4"
hints:
allow:
- GET
- PATCH
- PUT
users:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g4/users"
hints:
allow:
- GET
_embedded:
users: []
- id: guo4a5u7YAHhjXrMK0g5
status: ACTIVE
created: 2023-06-21T23:24:02.000Z
lastUpdated: 2023-06-21T23:24:02.000Z
profile:
displayName: Example Device name 2
platform: ANDROID
manufacturer: Google
model: Pixel 6
osVersion: 13:2023-05-05
registered: true
secureHardwarePresent: true
diskEncryptionType: USER
resourceType: UDDevice
resourceDisplayName:
value: Example Device name 2
sensitive: false
resourceAlternateId: null
resourceId: guo4a5u7YAHhjXrMK0g5
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5"
hints:
allow:
- GET
- PATCH
- PUT
users:
href: "https://{yourOktaDomain}/api/v1/devices/guo4a5u7YAHhjXrMK0g5/users"
hints:
allow:
- GET
_embedded:
users:
- managementStatus: MANAGED
created: 2021-10-01T16:52:41.000Z
screenLockType: BIOMETRIC
user:
id: 00u17vh0q8ov8IU881d7
realmId: 00u17vh0q8ov8IU8T0g5
profile:
firstName: fname
lastName: lname
login: [email protected]
email: [email protected]
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7"
APIDevicesListAllUsersResponse:
summary: Response example
value:
- created: 2021-08-20T17:13:35.000Z
managementStatus: NOT_MANAGED
screenLockType: BIOMETRIC
user:
id: 00u17vh0q8ov8IU881d7
status: ACTIVE
created: 2021-08-20T16:08:25.000Z
activated: null
statusChanged: 2021-08-20T16:39:41.000Z
lastLogin: 2023-04-18T17:54:12.000Z
lastUpdated: 2021-12-20T18:27:30.000Z
passwordChanged: 2021-12-20T18:27:30.000Z
type:
id: oty17vh0n2EHVnbYF1d7
profile:
firstName: Bunk
lastName: Moreland
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
credentials:
password: null
provider:
type: OKTA
name: OKTA
_links:
suspend:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/suspend"
method: POST
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/osc17vh0n2EHVnbYF1d7"
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/reset_password"
method: POST
forgotPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/forgot_password"
method: POST
expirePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/expire_password"
method: POST
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/change_recovery_question"
method: POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7"
resetFactors:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/reset_factors"
method: POST
type:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/oty17vh0n2EHVnbYF1d7"
changePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/credentials/change_password"
method: POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00u17vh0q8ov8IU881d7/lifecycle/deactivate"
method: POST
APIPushProvidersListAllResponse:
value:
- id: ppchvbeucdTgqeiGxR0g4
providerType: APNS
name: Example Push Provider 1
lastUpdatedDate: 2022-01-00T00:00:00.000Z
configuration:
keyId: ABC123DEFG
teamId: DEF123GHIJ
fileName: fileName.p8
_links:
self:
href: "https://your-subdomain.okta.com/api/v1/push-providers/{pushProviderId}"
hints:
allow:
- DELETE
- GET
- PUT
- id: ppctekcmngGaqeiBxB0g4
providerType: FCM
name: Example Push Provider 2
lastUpdatedDate: 2022-01-00T00:00:00.000Z
configuration:
projectId: PROJECT_ID
fileName: fileName.json
_links:
self:
href: "https://your-subdomain.okta.com/api/v1/push-providers/{pushProviderId}"
hints:
allow:
- DELETE
- GET
- PUT
APIServiceIntegrationInstanceSecretListResponse:
summary: Secrets list response example
value:
- id: ocs2f4zrZbs8nUa7p0g4
status: INACTIVE
client_secret: '***DhOW'
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
created: 2023-02-21T20:08:24.000Z
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4/lifecycle/activate"
hints:
allow:
- POST
delete:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4"
hints:
allow:
- DELETE
- id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: '***MQGQ'
secret_hash: 0WOOvBSzV9clc4Nr7Rbaug
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
APIServiceIntegrationListResponse:
summary: List response example
value:
- id: 0oa72lrepvp4WqEET1d9
type: my_app_cie
name: My App Cloud Identity Engine
createdAt: 2023-02-21T20:08:24.000Z
createdBy: 00uu3u0ujW1P6AfZC2d5
configGuideUrl: "https://{docDomain}/my-app-cie/configuration-guide"
grantedScopes:
- okta.logs.read
- okta.groups.read
- okta.users.read
_links:
self:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
logo:
name: small
href: "https://{logoDomain}/{logoPath}/my_app_cie_small_logo"
APIServiceIntegrationResponse:
summary: Response example
value:
id: 0oa72lrepvp4WqEET1d9
type: my_app_cie
name: My App Cloud Identity Engine
createdAt: 2023-02-21T20:08:24.000Z
createdBy: 00uu3u0ujW1P6AfZC2d5
configGuideUrl: "https://{docDomain}/my-app-cie/configuration-guide"
grantedScopes:
- okta.logs.read
- okta.groups.read
- okta.users.read
_links:
self:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
logo:
name: small
href: "https://{logoDomain}/{logoPath}/my_app_cie_small_logo"
ActivateFactorCallResponse:
summary: call
value:
id: clf1o51EADOTFXHHBXBP
factorType: call
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-08-06T16:56:31.000Z
lastUpdated: 2014-08-06T16:56:31.000Z
profile:
phoneNumber: +1-555-415-1337
phoneExtension: "1234"
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clf1o51EADOTFXHHBXBP/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clf1o51EADOTFXHHBXBP"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateFactorEmailResponse:
summary: email
value:
id: emfnf3gSScB8xXoXK0g3
factorType: email
provider: OKTA
vendorName: OKTA
status: ACTIVE
profile:
email: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3"
hints:
allow:
- GET
ActivateFactorPushResponse:
summary: push
value:
id: opf3hkfocI4JTLAju0g4
factorType: push
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2015-03-16T18:01:28.000Z
lastUpdated: 2015-08-27T14:25:17.000Z
profile:
credentialId: [email protected]
deviceType: SmartPhone_IPhone
name: Gibson
platform: IOS
version: "9.0"
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opf3hkfocI4JTLAju0g4/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opf3hkfocI4JTLAju0g4"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateFactorSmsResponse:
summary: sms
value:
id: sms1o51EADOTFXHHBXBP
factorType: sms
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-08-06T16:56:31.000Z
lastUpdated: 2014-08-06T16:56:31.000Z
profile:
phoneNumber: +1-555-415-1337
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms1o51EADOTFXHHBXBP/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms1o51EADOTFXHHBXBP"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateFactorTotpResponse:
summary: token:software:totp
value:
id: ostf1fmaMGJLMNGNLIVG
factorType: token:software:totp
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-07-16T16:13:56.000Z
lastUpdated: 2014-08-06T00:31:07.000Z
profile:
credentialId: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateFactorU2fRequest:
summary: u2f
value:
registrationData: BQTEMUyOM8h1TiZG4DL-RdMr-tYgTYSf62Y52AmwEFTiSYWIRVO5L-MwWdRJOthmV3J3JrqpmGfmFb820-awx1YIQFlTvkMhxItHlpkzahEqicpw7SIH9yMfTn2kaDcC6JaLKPfV5ds0vzuxF1JJj3gCM01bRC-HWI4nCVgc-zaaoRgwggEcMIHDoAMCAQICCwD52fCSMoNczORdMAoGCCqGSM49BAMCMBUxEzARBgNVBAMTClUyRiBJc3N1ZXIwGhcLMDAwMTAxMDAwMFoXCzAwMDEwMTAwMDBaMBUxEzARBgNVBAMTClUyRiBEZXZpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQFKJupuUgPQcRHUphaW5JPfLvkkwlEwlHKk_ntSp7MS4aTHJyGnpziqncrjiTC_oUVtb-wN-y_t_IMIjueGkhxMAoGCCqGSM49BAMCA0gAMEUCIQDBo6aOLxanIUYnBX9iu3KMngPnobpi0EZSTkVtLC8_cwIgC1945RGqGBKfbyNtkhMifZK05n7fU-gW37Bdnci5D94wRQIhAJv3VvclbRkHAQhaUR8rr8qFTg9iF-GtHoXU95vWaQdyAiAbEr-440U4dQAZF-Sj8G2fxgh5DkgkkWpyUHZhz7N9ew
clientData: eyJ0eXAiOiJuYXZpZ2F0b3IuaWQuZmluaXNoRW5yb2xsbWVudCIsImNoYWxsZW5nZSI6IlhxR0h0RTBoUkxuVEoxYUF5U1oyIiwib3JpZ2luIjoiaHR0cHM6Ly9sb2NhbGhvc3Q6MzAwMCIsImNpZF9wdWJrZXkiOiJ1bnVzZWQifQ
ActivateFactorU2fResponse:
summary: u2f
value:
id: fuf2rovRxogXJ0nDy0g4
factorType: u2f
provider: FIDO
vendorName: FIDO
status: ACTIVE
created: 2018-05-24T20:43:19.000Z
lastUpdated: 2018-05-24T21:43:32.000Z
profile:
credentialId: WVO-QyHEi0eWmTNqESqJynDtIgf3Ix9OfaRoNwLoloso99Xl2zS_O7EXUkmPeAIzTVtEL4dYjicJWBz7NpqhGA
version: U2F_V2
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
- DELETE
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4/verify"
hints:
allow:
- POST
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateFactorWebauthnRequest:
summary: webAuthn
value:
attestation: o2NmbXRmcGFja2VkZ2F0dFN0bXSiY2FsZyZjc2lnWEgwRgIhAMvf2+dzXlHZN1um38Y8aFzrKvX0k5dt/hnDu9lahbR4AiEAuwtMg3IoaElWMp00QrP/+3Po/6LwXfmYQVfsnsQ+da1oYXV0aERhdGFYxkgb9OHGifjS2dG03qLRqvXrDIRyfGAuc+GzF1z20/eVRV2wvl6tzgACNbzGCmSLCyXx8FUDAEIBvWNHOcE3QDUkDP/HB1kRbrIOoZ1dR874ZaGbMuvaSVHVWN2kfNiO4D+HlAzUEFaqlNi5FPqKw+mF8f0XwdpEBlClAQIDJiABIVgg0a6oo3W0JdYPu6+eBrbr0WyB3uJLI3ODVgDfQnpgafgiWCB4fFo/5iiVrFhB8pNH2tbBtKewyAHuDkRolcCnVaCcmQ==
clientData: eyJjaGFsbGVuZ2UiOiJVSk5wYW9sVWt0dF9vcEZPNXJMYyIsIm9yaWdpbiI6Imh0dHBzOi8vcmFpbi5va3RhMS5jb20iLCJ0eXBlIjoid2ViYXV0aG4uY3JlYXRlIn0=
ActivateFactorWebauthnResponse:
summary: webAuthn
value:
id: fwf2rovRxogXJ0nDy0g4
factorType: webauthn
provider: FIDO
vendorName: FIDO
status: ACTIVE
created: 2018-05-24T20:43:19.000Z
lastUpdated: 2018-05-24T21:43:32.000Z
profile:
credentialId: l3Br0n-7H3g047NqESqJynFtIgf3Ix9OfaRoNwLoloso99Xl2zS_O7EXUkmPeAIzTVtEL4dYjicJWBz7NpqhGA
authenticatorName: MacBook Touch ID
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
- DELETE
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4/verify"
hints:
allow:
- POST
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ActivateIdPResponse:
summary: Activate an Identity Provider
value:
id: 0oa62bfdiumsUndnZ0h7
type: GOOGLE
name: Google
status: ACTIVE
created: 2016-03-24T23:21:49.000Z
lastUpdated: 2016-03-25T19:14:23.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://accounts.google.com/o/oauth2/auth
binding: HTTP-REDIRECT
token:
url: https://www.googleapis.com/oauth2/v3/token
binding: HTTP-POST
scopes:
- profile
- email
- openid
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.email
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: |-
https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62bfdiumsUndnZ0h7&
client_id={clientId}&response_type={responseType}&response_mode={responseMode}&
scope={scopes}&redirect_uri={redirectUri}&state={state}
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
ActivateNetworkZone:
summary: Activated Network Zone
value:
type: IP
id: nzowc1U5Jh5xuAK0o0g3
name: MyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-24T20:37:32.000Z
lastUpdated: 2021-06-24T20:37:32.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
proxies:
- type: RANGE
value: 3.3.4.5-3.3.4.15
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3/lifecycle/deactivate"
hints:
allow:
- POST
ActiveAuthorizationServerKey:
summary: Active Authorization Server Key
value:
status: ACTIVE
alg: RS256
e: AQAB
"n": "g0MirhrysJMPm_wK45jvMbbyanfhl-jmTBv0o69GeifPaISaXGv8LKn3-CyJvUJcjjeHE17KtumJWVxUDRzFqtIMZ1ctCZyIAuWO0n\
\ LKilg7_EIDXJrS8k14biqkPO1lXGFwtjo3zLHeFSLw6sWf-CEN9zv6Ff3IAXb-RMYpfh-bVrxIgWsWCxjLW-UKI3la-gs0nWHH2PJr5HLJuI\
\ JIOL5HLJuIJIOLWahqTnm_r1LSCSYr6N4C-fh--w2_BW8DzTHalBYe76bNr0d7AqtR4tGazmrvrc79Wa2bjyxmhhN1u9jSaZQqq-3VZEod8q3,\
\ WHH2PJ5v1LoXniJQ4a2W8nDVqb6h4E8MUKYOpljTfQ"
kid: RQ8DuhdxCczyMvy7GNJb4Ka3lQ99vrSo3oFBUiZjzzc
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/RQ8DuhdxCczyMvy7GNJb4Ka3lQ99vrSo3oFBUiZjzzc"
hints:
allow:
- GET
AddMappingBody:
summary: Update an existing profile mapping by adding one or more properties
value:
properties:
additionalProperties:
fullName:
expression: user.firstName + user.lastName
pushStatus: PUSH
nickName:
expression: user.nickName
pushStatus: PUSH
AddMappingResponse:
summary: Update an existing profile mapping by adding one or more properties
value:
id: prm1k47ghydIQOTBW0g4
source:
id: otysbePhQ3yqt4cVv0g3
name: user
type: user
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otysbePhQ3yqt4cVv0g3"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscsbePhQ3yqt4cVv0g3"
target:
id: 0oa1qmn4LZQQEH0wZ0g4
name: okta_org2org
type: appuser
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1qmn4LZQQEH0wZ0g4"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/apps/0oa1qmn4LZQQEH0wZ0g4/default"
properties:
fullName:
expression: user.firstName + user.lastName
pushStatus: PUSH
nickName:
expression: user.nickName
pushStatus: PUSH
_links:
self:
href: "https://{yourOktaDomain}/api/v1/mappings/prm1k48weFSOnEUnw0g4"
AdminConsoleSettingsExample:
summary: Default Okta Admin Console Settings
value:
sessionMaxLifetimeMinutes: 720
sessionIdleTimeoutMinutes: 15
AerialConsentDetails:
description: Example response of consent details
value:
accountId: 0200bs0617vvhv2v675mch1cukp
grantDate: 2023-04-06T21:32:33.000Z
grantedBy: 00uabcdefg1234567890
AerialConsentInvalidAccountIdResponse:
description: Aerial account ID is invalid
value:
errorCode: E0000001
errorSummary: "API validation failed: account"
errorLink: E0000001
errorId: oaewjePjfdBT7m71KkPz0Ipaw
errorCauses:
- errorSummary: Invalid aerial account ID.
AerialConsentOrgAlreadyLinkedResponse:
description: The revoke operation isn't possible when the org is already linked
value:
errorCode: E0000001
errorSummary: "API validation failed: account"
errorLink: E0000001
errorId: oae_wheRkaxRT-EFAXwBmBKLg
errorCauses:
- errorSummary: The org is already linked to an Account.
AerialGrantAlreadyPresentErrorResponse:
description: Grant is already present
value:
errorCode: E0000001
errorSummary: "Api validation failed: account"
errorLink: E0000001
errorId: oaewjePjfdBT7m71KkPz0Ipaw
errorCauses:
- errorSummary: The org already has a consent grant added to Aerial.
AerialGrantNotFoundResponse:
description: No grant found for org
value:
errorCode: E0000007
errorSummary: "Not found: Resource not found: grant (String)"
errorLink: E0000007
errorId: sampleFYH_dTSSTdpPYIAdHJw
errorCauses: []
AllAssignmentsOperationResponse:
value:
id: rre4mje4ez7B2a7B60g7
type: realm:assignment
status: COMPLETED
created: 2023-10-25T21:02:54.000Z
started: 2023-10-25T21:02:54.000Z
completed: 2023-10-25T21:02:54.000Z
assignmentOperation:
configuration:
id: ALL
name: All Assignments
numUserMoved: 50
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/operations/rre4mje4ez7B2a7B60g7
method: GET
ApiTokenListMetadataResponse:
value:
- name: My API Token
userId: 00uabcdefg1234567890
tokenWindow: P30D
network:
connection: ANYWHERE
id: 00Tabcdefg1234567890
clientName: Okta API
expiresAt: 2021-12-11T20:38:10.000Z
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/api-tokens/00Tabcdefg1234567890"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00uabcdefg1234567890"
hints:
allow:
- GET
- name: Another API Token
userId: 00uabcdefg1234567890
tokenWindow: PT5M
id: 00T1234567890abcdefg
clientName: Okta API
expiresAt: 2021-11-11T20:43:10.000Z
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/api-tokens/00T1234567890abcdefg"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00uabcdefg1234567890"
hints:
allow:
- GET
ApiTokenMetadataResponse:
value:
name: My API Token
userId: 00uXXXXXXXXXXXXXXXXX
tokenWindow: P30D
network:
connection: ANYWHERE
id: 00Tabcdefg1234567890
clientName: Okta API
expiresAt: 2021-12-11T20:38:10.000Z
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/api-tokens/00Tabcdefg1234567890"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00uXXXXXXXXXXXXXXXXX"
hints:
allow:
- GET
AppCsrJsonResponse:
summary: CSR object in JSON format
value:
id: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
created: 2017-03-28T01:11:10.000Z
csr: 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
kty: RSA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
hints:
allow:
- GET
- DELETE
publish:
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
hints:
allow:
- POST
AppCsrPkcs10Response:
summary: CSR in DER format
value: MIIC4DCCAcgCAQAwcTELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xEzARBgNVBAoMCk9rdGEsIEluYy4xDDAKBgNVBAsMA0RldjESMBAGA1UEAwwJU1AgSXNzdWVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6m8jHVCr9
AppFeatureListResponseEx:
summary: List app Feature response
value:
- name: USER_PROVISIONING
status: ENABLED
description: User provisioning settings from Okta to a downstream application
capabilities:
create:
lifecycleCreate:
status: DISABLED
update:
profile:
status: DISABLED
lifecycleDeactivate:
status: DISABLED
password:
status: DISABLED
seed: RANDOM
change: KEEP_EXISTING
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/features/USER_PROVISIONING"
hints:
allow:
- GET
- PUT
AppFeatureResponseEx:
summary: App Feature response
value:
name: USER_PROVISIONING
status: ENABLED
description: User provisioning settings from Okta to a downstream application
capabilities:
create:
lifecycleCreate:
status: DISABLED
update:
profile:
status: DISABLED
lifecycleDeactivate:
status: DISABLED
password:
status: DISABLED
seed: RANDOM
change: KEEP_EXISTING
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/features/USER_PROVISIONING"
hints:
allow:
- GET
- PUT
AppGrantsEx:
summary: App Grants example
value:
id: oag91n9ruw3dsaXzP0h6
status: ACTIVE
created: 2023-02-21T16:54:00.000Z
createdBy:
id: 00u6eltha0nrSc47i0h7
type: User
lastUpdated: 2023-02-21T16:54:00.000Z
issuer: "{yourOktaDomain}"
clientId: "{clientId}"
scopeId: okta.users.read
source: ADMIN
_embedded:
scope:
id: okta.users.read
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
title: Application name
self:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}/grants/oag91n9ruw3dsaXzP0h6"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: Client name
AppGrantsPostEx:
summary: App Grants example
value:
issuer: "{yourOktaDomain}"
scopeId: okta.users.read
AppResponseBaseEx:
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
AppUserAssignProvRequest:
summary: SSO and provisioning Application User request example
value:
id: 00u15s1KDETTQMQYABRL
scope: USER
credentials:
username: [email protected]
profile:
salesforceGroups:
- Employee
role: Developer
profile: Standard User
AppUserAssignSSORequest:
summary: SSO Application User request example
value:
id: 00ud4tVDDXYVKPXKVLCO
scope: USER
credentials:
username: [email protected]
AppUserCredUpdateResponse:
summary: Application User credential update
value:
id: 00ud4tVDDXYVKPXKVLCO
externalId: null
created: 2024-01-27T03:52:45.000Z
lastUpdated: 2024-01-27T05:15:30.000Z
scope: USER
status: ACTIVE
statusChanged: 2024-01-27T03:52:45.000Z
passwordChanged: 2024-01-27T05:15:30.000Z
syncState: DISABLED
credentials":
userName: [email protected]
password: {}
profile:
street_address: null
country: null
website: null
zoneinfo: America/Los_Angeles
birthdate: null
gender: null
formatted: null
profile: null
locality: null
given_name: Rae
middle_name: null
locale: en_US
picture: null
name: Rae Cloud
nickname: null
phone_number: null
region: null
postal_code: null
family_name: Cloud
email: [email protected]
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ud4tVDDXYVKPXKVLCO"
AppUserListEx:
summary: List Application User example
value:
- id: 00u1dnq5S0CfjlkpABCD
externalId: 00u5edt3PNbbjzvIABCD
created: 2024-01-31T18:25:01.000Z
lastUpdated: 2024-01-31T18:25:03.000Z
scope: USER
status: PROVISIONED
statusChanged: 2024-01-31T18:25:03.000Z
passwordChanged: null
syncState: SYNCHRONIZED
lastSync: 2024-01-31T18:25:03.000Z
credentials:
userName: [email protected]
profile:
secondEmail: null
lastName: Test
mobilePhone: null
displayName: Saml O Test
email: [email protected]
salesforceGroups: []
role: Tester
firstName: Saml
streetAddress: null
profile: Standard Platform User
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oajiqIRNXPPJBNZMGYL"
user:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD"
_embedded:
user:
id: 00u1dnq5S0CfjlkpABCD
status: ACTIVE
created: 2024-01-09T15:36:04.000Z
activated: 2024-01-09T15:36:05.000Z
statusChanged: 2024-01-09T15:36:05.000Z
lastLogin: null
lastUpdated: 2024-01-09T15:36:05.000Z
passwordChanged: 2024-01-09T15:36:05.000Z
type:
id: otyzhh29g7Python90g3
profile:
firstName: Saml
lastName: Test
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
suspend:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/suspend"
method: POST
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscarho9g7PythoN23z9"
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/reset_password"
method: POST
expirePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/expire_password"
method: POST
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/credentials/change_recovery_question"
method: POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD"
type:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otyzhh29g7Python90g3"
changePassword:
href: https://rain.okta1.com/api/v1/users/00u1dnq5S0CfjlkpABCD/credentials/change_password
method: POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/deactivate"
method: POST
AppUserProfUpdateResponse:
summary: Application User profile update
value:
id: 00ud4tVDDXYVKPXKVLCO
externalId: null
created: 2024-01-27T03:52:45.000Z
lastUpdated: 2024-01-27T05:05:32.000Z
scope: USER
status: ACTIVE
statusChanged: 2024-01-27T03:52:45.000Z
passwordChanged: null
syncState: DISABLED
credentials":
userName: [email protected]
profile:
street_address: null
country: null
website: null
zoneinfo: America/Los_Angeles
birthdate: null
gender: null
formatted: null
profile: null
locality: null
given_name: Rae
middle_name: Mae
locale: en_US
picture: null
name: Rae Mae Cloud
nickname: null
phone_number: null
region: null
postal_code: null
family_name: Cloud
email: [email protected]
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ud4tVDDXYVKPXKVLCO"
AppUserProvExpandResponse:
summary: Application User expand example
value:
id: 00u1dnq5S0CfjlkpABCD
externalId: 00u5edt3PNbbjzvIABCD
created: 2024-01-31T18:25:01.000Z
lastUpdated: 2024-01-31T18:25:03.000Z
scope: USER
status: PROVISIONED
statusChanged: 2024-01-31T18:25:03.000Z
passwordChanged: null
syncState: SYNCHRONIZED
lastSync: 2024-01-31T18:25:03.000Z
credentials:
userName: [email protected]
profile:
secondEmail: null
lastName: Test
mobilePhone: null
displayName: Saml O Test
email: [email protected]
salesforceGroups: []
role: Tester
firstName: Saml
streetAddress: null
profile: Standard Platform User
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oajiqIRNXPPJBNZMGYL"
user:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD"
_embedded:
user:
id: 00u1dnq5S0CfjlkpABCD
status: ACTIVE
created: 2024-01-09T15:36:04.000Z
activated: 2024-01-09T15:36:05.000Z
statusChanged: 2024-01-09T15:36:05.000Z
lastLogin: null
lastUpdated: 2024-01-09T15:36:05.000Z
passwordChanged: 2024-01-09T15:36:05.000Z
type:
id: otyzhh29g7Python90g3
profile:
firstName: Saml
lastName: Test
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
suspend:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/suspend"
method: POST
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscarho9g7PythoN23z9"
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/reset_password"
method: POST
expirePassword:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/expire_password"
method: POST
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/credentials/change_recovery_question"
method: POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD"
type:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otyzhh29g7Python90g3"
changePassword:
href: https://rain.okta1.com/api/v1/users/00u1dnq5S0CfjlkpABCD/credentials/change_password
method: POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00u1dnq5S0CfjlkpABCD/lifecycle/deactivate"
method: POST
AppUserProvResponse:
summary: SSO and provisioning Application User response example
value:
id: 00u15s1KDETTQMQYABRL
externalId: 005o0000000ogQ9AAI
created: 2014-08-16T02:35:14.000Z
lastUpdated: 2014-08-16T02:56:49.000Z
scope: USER
status: PROVISIONED
statusChanged: 2014-08-16T02:56:49.000Z
passwordChanged: null
syncState: SYNCHRONIZED
lastSync: 2014-08-16T02:56:49.000Z
credentials:
userName: [email protected]
profile:
secondEmail: null
lastName: Jackson
mobilePhone: null
email: [email protected]
salesforceGroups:
- Employee
role: Developer
firstName: Saml
profile: Standard User
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
AppUserSSOResponse:
summary: SSO Application User response example
value:
id: 00ud4tVDDXYVKPXKVLCO
externalId: null
created: 2024-01-27T03:52:45.000Z
lastUpdated: 2024-01-27T03:52:45.000Z
scope: USER
status: ACTIVE
statusChanged: 2024-01-27T03:52:45.000Z
passwordChanged: null
syncState: DISABLED
credentials":
userName: [email protected]
profile:
street_address: null
country: null
website: null
zoneinfo: America/Los_Angeles
birthdate: null
gender: null
formatted: null
profile: null
locality: null
given_name: Rae
middle_name: null
locale: en_US
picture: null
name: Rae Cloud
nickname: null
phone_number: null
region: null
postal_code: null
family_name: Cloud
email: [email protected]
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ud4tVDDXYVKPXKVLCO"
AppUserSchemaAddRequest:
value:
definitions:
custom:
id: '#custom'
type: object
properties:
twitterUserName:
title: Twitter username
externalName: twitterUserName
description: User's username for twitter.com
type: string
required: false
minLength: 1
maxLength: 20
required: []
AppUserSchemaResponse:
value:
id: "https://{yourOktaDomain}/meta/schemas/apps/0oa25gejWwdXNnFH90g4/default"
$schema: http://json-schema.org/draft-04/schema#
name: Example App
title: Example App User
lastUpdated: 2017-07-18T23:18:43.000Z
created: 2017-07-18T22:35:30.000Z
definitions:
base:
id: '#base'
type: object
properties:
userName:
title: Username
type: string
required: true
scope: NONE
maxLength: 100
required:
- userName
custom:
id: '#custom'
type: object
properties:
twitterUserName:
title: Twitter username
externalName: twitterUserName
description: User's username for twitter.com
type: string
scope: NONE
minLength: 1
maxLength: 20
required: []
type: object
properties:
profile:
allOf:
- $ref: '#/definitions/base'
- $ref: '#/definitions/custom'
AppUserUpdateCredRequest:
summary: Application User credentials update
value:
credentials:
userName: [email protected]
password:
value: updatedP@55word
AppUserUpdateProfileRequest:
summary: Application User profile update
value:
profile:
name: Rae Mae Cloud
middle_name: Mae
AppleIdPResponse:
summary: Apple Identity Provider
value:
id: 0oa18hsHsG3boVejU0g4
type: APPLE
issuerMode: ORG_URL
name: Apple Identity Provider
status: ACTIVE
created: 2020-06-05T20:57:51.000Z
lastUpdated: 2020-06-05T20:57:51.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://appleid.apple.com/auth/authorize
binding: HTTP-REDIRECT
token:
url: https://appleid.apple.com/auth/token
binding: HTTP-POST
scopes:
- openid
- email
- name
credentials:
client:
client_id: your-client-id
signing:
teamId: test team ID
privateKey: MIGTAgEAMBM........Cb9PnybCnzDv+3cWSGWqpAIsQQZ
kid: test key ID
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.email
filter: null
matchType: USERNAME
matchAttribute: null
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa18hsHsG3boVejU0g4&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri=${redirectUri}&state={state}&nonce={nonce}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
AssignGroupOwnerRequest:
summary: Assign a group owner request example
value:
id: 00u1cmc03xjzePoWD0h8
type: USER
AssignGroupOwnerResponse:
summary: Assign a group owner response example
value:
id: 00u1cmc03xjzePoWD0h8
type: USER
resolved: true
originId: null
originType: OKTA_DIRECTORY
displayName: Oliver Putnam
lastUpdated: Wed Mar 29 18:34:31 UTC 2023
AuthenticatorMethodInactiveVoice:
value:
type: voice
status: INACTIVE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/voice"
hints:
allow:
- GET
- PUT
activate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/voice/lifecycle/activate"
hints:
allow:
- POST
AuthenticatorMethodPhone:
value:
- type: sms
status: ACTIVE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/sms"
hints:
allow:
- GET
- PUT
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/sms/lifecycle/deactivate"
hints:
allow:
- POST
- type: voice
status: INACTIVE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/voice"
hints:
allow:
- GET
- PUT
activate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/voice/lifecycle/activate"
hints:
allow:
- POST
AuthenticatorMethodSms:
value:
type: sms
status: ACTIVE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/sms"
hints:
allow:
- GET
- PUT
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/sms/lifecycle/deactivate"
hints:
allow":
- POST
AuthenticatorMethodWebauth:
value:
type: webauthn
status: ACTIVE
settings:
userVerification: DISCOURAGED
attachment: ANY
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods/webauthn"
hints:
allow:
- GET
- PUT
AuthenticatorRequestDuo:
value:
key: duo
name: Duo Security
provider:
type: DUO
configuration:
userNameTemplate:
template: oktaId
integrationKey: testIntegrationKey
secretKey: testSecretKey
host: https://api-xxxxxxxx.duosecurity.com
AuthenticatorResponseDuo:
value:
type: app
id: aut9gnvcjUHIWb37J0g4
key: duo
status: ACTIVE
name: Duo Security
created: 2022-07-15T21:14:02.000Z
lastUpdated: 2022-07-15T21:14:02.000Z
settings: {}
provider:
type: DUO
configuration:
host: https://api-xxxxxxxx.duosecurity.com
userNameTemplate:
template: oktaId
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut5gnvcjUHIWb25J0g4"
hints:
allow:
- GET
- PUT
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut5gnvcjUHIWb25J0g4/lifecycle/deactivate"
hints:
allow:
- POST
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut5gnvcjUHIWb25J0g4/methods"
hints:
allow:
- GET
AuthenticatorResponseEmail:
value:
type: email
id: aut1nbsPHh7jNjjyP0g4
key: okta_email
status: ACTIVE
name: Email
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-28T21:45:52.000Z
settings:
allowedFor: any
tokenLifetimeInMinutes: 5
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4/lifecycle/deactivate"
hints:
allow:
- POST
AuthenticatorResponseInactiveWebAuthn:
value:
type: security_key
id: aut1nd8PQhGcQtSxB0g4
key: webauthn
status: INACTIVE
name: Security Key or Biometric
created: 2020-07-26T21:16:37.000Z
lastUpdated: 2020-07-27T18:59:30.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/lifecycle/deactivate"
hints:
allow:
- POST
AuthenticatorResponsePassword:
value:
type: password
id: aut1nbtrJKKA9m45a0g4
key: okta_password
status: ACTIVE
name: Password
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-26T21:05:23.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbtrJKKA9m45a0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbtrJKKA9m45a0g4/methods"
hints:
allow:
- GET
AuthenticatorResponsePhone:
value:
type: phone
id: aut1nbuyD8m1ckAYc0g4
key: phone_number
status: INACTIVE
name: Phone
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-29T00:21:29.000Z
settings:
allowedFor: none
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4/methods"
hints:
allow:
- GET
activate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4/lifecycle/activate"
hints:
allow:
- POST
AuthenticatorResponseSecurityQuestion:
summary: Security Question
value:
type: security_question
id: aut1nbvIgEenhwE6c0g4
key: security_question
status: ACTIVE
name: Security Question
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-26T21:05:23.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbvIgEenhwE6c0g4"
hints:
allow:
- GET
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbvIgEenhwE6c0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbvIgEenhwE6c0g4/lifecycle/deactivate"
hints:
allow:
- POST
AuthenticatorResponseWebAuthn:
value:
type: security_key
id: aut1nd8PQhGcQtSxB0g4
key: webauthn
status: ACTIVE
name: Security Key or Biometric
created: 2020-07-26T21:16:37.000Z
lastUpdated: 2020-07-27T18:59:30.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/lifecycle/deactivate"
hints:
allow:
- POST
AuthenticatorsResponse:
summary: Org Authenticators
value:
- type: email
id: aut1nbsPHh7jNjjyP0g4
key: okta_email
status: ACTIVE
name: Email
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-28T21:45:52.000Z
settings:
allowedFor: any
tokenLifetimeInMinutes: 5
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbsPHh7jNjjyP0g4/lifecycle/deactivate"
hints:
allow:
- POST
- type: password
id: aut1nbtrJKKA9m45a0g4
key: okta_password
status: ACTIVE
name: Password
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-26T21:05:23.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbtrJKKA9m45a0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbtrJKKA9m45a0g4/methods"
hints:
allow:
- GET
- type: phone
id: aut1nbuyD8m1ckAYc0g4
key: phone_number
status: INACTIVE
name: Phone
created: 2020-07-26T21:05:23.000Z
lastUpdated: 2020-07-29T00:21:29.000Z
settings:
allowedFor: none
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4/methods"
hints:
allow:
- GET
activate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nbuyD8m1ckAYc0g4/lifecycle/activate"
hints:
allow:
- POST
- type: security_key
id: aut1nd8PQhGcQtSxB0g4
key: webauthn
status: ACTIVE
name: Security Key or Biometric
created: 2020-07-26T21:16:37.000Z
lastUpdated: 2020-07-27T18:59:30.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4"
hints:
allow:
- GET
- PUT
methods:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/methods"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/authenticators/aut1nd8PQhGcQtSxB0g4/lifecycle/deactivate"
hints:
allow:
- POST
AuthorizationServerPolicy:
summary: Authorization Server Policy
value:
type: OAUTH_AUTHORIZATION_POLICY
id: 00palyaappA22DPkj0h7
status: ACTIVE
name: Vendor2 Policy
description: Vendor2 policy description
priority: 1
system: false
conditions:
clients:
include:
- ALL_CLIENTS
created: 2017-05-26T19:43:53.000Z
lastUpdated: 2017-06-07T15:28:17.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7/lifecycle/deactivate"
hints:
allow:
- POST
rules:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7/rules"
hints:
allow:
- GET
AuthorizationServerPolicyRule:
summary: Authorization Server Policy Rule
value:
type: RESOURCE_ACCESS
id: 0prbsjfyl01zfSZ9K0h7
status: ACTIVE
name: Default Policy Rule
priority: 1
created: 2017-08-25T16:57:02.000Z
lastUpdated: 2017-08-30T14:51:05.000Z
system: false
conditions:
people:
users:
include: []
exclude: []
groups:
include:
- EVERYONE
exclude: []
grantTypes:
include:
- implicit
- client_credentials
- authorization_code
- password
scopes:
include:
- '*'
actions:
token:
accessTokenLifetimeMinutes: 60
refreshTokenLifetimeMinutes: 0
refreshTokenWindowMinutes: 10080
inlineHook:
id: cal4egvp1mbMldrYN0g7
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/0prbsjfyl01zfSZ9K0h7"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/0prbsjfyl01zfSZ9K0h7/lifecycle/deactivate"
hints:
allow:
- POST
AutoLoginAppResponseEx:
summary: AUTO_LOGIN
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
customswaapp_link: true
name: customswaapp
label: Custom SWA App
features: []
signOnMode: AUTO_LOGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app: {}
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
signOn:
redirectUrl: http://swasecondaryredirecturl.okta.com
loginUrl: http://swaprimaryloginurl.okta.com
AutoLoginEx:
summary: AUTO_LOGIN
value:
label: Custom SWA App
signOnMode: AUTO_LOGIN
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
settings:
signOn:
redirectUrl: http://swasecondaryredirecturl.okta.com
loginUrl: http://swaprimaryloginurl.okta.com
AutoLoginPutEx:
summary: AUTO_LOGIN
value:
label: Custom SWA App updated
status: ACTIVE
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
features: []
signOnMode: AUTO_LOGIN
credentials:
scheme: ADMIN_SETS_CREDENTIALS
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
settings:
signOn:
redirectUrl: http://swasecondaryredirecturlupdated.okta.com
loginUrl: http://swaprimaryloginurl.okta.com
AutoLoginPutResponseEx:
summary: AUTO_LOGIN
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
customswaapp_link: true
name: customswaapp
label: Custom SWA App updated
features: []
signOnMode: AUTO_LOGIN
credentials:
scheme: ADMIN_SETS_CREDENTIALS
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app: {}
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
signOn:
redirectUrl: http://swasecondaryredirecturlupdated.okta.com
loginUrl: http://swaprimaryloginurl.okta.com
BaseSignOnModeEx:
value:
status: ACTIVE
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
features: []
BasicAuthEx:
summary: BASIC_AUTH
value:
name: template_basic_auth
label: Sample Basic Auth App
signOnMode: BASIC_AUTH
settings:
app:
url: https://example.com/login.html
authURL: https://example.com/auth.html
BasicAuthPutEx:
summary: BASIC_AUTH
value:
label: Sample Basic Auth App updated
signOnMode: BASIC_AUTH
settings:
app:
url: https://example.com/loginUpdated.html
authURL: https://example.com/auth.html
BasicAuthPutResponseEx:
summary: BASIC_AUTH
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_basic_auth
label: Sample Basic Auth App updated
features: []
signOnMode: BASIC_AUTH
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
url: https://example.com/loginUpdated.html
authURL: https://example.com/auth.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BasicAuthResponseEx:
summary: BASIC_AUTH
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_basic_auth
label: Sample Basic Auth App
features: []
signOnMode: BASIC_AUTH
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
url: https://example.com/login.html
authURL: https://example.com/auth.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BehaviorRuleRequest:
value:
name: My Behavior Rule
type: VELOCITY
BehaviorRuleResponse:
value:
id: abcd1234
name: My Behavior Rule
type: VELOCITY
settings:
velocityKph: 805
status: ACTIVE
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_link:
self:
href: https://your-subdomain.okta.com/api/v1/behaviors/abcd1234
hints:
allow:
- GET
- POST
- PUT
- DELETE
BookmarkAppResponseEx:
summary: BOOKMARK
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: bookmark
label: Sample Bookmark App
features: []
signOnMode: BOOKMARK
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing: {}
settings:
app:
requestIntegration: false
url: https://example.com/bookmark.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BookmarkEx:
summary: BOOKMARK
value:
name: bookmark
label: Sample Bookmark App
signOnMode: BOOKMARK
settings:
app:
url: https://example.com/bookmark.html
BookmarkPutEx:
summary: BOOKMARK
value:
name: bookmark
label: Sample Bookmark App updated
signOnMode: BOOKMARK
settings:
app:
requestIntegration: true
url: https://example.com/bookmark.html
BookmarkPutResponseEx:
summary: BOOKMARK
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: bookmark
label: Sample Bookmark App updated
features: []
signOnMode: BOOKMARK
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing: {}
settings:
app:
requestIntegration: true
url: https://example.com/bookmark.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BrowserPluginEx:
summary: BROWSER_PLUGIN
value:
name: template_swa
label: Sample Plugin App
signOnMode: BROWSER_PLUGIN
settings:
app:
buttonField: btn-login
passwordField: txtbox-password
usernameField: txtbox-username
url: https://example.com/login.html
BrowserPluginPutEx:
summary: BROWSER_PLUGIN
value:
name: template_swa
label: Sample Plugin App updated
signOnMode: BROWSER_PLUGIN
settings:
app:
buttonField: btn-login
passwordField: txtbox-password
usernameField: txtbox-username
url: https://example_updated.com/login.html
BrowserPluginPutResponseEx:
summary: BROWSER_PLUGIN
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_swa
label: Sample Plugin App updated
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
usernameField: txtbox-username
buttonField: btn-login
passwordField: txtbox-password
url: https://example_updated.com/login.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BrowserPluginResponseEx:
summary: BROWSER_PLUGIN
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_swa
label: Sample Plugin App
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
usernameField: txtbox-username
buttonField: btn-login
passwordField: txtbox-password
url: https://example.com/login.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BrowserPluginSwa3FieldEx:
summary: BROWSER_PLUGIN with three CSS selectors
value:
name: template_swa3field
label: Sample Plugin App
signOnMode: BROWSER_PLUGIN
settings:
app:
buttonSelector: '#btn-login'
passwordSelector: '#txtbox-password'
userNameSelector: '#txtbox-username'
targetURL: https://example.com/login.html
extraFieldSelector: .login
extraFieldValue: SOMEVALUE
BrowserPluginSwa3FieldPutEx:
summary: BROWSER_PLUGIN with three CSS selectors
value:
name: template_swa3field
label: Sample Plugin App updated
signOnMode: BROWSER_PLUGIN
settings:
app:
buttonSelector: '#btn-login'
passwordSelector: '#txtbox-password'
userNameSelector: '#txtbox-username'
targetURL: https://exampleupdated.com/login.html
extraFieldSelector: .login
extraFieldValue: SOMEVALUE
BrowserPluginSwa3FieldPutResponseEx:
summary: BROWSER_PLUGIN with three CSS selectors
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_swa3field
label: Sample Plugin App updated
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
extraFieldSelector: .login
extraFieldValue: SOMEVALUE
userNameSelector: '#txtbox-username'
passwordSelector: '#txtbox-password'
buttonSelector: '#btn-login'
targetURL: https://exampleupdated.com/login.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BrowserPluginSwa3FieldResponseEx:
summary: BROWSER_PLUGIN with three CSS selectors
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_swa3field
label: Sample Plugin App
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
loginUrlRegex: null
extraFieldSelector: .login
extraFieldValue: SOMEVALUE
userNameSelector: '#txtbox-username'
passwordSelector: '#txtbox-password'
buttonSelector: '#btn-login'
targetURL: https://example.com/login.html
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
BundleEntitlementsResponse:
summary: List of governance bundle entitlements
value:
entitlements:
- id: espfxqCAJWWGELFTYASJ
role: GROUP_MEMBERSHIP_ADMIN
name: Group Membership Admin
description: Perform all admin activities for groups in the org
_links:
values: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA/entitlements/espfxqCAJWWGELFTYASJ/values
_links:
self:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles?limit=2&after=10
next:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles?after=bundleId12
bundle:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA
CAPTCHAInstanceRequestHCaptcha:
value:
name: myHCaptcha
secretKey: xxxxxxxxxxx
siteKey: xxxxxxxxxxx
type: HCAPTCHA
CAPTCHAInstanceRequestReCaptcha:
value:
name: myReCaptcha
secretKey: xxxxxxxxxxx
siteKey: yyyyyyyyyyyyyyy
type: RECAPTCHA_V2
CAPTCHAInstanceResponseHCaptcha:
value:
id: abcd1234
name: myHCaptcha
siteKey: xxxxxxxxxxx
type: HCAPTCHA
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas/abcd1234
hints:
allow:
- GET
- POST
- PUT
- DELETE
CAPTCHAInstanceResponseReCaptcha:
value:
id: abcd4567
name: myReCaptcha
siteKey: yyyyyyyyyyyyyyy
type: RECAPTCHA_V2
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas/abcd4567
hints:
allow:
- GET
- POST
- PUT
- DELETE
ChangePwdRequest:
value:
oldPassword:
value: tlpWENT2m
newPassword:
value: "uTVM,TPw55"
revokeSessions: true
ChangePwdResponse:
value:
password: {}
recovery_question:
question: Who's a major player in the cowboy scene?
provider:
type: OKTA
name: OKTA
CreateAnEventHook:
summary: Create an event hook
value:
name: Event Hook Test
events:
type: EVENT_TYPE
items:
- group.user_membership.add
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
headers:
- key: X-Other-Header
value: my-header-value
authScheme:
type: HEADER
key: Authorization
value: my-shared-secret
CreateAnEventHookWithFilter:
summary: Create an event hook with a filter
value:
name: Event Hook with Filter
description: An event hook using an Okta Expression Language filter
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter:
type: EXPRESSION_LANGUAGE
eventFilterMap:
- event: group.user_membership.add
condition:
expression: "event.target.?[type eq 'UserGroup'].size()>0 && event.target.?[displayName\
\ eq 'Sales'].size()>0"
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
authScheme:
type: HEADER
key: Authorization
value: my-shared-secret
CreateAppleIdPRequest:
summary: Create Apple Identity Provider
value:
type: APPLE
name: Apple Identity Provider
protocol:
type: OIDC
scopes:
- openid
- email
- name
credentials:
client:
client_id: your-client-id
signing:
privateKey: MIGTAgEAMBM........Cb9PnybCnzDv+3cWSGWqpAIsQQZ
kid: test key ID
teamId: test team ID
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
action: AUTO
subject:
userNameTemplate:
template: idpuser.email
matchType: USERNAME
CreateAssocAuthServerBody:
summary: Create a trusted relationship between authorization servers
value:
- trusted: "{authorizationServerId}"
CreateAssocAuthServerResponse:
summary: Create a trusted relationship between authorization servers
value:
- id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: CUSTOM_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: AUTO
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- DELETE
CreateAuthServerBody:
summary: Create a custom authorization server
value:
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- api://default
CreateAuthServerResponse:
summary: Create a custom authorization server
value:
id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: ORG_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: AUTO
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
_links:
scopes:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes"
hints:
allow:
- GET
claims:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims"
hints:
allow:
- GET
policies:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- GET
- DELETE
- PUT
metadata:
- name: oauth-authorization-server
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/oauth-authorization-server"
hints:
allow:
- GET
- name: openid-configuration
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/openid-configuration"
hints:
allow:
- GET
rotateKey:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/lifecycle/keyRotate"
hints:
allow:
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/lifecycle/deactivate"
hints:
allow:
- POST
CreateAuthorizationServerPolicyRequest:
summary: Create Authorization Server Policy
value:
type: OAUTH_AUTHORIZATION_POLICY
status: ACTIVE
name: Default Policy
description: Default policy description
priority: 1
system: false
conditions:
clients":
include":
- ALL_CLIENTS
CreateAuthorizationServerPolicyRuleRequest:
summary: Create Authorization Server Policy Rule
value:
type: RESOURCE_ACCESS
name: Default Policy Rule
priority: 1
conditions:
people:
groups:
include:
- EVERYONE
grantTypes:
include:
- implicit
- client_credentials
- authorization_code
- password
scopes:
include:
- '*'
actions:
token:
accessTokenLifetimeMinutes: 60
refreshTokenLifetimeMinutes: 0
refreshTokenWindowMinutes: 10080
inlineHook:
id: cal4egvp1mbMldrYN0g7
CreateBrandRequest:
value:
name: My Awesome Brand
CreateBrandResponse:
value:
id: bnd114iNkrcN6aR680g5
removePoweredByOkta: false
customPrivacyPolicyUrl: "null,"
agreeToCustomPrivacyPolicy: "false,"
name: My Awesome Brand
locale: en
defaultApp:
appInstanceId: null
appLinkName: null
classicApplicationUri: null
isDefault: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g5"
hints:
allow:
- GET
- PUT
- DELETE
themes:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g5/themes"
hints:
allow:
- GET
CreateChildOrgRequestEx:
summary: Create Org request
value:
subdomain: my-child-org-1
name: My Child Org 1
website: http://www.examplecorp.com
edition: SKU
admin:
profile:
firstName: First
lastName: Last
email: [email protected]
login: [email protected]
mobilePhone: null
credentials:
password:
value: XXXX
CreateChildOrgResponseEx:
summary: Create Org response
value:
id: 00o1n8sbwArJ7OQRw406
subdomain: my-child-org-1
name: My Child Org 1
website: http://www.examplecorp.com
status: ACTIVE
edition: SKU
expiresAt: null
created: 2024-08-27T15:42:52.000Z
lastUpdated: 2024-08-27T15:42:56.000Z
licensing:
apps: []
settings:
app:
errorRedirectUrl: null
interstitialUrl: null
interstitialMinWaitTime: 1200
userAccount:
attributes:
secondaryEmail: true
secondaryImage: true
portal:
errorRedirectUrl: null
signOutUrl: null
logs:
level: INFO
token: XXXXXXXXXXXXX
tokenType: SSWS
_links:
administrator:
href: https://my-child-org-1.oktapreview.com/api/v1/users/00u1n8sheI1WBQlDV406
uploadLogo:
href: https://my-child-org-1.oktapreview.com/api/v1/org/logo
organization:
href: https://my-child-org-1.oktapreview.com/api/v1/orgs/my-child-org-1
contacts:
href: https://my-child-org-1.oktapreview.com/api/v1/orgs/my-child-org-1/contacts
policy:
href: https://my-child-org-1.oktapreview.com/api/v1/orgs/my-child-org-1/policy
CreateCustomRoleResponseGroup:
value:
id: irb1q92TFAHzySt3x0g4
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: GROUP
resource-set: iamoJDFKaJxGIr0oamd9g
_links:
assignee:
href": "https://{yourOktaDomain}/api/v1/groups/00gsr2IepS8YhHRFf0g3"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions"
CreateCustomTokenClaimBody:
summary: Create a custom token Claim
value:
- alwaysIncludeInToken: true
claimType: IDENTITY
conditions:
scopes:
- profile
group_filter_type: CONTAINS
name: Support
status: ACTIVE
system: false
value: Support
valueType: GROUPS
CreateCustomTokenClaimResponse:
summary: Create a custom token Claim response
value:
- id: "{claimId}"
name: Support
status: ACTIVE
claimType: IDENTITY
valueType: GROUPS
value: Support
conditions:
scopes:
- profile
system: false
alwaysIncludeInToken: true
apiResourceId: null
group_filter_type: CONTAINS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims/{claimId}"
hints:
allow:
- GET
- PUT
- DELETE
CreateEDNZRequest:
summary: Create an Enhanced Dynamic Network Zone
value:
type: DYNAMIC_V2
name: testZone106
status: ACTIVE
usage: BLOCKLIST
locations:
include: []
exclude: []
asns:
include: []
exclude: []
ipServiceCategories:
include:
- ALL_ANONYMIZERS
exclude: []
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
CreateEDNZResponse:
summary: Enhanced Dynamic Network Zone
value:
type: DYNAMIC_V2
id: nzok0oz2xYHOZtIch0g4
name: testZone106
status: ACTIVE
usage: BLOCKLIST
create: 2024-05-13T16:33:44.000Z
lastUpdated: 2024-05-13T16:33:44.000Z
system: false
locations:
include: []
exclude: []
asns:
include: []
exclude: []
ipServiceCategories:
include:
- ALL_ANONYMIZERS
exclude: []
_links:
self:
href: "http://{yourOktaDomain}/api/v1/zones/nzok0oz2xYHOZtIch0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "http://{yourOktaDomain}/api/v1/zones/nzok0oz2xYHOZtIch0g4/lifecycle/deactivate"
hints:
allow:
- POST
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
CreateEmailDomainRequest:
value:
displayName: Admin
userName: admin
domain: example.com
brandId: bnd100iSrkcN6aR680g1
validationSubdomain: mail
CreateFacebookIdPRequest:
summary: Create Facebook Identity Provider
value:
type: FACEBOOK
name: Facebook
protocol:
type: OAUTH2
scopes:
- public_profile
- email
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
CreateGenericOidcIdPRequest:
summary: Create Generic OpenID Connect Identity Provider
value:
type: OIDC
name: Example OpenID Connect IdP
protocol:
algorithms:
request:
signature:
algorithm: HS256
scope: REQUEST
endpoints:
acs:
binding: HTTP-POST
type: INSTANCE
authorization:
binding: HTTP-REDIRECT
url: https://idp.example.com/authorize
token:
binding: HTTP-POST
url: https://idp.example.com/token
userInfo:
binding: HTTP-REDIRECT
url: https://idp.example.com/userinfo
jwks:
binding: HTTP-REDIRECT
url: https://idp.example.com/keys
scopes:
- openid
- profile
- email
type: OIDC
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
pkce_required: "true"
issuer:
url: https://idp.example.com
policy:
accountLink:
action: AUTO
filter: null
provisioning:
action: AUTO
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
groups:
action: NONE
mapAMRClaims: false
maxClockSkew: 120000
subject:
userNameTemplate:
template: idpuser.email
matchType: USERNAME
CreateGoogleIdPRequest:
summary: Create Google Identity Provider
value:
type: GOOGLE
name: Google
protocol:
type: OAUTH2
scopes:
- profile
- email
- openid
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
CreateHookKeyResponse:
description: |-
The response is a [Key object](https://developer.okta.com/docs/reference/api/hook-keys/#key-object) that represents the key that you create. The `id` property in the response serves as the unique ID for the key, which you can specify when invoking other CRUD operations. The `keyId` provided in the response is the alias of the public key that you can use to get details of the public key data in a separate call.
> **Note:** The keyId is the alias of the public key that you can use to retrieve the public key.
summary: Create a key response example
value:
id: HKY1p7jWLndGQV9M60g4
keyId: 7fbc27fd-e3df-4522-86bf-1930110256ad
name: My new key
created: 2022-08-31T18:09:58.000Z
lastUpdated: 2022-08-31T18:09:58.000Z
isUsed: "false"
_embedded:
kty: RSA
alg: RSA
kid: 7fbc27fd-e3df-4522-86bf-1930110256ad
use: "null"
e: AQAB
"n": 2naqCnv6r4xNQs7207lRtKQvdtnlVND-8k5iYBIiqoKGY3CqUmRm1jleoOniiQoMkFX8Wj2DmVqr002efF3vOQ7_gjtTatBTVUNbNIQLybun4dkVoUtfP7pRc5SLpcP3eGPRVar734ZrpQXzmCEdpqBt3jrVjwYjNE5DqOjbYXFJtMsy8CWE9LRJ3kyHEoHPzo22dG_vMrXH0_sAQoCk_4TgNCbvyzVmGVYXI_BkUnp0hv2pR4bQVRYzGB9dKJdctOh8zULqc_EJ8tiYsS05YnF7whrWEyARK0rH-e4d4W-OmBTga_zhY4kJ4NsoQ4PyvcatZkxjPO92QHQOFDnf3w`
CreateIAMStandardRoleResponseGroup:
value:
id: irb1q92TFAHzySt3x0g4
role: ACCESS_REQUESTS_ADMIN
label: Access Requests Administrator
type: ACCESS_REQUESTS_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: GROUP
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/groups/00gsr2IepS8YhHRFf0g3"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN/permissions"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_REQUESTS_ADMIN/members/irb4jlomnnDBuBDyJ0g7"
CreateIPPolicyBlockListNetworkZone:
summary: Create an IP Blocklist Network Zone
value:
type: IP
name: newBlockListNetworkZone
status: ACTIVE
usage: BLOCKLIST
gateways:
- type: CIDR
value: 1.2.3.4/24
- type: CIDR
value: 2.3.4.5/24
proxies: null
CreateIPPolicyBlockListNetworkZoneResponse:
summary: IP Blocklist Network Zone
value:
type: IP
id: nzo1qasnPb1kqEq0e0g4
name: newBlockListNetworkzone
status: ACTIVE
usage: BLOCKLIST
created: 2021-08-09T20:22:09.000Z
lastUpdated: 2021-08-09T20:22:09.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
- type: CIDR
value: 2.3.4.5/24
proxies: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzo1qasnPb1kqEq0e0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzo1qasnPb1kqEq0e0g4/lifecycle/deactivate"
hints:
allow:
- POST
CreateIPPolicyNetworkZone:
summary: Create an IP Policy Network Zone
value:
type: IP
name: newNetworkZone
gateways:
- type: CIDR
value: 1.2.3.4/24
- type: CIDR
value: 2.3.4.5/24
proxies:
- type: CIDR
value: 2.2.3.4/24
- type: CIDR
value: 3.3.4.5/24
CreateIPPolicyNetworkZoneResponse:
summary: IP Policy Network Zone
value:
type: IP
id: nzowb8T5Jh5xuAJ0o0g7
name: newNetworkZone
status: ACTIVE
usage: POLICY
created: 2021-08-09T21:32:01.000Z
lastUpdated: 2021-08-09T21:32:01.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24'
- type: CIDR
value: 2.3.4.5/24
proxies:
- type: CIDR
value: 2.2.3.4/24
- type: CIDR
value: 3.3.4.5/24
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowb8T5Jh5xuAJ0o0g7"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowb8T5Jh5xuAJ0o0g7/lifecycle/deactivate"
hints:
allow:
- POST
CreateLinkedObjectRequest:
summary: Create manager-subordinate link request
value:
primary:
name: manager
title: manager
description: Manager link property
type: USER
associated:
name: subordinate
title: subordinate
description: Subordinate link property
type: USER
CreateLinkedObjectResponse:
summary: Create manager-subordinate link property response
value:
primary:
name: manager
title: manager
description: Manager link property
type: USER
associated:
name: subordinate
title: subordinate
description: Subordinate link property
type: USER
_links:
self:
href: http://your-subdomain.okta.com/api/v1/meta/schemas/user/linkedObjects/manager
CreateMicrosoftIdPRequest:
summary: Create Microsoft Identity Provider
value:
type: MICROSOFT
name: Microsoft
protocol:
type: OIDC
scopes:
- openid
- email
- profile
- https://graph.microsoft.com/User.Read
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
CreateOAuth2ScopeRequest:
summary: Example scope
value:
name: car:drive
description: Drive car
consent: REQUIRED
displayName: Saml Jackson
CreateOrReplaceSMSTemplateRequest:
value:
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
CreateOrReplaceSMSTemplateResponse:
value:
id: 6NQUJ5yR3bpgEiYmq8IC
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
CreateSamlIdPRequest:
summary: Create SAML 2.0 Identity Provider
value:
type: SAML2
name: Example SAML IdP
protocol:
type: SAML2
endpoints:
sso:
url: https://idp.example.com
binding: HTTP-POST
destination: https://idp.example.com
acs:
binding: HTTP-POST
type: INSTANCE
algorithms:
request:
signature:
algorithm: SHA-256
scope: REQUEST
response:
signature:
algorithm: SHA-256
scope: ANY
credentials:
trust:
issuer: https://idp.example.com
audience: http://www.okta.com/123
kid: your-key-id
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: saml.subjectNameId
format:
- urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
filter: (\S+@example\.com)
matchType: USERNAME
CreateSessionBody:
summary: Create a new Session with a valid session token
value:
sessionToken: 00HiohZYpJgMSHwmL9TQy7RRzuY-q9soKp1SPmYYow
CreateSessionResponse:
summary: Create a new Session with a valid session token
value:
amr:
- pwd
createdAt: 2019-08-24T14:15:22Z
expiresAt: 2019-08-24T14:15:22Z
id: l7FbDVqS8zHSy65uJD85
idp:
id: 01a2bcdef3GHIJKLMNOP
type: ACTIVE_DIRECTORY
lastFactorVerification: 2019-08-24T14:15:22Z
lastPasswordVerification: 2019-08-24T14:15:22Z
login: [email protected]
status: ACTIVE
userId: 00u0abcdefGHIJKLMNOP
_links:
self:
hints:
allow:
- DELETE
href: "https://{yourOktaDomain}/api/v1/sessions/l7FbDVqS8zHSy65uJD85"
CreateSmartCardIdPRequest:
summary: Create SmartCard Identity Provider
value:
type: X509
status: ACTIVE
name: Smart Card IDP Name
properties:
additionalAmr:
- sc
- hwk
- pin
- mfa
protocol:
type: MTLS
credentials:
trust:
revocation: CRL
revocationCacheLifetime: 2880
issuer: your-issuer
kid: your-kid
policy:
provisioning:
action: DISABLED
mapAMRClaims: false
maxClockSkew: 120000
subject:
matchType: EMAIL
matchAttribute: ""
userNameTemplate:
template: idpuser.subjectAltNameEmail
CreateStandardRoleAssignmentResponseGroup:
value:
id: grasraHPx7i79ajaJ0g3
label: Organization Administrator
type: ORG_ADMIN
status: ACTIVE
created: 2019-02-27T14:56:55.000Z
lastUpdated: 2019-02-27T14:56:55.000Z
assignmentType: GROUP
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/groups/00gsr2IepS8YhHRFf0g3"
CreateUISchemaBody:
summary: UI Schema body request
value:
uiSchema:
type: Group
elements:
- type: Control
scope: '#/properties/firstName'
label: First Name
options:
format: text
- type: Control
scope: '#/properties/lastName'
label: Last Name
options:
format: text
- type: Control
scope: '#/properties/email'
label: Primary email
options:
format: text
buttonLabel: Submit
label: Sign in
CreateUISchemaResponse:
summary: Returns full UI Schema body
value:
id: uis4a7liocgcRgcxZ0g7
uiSchema:
type: Group
label: Sign in
buttonLabel: Submit
elements:
- type: Control
scope: '#/properties/firstName'
label: First name
options:
format: text
- type: Control
scope: '#/properties/lastName'
label: Last name
options:
format: text
- type: Control
scope: '#/properties/email'
label: Primary email
options:
format: text
created: 2022-07-25T12:56:31.000Z
lastUpdated: 2022-07-26T11:53:59.000Z
_links:
self:
href: https://exmaple.com/api/v1/meta/uischemas/uis4a7liocgcRgcxZ0g7
hints:
allow:
- GET
- PUT
- DELETE
CreateUpdateEmailCustomizationRequest:
value:
language: fr
subject: "Bienvenue dans ${org.name}!"
body: "Bonjour ${user.profile.firstName}. Activer le compte
"
isDefault: false
CreateUpdateEmailCustomizationResponse:
value:
language: fr
subject: "Bienvenue dans ${org.name}!"
body: "Bonjour ${user.profile.firstName}. Activer le compte
"
isDefault: false
id: oel11u6DqUiMbQkpl0g4
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4"
hints:
allow:
- GET
- PUT
- DELETE
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
preview:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4/preview"
hints:
allow:
- GET
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
CreateUpdateIamRolePermissionRequestExampleWithExclude:
value:
conditions:
exclude:
okta:ResourceAttribute/User/Profile:
- zipCode
CreateUpdateIamRolePermissionRequestExampleWithInclude:
value:
conditions:
include:
okta:ResourceAttribute/User/Profile:
- city
- state
CreateUserRequest:
summary: Create a user type request
value:
description: A new custom user type
displayName: New User Type
name: newUserType
CreateUserResponse:
summary: Create a user type response
value:
id: otyfnly5cQjJT9PnR0g4
displayName: New User Type
name: newUserType
description: A new custom user type
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
CsrJsonResponse:
summary: CSR object in JSON format
value:
id: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
created: 2017-03-28T01:11:10.000Z
csr: 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
kty: RSA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
hints:
allow:
- GET
- DELETE
publish:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
hints:
allow:
- POST
CsrPkcs10Response:
summary: CSR in DER format
value: MIIC4DCCAcgCAQAwcTELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xEzARBgNVBAoMCk9rdGEsIEluYy4xDDAKBgNVBAsMA0RldjESMBAGA1UEAwwJU1AgSXNzdWVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6m8jHVCr9
CustomRoleAssignmentRequest:
value:
type: CUSTOM
role: cr04cxy6yzSCtNciD0g7
resource-set: iam4cxy6z7hhaZCSk0g7
CustomRoleResponseClient:
value:
id: irb4ey26fpFI3vQ8y0g7
label: view_minimal
type: CUSTOM
status: ACTIVE
created: 2023-05-01T15:16:47.000Z
lastUpdated: 2023-05-01T15:16:47.000Z
assignmentType: CLIENT
resource-set: iam4cxy6z7hhaZCSk0g7
role: cr04cxy6yzSCtNciD0g7
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr04cxy6yzSCtNciD0g7"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iam4cxy6z7hhaZCSk0g7"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr04cxy6yzSCtNciD0g7/permissions"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iam4cxy6z7hhaZCSk0g7/bindings/cr04cxy6yzSCtNciD0g7/members/irb4ey26fpFI3vQ8y0g7"
assignee:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oa4ee9vgbIuqTUvd0g7"
CustomRoleResponseUser:
value:
id: irb1q92TFAHzySt3x0g4
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: USER
resource-set: iamoJDFKaJxGIr0oamd9g
_links:
assignee:
href": "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions"
CustomRolesListResponseClient:
value:
- id: irb4ey26fpFI3vQ8y0g7
label: view_minimal
type: CUSTOM
status: ACTIVE
created: 2023-05-01T15:16:47.000Z
lastUpdated: 2023-05-01T15:16:47.000Z
assignmentType: CLIENT
resource-set: iam4cxy6z7hhaZCSk0g7
role: cr04cxy6yzSCtNciD0g7
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr04cxy6yzSCtNciD0g7"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iam4cxy6z7hhaZCSk0g7"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr04cxy6yzSCtNciD0g7/permissions"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iam4cxy6z7hhaZCSk0g7/bindings/cr04cxy6yzSCtNciD0g7/members/irb4ey26fpFI3vQ8y0g7"
assignee:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oa4ee9vgbIuqTUvd0g7"
CustomRolesListResponseGroup:
value:
- id: irb1q92TFAHzySt3x0g4
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: GROUP
resource-set: iamoJDFKaJxGIr0oamd9g
_links:
assignee:
href": "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/cr0Yq6IJxGIr0ouum0g3/permissions"
DeactivateIdPResponse:
summary: Deactivate an Identity Provider
value:
id: 0oa62bfdiumsUndnZ0h7
type: GOOGLE
name: Google
status: INACTIVE
created: 2016-03-24T23:21:49.000Z
lastUpdated: 2016-03-25T19:16:53.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://accounts.google.com/o/oauth2/auth
binding: HTTP-REDIRECT
token:
url: https://www.googleapis.com/oauth2/v3/token
binding: HTTP-POST
scopes:
- profile
- email
- openid
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: |-
https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62bfdiumsUndnZ0h7&
client_id={clientId}&response_type={responseType}&response_mode={responseMode}&
scope={scopes}&redirect_uri={redirectUri}&state={state}
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
DeactivateNetworkZone:
summary: Deactivated Network Zone
value:
type: IP
id: nzowc1U5Jh5xuAK0o0g3
name: MyIpZone
status: INACTIVE
usage: POLICY
created: 2021-06-24T20:37:32.000Z
lastUpdated: 2021-06-24T20:37:32.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
proxies:
- type: RANGE
value: 3.3.4.5-3.3.4.15
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3"
hints:
allow:
- GET
- PUT
- DELETE
activate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3/lifecycle/activate"
hints:
allow:
- POST
DeactivatedSecurityEventsProviderResponse:
summary: Inactive Security Events Provider
value:
id: sse1qg25RpusjUP6m0g5
name: Security Events Provider with well-known URL
type: okta
status: INACTIVE
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
_links:
self:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5
hints:
allow:
- GET
- PUT
- DELETE
activate:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5/lifecycle/activate
hints:
allow:
- POST
DefaultEnhancedDynamicNetworkZone:
summary: Default Enhanced Dynamic Network Zone
value:
type: DYNAMIC_V2
id: nzohcnxFrSgsiwyHp0g4
name: DefaultEnhancedDynamicZone
status: ACTIVE
usage: BLOCKLIST
created: 2024-05-06T19:12:29.000Z
lastUpdated: 2024-05-09T21:02:31.000Z
system: true
locations:
include: []
exclude: []
ipServiceCategories:
include:
- ALL_ANONYMIZERS
exclue: []
asns:
include: []
exclude: []
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6/lifecycle/deactivate"
hints:
allow:
- POST
DefaultIpBlocklistNetworkZone:
summary: Default IP Blocklist Network Zone
value:
type: IP
id: nzou3u0stMCmgOzXK1d6
name: BlockedIpZone
status: ACTIVE
usage: BLOCKLIST
created: 2021-06-09T21:32:46.000Z
lastUpdated: 2021-06-09T21:32:46.000Z
system: true
gateways: null
proxies: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6/lifecycle/deactivate"
hints:
allow:
- POST
DefaultIpNetworkZone:
summary: Default IP Network Zone
value:
type: IP
id: nzou3u0ssJfZjYsWL1d6
name: LegacyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-09T21:32:46.000Z
lastUpdated: 2021-06-09T21:32:46.000Z
system: true
gateways: null
proxies: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0ssJfZjYsWL1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0ssJfZjYsWL1d6/lifecycle/deactivate"
hints:
allow:
- POST
DefaultRealmAssignment:
value:
id: rul2jy7jLUlnO5ng00g4
status: ACTIVE
name: Catch-all
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: true
conditions:
profileSourceId: "0oa4enoRyjwSCy6hx0g4,"
expression:
value: string
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf2g5
priority: 499
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realm-assignments/rul2jy7jLUlnO5ng00g4
method: GET
DefaultRealmResponse:
value:
id: guox9jQ16k9V8IQWL0g3
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: true
profile:
name: Default Realm
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realms/guox9jQ16k9V8IQWL0g3
method: GET
DeviceAssuranceAndroidRequest:
summary: Android request
value:
name: Device Assurance Android
osVersion:
minimum: 12
diskEncryptionType:
include:
- USER
- FULL
jailbreak: false
platform: ANDROID
screenLockType:
include:
- BIOMETRIC
secureHardwarePresent: true
DeviceAssuranceAndroidResponse:
summary: Android response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Android
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5
diskEncryptionType:
include:
- USER
- FULL
jailbreak: false
platform: ANDROID
screenLockType:
include:
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceAssuranceAndroidWithDynamicVersionRequirementRequest:
summary: Android with dynamic version requirement request
value:
name: Device Assurance Android
osVersion:
dynamicVersionRequirement:
type: MINIMUM
distanceFromLatestMajor: 0
diskEncryptionType:
include:
- USER
- FULL
jailbreak: false
platform: ANDROID
screenLockType:
include:
- BIOMETRIC
secureHardwarePresent: true
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceAndroidWithDynamicVersionRequirementResponse:
summary: Android with dynamic version requirement response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Android
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
dynamicVersionRequirement:
type: MINIMUM
distanceFromLatestMajor: 0
diskEncryptionType:
include:
- USER
- FULL
jailbreak: false
platform: ANDROID
screenLockType:
include:
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceChromeOSWithThirdPartySignalProvidersRequest:
summary: ChromeOS with third-party signal providers request
value:
name: Device Assurance ChromeOS
platform: CHROMEOS
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
allowScreenLock: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain: testDomain
builtInDnsClientEnabled: true
chromeRemoteDesktopAppBlocked: true
safeBrowsingProtectionLevel: ENHANCED_PROTECTION
siteIsolationEnabled: true
passwordProtectionWarningTrigger: PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode: true
keyTrustLevel: CHROME_OS_VERIFIED_MODE
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceChromeOSWithThirdPartySignalProvidersResponse:
summary: ChromeOS with third-party signal providers response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance ChromeOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
platform: CHROMEOS
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
allowScreenLock: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain: testDomain
builtInDnsClientEnabled: true
chromeRemoteDesktopAppBlocked: true
safeBrowsingProtectionLevel: ENHANCED_PROTECTION
siteIsolationEnabled: true
passwordProtectionWarningTrigger: PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode: true
keyTrustLevel: CHROME_OS_VERIFIED_MODE
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceIosRequest:
summary: iOS request
value:
name: Device Assurance iOS
osVersion:
minimum: 12.4.5
jailbreak: false
platform: IOS
screenLockType:
include:
- BIOMETRIC
DeviceAssuranceIosResponse:
summary: iOS response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance iOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5.9
jailbroken: false
platform: IOS
screenLockType:
include:
- BIOMETRIC
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceAssuranceIosWithDynamicVersionRequirementRequest:
summary: iOS with dynamic version requirement request
value:
name: Device Assurance iOS
osVersion:
dynamicVersionRequirement:
type: EXACT_ANY_SUPPORTED
latestSecurityPatch: true
jailbreak: false
platform: IOS
screenLockType:
include:
- BIOMETRIC
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceIosWithDynamicVersionRequirementResponse:
summary: iOS with dynamic version requirement response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance iOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
dynamicVersionRequirement:
type: EXACT_ANY_SUPPORTED
latestSecurityPatch: true
jailbroken: false
platform: IOS
screenLockType:
include:
- BIOMETRIC
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceMacOSRequest:
summary: macOS request
value:
name: Device Assurance macOS
osVersion:
minimum: 12.4.5
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
DeviceAssuranceMacOSResponse:
summary: macOS response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance macOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceAssuranceMacOSWithDynamicVersionRequirementRequest:
summary: macOS with dynamic version requirement request
value:
name: Device Assurance macOS
osVersion:
dynamicVersionRequirement:
type: EXACT
distanceFromLatestMajor: 0
latestSecurityPatch: true
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceMacOSWithDynamicVersionRequirementResponse:
summary: macOS with dynamic version requirement response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance macOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
dynamicVersionRequirement:
type: EXACT
distanceFromLatestMajor: 0
latestSecurityPatch: true
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceMacOSWithThirdPartySignalProvidersRequest:
summary: macOS with third-party signal providers request
value:
name: Device Assurance macOS
osVersion:
minimum: 12.4.5
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain": testDomain
builtInDnsClientEnabled": true
chromeRemoteDesktopAppBlocked": true
safeBrowsingProtectionLevel": true
siteIsolationEnabled": true
passwordProtectionWarningTrigger": PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode": true
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceMacOSWithThirdPartySignalProvidersResponse:
summary: macOS with third-party signal providers response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance macOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5.9
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: MACOS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain: testDomain
builtInDnsClientEnabled: true
chromeRemoteDesktopAppBlocked: true
safeBrowsingProtectionLevel: ENHANCED_PROTECTION
siteIsolationEnabled: true
passwordProtectionWarningTrigger: PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode: true
keyTrustLevel: CHROME_BROWSER_HW_KEY
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsRequest:
summary: Windows request
value:
name: Device Assurance Windows
osVersion:
minimum: 12.4.5.9
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
DeviceAssuranceWindowsResponse:
summary: Windows response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5.9
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceAssuranceWindowsWithDynamicVersionRequirementsRequest:
summary: Windows with Windows 11 and Windows 10 dynamic version requirements
request
value:
name: Device Assurance Windows
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
dynamicVersionRequirement:
type: MINIMUM
distanceFromLatestMajor: 1
latestSecurityPatch: true
- majorVersionConstraint: WINDOWS_10
dynamicVersionRequirement:
type: EXACT_ANY_SUPPORTED
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithDynamicVersionRequirementsResponse:
summary: Windows with Windows 11 and Windows 10 dynamic version requirements
response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
dynamicVersionRequirement:
type: MINIMUM
distanceFromLatestMajor: 1
latestSecurityPatch: true
- majorVersionConstraint: WINDOWS_10
dynamicVersionRequirement:
type: EXACT_ANY_SUPPORTED
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithThirdPartySignalProvidersRequest:
summary: Windows with third-party signal providers request
value:
name: Device Assurance Windows
osVersion:
minimum: 12.4.5.9
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain: testDomain
builtInDnsClientEnabled: true
chromeRemoteDesktopAppBlocked: true
safeBrowsingProtectionLevel: ENHANCED_PROTECTION
siteIsolationEnabled: true
passwordProtectionWarningTrigger: PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode: true
secureBootEnabled: true
windowsMachineDomain: testMachineDomain
windowsUserDomain: testUserDomain
thirdPartyBlockingEnabled: true
crowdStrikeCustomerId: testCustomerId
crowdStrikeAgentId": testAgentId
keyTrustLevel: CHROME_BROWSER_HW_KEY
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithThirdPartySignalProvidersResponse:
summary: Windows with third-party signal providers response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersion:
minimum: 12.4.5.9
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
thirdPartySignalProviders:
dtc:
osVersion:
minimum: 10.0.19041.1110
diskEncrypted: true
osFirewall: true
screenLockSecured: true
browserVersion:
minimum: 15393.27.0
deviceEnrollmentDomain: testDomain
builtInDnsClientEnabled: true
chromeRemoteDesktopAppBlocked: true
safeBrowsingProtectionLevel: ENHANCED_PROTECTION
siteIsolationEnabled: true
passwordProtectionWarningTrigger: PASSWORD_PROTECTION_OFF
realtimeUrlCheckMode: true
secureBootEnabled: true
windowsMachineDomain: testMachineDomain
windowsUserDomain: testUserDomain
thirdPartyBlockingEnabled: true
crowdStrikeCustomerId: testCustomerId
crowdStrikeAgentId": testAgentId
keyTrustLevel: CHROME_BROWSER_HW_KEY
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringRequest:
summary: Windows with Windows 11 dynamic version requirement and Windows 10
minimum version request
value:
name: Device Assurance Windows
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
dynamicVersionRequirement:
type: EXACT
distanceFromLatestMajor: 1
- majorVersionConstraint: WINDOWS_10
minimum: 10.0.19045.0
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithWin11DynamicVersionRequirementAndWin10MinimumVersionStringResponse:
summary: Windows with Windows 11 dynamic version requirement and Windows 10
minimum version response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
dynamicVersionRequirement:
type: EXACT
distanceFromLatestMajor: 1
- majorVersionConstraint: WINDOWS_10
minimum: 10.0.19045.0
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementRequest:
summary: Windows with Windows 11 minimum version and a Windows 10 dynamic version
requirement request
value:
name: Device Assurance Windows
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
minimum: 10.0.22000.0
- majorVersionConstraint: WINDOWS_10
dynamicVersionRequirement:
type: NOT_ALLOWED
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsWithWin11MinimumVersionStringAndWin10DynamicVersionRequirementResponse:
summary: Windows with Windows 11 minimum version and Windows 10 dynamic version
requirement response
value:
id: dae3m8o4rWhwReDeM1c5
name: Device Assurance Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
osVersionConstraints:
- majorVersionConstraint: WINDOWS_11
minimum: 10.0.22000.0
- majorVersionConstraint: WINDOWS_10
dynamicVersionRequirement:
type: NOT_ALLOWED
diskEncryptionType:
include:
- ALL_INTERNAL_VOLUMES
platform: WINDOWS
screenLockType:
include:
- PASSCODE
- BIOMETRIC
secureHardwarePresent: true
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-assurances/dae3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
DeviceChecksMacOSRequest:
summary: macOS request
value:
name: Device Check macOS
description: Query macOS devices to check if firewall is enabled
variableName: macOSFirewall
platform: MACOS
query: SELECT CASE WHEN global_state = 0 THEN 0 ELSE 1 END AS firewall_enabled
FROM alf;
DeviceChecksMacOSResponse:
summary: macOS response
value:
id: dch3m8o4rWhwReDeM1c5
name: Device Check macOS
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
description: Query macOS devices to check if firewall is enabled
variableName: macOSFirewall
query: SELECT CASE WHEN global_state = 0 THEN 0 ELSE 1 END AS firewall_enabled
FROM alf;
platform: MACOS
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-checks/dch3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceChecksWindowsRequest:
summary: Windows request
value:
name: Device Check Windows
description: Query Windows devices to check if firewall is enabled
variableName: windowsFirewall
platform: WINDOWS
query: SELECT CASE WHEN enabled = 1 THEN 1 ELSE 0 END AS firewall_enabled
FROM windows_firewall_profiles;
DeviceChecksWindowsResponse:
summary: Windows response
value:
id: dch3m8o4rWhwReDeM1c5
name: Device Check Windows
lastUpdate: 2022-01-01T00:00:00.000Z
createdUpdate: 2022-01-01T00:00:00.000Z
lastUpdatedBy: 00u217pyf72CdUrBt1c5
createdBy: 00u217pyf72CdUrBt1c5
description: Query Windows devices to check if firewall is enabled
variableName: windowsFirewall
query: SELECT CASE WHEN enabled = 1 THEN 1 ELSE 0 END AS firewall_enabled
FROM windows_firewall_profiles;
platform: WINDOWS
_links:
self:
href: https://your-subdomain.okta.com/api/v1/device-checks/dch3m8o4rWhwReDeM1c5
hints:
allow:
- DELETE
- GET
- PUT
DeviceResponse:
value:
id: guo8jx5vVoxfvJeLb0w4
status: ACTIVE
created: 2020-11-03T21:47:01.000Z
lastUpdated: 2020-11-03T23:46:27.000Z
profile:
displayName: DESKTOP-EHAD3IE
platform: WINDOWS
manufacturer: International Corp
model: "VMware7,1"
osVersion: 10.0.18362
serialNumber: 56 4d 4f 95 74 c5 d3 e7-fc 3a 57 9c c2 f8 5d ce
udid: 954F4D56-C574-E7D3-FC3A-579CC2F85DCE
sid: S-1-5-21-3992267483-1860856704-2413701314-500
registered: true
secureHardwarePresent: false
diskEncryptionType: NONE
resourceId: guo8jx5vVoxfvJeLb0w4
resourceDisplayName:
value: DESKTOP-EHAD3IE
sensitive: false
resourceType: UDDevice
resourceAlternateId: null
_links:
suspend:
href: "https://{yourOktaDomain}/api/v1/devices/guo8jx5vVoxfvJeLb0w4/lifecycle/suspend"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/devices/guo8jx5vVoxfvJeLb0w4"
hints:
allow:
- GET
- PATCH
- PUT
users:
href: "https://{yourOktaDomain}/api/v1/devices/guo8jx5vVoxfvJeLb0w4/users"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/devices/guo8jx5vVoxfvJeLb0w4/lifecycle/deactivate"
hints:
allow:
- POST
EmailCustomizationResponse:
value:
language: en
isDefault: true
subject: "Welcome to ${org.name}!"
body: "Hello, ${user.profile.firstName}. Click\
\ here to activate your account."
id: oel11u6DqUiMbQkpl0g4
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4"
hints:
allow:
- GET
- PUT
- DELETE
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
preview:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4/preview"
hints:
allow:
- GET
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
EmailDomainResponse:
value:
id: OeD114iNkrcN6aR680g4
validationStatus: NOT_STARTED
displayName: Admin
userName: admin
domain: example.com
validationSubdomain: mail
dnsValidationRecords:
- recordType: TXT
fqdn: _oktaverification.example.com
verificationValue: 759080212bda43e3bc825a7d73b4bb64
- recordType: CNAME
fqdn: mail.example.com
verificationValue: u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t02._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t022._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
EmailSettingsRequest:
value:
recipients: ALL_USERS
EmailSettingsResponse:
value:
recipients: ALL_USERS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/settings"
hints:
allow:
- GET
- PUT
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
EmailTemplateDefaultContentResponse:
value:
subject: "Welcome to ${org.name}!"
body: "
Hello, ${user.profile.firstName}. Click\
\ here to activate your account."
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/default-content"
hints:
allow:
- GET
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
preview:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/default-content/preview"
hints:
allow:
- GET
EmbeddedGroupAssignmentSampleResponse:
summary: Application Group with an embedded Group
value:
id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-02T13:17:57.000Z
profile:
preferredLanguage: English
manager: Donald Glover
securityQuestion: Who is the footballer to have played the game
securityAnswer: Ronaldinho
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: wazobia
userType: null
department: marketing
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
_embedded:
group:
id: 00g15acRUy0SYb9GT0g4
created: 2024-06-02T13:02:12.000Z
lastUpdated: 2024-06-02T13:02:12.000Z
lastMembershipUpdated: 2024-06-02T13:03:13.000Z
objectClass:
- okta:user_group
type: OKTA_GROUP
profile:
name: Football Group
description: Group with professional footballers
_links:
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/groups/odyssey/okta-medium.30ce6d4085dff29412984e4c191bc874.png"
type: image/png
- name: large
href: "http://{yourOktaDomain}/assets/img/logos/groups/odyssey/okta-large.c3cb8cda8ae0add1b4fe928f5844dbe3.png"
type: image/png
users:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4/users"
apps:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4/apps"
EmbeddedMetadataGroupAssignmentSampleResponse:
summary: Application Group with embedded metadata
value:
id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-02T13:17:57.000Z
profile:
preferredLanguage: English
manager: Donald Glover
securityQuestion: Who is the footballer to have played the game
securityAnswer: Ronaldinho
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: wazobia
userType: null
department: marketing
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
_embedded:
metadata:
credentials: {}
profile:
division:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
preferredLanguage:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
manager:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
securityQuestion:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
securityAnswer:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
timezone:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
organization:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
initialStatus:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
managerId:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
userType:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
locale:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
department:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
EnrollFactorCallRequest:
summary: call
value:
factorType: call
provider: OKTA
profile:
phoneNumber: +1-555-415-1337
honeExtension: "1234"
EnrollFactorCallResponse:
summary: call
value:
id: clf1nz9JHJGHWRKMTLHP
factorType: call
provider: OKTA
vendorName: OKTA
status: PENDING_ACTIVATION
created: 2014-08-05T20:59:49.000Z
lastUpdated: 2014-08-06T03:59:49.000Z
profile:
phoneNumber: +1-555-415-1337
phoneExtension: "1234"
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clf1nz9JHJGHWRKMTLHP/lifecycle/activate"
hints:
allow:
- POST
resend:
- name: call
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clf1nz9JHJGHWRKMTLHP/resend"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clf1nz9JHJGHWRKMTLHP"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EnrollFactorCustomTotpRequest:
summary: custom totp
value:
factorType: token:hotp
provider: CUSTOM
factorProfileId: fpr20l2mDyaUGWGCa0g4
profile:
sharedSecret: 484f97be3213b117e3a20438e291540a
EnrollFactorCustomTotpResponse:
summary: custom totp
value:
id: chf20l33Ks8U2Zjba0g4
factorType: token:hotp
provider: CUSTOM
vendorName: Entrust Datacard
status: ACTIVE
created: 2019-07-22T23:22:36.000Z
lastUpdated: 2019-07-22T23:22:36.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00utf43LCCmTJVcsK0g3/factors/chf20l33Ks8U2Zjba0g4"
hints:
allow:
- GET
- DELETE
verify:
href: "https://{yourOktaDomain}/api/v1/users/00utf43LCCmTJVcsK0g3/factors/chf20l33Ks8U2Zjba0g4/verify"
hints:
allow:
- POST
user:
href: "https://{yourOktaDomain}/api/v1/users/00utf43LCCmTJVcsK0g3"
hints:
allow:
- GET
EnrollFactorEmailRequest:
summary: email
value:
factorType: email
provider: OKTA
profile:
email: [email protected]
EnrollFactorEmailResponse:
summary: email
value:
id: emfnf3gSScB8xXoXK0g3
factorType: email
provider: OKTA
vendorName: OKTA
status: PENDING_ACTIVATION
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3/lifecycle/activate"
hints:
allow:
- POST
resend:
- name: email
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3/resend"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3"
hints:
allow:
- GET
EnrollFactorGoogleRequest:
summary: google token:software:totp
value:
factorType: token:software:totp
provider: GOOGLE
EnrollFactorGoogleResponse:
value:
id: ostf1fmaMGJLMNGNLIVG
factorType: token:software:totp
provider: GOOGLE
vendorName: GOOGLE
status: PENDING_ACTIVATION
created: 2014-07-16T16:13:56.000Z
lastUpdated: 2014-07-16T16:13:56.000Z
profile:
credentialId: [email protected]
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
timeStep: 30
sharedSecret: JBTWGV22G4ZGKV3N
encoding: base32
keyLength: 16
_links:
qrcode:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG/qr/00fukNElRS_Tz6k-CFhg3pH4KO2dj2guhmaapXWbc4"
type: image/png
EnrollFactorOVPushRequest:
summary: token:software:totp push
value:
factorType: push
provider: OKTA
EnrollFactorOVPushResponse:
summary: token:software:totp
value:
id: opfbtzzrjgwauUsxO0g4
factorType: push
provider: OKTA
vendorName: OKTA
status: PENDING_ACTIVATION
created: 2015-11-13T07:34:22.000Z
lastUpdated: 2015-11-13T07:34:22.000Z
_links:
poll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfbtzzrjgwauUsxO0g4/lifecycle/activate/poll"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfbtzzrjgwauUsxO0g4"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
expiresAt: 2015-11-13T07:44:22.000Z
factorResult: WAITING
_links:
send:
- name: email
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfbtzzrjgwauUsxO0g4/lifecycle/activate/email"
hints:
allow:
- POST
- name: sms
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfbtzzrjgwauUsxO0g4/lifecycle/activate/sms"
hints:
allow:
- POST
qrcode:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfbtzzrjgwauUsxO0g4/qr/00Ji8qVBNJD4LmjYy1WZO2VbNqvvPdaCVua-1qjypa"
type: image/png
EnrollFactorOVTotpRequest:
summary: token:software:totp
value:
factorType: token:software:totp
provider: OKTA
EnrollFactorOVTotpResponse:
summary: token:software:totp
value:
id: ostf1fmaMGJLMNGNLIVG
factorType: token:software:totp
provider: OKTA
vendorName: OKTA
status: PENDING_ACTIVATION
created: 2014-07-16T16:13:56.000Z
lastUpdated: 2014-07-16T16:13:56.000Z
profile:
credentialId: [email protected]
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
timeStep: 30
sharedSecret: JBTWGV22G4ZGKV3N
encoding: base32
keyLength: 6
_links:
qrcode:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf1fmaMGJLMNGNLIVG/qr/00fukNElRS_Tz6k-CFhg3pH4KO2dj2guhmaapXWbc4"
type: image/png
EnrollFactorQuestionRequest:
summary: question
value:
question:
summary: question factor
value:
factorType: question
provider: OKTA
profile:
question: disliked_food
answer: mayonnaise
EnrollFactorQuestionResponse:
summary: question
value:
id: ufs1o01OTMGHLAJPVHDZ
factorType: question
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-08-05T22:58:49.000Z
lastUpdated: 2014-08-05T22:58:49.000Z
profile:
question: disliked_food
questionText: What is the food you least liked as a child?
_links:
questions:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/questions"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ufs1o01OTMGHLAJPVHDZ"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EnrollFactorRsaSecurIdRequest:
summary: RSA SecurID
value:
factorType: token
provider: RSA
profile:
credentialId: [email protected]
verify:
passCode: "5275875498"
EnrollFactorRsaSecurIdResponse:
summary: RSA SecurID
value:
id: rsabtznMn6cp94ez20g4
factorType: token
provider: RSA
vendorName: RSA
status: ACTIVE
created: 2015-11-13T07:05:53.000Z
lastUpdated: 2015-11-13T07:05:53.000Z
profile:
credentialId: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/rsabtznMn6cp94ez20g4/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/rsabtznMn6cp94ez20g4"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EnrollFactorSmsRequest:
summary: sms
value:
factorType: sms
provider: OKTA
profile:
phoneNumber: +1-555-415-1337
EnrollFactorSmsResponse:
summary: sms
value:
id: mbl1nz9JHJGHWRKMTLHP
factorType: sms
provider: OKTA
vendorName: OKTA
status: PENDING_ACTIVATION
created: 2014-08-05T20:59:49.000Z
lastUpdated: 2014-08-06T03:59:49.000Z
profile:
phoneNumber: +1-555-415-1337
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/mbl1nz9JHJGHWRKMTLHP/lifecycle/activate"
hints:
allow:
- POST
resend:
- name: sms
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/mbl1nz9JHJGHWRKMTLHP/resend"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/mbl1nz9JHJGHWRKMTLHP"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EnrollFactorSymantecVipRequest:
summary: Symantec VIP
value:
factorType: token
provider: SYMANTEC
profile:
credentialId: VSMT14393584
verify:
passCode: "875498"
nextPassCode: "678195"
EnrollFactorSymantecVipResponse:
summary: Symantec VIP
value:
id: ufvbtzgkYaA7zTKdQ0g4
factorType: token
provider: SYMANTEC
vendorName: SYMANTEC
status: ACTIVE
created: 2015-11-13T06:52:08.000Z
lastUpdated: 2015-11-13T06:52:08.000Z
profile:
credentialId: VSMT14393584
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ufvbtzgkYaA7zTKdQ0g4/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ufvbtzgkYaA7zTKdQ0g4"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EnrollFactorU2fRequest:
summary: u2f
value:
factorType: u2f
provider: FIDO
EnrollFactorU2fResponse:
summary: u2f
value:
id: fuf2rovRxogXJ0nDy0g4
factorType: u2f
provider: FIDO
vendorName: FIDO
status: PENDING_ACTIVATION
created: 2018-05-24T20:43:19.000Z
lastUpdated: 2018-05-24T20:43:19.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
version: U2F_V2
nonce: 9DmGJDLvaU6KWxJbfrZ0
timeoutSeconds: 20
EnrollFactorWebauthnRequest:
summary: webAuthn
value:
factorType: webauthn
provider: FIDO
EnrollFactorWebauthnResponse:
summary: webAuthn
value:
id: fwf2rovRxogXJ0nDy0g4
factorType: webauthn
provider: FIDO
vendorName: FIDO
status: PENDING_ACTIVATION
created: 2018-05-24T20:43:19.000Z
lastUpdated: 2018-05-24T20:43:19.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
attestation: direct
authenticatorSelection:
userVerification: preferred
requireResidentKey: false
challenge: cdsZ1V10E0BGE4GcG3IK
excludeCredentials: []
pubKeyCredParams:
- type: public-key
alg: -7
- type: public-key
alg: -257
rp:
name: Rain-Cloud59
user:
displayName: First Last
name: [email protected]
id: 00u15s1KDETTQMQYABRL
EnrollFactorYubikeyRequest:
summary: yubikey
value:
factorType: token:hardware
provider: YUBICO
verify:
passCode: cccccceukngdfgkukfctkcvfidnetljjiknckkcjulji
EnrollFactorYubikeyResponse:
value:
id: ykfbty3BJeBgUi3750g4
factorType: token:hardware
provider: YUBICO
vendorName: YUBICO
status: ACTIVE
created: 2015-11-13T05:27:49.000Z
lastUpdated: 2015-11-13T05:27:49.000Z
profile:
credentialId: "000004102994"
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ykfbty3BJeBgUi3750g4/verify"
hints:
allow:
- POST
self:
href: "hhttps://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ykfbty3BJeBgUi3750g4"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
EntitlementValuesResponse:
summary: List of bundle entitlement values
value:
entitlementValues:
- id: entfxqCAJWWGELFTYAAA
value: orn:okta:00o5rb5mt2H3d1TJd0h7:groups:00guaxWZ0AOa5NFAj0g3
name: Restricted users group
_links:
group: http://your-subdomain.okta.com/api/v1/groups/00guaxWZ0AOa5NFAj0g3
_links:
self:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles?limit=2&after=10
bundle:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA
entitlements:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA/entitlements
ErrorAccessDenied:
summary: Access Denied
value:
errorCode: E0000006
errorSummary: You do not have permission to perform the requested action
errorLink: E0000006
errorId: sampleNUSD_8fdkFd8fs8SDBK
errorCauses: []
ErrorAgentTimeOut:
value:
errorCode: E0000237
errorSummary: Timed out waiting for agent.
errorLink: E0000237
errorId: sampleMlLvGUj_YD5v16vkYWY
errorCauses: []
ErrorApiValidationFailed:
summary: API Validation Failed
value:
errorCode: E0000001
errorSummary: "Api validation failed: {0}"
errorLink: E0000001
errorId: sampleiCF-8D5rLW6myqiPItW
errorCauses: []
ErrorAppFeatureAPIValidationFailed:
summary: API Validation Failed
value:
errorCode: E0000001
errorSummary: "Api validation failed: feature"
errorLink: E0000001
errorId: oaeZLxeiHUUQomPkM8xOqvu1A
errorCauses:
- errorSummary: Provisioning is not enabled for the app instance.
ErrorAppUserForbiddenAction:
description: "If the `PUSH_NEW_USERS` or `PUSH_PROFILE_UPDATES` feature is enabled\
\ and the request specifies a value for a profile-mapped (Universal Directory)\
\ attribute that doesn't match the mapped value, then a 403 error is returned."
summary: Forbidden action
value:
errorCode: E0000075
errorSummary: Cannot modify the firstName attribute because it has a field
mapping and profile push is enabled.
errorLink: E0000075
errorId: sampleWXiR_K-WwaTKhlgBQ
errorCauses: []
ErrorAppUserUpdateBadRequest:
description: "If you attempt to assign a username or password to an app with\
\ an incompatible authentication scheme, then a 400 error is returned."
summary: Bad request
value:
errorCode: E0000041
errorSummary: Credentials should not be set on this resource based on the
scheme.
errorLink: E0000041
errorId: oaeUM77NBynQQu4C_qT5ngjGQ
errorCauses:
errorSummary: User level credentials should not be provided for this scheme.
ErrorCAPTCHALimitOfOne:
value:
errorCode: E0000165
errorSummary: CAPTCHA count limit reached. At most one CAPTCHA instance is
allowed per Org.
errorLink: E0000165
errorId: oaejrB1fWL1S7mc-2KcG-SOtw
errorCauses: []
ErrorCAPTCHAOrgWideSetting:
value:
errorCode: E0000149
errorSummary: "Current CAPTCHA is associated with org-wide settings, cannot\
\ be removed."
errorLink: E0000149
errorId: samplezsusshPdiTWiITwqBt8
errorCauses: []
ErrorCAPTCHAOrgWideSettingNull:
summary: "captchaId is null, but enabledPages is defined"
value:
errorCode: E0000001
errorSummary: "Api validation failed: captchaId"
errorLink: E0000001
errorId: oae-hk3rssXQmOWDRsaFfxe8A
errorCauses:
errorSummary: "captchaId: Invalid CAPTCHA ID. The value of captchaId cannot\
\ be blank when enabledPages is not empty. Please resubmit with an existing\
\ CAPTCHA ID or disable CAPTCHA support on all supported pages."
ErrorClientJsonWebKeyDuplicateKid:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: All keys in the 'jwks' must have a unique `kid`.
ErrorClientJsonWebKeyKidLengthTooShort:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "RSA key length in the 'jwks' is less than '2,048' bits for\
\ the given key."
ErrorClientJsonWebKeyNonUniqueKid:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "Each key should have a unique kid when adding multiple keys.\
\ Use the Apps API to update the JWKS to add a kid for the existing key,\
\ or delete the existing key and re-add the key with a kid using the JWKS\
\ APIs."
ErrorClientJsonWebKeyTooManyKids:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "You can't create a new key. You have reached the maximum\
\ number of keys allowed (50). To add another key, you must first delete\
\ an existing one."
ErrorClientSecretNonAscii:
summary: Client secret allows only ASCII error
value:
errorCode: E0000001
errorSummary: "Api validation failed: client_secret"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "client_secret: ''client_secret'' must only contain printable\
\ ASCII: [x20-x7E]+"
ErrorClientSecretTooLong:
summary: Client secret too long error
value:
errorCode: E0000001
errorSummary: "Api validation failed: client_secret"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "client_secret: 'client_secret' can't be more than '100' characters\
\ long."
ErrorClientSecretTooShort:
summary: Client secret too short error
value:
errorCode: E0000001
errorSummary: "Api validation failed: client_secret"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "client_secret: 'client_secret' must be at least '14' characters\
\ long."
ErrorClientSecretTooShortWithClientSecretJWT:
summary: Client secret is too short for JWT error
value:
errorCode: E0000001
errorSummary: "Api validation failed: client_secret"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: "client_secret: 'client_secret' must be at least '32' characters\
\ long when 'token_endpoint_auth_method' is 'client_secret_jwt'."
ErrorClientSecretWithPrivateKeyJWT:
summary: Client secret can't be used for private key JWT error
value:
errorCode: E0000001
errorSummary: "Api validation failed: client_secret"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: '''client_secret'' can''t be used when ''token_endpoint_auth_method''
is ''private_key_jwt''.'
ErrorCreateBrandExists:
value:
errorCode: E0000202
errorSummary: Brand name already exists.
errorLink: E0000202
errorId: oaeKABuesTdRvCXeCTpSpXAcQ
errorCauses: []
ErrorCreateUserWithExpiredPasswordWithNullPassword:
value:
errorCode: E0000124
errorSummary: "Could not create User. To create a User and expire their password\
\ immediately, a password must be specified."
errorLink: E0000124
errorId: oaeXxuZgXBySvqi1FvtkwoYCA
errorCauses:
- errorSummary: "Could not create User. To create a User and expire their\
\ password immediately, a password must be specified."
ErrorCreateUserWithExpiredPasswordWithoutActivation:
value:
errorCode: E0000125
errorSummary: "Could not create User. To create a User and expire their password\
\ immediately, `activate` must be true."
errorLink: E0000125
errorId: oaeDd77L9R-TJaD7j_rXsQ31w
errorCauses:
- errorSummary: "Could not create User. To create a User and expire their\
\ password immediately, `activate` must be true."
ErrorCreateUserWithTooManyManyGroupsResponse:
value:
errorCode: E0000093
errorSummary: Target count limit exceeded
errorLink: E0000093
errorId: oaePVSLIYnIQsC0B-ptBIllVA
errorCauses:
- errorSummary: The number of group targets is too large
ErrorDeactivateTheOnlyClientSecret:
value:
errorCode: E0000001
errorSummary: "Api validation failed: OAuth2ClientSecretMediated"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: You can't deactivate the only active client secret.
ErrorDeactivateTheOnlyKeyWithPrivateKeyJwtAuthMethod:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: Can't deactivate the only active JSON Web Key when the value
for `token_endpoint_auth_method` is `private_key_jwt`.
ErrorDeactivateTheOnlyKeyWithRequestObjectSignAlgorithm:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: The `jwks` must contain at least one key with an algorithm
matching the `request_object_signature_algorithm`.
ErrorDeleteActiveJsonWebKey:
value:
errorCode: E0000001
errorSummary: "Api validation failed: JsonWebKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: You can't delete an active JSON Web key. Deactivate the key
before deleting it.
ErrorDeleteActiveSecret:
value:
errorCode: E0000001
errorSummary: "Api validation failed: OAuth2ClientSecretMediated"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: You can't delete an active client secret. Deactivate the secret
before deleting it.
ErrorDeleteBrandAssociatedWithDomain:
value:
errorCode: E0000201
errorSummary: A brand associated with a domain cannot be deleted
errorLink: E0000201
errorId: oaeAdRqprFuTyKokyYPbURJkA
errorCauses: []
ErrorDeleteDefaultBrand:
value:
errorCode: E0000200
errorSummary: A default brand cannot be deleted
errorLink: E0000200
errorId: oaeAdRqprFuTyKokyYPbURJkA
errorCauses: []
ErrorDeviceAssuranceInUse:
summary: Can't delete device assurance policy in use by authentication policies
value:
errorSummary: Device assurance is in use and cannot be deleted.
errorId: oaenwA1ra80S9W-pvbh4m6haA
errorCauses: []
ErrorDeviceCheckInUse:
summary: Can't delete device check in use by device assurance policies
value:
errorSummary: Device check is in use and can't be deleted.
errorId: oaenwA1ra80S9W-pvbh4m6haA
errorCauses: []
ErrorEmailCustomizationCannotClearDefault:
value:
errorCode: E0000185
errorSummary: The isDefault parameter of the default email template customization
can't be set to false.
errorLink: E0000185
errorId: oaejrB1fWL1S7mc-2KcG-SOtw
errorCauses: []
ErrorEmailCustomizationCannotDeleteDefault:
value:
errorCode: E0000184
errorSummary: A default email template customization can't be deleted.
errorLink: E0000184
errorId: oaeAdRqprFuTyKokyYPbURJkA
errorCauses: []
ErrorEmailCustomizationDefaultAlreadyExists:
value:
errorCode: E0000182
errorSummary: A default email template customization already exists.
errorLink: E0000182
errorId: oaeXYwTiMvASsC3O4HCzjFaCA
errorCauses: []
ErrorEmailCustomizationLanguageAlreadyExists:
value:
errorCode: E0000183
errorSummary: An email template customization for that language already exists.
errorLink: E0000183
errorId: oaeUcGELffqRay0u1OPdnPypw
errorCauses: []
ErrorEmailDomainAlreadyExists:
value:
errorCode: E0000197
errorSummary: Email domain already exists.
errorLink: E0000197
errorId: oaeEdRqprFuTyKokyYPbURJkA
errorCauses: []
ErrorEmailDomainInUse:
value:
errorCode: E0000216
errorSummary: Email domain can't be deleted due to mail provider restrictions.
errorLink: E0000216
errorId: oaeEdRqprFuTyKokyYPbURJkB
errorCauses: []
ErrorEmailDomainInvalidStatus:
value:
errorCode: E0000217
errorSummary: Invalid status. Can't validate email domain with current status.
errorLink: E0000217
errorId: oaeEdRqprFuTyKokyYPbURJkD
errorCauses: []
ErrorEmailDomainNotVerified:
value:
errorCode: E0000218
errorSummary: Email domain couldn't be verified by mail provider.
errorLink: E0000218
errorId: oaeEdRqprFuTyKokyYPbURJkC
errorCauses: []
ErrorInternalServer:
summary: Internal Server Error
value:
errorCode: E0000009
errorSummary: Internal Server Error
errorLink: E0000000
errorId: sampleAlJ82XS2SDB_vaNIWgcA
errorCauses: []
ErrorInvalidEmailTemplateRecipients:
value:
errorCode: E0000189
errorSummary: This template does not support the recipients value.
errorLink: E0000189
errorId: oae8L1-UkcNTeGi5xVQ28_lww
errorCauses: []
ErrorInvalidLinkedObjectDef:
summary: Invalid linked objection definition
value:
errorCode: E0000127
errorSummary: Invalid linked objection definition. Linked object identifier
is already in use.
errorLink: E0000127
errorId: oaeh5FICFF2RnqakoNofPadhw
errorCauses:
- errorSummary: Linked object identifier for primary is already in use.
reason: UNIQUE_CONSTRAINT
locationType: body
domain: linkedObjects
- errorSummary: Linked object identifier for associated is already in use.
reason: UNIQUE_CONSTRAINT
locationType: body
domain: linkedObjects
ErrorInvalidTokenProvided:
summary: Invalid Token Provided
value:
errorCode: E0000011
errorSummary: Invalid token provided
errorLink: E0000011
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses: []
ErrorKeyCredentialCloneDuplicateKey:
summary: Duplicate key credential error
value:
errorCode: E0000001
errorSummary: "Api validation failed: cloneKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: Key already exists in the list of key credentials for the
target app.
ErrorKeyCredentialInvalidValidity:
summary: Key credential invalid year error
value:
errorCode: E0000001
errorSummary: "Api validation failed: generateKey"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: Validity years out of range. It should be 2 - 10 years.
ErrorMaxNumberOfSecrets:
summary: Maximum client secrets reached error
value:
errorCode: E0000001
errorSummary: "Api validation failed: OAuth2ClientSecretMediated"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: You've reached the maximum number of client secrets per client.
ErrorMissingRequiredParameter:
summary: Missing Required Parameter
value:
errorCode: E0000028
errorSummary: The request is missing a required parameter.
errorLink: E0000028
errorId: sampleiCF-l7mr9XqM1NQ
errorCauses: []
ErrorNoConnectedAgents:
value:
errorCode: E0000236
errorSummary: There are no connected agents.
errorLink: E0000236
errorId: sampleMlLvGUj_YD5v16vkYWY
errorCauses: []
ErrorPinOrCredRequestsGenerationFailure:
summary: PIN or Cred Requests Generation Failed
value:
errorCode: E0000001
errorSummary: "Api validation failed: pinRequest|credRequests"
errorLink: E0000001
errorId: oaehk3rssXQmOWDRsaFfxe8A
errorCauses:
errorSummary: There was a problem generating the pinRequest|credRequests.
ErrorPinOrCredResponsesProcessingFailure:
summary: PIN or Cred Response Processing Failed
value:
errorCode: E0000001
errorSummary: "Api validation failed: pinResponse|credResponses"
errorLink: E0000001
errorId: oaehk3rssXQmOWDRsaFfxe8B
errorCauses:
errorSummary: There was a problem generating the pinResponse|credResponses.
ErrorPublishCSRCertDoesNotMatchCSR:
summary: Mismatch certificate and CSR error
value:
errorCode: E0000001
errorSummary: "Api validation failed: certificate"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: The certificate doesn't match the CSR.
ErrorPublishCSRCertValidityLessThan90Days:
summary: Certificate valid for 90 days error
value:
errorCode: E0000001
errorSummary: "Api validation failed: certificate"
errorLink: E0000001
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses:
- errorSummary: The certificate must be valid for more than 90 days.
ErrorPushProviderUsedByCustomAppAuthenticator:
value:
errorCode: E0000187
errorSummary: Cannot delete push provider because it is being used by a custom
app authenticator.
errorLink: E0000187
errorId: oaenwA1ra80S9W-pvbh4m6haA
errorCauses: []
ErrorResourceNotFound:
summary: Resource Not Found
value:
errorCode: E0000007
errorSummary: "Not found: {0}"
errorLink: E0000007
errorId: sampleMlLvGUj_YD5v16vkYWY
errorCauses: []
ErrorTooManyRequests:
summary: Too Many Requests
value:
errorCode: E0000047
errorSummary: API call exceeded rate limit due to too many requests.
errorLink: E0000047
errorId: sampleQPivGUj_ND5v78vbYWW
errorCauses: []
ExampleOAuth2Scope:
summary: Example scope
value:
id: scp5yu8kLOnDzo7lh0g4
name: car:drive
description: Drive car
system: false
default: false
displayName: Saml Jackson
consent: REQUIRED
optional: false
metadataPublish: NO_CLIENTS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/scp5yu8kLOnDzo7lh0g4"
hints:
allow:
- GET
- PUT
- DELETE
ExampleOAuth2Scopes:
summary: All scopes
value:
- id: scp5yu8kLOnDzo7lh0g4
name: car:drive
description: Drive car
system: false
default: false
displayName: Saml Jackson
consent: REQUIRED
optional: false
metadataPublish: NO_CLIENTS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/scp5yu8kLOnDzo7lh0g4"
hints:
allow:
- GET
- PUT
- DELETE
ExpirePwdResponse:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: PASSWORD_EXPIRED
created: 2013-06-24T16:39:18.000Z
activated: 2013-06-24T16:39:19.000Z
statusChanged: 2013-06-24T16:39:19.000Z
lastLogin: 2013-06-24T17:39:19.000Z
lastUpdated: 2013-06-27T16:35:28.000Z
passwordChanged: 2013-06-24T16:39:19.000Z
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password: {}
recovery_question:
question: Who's a major player in the cowboy scene?
provider:
type: OKTA
name: OKTA
_links:
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/reset_password"
resetFactors:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/reset_factors"
expirePassword:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/expire_password"
forgotPassword:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/credentials/forgot_password"
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/credentials/change_recovery_question"
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/deactivate"
changePassword:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/credentials/change_password"
ExpirePwdWithTempPwdResponse:
value:
tempPassword: F46gy7X4
ExpiredAuthorizationServerKey:
summary: Expired Authorization Server Key
value:
status: EXPIRED
alg: RS256
e: AQAB
"n": lC4ehVB6W0OCtNPnz8udYH9Ao83B6EKnHA5eTcMOap_lQZ-nKtS1lZwBj4wXRVc1XmS0d2OQFA1VMQ-dHLDE3CiGfsGqWbaiZFdW7U
GLO1nAwfDdH6xp3xwpKOMewDXbAHJlXdYYAe2ap - CE9c5WLTUBU6JROuWcorHCNJisj1aExyiY5t3JQQVGpBz2oUIHo7NRzQoKimvp
dMvMzcYnTlk1dhlG11b1GTkBclprm1BmOP7Ltjd7aEumOJWS67nKcAZzl48Zyg5KtV11V9F9dkGt25qHauqFKL7w3wu
- DYhT0hmyFc wn - tXS6e6HQbfHhR_MQxysLtDGOk2ViWv8AQ
kid: h5Sr3LXcpQiQlAUVPdhrdLFoIvkhRTAVs_h39bQnxlU
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/h5Sr3LXcpQiQlAUVPdhrdLFoIvkhRTAVs_h39bQnxlU"
hints:
allow:
- GET
FacebookIdPResponse:
summary: Facebook Identity Provider
value:
id: 0oa62b57p7c8PaGpU0h7
type: FACEBOOK
name: Facebook
status: ACTIVE
created: 2016-03-24T23:18:27.000Z
lastUpdated: 2016-03-24T23:18:27.000Z
protocol:
type: OAUTH2
endpoints:
authorization:
url: https://www.facebook.com/dialog/oauth
binding: HTTP-REDIRECT
token:
url: https://graph.facebook.com/v2.5/oauth/access_token
binding: HTTP-POST
scopes:
- public_profile
- email
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: |-
https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62b57p7c8PaGpU0h7&
client_id={clientId}&response_type={responseType}&response_mode={responseMode}&
scope={scopes}&redirect_uri={redirectUri}&state={state}
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
FactorEmail:
value:
id: emfnf3gSScB8xXoXK0g3
factorType: email
provider: OKTA
vendorName: OKTA
status: ACTIVE
profile:
email: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3/factors/emfnf3gSScB8xXoXK0g3"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00umvfJKwXOQ1mEL50g3"
hints:
allow:
- GET
FactorPasscodeRequest:
value:
passCode: "123456"
FactorResponseSms:
value:
id: sms2gt8gzgEBPUWBIFHN
factorType: sms
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-06-27T20:27:26.000Z
lastUpdated: 2014-06-27T20:27:26.000Z
profile:
phoneNumber: +1-555-415-1337
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms2gt8gzgEBPUWBIFHN/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms2gt8gzgEBPUWBIFHN"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ForgotPwdRecoveryQuestionRequest:
value:
password:
value: "uTVM,TPw55"
recovery_question:
answer: Annie Oakley
ForgotPwdRecoveryQuestionResponse:
value:
password: {}
recovery_question:
question: Who's a major player in the cowboy scene?
provider:
type: OKTA
name: OKTA
ForgotPwdResponse:
value:
resetPasswordUrl: "https://{yourOktaDomain}/signin/reset-password/XE6wE17zmphl3KqAPFxO"
GenericOidcIdpResponse:
summary: Generic OpenID Connect Identity Provider
value:
id: 0oaulob4BFVa4zQvt0g3
type: OIDC
name: Example OpenID Connect IdP
status: ACTIVE
created: 2019-02-07T20:07:47.000Z
lastUpdated: 2019-02-07T20:07:47.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://idp.example.com/authorize
binding: HTTP-REDIRECT
token:
url: https://idp.example.com/token
binding: HTTP-POST
userInfo:
url: https://idp.example.com/userinfo
binding: HTTP-REDIRECT
jwks:
url: https://idp.example.com/keys
binding: HTTP-REDIRECT
algorithms:
request:
signature:
algorithm: HS256
scope: REQUEST
scopes:
- openid
issuer:
url: https://idp.example.com
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
pkce_required: "true"
policy:
provisioning:
action: AUTO
profileMaster: false
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.email
filter: null
matchType: USERNAME
matchAttribute: null
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oaulob4BFVa4zQvt0g3&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}&nonce={nonce}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
GetApplicationsByGroupResponseEx:
summary: Retrieve apps assigned to a group
value:
- id: 0oa7vicdkRNrz59R80w6
name: workday
label: hrportal2
status: ACTIVE
lastUpdated: 2021-05-17T23:10:50.000Z
created: 2021-05-17T23:10:49.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
signing:
kid: wRejFXWxFlK9nnLozx5qKWQa3fg-JRXw7dvdlTjs5Pg
settings:
app:
siteURL: https://acme.workday.com
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: null
ssoAcsUrlOverride: null
audienceOverride: null
recipientOverride: null
destinationOverride: null
attributeStatements: []
_links:
help:
href: https://testorgone-admin.okta.com/app/workday/0oa7vicdkRNrz59R80w6/setup/help/SAML_2_0/external-doc
type: text/html
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/sso/saml/metadata
type: application/xml
appLinks:
- name: login
href: https://testorgone.okta.com/home/workday/0oa7vicdkRNrz59R80w6/30
type: text/html
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/groups
logo:
- name: medium
href: https://tc2static.oktacdn.com/fs/bcg/4/gfs1wwhrwJR4LpB5X0w6
type: image/png
users:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/lifecycle/deactivate
- id: 0oa7vicvor8YSr9Hc0w6
name: workday
label: hrportal1
status: ACTIVE
lastUpdated: 2021-05-17T23:10:22.000Z
created: 2021-05-17T23:10:22.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
signing:
kid: wRejFXWxFlK9nnLozx5qKWQa3fg-JRXw7dvdlTjs5Pg
settings:
app:
siteURL: https://acme.workday.com
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: null
ssoAcsUrlOverride: null
audienceOverride: null
recipientOverride: null
destinationOverride: null
attributeStatements: []
_links:
help:
href: https://testorgone-admin.okta.com/app/workday/0oa7vicvor8YSr9Hc0w6/setup/help/SAML_2_0/external-doc
type: text/html
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/sso/saml/metadata
type: application/xml
appLinks:
- name: login
href: https://testorgone.okta.com/home/workday/0oa7vicvor8YSr9Hc0w6/30
type: text/html
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/groups
logo:
- name: medium
href: https://tc2static.oktacdn.com/fs/bcg/4/gfs1wwhrwJR4LpB5X0w6
type: image/png
users:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/lifecycle/deactivate
- id: 0oabkvBLDEKCNXBGYUAS
name: template_swa
label: Sample Plugin App
status: ACTIVE
lastUpdated: 2013-09-11T17:58:54.000Z
created: 2013-09-11T17:46:08.000Z
accessibility:
selfService: false
errorRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
settings:
app:
buttonField: btn-login
passwordField: txtbox-password
usernameField: txtbox-username
url: https://example.com/login.html
_links:
logo:
- href: https:/example.okta.com/img/logos/logo_1.png
name: medium
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/users"
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/groups"
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/lifecycle/deactivate"
GetApplicationsByKeyResponseEx:
summary: Retrieve apps using a key
value:
- id: 0oa1gjh63g214q0Hq0g4
name: testorgone_customsaml20app_1
label: Custom Saml 2.0 App
status: ACTIVE
lastUpdated: 2016-08-09T20:12:19.000Z
created: 2016-08-09T20:12:19.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
testorgone_customsaml20app_1_link: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${fn:substringBefore(source.login, \"@\")}"
type: BUILT_IN
signing: {}
settings:
app: {}
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: ""
ssoAcsUrl: "https://{yourOktaDomain}"
idpIssuer: "https://www.okta.com/${org.externalKey}"
audience: https://example.com/tenant/123
recipient: https://recipient.okta.com
destination: https://destination.okta.com
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
slo:
enabled: true
spIssuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
participateSlo:
enabled: true
logoutRequestUrl: https://testorgone.okta.com/logout/participate
sessionIndexRequired: true
bindingType: REDIRECT
spCertificate:
x5c:
- "MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\r\
\n"
requestCompressed: false
allowMultipleAcsEndpoints: false
acsEndpoints: []
attributeStatements: []
_links:
logo:
- name: medium
href: https://testorgone.okta.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png
type: image/png
appLinks:
- name: testorgone_customsaml20app_1_link
href: https://testorgone.okta.com/home/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/aln1gofChJaerOVfY0g4
type: text/html
help:
href: https://testorgone-admin.okta.com/app/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/setup/help/SAML_2_0/instructions
type: text/html
users:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/lifecycle/deactivate
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/groups
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/sso/saml/metadata
type: application/xml
_embedded:
user:
id: 00ucw2RPGIUNTDQOYPOF
externalId: null
created: 2014-03-21T23:31:35.000Z
lastUpdated: 2014-03-21T23:31:35.000Z
scope: USER
status: ACTIVE
statusChanged: 2014-03-21T23:31:35.000Z
passwordChanged: null
syncState: DISABLED
lastSync: null
credentials:
userName: [email protected]
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabizCHPNYALCHDUIOD"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ucw2RPGIUNTDQOYPOF"
id: 0oabkvBLDEKCNXBGYUAS
name: template_swa
label: Sample Plugin App
status: ACTIVE
lastUpdated: 2013-09-11T17:58:54.000Z
created: 2013-09-11T17:46:08.000Z
accessibility:
selfService: false
errorRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
settings:
app:
buttonField: btn-login
passwordField: txtbox-password
usernameField: txtbox-username
url: https://example.com/login.html
_links:
logo:
- href: https://example.okta.com/img/logos/logo_1.png
name: medium
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/users"
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/groups"
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/lifecycle/deactivate"
_embedded:
user:
id: 00ucw2RPGIUNTDQOYPOF
externalId: null
created: 2014-06-10T15:16:01.000Z
lastUpdated: 2014-06-10T15:17:38.000Z
scope: USER
status: ACTIVE
statusChanged: 2014-06-10T15:16:01.000Z
passwordChanged: 2014-06-10T15:17:38.000Z
syncState: DISABLED
lastSync: null
credentials:
userName: [email protected]
password: {}
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ucw2RPGIUNTDQOYPOF"
GetApplicationsByNameResponseEx:
summary: Retrieve apps by name
value:
- id: 0oa7vicdkRNrz59R80w6
name: workday
label: hrportal2
status: ACTIVE
lastUpdated: 2021-05-17T23:10:50.000Z
created: 2021-05-17T23:10:49.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
signing:
kid: wRejFXWxFlK9nnLozx5qKWQa3fg-JRXw7dvdlTjs5Pg
settings:
app:
siteURL: https://acme.workday.com
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: null
ssoAcsUrlOverride: null
audienceOverride: null
recipientOverride: null
destinationOverride: null
attributeStatements: []
_links:
help:
href: https://testorgone-admin.okta.com/app/workday/0oa7vicdkRNrz59R80w6/setup/help/SAML_2_0/external-doc
type: text/html
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/sso/saml/metadata
type: application/xml
appLinks:
- name: login
href: https://testorgone.okta.com/home/workday/0oa7vicdkRNrz59R80w6/30
type: text/html
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/groups
logo:
- name: medium
href: https://tc2static.oktacdn.com/fs/bcg/4/gfs1wwhrwJR4LpB5X0w6
type: image/png
users:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicdkRNrz59R80w6/lifecycle/deactivate
- id: 0oa7vicvor8YSr9Hc0w6
name: workday
label: hrportal1
status: ACTIVE
lastUpdated: 2021-05-17T23:10:22.000Z
created: 2021-05-17T23:10:22.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
signing:
kid: wRejFXWxFlK9nnLozx5qKWQa3fg-JRXw7dvdlTjs5Pg
settings:
app:
siteURL: https://acme.workday.com
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: null
ssoAcsUrlOverride: null
audienceOverride: null
recipientOverride: null
destinationOverride: null
attributeStatements: []
_links:
help:
href: https://testorgone-admin.okta.com/app/workday/0oa7vicvor8YSr9Hc0w6/setup/help/SAML_2_0/external-doc
type: text/html
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/sso/saml/metadata
type: application/xml
appLinks:
- name: login
href: https://testorgone.okta.com/home/workday/0oa7vicvor8YSr9Hc0w6/30
type: text/html
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/groups
logo:
- name: medium
href: https://tc2static.oktacdn.com/fs/bcg/4/gfs1wwhrwJR4LpB5X0w6
type: image/png
users:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa7vicvor8YSr9Hc0w6/lifecycle/deactivate
GetApplicationsByUserResponseEx:
summary: Retrieve apps assigned to a user
value:
- id: 0oa1gjh63g214q0Hq0g4
name: testorgone_customsaml20app_1
label: Custom Saml 2.0 App
status: ACTIVE
lastUpdated: 2016-08-09T20:12:19.000Z
created: 2016-08-09T20:12:19.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
testorgone_customsaml20app_1_link: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${fn:substringBefore(source.login, \"@\")}"
type: BUILT_IN
signing: {}
settings:
app: {}
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: ""
ssoAcsUrl: "https://{yourOktaDomain}"
idpIssuer: "https://www.okta.com/${org.externalKey}"
audience: https://example.com/tenant/123
recipient: https://recipient.okta.com
destination: https://destination.okta.com
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
slo:
enabled: true
spIssuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
participateSlo:
enabled: true
logoutRequestUrl: https://testorgone.okta.com/logout/participate
sessionIndexRequired: true
bindingType: REDIRECT
spCertificate:
x5c:
- "MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\r\
\n"
requestCompressed: false
allowMultipleAcsEndpoints: false
acsEndpoints: []
attributeStatements: []
_links:
logo:
- name: medium
href: https://testorgone.okta.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png
type: image/png
appLinks:
- name: testorgone_customsaml20app_1_link
href: https://testorgone.okta.com/home/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/aln1gofChJaerOVfY0g4
type: text/html
help:
href: https://testorgone-admin.okta.com/app/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/setup/help/SAML_2_0/instructions
type: text/html
users:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/lifecycle/deactivate
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/groups
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/sso/saml/metadata
type: application/xml
_embedded:
user:
id: 00ucw2RPGIUNTDQOYPOF
externalId: null
created: 2014-03-21T23:31:35.000Z
lastUpdated: 2014-03-21T23:31:35.000Z
scope: USER
status: ACTIVE
statusChanged: 2014-03-21T23:31:35.000Z
passwordChanged: null
syncState: DISABLED
lastSync: null
credentials:
userName: [email protected]
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabizCHPNYALCHDUIOD"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ucw2RPGIUNTDQOYPOF"
id: 0oabkvBLDEKCNXBGYUAS
name: template_swa
label: Sample Plugin App
status: ACTIVE
lastUpdated: 2013-09-11T17:58:54.000Z
created: 2013-09-11T17:46:08.000Z
accessibility:
selfService: false
errorRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: BROWSER_PLUGIN
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
settings:
app:
buttonField: btn-login
passwordField: txtbox-password
usernameField: txtbox-username
url: https://example.com/login.html
_links:
logo:
- href: https://example.okta.com/img/logos/logo_1.png
name: medium
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/users"
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/groups"
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS/lifecycle/deactivate"
_embedded:
user:
id: 00ucw2RPGIUNTDQOYPOF
externalId: null
created: 2014-06-10T15:16:01.000Z
lastUpdated: 2014-06-10T15:17:38.000Z
scope: USER
status: ACTIVE
statusChanged: 2014-06-10T15:16:01.000Z
passwordChanged: 2014-06-10T15:17:38.000Z
syncState: DISABLED
lastSync: null
credentials:
userName: [email protected]
password: {}
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabkvBLDEKCNXBGYUAS"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ucw2RPGIUNTDQOYPOF"
GetApplicationsResponseEx:
summary: Retrieve an app
value:
id: 0oa1gjh63g214q0Hq0g4
name: testorgone_customsaml20app_1
label: Custom Saml 2.0 App
status: ACTIVE
lastUpdated: 2016-08-09T20:12:19.000Z
created: 2016-08-09T20:12:19.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
testorgone_customsaml20app_1_link: true
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${fn:substringBefore(source.login, \"@\")}"
type: BUILT_IN
signing: {}
settings:
app: {}
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
signOn:
defaultRelayState: ""
ssoAcsUrl: "https://{yourOktaDomain}"
idpIssuer: "https://www.okta.com/${org.externalKey}"
audience: https://example.com/tenant/123
recipient: https://recipient.okta.com
destination: https://destination.okta.com
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
slo:
enabled: true
spIssuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
participateSlo:
enabled: true
logoutRequestUrl: https://testorgone.okta.com/logout/participate
sessionIndexRequired: true
bindingType: REDIRECT
spCertificate:
x5c:
- "MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\r\
\n"
requestCompressed: false
allowMultipleAcsEndpoints: false
acsEndpoints: []
attributeStatements: []
inlineHooks:
- id: cal3ughy17pylLxQB357
_links:
self:
href: "https://{yourOktaDomain}/api/v1/inlineHooks/cal3ughy17pylLxQB357"
hints:
allow:
- GET
- PUT
- DELETE
_links:
logo:
- name: medium
href: https://testorgone.okta.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png
type: image/png
appLinks:
- name: testorgone_customsaml20app_1_link
href: https://testorgone.okta.com/home/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/aln1gofChJaerOVfY0g4
type: text/html
help:
href: https://testorgone-admin.okta.com/app/testorgone_customsaml20app_1/0oa1gjh63g214q0Hq0g4/setup/help/SAML_2_0/instructions
type: text/html
users:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/users
deactivate:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/lifecycle/deactivate
groups:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/groups
metadata:
href: https://testorgone.okta.com/api/v1/apps/0oa1gjh63g214q0Hq0g4/sso/saml/metadata
type: application/xml
GetAssociatedLinkedObjectsResponse:
summary: Retrieve all associated Linked Object values response
value:
- _links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u5zex6ztMbOZhF50h7"
- _links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u1tsf0nQKavLDUh0g5"
GetBrandResponse:
value:
id: bnd114iNkrcN6aR680g4
agreeToCustomPrivacyPolicy: false
removePoweredByOkta: false
customPrivacyPolicyUrl: null
name: Okta Default
isDefault: true
locale: en
emailDomainId: OeD114iNkrcN6aR680g4
defaultApp:
appInstanceId: 0oa114iNkrcN6aR680g4
appLinkName: null
classicApplicationUri: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
- DELETE
themes:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4/themes"
hints:
allow:
- GET
emailDomain:
href: "https://{yourOktaDomain}/api/v1/email-domains/OeD114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
GetEmailTemplateResponse:
value:
name: UserActivation
_embedded:
customizationCount: 0
settings:
recipients: ALL_USERS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/settings"
hints:
allow:
- GET
- PUT
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
settings:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/settings"
hints:
allow:
- GET
- PUT
defaultContent:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/default-content"
hints:
allow:
- GET
customizations:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations"
hints:
allow:
- GET
- POST
- DELETE
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
GetPrimaryLinkedObjectResponse:
summary: Retrieve primary Linked Object value response
value:
- _links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7"
GetRealmAssignmentResponse:
value:
id: rul2jy7jLUlnO3ng00g4
status: ACTIVE
name: Realm Assignment 1
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: false
conditions:
profileSourceId: 0oa4enoRyjwSCy5hx0g4
expression:
value: string
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf0g5
priority: 0
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realm-assignments/rul2jy7jLUlnO3ng00g4
method: GET
GetRoleAssignmentGovernanceGrantResources:
value:
resources:
- resource: orn:okta:directory:00ozmkUsqWxsUxhGO0g3:groups:00g114290ar1oCC5A0g5
label: test-group-1
- resource: orn:okta:directory:00ozmkUsqWxsUxhGO0g3:groups:00g118990hl1oCC5B0g5
label: test-group-2
_links:
next:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai2556vZgWesWf10g4/resources?after=orn:okta:directory:00ozmkUsqWxsUxhGO0g3:groups:00g118990hl1oCC5A0g5"
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai2556vZgWesWf10g4/resources"
GetRoleAssignmentGovernanceGrantResponse:
value:
type: ENTITLEMENT-BUNDLE
grantId: grai2556vZgWesWf10g4
bundleId: enbhz2pAwtts9UBes0g4
expirationDate: 2024-12-09 14:17:22.0
_links:
resources:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai2556vZgWesWf10g4/resources"
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai2556vZgWesWf10g4"
GetSessionResponse:
value:
id: aps1qqonvr2SZv6o70h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: CREATED
importType: INCREMENTAL
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T16:15:44.000Z
GetThemeResponse:
value:
id: thdul904tTZ6kWVhP0g3
logo: "https://{yourOktaDomain}/assets/img/logos/okta-logo.47066819ac7db5c13f4c431b2687cef6.png"
favicon: "https://{yourOktaDomain}/favicon.ico"
backgroundImage: null
primaryColorHex: '#1662dd'
primaryColorContrastHex: '#000000'
secondaryColorHex: '#ebebed'
secondaryColorContrastHex: '#000000'
signInPageTouchPointVariant: OKTA_DEFAULT
endUserDashboardTouchPointVariant: OKTA_DEFAULT
errorPageTouchPointVariant: OKTA_DEFAULT
emailTemplateTouchPointVariant: OKTA_DEFAULT
loadingPageTouchPointVariant: OKTA_DEFAULT
GetUseRoleGovernanceResponse:
value:
grants:
- type: CUSTOM
grantId: grai24zWTjnDazeOI0g4
_links:
resources:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai24zWTjnDazeOI0g4/resources"
- type: ENTITLEMENT-BUNDLE
grantId: grai2556vZgWesWf10g4
bundleId: enbhz2pAwtts9UBes0g4
expirationDate: 2024-12-09 14:17:22.0
_links:
resources:
href: "https://{yourOktaDomain}//api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance/grai2556vZgWesWf10g4/resources"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5/roles/KVJUKUS7IFCE2SKO/governance"
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00u15r0i2hC4jeTne0g5\""
GetUserLinkedObjectResponse:
summary: Retrieve User Linked Object value
value:
- _links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7"
GetUserResponse:
summary: Retrieve a user type response
value:
id: otyfnly5cQjJT9PnR0g4
displayName: New User Type
name: newUserType
description: A new custom user type
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
GetYubikeyOptTokenResponse:
summary: Get Yubikey OPT Token response
value:
id: ykkxdtCA1fKVxyu6R0g3
created: 2020-06-09T23:42:05.000Z
activated: 2020-06-09T23:47:29.000Z
lastVerified: 2020-06-09T23:47:29.000Z
lastUpdated: 2020-06-09T23:47:29.000Z
status: ACTIVE
profile:
serial: "000009508427"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/org/factors/yubikey_token/tokens/ykkxdtCA1fKVxyu6R0g3"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00uu0x8sxTr9HcHOo0g3"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00uu0x8sxTr9HcHOo0g3/factors/ykfxduQAhl89YyPrV0g3"
hints:
allow:
- DELETE
GoogleIdPResponse:
summary: Google Identity Provider
value:
id: 0oa62bfdiumsUndnZ0h7
type: GOOGLE
name: Google
status: ACTIVE
created: 2016-03-24T23:21:49.000Z
lastUpdated: 2016-03-24T23:21:49.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://accounts.google.com/o/oauth2/auth
binding: HTTP-REDIRECT
token:
url: https://www.googleapis.com/oauth2/v3/token
binding: HTTP-POST
scopes:
- profile
- email
- openid
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: |-
https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62bfdiumsUndnZ0h7&
client_id={clientId}&response_type={responseType}&response_mode={responseMode}&
scope={scopes}&redirect_uri={redirectUri}&state={state}
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
GovernanceBundle:
summary: Governance Bundle
value:
id: 0bbfxqCAJWWGELFTYAAA
name: Group admin bundle
description: Group bundle for administrative access
status: ACTIVE
orn: orn:okta:governance:00o5rb5mt2H3d1TJd0h7:bundles:0bbfxqCAJWWGELFTYAAA
_links:
self: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA
entitlements: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA/entitlements
GovernanceBundleCreateRequestCustomRole:
summary: Create governance bundle with custom role
value:
name: Custom admin bundle
description: Custom bundle for administrative access
entitlements:
role: cr0WxyzJxGIr0ouum0g4
resourceSets:
- iamoJDFKaJxGIr0oamd9g
GovernanceBundleCreateRequestScopedStandardRole:
summary: Create governance bundle with scoped standard role
value:
name: Group admin bundle
description: Group bundle for administrative access
entitlements:
role: GROUP_MEMBERSHIP_ADMIN
targets:
- 00guaxWZ0AOa5NFAj0g3
GovernanceBundleCreateRequestStandardRole:
summary: Create governance bundle with non-scoped standard role
value:
name: Group admin bundle
description: Group bundle for administrative access
entitlements:
role: GROUP_MEMBERSHIP_ADMIN
GovernanceBundleUpdateRequestCustomRole:
summary: Update governance bundle with custom role
value:
name: Custom admin bundle
description: Custom bundle for administrative access
entitlements:
role: cr0WxyzJxGIr0ouum0g4
resourceSets:
- iamoJDFKaJxGIr0oamd9g
GovernanceBundleUpdateRequestScopedStandardRole:
summary: Update governance bundle with scoped standard role
value:
name: Group admin bundle
description: Group bundle for administrative access
entitlements:
role: GROUP_MEMBERSHIP_ADMIN
targets:
- 00guaxWZ0AOa5NFAj0g3
GovernanceBundleUpdateRequestStandardRole:
summary: Update governance bundle with non-scoped standard role
value:
name: Group admin bundle
description: Group bundle for administrative access
entitlements:
role: GROUP_MEMBERSHIP_ADMIN
GovernanceBundlesResponse:
summary: List of governance bundles
value:
bundles:
- id: 0bbfxqCAJWWGELFTYAAA
name: Group admin bundle
description: Group bundle for administrative access
status: ACTIVE
orn: orn:okta:governance:00o5rb5mt2H3d1TJd0h7:bundles:0bbfxqCAJWWGELFTYAAA
_links:
entitlements: http://your-subdomain.okta.com/api/v1/iam/governance/bundles/0bbfxqCAJWWGELFTYAAA/entitlements
_links:
self:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles?limit=2&after=10
next:
href: http://your-subdomain.okta.com/api/v1/iam/governance/bundles?after=bundleId12
GroupAssignmentExListResponse:
summary: Application Groups list with embedded metadata
value:
- id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-02T13:17:57.000Z
profile:
preferredLanguage: English
manager: Donald Glover
securityQuestion: Who is the footballer to have played the game
securityAnswer: Ronaldinho
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: wazobia
userType: null
department: marketing
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
_embedded:
metadata:
credentials: {}
profile:
division:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
preferredLanguage:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
manager:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
securityQuestion:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
securityAnswer:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
timezone:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
organization:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
initialStatus:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
managerId:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
userType:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
locale:
source:
type: USER
value:
- id: 00uzojLwDGgUynjJS0g3
self:
href: "http://{yourOktaDomain}/api/v1/users/00uzojLwDGgUynjJS0g3"
lastUpdated: null
department:
source:
type: MAPPING
value:
- id: null
lastUpdated: null
GroupAssignmentExResponse:
summary: Application Group response
value:
id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-02T13:17:57.000Z
profile:
preferredLanguage: English
manager: Donald Glover
securityQuestion: Who is the footballer to have played the game
securityAnswer: Ronaldinho
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: wazobia
userType: null
department: marketing
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
GroupAssignmentPatchRequestExample:
summary: Update app group request
value:
- op: replace
path: /profile/manager
value: Carlo Ancelotti
GroupAssignmentPatchResponseExample:
summary: Update Application Group response
value:
id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-03T13:42:20.000Z
profile:
preferredLanguage: English
securityQuestion: Who is the footballer to have played the game
securityAnswer: Jay Jay Okocha
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: null
userType: null
department: Accounting
manager: Carlo Ancelotti
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
GroupAssignmentPutRequestExample:
summary: Assign Application Group request
value:
id: 00g15acRUy0SYb9GT0g4
profile:
preferredLanguage: English
manager: Arsene Wenger
securityQuestion: Who is the footballer to have played the game
securityAnswer: Jay Jay Okocha
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: null
userType: null
department: Accounting
GroupAssignmentPutResponseExample:
summary: Assign Application Group response
value:
id: 00g15acRUy0SYb9GT0g4
priority: 0
lastUpdated: 2024-06-03T13:52:07.000Z
profile:
preferredLanguage: English
manager: Arsene Wenger
securityQuestion: Who is the footballer to have played the game
securityAnswer: Jay Jay Okocha
timezone: Canada/Eastern
initialStatus: active_with_pass
managerId: [email protected]
locale: en_US
division: top
organization: null
userType: null
department: Accounting
_links:
app:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4"
self:
href: "http://{yourOktaDomain}/api/v1/apps/0oa15anjcUHSI6hTB0g4/groups/00g15acRUy0SYb9GT0g4"
group:
href: "http://{yourOktaDomain}/api/v1/groups/00g15acRUy0SYb9GT0g4"
GroupSchemaAddRequest:
value:
definitions:
custom:
id: '#custom'
type: object
properties:
groupContact:
title: Group administrative contact
description: Group administrative contact
type: string
required: false
minLength: 1
maxLength: 20
permissions:
- principal: SELF
action: READ_WRITE
required: []
GroupSchemaResponse:
value:
$schema: http://json-schema.org/draft-04/schema#
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/group/default"
method: GET
rel: self
created: 2021-01-30T00:18:24.000Z
definitions:
base:
id: '#base'
properties: {}
required:
- name
type: object
custom:
id: '#custom'
properties:
groupContact:
description: Group administrative contact
master:
type: PROFILE_MASTER
mutability: READ_WRITE
permissions:
- action: READ_WRITE
principal: SELF
scope: NONE
title: Group administrative contact
type: string
required: []
type: object
description: Okta group profile template
id: "https://{yourOktaDomain}/meta/schemas/group/default"
lastUpdated: 2021-02-25T23:05:31.000Z
name: group
properties:
profile:
allOf:
- $ref: '#/definitions/custom'
- $ref: '#/definitions/base'
title: Okta group
type: object
IAMStandardRoleResponseClient:
value:
id: irb4jlodtdN4yJ88b0g7
role: ACCESS_REQUESTS_ADMIN
label: Access Requests Administrator
type: ACCESS_REQUESTS_ADMIN
status: ACTIVE
created: 2023-07-06T21:52:48.000Z
lastUpdated: 2023-07-06T21:52:48.000Z
assignmentType: CLIENT
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/client/0oa5vymVNCe2cPEeZ0g4"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN/permissions"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_REQUESTS_ADMIN/members/irb4jlomnnDBuBDyJ0g7"
IAMStandardRoleResponseUser:
value:
id: irb1q92TFAHzySt3x0g4
role: ACCESS_REQUESTS_ADMIN
label: Access Requests Administrator
type: ACCESS_REQUESTS_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: USER
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_REQUESTS_ADMIN/permissions"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_REQUESTS_ADMIN/members/irb1q92TFAHzySt3x0g4"
IAMStandardRolesListResponse:
value:
- id: IFIFAX2BIRGUSTQ
label: Application Administrator
type: APP_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: irb1q92TFAHzySt3x0g4
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: USER
resource-set: iamoJDFKaJxGIr0oamd9g
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00u1gytb3XCr9Dkr18r2"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/cr0Yq6IJxGIr0ouum0g3/permissions"
- id: irb5e92YgBazyyQ3x1q5
role: ACCESS_CERTIFICATIONS_ADMIN
label: Access Certifications Administrator
type: ACCESS_CERTIFICATIONS_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: USER
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00u1gytb3XCr9Dkr18r2"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_CERTIFICATIONS_ADMIN/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_CERTIFICATIONS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/OKTA_IAM_TEST_DELIVERED_ROLE/permissions"
IAMStandardRolesListResponseClient:
value:
- id: irb5e92YgBazyyQ3x1q5
role: ACCESS_CERTIFICATIONS_ADMIN
label: Access Certifications Administrator
type: ACCESS_CERTIFICATIONS_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: CLIENT
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/clients/0oa4ee9vgbIuqTUvd0g7"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_CERTIFICATIONS_ADMIN/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_CERTIFICATIONS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/OKTA_IAM_TEST_DELIVERED_ROLE/permissionsZ"
IAMStandardRolesListResponseGroup:
value:
- id: irb5e92YgBazyyQ3x1q5
role: ACCESS_CERTIFICATIONS_ADMIN
label: Access Certifications Administrator
type: ACCESS_CERTIFICATIONS_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: Group
resource-set: ACCESS_CERTIFICATIONS_IAM_POLICY
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/ACCESS_CERTIFICATIONS_IAM_POLICY/bindings/ACCESS_CERTIFICATIONS_ADMIN/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/ACCESS_CERTIFICATIONS_ADMIN"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/OKTA_IAM_TEST_DELIVERED_ROLE/permissions"
IdPAppUserResponse:
summary: IdP User
value:
id: 00u5t60iloOHN9pBi0h7
externalId: externalId
created: 2017-12-19T17:30:16.000Z
lastUpdated: 2017-12-19T17:30:16.000Z
profile:
profileUrl: null
firstName: null
lastName: null
honorificSuffix: null
displayName: null
honorificPrefix: null
middleName: null
email: null
_links:
idp:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bfdiumsUndnZ0h7"
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bfdiumsUndnZ0h7/users/00u5t60iloOHN9pBi0h7"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7"
IdPKeyCredentialRequest:
summary: Identity Provider Key Credential
value:
e: "65537"
"n": "101438407598598116085679865987760095721749307901605456708912786847324207000576780508113360584555007890315805735307890113536927352312915634368993759211767770602174860126854831344273970871509573365292777620005537635317282520456901584213746937262823585533063042033441296629204165064680610660631365266976782082747"
x5c:
- MIIDnjCCAoagAwIBAgIGAVG3MN+PMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEUMBIGA1UECwwLU1NPUHJvdmlkZXIxEDAOBgNVBAMMB2V4YW1wbGUxHDAaBgkqhkiG9w0BCQEWDWluZm9Ab2t0YS5jb20wHhcNMTUxMjE4MjIyMjMyWhcNMjUxMjE4MjIyMzMyWjCBjzELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNVBAoMBE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRAwDgYDVQQDDAdleGFtcGxlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQG9rdGEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtcnyvuVCrsFEKCwHDenS3Ocjed8eWDv3zLtD2K/iZfE8BMj2wpTfn6Ry8zCYey3mWlKdxIybnV9amrujGRnE0ab6Q16v9D6RlFQLOG6dwqoRKuZy33Uyg8PGdEudZjGbWuKCqqXEp+UKALJHV+k4wWeVH8g5d1n3KyR2TVajVJpCrPhLFmq1Il4G/IUnPe4MvjXqB6CpKkog1+ThWsItPRJPAM+RweFHXq7KfChXsYE7Mmfuly8sDQlvBmQyxZnFHVuiPfCvGHJjpvHy11YlHdOjfgqHRvZbmo30+y0X/oY/yV4YEJ00LL6eJWU4wi7ViY3HP6/VCdRjHoRdr5L/DwIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQCzzhOFkvyYLNFj2WDcq1YqD4sBy1iCia9QpRH3rjQvMKDwQDYWbi6EdOX0TQ/IYR7UWGj+2pXd6v0t33lYtoKocp/4lUvT3tfBnWZ5KnObi+J2uY2teUqoYkASN7F+GRPVOuMVoVgm05ss8tuMb2dLc9vsx93sDt+XlMTv/2qi5VPwaDtqduKkzwW9lUfn4xIMkTiVvCpe0X2HneD2Bpuao3/U8Rk0uiPfq6TooWaoW3kjsmErhEAs9bA7xuqo1KKY9CdHcFhkSsMhoeaZylZHtzbnoipUlQKSLMdJQiiYZQ0bYL83/Ta9fulr1EERICMFt3GUmtYaZZKHpWSfdJp9
x5t#S256: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
IdPKeyCredentialResponse:
summary: Identity Provider Key Credential
value:
kid: your-key-id
created: 2016-01-03T18:15:47.000Z
lastUpdated: 2016-01-03T18:15:47.000Z
e: "65537"
"n": "101438407598598116085679865987760095721749307901605456708912786847324207000576780508113360584555007890315805735307890113536927352312915634368993759211767770602174860126854831344273970871509573365292777620005537635317282520456901584213746937262823585533063042033441296629204165064680610660631365266976782082747"
kty: RSA
use: sig
x5c:
- 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
x5t#S256: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
IdPSigningKeyCredentialResponse:
summary: Identity Provider Signing Key Credential
value:
created: 2015-12-10T18:56:23.000Z
expiresAt: 2017-12-10T18:56:22.000Z
kid: akm5hvbbevE341ovl0h7
kty: RSA
use: sig
x5c:
- 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
x5t#S256: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
InlineHookTelephony:
value:
channel:
type: HTTP
version: 1.0.0
config:
uri: https://your-external-webservice/sendOtp
headers: []
method: POST
authScheme:
type: HEADER
key: x-telephony-key
created: 2024-03-28T17:30:25.000Z
id: caldpyulr3nbET2du1d7
lastUpdated: 2024-05-07T16:35:18.000Z
name: testTelephonyHook
status: ACTIVE
type: com.okta.telephony.provider
version: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/inlineHooks/caldpyulr3nbET2du1d7"
execute:
href: "https://{yourOktaDomain}/api/v1/inlineHooks/caldpyulr3nbET2du1d7/execute"
hints:
allow":
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/inlineHooks/caldpyulr3nbET2du1d7/lifecycle/deactivate"
hints:
allow":
- POST
InvalidRotateUse:
summary: Invalid Use
value:
errorCode: E0000001
errorSummary: "Api validation failed: rotateKeys"
errorLink: E0000001
errorId: oaeprak9qKHRlaWiclJ4oPJRQ
errorCauses:
- errorSummary: Invalid value specified for key 'use' parameter
KeyCredentialExample:
summary: Key Credential example
value:
created: 2015-12-10T18:56:23.000Z
lastUpdated: 2024-08-13T18:26:57.000Z
expiresAt: 2017-12-10T18:56:22.000Z
x5c:
- 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
e: AQAB
"n": mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
kid: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
kty: RSA
use: sig
x5t#S256": 5GOpy9CQVtfvBmu2T8BHvpKE4OGtC3BuS046t7p9pps
LinkIdPAppUserResponse:
summary: Linked IdP User
value:
id: 00ub0oNGTSWTBKOLGLNR
externalId: "121749775026145"
created: 2017-03-30T02:19:51.000Z
lastUpdated: 2017-03-30T02:19:51.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62b57p7c8PaGpU0h7/users/00ub0oNGTSWTBKOLGLNR"
hints:
allow:
- GET
- DELETE
idp:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62b57p7c8PaGpU0h7"
user:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
ListAllKeyCredentialsExample:
summary: List all Key Credentials example
value:
- created: 2015-12-10T18:56:23.000Z
lastUpdated: 2024-08-13T18:26:57.000Z
expiresAt: 2017-12-10T18:56:22.000Z
x5c:
- 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
e: AQAB
"n": mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
kid: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
kty: RSA
use: sig
x5t#S256": 5GOpy9CQVtfvBmu2T8BHvpKE4OGtC3BuS046t7p9pps
- created: 2015-12-10T18:55:35.000Z
lastUpdated: 2024-08-13T18:26:57.000Z
expiresAt: 2045-01-23T02:15:23.000Z
x5c:
- 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
e: AQAB
"n": htbi5H5MN_oYaKcZ8vlWRZn2oTrPY0v8_2Br_VZPJgJ57dCgguq5dDk1Me_ax-B3kjBPdXcW8wEoUFaU30spyVeQjZrdqsSvF0nMW4OzrMOIqrGLwCrAoDBS8tutfk5Y7qc-5xABzxgu4BjgSK5nWXbCt_UR0DzVTknotmMGeT8tAej8F6GAphLa0YhIxWT7Jy-y_pdANsiUPRiZBoLueGI0rrCqgYHIQVjNoj4-si105KCXbQuyYM9_Cd-dyyu5KJ4Ic0cOW61gpx4pnecMgSy8OX57FEd06W2hExBd49ah6jra2KFMeOGe3rkIXirdkofl1mBgeQ77ruKO1wW9Qw
kid: mXtzOtml09Dg1ZCeKxTRBo3KrQuBWFkJ5oxhVagjTzo
kty: RSA
use: sig
x5t#S256": 7CCyXWwKzH4P6PoBP91B1S_iIZVzuGffVnUXu-BTYQQ
ListAllKeysResponse:
summary: List All Keys response example
value:
- id: HKY1i2htmXF5UNQhL0g4
keyId: bb5bed7d-6e4d-488f-9c86-59b93a2bb3fb
name: My new key
created: 2022-08-22T16:34:33.000Z
lastUpdated: 2022-08-22T16:34:33.000Z
isUsed: "true"
- id: HKY1p7jWLndGQV9M60g4
keyId: 7fbc27fd-e3df-4522-86bf-1930110256ad
name: Test key
created: 2022-08-31T18:09:58.000Z
lastUpdated: 2022-08-31T18:09:58.000Z
isUsed: "false"
ListAppGrantsEx:
summary: List all app Grants example
value:
- id: oag91n9ruw3dsaXzP0h6
status: ACTIVE
created: 2023-02-21T16:54:00.000Z
createdBy:
id: 00u6eltha0nrSc47i0h7
type: User
lastUpdated: 2023-02-21T16:54:00.000Z
issuer: "{yourOktaDomain}"
clientId: "{clientId}"
scopeId: okta.users.read
source: ADMIN
_embedded:
scope:
id: okta.users.read
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
title: Application name
self:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}/grants/oag91n9ruw3dsaXzP0h6"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: Client name
- id: oaghm3sh9ukdkvDmO0h6
status: ACTIVE
created: 2023-02-03T21:57:49.000Z
createdBy:
id: 00u6eltha0nrSc47i0h7
type: User
lastUpdated: 2023-02-03T21:57:49.000Z
issuer: "{yourOktaDomain}"
clientId: "{clientId}"
scopeId: okta.apps.manage
source: ADMIN
_embedded:
scope:
id: okta.apps.manage
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
title: Application name
self:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}/grants/oaghm3sh9ukdkvDmO0h6"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: Client name
ListAppLinks:
value:
- id: 00ub0oNGTSWTBKOLGLNR
label: Google Apps Mail
linkUrl: "https://{yourOktaDomain}/home/google/0oa3omz2i9XRNSRIHBZO/50"
logoUrl: "https://{yourOktaDomain}/img/logos/google-mail.png"
appName: google
appInstanceId: 0oa3omz2i9XRNSRIHBZO
appAssignmentId: 0ua3omz7weMMMQJERBKY
credentialsSetup: false
hidden: false
sortOrder: 0
- id: 00ub0oNGTSWTBKOLGLNR
label: Google Apps Calendar
linkUrl: "https://{yourOktaDomain}/home/google/0oa3omz2i9XRNSRIHBZO/54"
logoUrl: "https://{yourOktaDomain}/img/logos/google-calendar.png"
appName: google
appInstanceId: 0oa3omz2i9XRNSRIHBZO
appAssignmentId: 0ua3omz7weMMMQJERBKY
credentialsSetup: false
hidden: false
sortOrder: 1
- id: 00ub0oNGTSWTBKOLGLNR
label: Box
linkUrl: "https://{yourOktaDomain}/home/boxnet/0oa3ompioiQCSTOYXVBK/72"
logoUrl: "https://{yourOktaDomain}/img/logos/box.png"
appName: boxnet
appInstanceId: 0oa3ompioiQCSTOYXVBK
appAssignmentId: 0ua3omx46lYEZLPPRWBO
credentialsSetup: false
hidden: false
sortOrder: 3
- id: 00ub0oNGTSWTBKOLGLNR
label: Salesforce.com
linkUrl: "https://{yourOktaDomain}/home/salesforce/0oa12ecnxtBQMKOXJSMF/46"
logoUrl: "https://{yourOktaDomain}/img/logos/salesforce_logo.png"
appName: salesforce
appInstanceId: 0oa12ecnxtBQMKOXJSMF
appAssignmentId: 0ua173qgj5VAVOBQMCVB
credentialsSetup: true
hidden: false
sortOrder: 2
ListAssocAuthServerResponse:
summary: List associated Authorization Servers
value:
- id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: CUSTOM_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: DYNAMIC
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- DELETE
ListAuthServersResponse:
summary: List all custom authorization servers in your org
value:
- id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: ORG_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: AUTO
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
_links:
scopes:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes"
hints:
allow:
- GET
claims:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims"
hints:
allow:
- GET
policies:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- GET
- DELETE
- PUT
metadata:
- name: oauth-authorization-server
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/oauth-authorization-server"
hints:
allow:
- GET
- name: openid-configuration
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/openid-configuration"
hints:
allow:
- GET
rotateKey:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/lifecycle/keyRotate"
hints:
allow:
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/lifecycle/deactivate"
hints:
allow:
- POST
ListAuthorizationServerKeys:
summary: All Credential Keys
value:
- status: ACTIVE
alg: RS256
e: AQAB
"n": "g0MirhrysJMPm_wK45jvMbbyanfhl-jmTBv0o69GeifPaISaXGv8LKn3-CyJvUJcjjeHE17KtumJWVxUDRzFqtIMZ1ctCZyIAuWO0n\
\ LKilg7_EIDXJrS8k14biqkPO1lXGFwtjo3zLHeFSLw6sWf-CEN9zv6Ff3IAXb-RMYpfh-bVrxIgWsWCxjLW-UKI3la-gs0nWHH2PJr5HLJuI\
\ JIOL5HLJuIJIOLWahqTnm_r1LSCSYr6N4C-fh--w2_BW8DzTHalBYe76bNr0d7AqtR4tGazmrvrc79Wa2bjyxmhhN1u9jSaZQqq-3VZEod8q3,\
\ WHH2PJ5v1LoXniJQ4a2W8nDVqb6h4E8MUKYOpljTfQ"
kid: RQ8DuhdxCczyMvy7GNJb4Ka3lQ99vrSo3oFBUiZjzzc
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/RQ8DuhdxCczyMvy7GNJb4Ka3lQ99vrSo3oFBUiZjzzc"
hints:
allow:
- GET
- status: NEXT
alg: RS256
e: AQAB
"n": l1hZ_g2sgBE3oHvu34T-5XP18FYJWgtul_nRNg-5xra5ySkaXEOJUDRERUG0HrR42uqf9jYrUTwg9fp-SqqNIdHRaN8EwRSDRsKAwK
3 HIJ2NJfgmrrO2ABkeyUq6rzHxAumiKv1iLFpSawSIiTEBJERtUCDcjbbqyHVFuivIFgH8L37
- XDIDb0XG - R8DOoOHLJPTpsgH - rJe M5w96VIRZInsGC5OGWkFdtgk6OkbvVd7_TXcxLCpWeg1vlbmX
- 0 TmG5yjSj7ek05txcpxIqYu - 7 FIGT0KKvXge_BOSEUlJpBhLKU28 OtsOnmc3NLIGXB
- GeDiUZiBYQdPR - myB4ZoQ
kid: Y3vBOdYT-l-I0j-gRQ26XjutSX00TeWiSguuDhW3ngo
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/Y3vBOdYT-l-I0j-gRQ26XjutSX00TeWiSguuDhW3ngo"
hints:
allow:
- GET
- status: EXPIRED
alg: RS256
e: AQAB
"n": lC4ehVB6W0OCtNPnz8udYH9Ao83B6EKnHA5eTcMOap_lQZ-nKtS1lZwBj4wXRVc1XmS0d2OQFA1VMQ-dHLDE3CiGfsGqWbaiZFdW7U
GLO1nAwfDdH6xp3xwpKOMewDXbAHJlXdYYAe2ap - CE9c5WLTUBU6JROuWcorHCNJisj1aExyiY5t3JQQVGpBz2oUIHo7NRzQoKimvp
dMvMzcYnTlk1dhlG11b1GTkBclprm1BmOP7Ltjd7aEumOJWS67nKcAZzl48Zyg5KtV11V9F9dkGt25qHauqFKL7w3wu
- DYhT0hmyFc wn - tXS6e6HQbfHhR_MQxysLtDGOk2ViWv8AQ
kid: h5Sr3LXcpQiQlAUVPdhrdLFoIvkhRTAVs_h39bQnxlU
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/h5Sr3LXcpQiQlAUVPdhrdLFoIvkhRTAVs_h39bQnxlU"
hints:
allow:
- GET
ListAuthorizationServerPolicies:
summary: List Authorization Server Policies
value:
- type: OAUTH_AUTHORIZATION_POLICY
id: 00palyaappA22DPkj0h7
status: ACTIVE
name: Vendor2 Policy
description: Vendor2 policy description
priority: 1
system: false
conditions:
clients:
include:
- ALL_CLIENTS
created: 2017-05-26T19:43:53.000Z
lastUpdated: 2017-06-07T15:28:17.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7/lifecycle/deactivate"
hints:
allow:
- POST
rules:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies/00palyaappA22DPkj0h7/rules"
hints:
allow:
- GET
ListAuthorizationServerPolicyRules:
summary: List Authorization Server Policy Rules
value:
- type: RESOURCE_ACCESS
id: 0prbsjfyl01zfSZ9K0h7
status: ACTIVE
name: Default Policy Rule
priority: 1
created: 2017-08-25T16:57:02.000Z
lastUpdated: 2017-08-30T14:51:05.000Z
system: false
conditions:
people:
users:
include: []
exclude: []
groups:
include:
- EVERYONE
exclude: []
grantTypes:
include:
- implicit
- client_credentials
- authorization_code
- password
scopes:
include:
- '*'
actions:
token:
accessTokenLifetimeMinutes: 60
refreshTokenLifetimeMinutes: 0
refreshTokenWindowMinutes: 10080
inlineHook:
id: cal4egvp1mbMldrYN0g7
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/0prbsjfyl01zfSZ9K0h7"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/0prbsjfyl01zfSZ9K0h7/lifecycle/deactivate"
hints:
allow:
- POST
ListBrandsResponse:
value:
- id: bnd114iNkrcN6aR680g4
name: Okta Default
isDefault: true
agreeToCustomPrivacyPolicy: false
removePoweredByOkta: false
customPrivacyPolicyUrl: null
locale: en
emailDomainId: OeD114iNkrcN6aR680g4
defaultApp:
appInstanceId: 0oa114iNkrcN6aR680g4
appLinkName: null
classicApplicationUri: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
- DELETE
themes:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4/themes"
hints:
allow:
- GET
emailDomain:
href: "https://{yourOktaDomain}/api/v1/email-domains/OeD114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
ListClientsResponse:
summary: List all Client resources for which an authorization server has tokens
value:
- client_id: "{clientId}"
client_name: My Web App
client_uri: "null,"
logo_uri: "null,"
_links:
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: My Web App
tokens:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/clients/{clientId}/tokens"
hints:
allow:
- GET
- DELETE
ListCustomTokenClaimsResponse:
summary: List all custom token Claims for an authorization server
value:
- id: "{claimId}"
name: sub
status: ACTIVE
claimType: RESOURCE
valueType: EXPRESSION
value: "(appuser != null) ? appuser.userName : app.clientId"
conditions:
scopes:
- profile
system: true
alwaysIncludeInToken: true
apiResourceId: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims/{claimId}"
hints:
allow:
- GET
- PUT
- DELETE
ListEmailCustomizationResponse:
value:
- language: en
isDefault: true
subject: "Welcome to ${org.name}!"
body: "
Hello, ${user.profile.firstName}. Click\
\ here to activate your account."
id: oel11u6DqUiMbQkpl0g4
created: 2021-11-09T20:38:10.000Z
lastUpdated: 2021-11-11T20:38:10.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4"
hints:
allow:
- GET
- PUT
- DELETE
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
preview:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel11u6DqUiMbQkpl0g4/preview"
hints:
allow:
- GET
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
ListEmailTemplateResponse:
value:
- name: UserActivation
_embedded:
customizationCount: 0
settings:
recipients: ALL_USERS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/settings"
hints:
allow:
- GET
- PUT
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
settings:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/settings"
hints:
allow:
- GET
- PUT
defaultContent:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/default-content"
hints:
allow:
- GET
customizations:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations"
hints:
allow:
- GET
- POST
- DELETE
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
ListFactorsResults:
summary: All of the enrolled Factors for the specified User
value:
- id: ufs2bysphxKODSZKWVCT
factorType: question
provider: OKTA
vendorName: OKTA
status: ACTIVE
created: 2014-04-15T18:10:06.000Z
lastUpdated: 2014-04-15T18:10:06.000Z
profile:
question: favorite_art_piece
questionText: What is your favorite piece of art?
_links:
questions:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/questions"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ufs2bysphxKODSZKWVCT"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
- id: ostf2gsyictRQDSGTDZE
factorType: token:software:totp
provider: OKTA
status: PENDING_ACTIVATION
created: 2014-06-27T20:27:33.000Z
lastUpdated: 2014-06-27T20:27:33.000Z
profile:
credentialId: [email protected]
_links:
next:
name: activate
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf2gsyictRQDSGTDZE/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/ostf2gsyictRQDSGTDZE"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
_embedded:
activation:
timeStep: 30
sharedSecret: HE64TMLL2IUZW2ZLB
encoding: base32
keyLength: 16
- id: sms2gt8gzgEBPUWBIFHN
factorType: sms
provider: OKTA
status: ACTIVE
created: 2014-06-27T20:27:26.000Z
lastUpdated: 2014-06-27T20:27:26.000Z
profile:
phoneNumber: +1-555-415-1337
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms2gt8gzgEBPUWBIFHN/verify"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/sms2gt8gzgEBPUWBIFHN"
hints:
allow:
- GET
- DELETE
user:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL"
hints:
allow:
- GET
ListFeatureDependenciesResponse:
summary: List all dependencies for a feature
value:
- id: ftrZooGoT8b41iWRiQs7
description: Example feature description
name: Example feature name
stage:
state: OPEN
value: EA
status: ENABLED
type: self-service
_links:
self:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/features/ftrZooGoT8b41iWRiQs7"
dependents:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependents"
dependencies:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependencies"
ListFeatureDependentsResponse:
summary: List all feature dependents for the specified feature
value:
- id: ftrZooGoT8b41iWRiQs7
description: Example feature description
name: Example feature name
stage:
state: OPEN
value: EA
status: ENABLED
type: self-service
_links:
self:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/features/ftrZooGoT8b41iWRiQs7"
dependents:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependents"
dependencies:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependencies"
ListFeaturesResponse:
summary: List all self-service features for your org
value:
- id: ftrZooGoT8b41iWRiQs7
description: Example feature description
name: Example feature name
stage:
state: CLOSED
value: BETA
status: DISABLED
type: self-service
_links:
self:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/features/ftrZooGoT8b41iWRiQs7"
dependents:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependents"
dependencies:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependencies"
ListIdPUsersResponse:
summary: List of linked IdP Users
value:
- id: 00u5cl9lo7nMjHjPr0h7
externalId: "109912936038778"
created: 2015-11-03T19:10:11.000Z
lastUpdated: 2015-11-03T19:11:49.000Z
profile:
firstName: Carol
middleName: Lee
lastName: Johnson
email: [email protected]
displayName: Carol Johnson
profile: https://www.facebook.com/app_scoped_user_id/109912936038778/
_links:
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oa4lb6lbtmH355Hx0h7/users/00u5cl9lo7nMjHjPr0h7"
hints:
allow:
- GET
- DELETE
idp:
href: "https://{yourOktaDomain}/api/v1/idps/0oa4lb6lbtmH355Hx0h7"
user:
href: "https://{yourOktaDomain}/api/v1/users/00u5cl9lo7nMjHjPr0h7"
ListLinkedObjects:
summary: List all Linked Object definitions
value:
- primary:
name: manager
title: manager
description: Manager link property
type: USER
associated:
name: subordinate
title: subordinate
description: Subordinate link property
type: USER
_links:
self:
href: http://your-subdomain.okta.com/api/v1/meta/schemas/user/linkedObjects/manager
ListLogs:
summary: List all system logs
value:
- actor:
id: 00uttidj01jqL21aM1d6
type: User
alternateId: [email protected]
displayName: John Doe
detailEntry: null
client:
userAgent:
rawUserAgent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36\
\ (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36"
os: Mac OS X
browser: CHROME
zone: null
device: Computer
id: null
ipAddress: 10.0.0.1
geographicalContext:
city: New York
state: New York
country: United States
postalCode: 10013
geolocation:
lat: 40.3157
lon: -74.01
device:
id: guofdhyjex1feOgbN1d9
name: "Mac15,6"
os_platform: OSX
os_version: 14.6.0
managed: false
registered: true
device_integrator: null
disk_encryption_type: ALL_INTERNAL_VOLUMES
screen_lock_type: BIOMETRIC
jailbreak: null
secure_hardware_present: true
authenticationContext:
authenticationProvider: null
credentialProvider: null
credentialType: null
issuer: null
interface: null
authenticationStep: 0
rootSessionId: idxBager62CSveUkTxvgRtonA
externalSessionId: idxBager62CSveUkTxvgRtonA
displayMessage: User login to Okta
eventType: user.session.start
outcome:
result: SUCCESS
reason: null
published: 2024-08-13T15:58:20.353Z
securityContext:
asNumber: 394089
asOrg: ASN 0000
isp: google
domain: null
isProxy: false
severity: INFO
debugContext:
debugData:
requestId: ab609228fe84ce59cdcbfa690bcce016
requestUri: /idp/idx/authenticators/poll
url: /idp/idx/authenticators/poll
legacyEventType: core.user_auth.login_success
transaction:
type: WEB
id: ab609228fe84ce59cdcbfa690bgce016
detail: null
uuid: dc9fd3c0-598c-11ef-8478-2b7584bf8d5a
version: 0
request:
ipChain:
- ip: 10.0.0.1
geographicalContext:
city: New York
state: New York
country: United States
postalCode: 10013
geolocation:
lat: 40.3157
lon: -74.01
version: V4
source: null
target:
- id: pfdfdhyjf0HMbkP2e1d7
type: AuthenticatorEnrollment
alternateId: unknown
displayName: Okta Verify
detailEntry: null
- id: 0oatxlef9sQvvqInq5d6
type: AppInstance
alternateId: Okta Admin Console
displayName: Okta Admin Console
detailEntry: null
ListMappingsResponse:
summary: List all Profile Mappings response
value:
- id: prm1k47ghydIQOTBW0g4
source:
id: otysbePhQ3yqt4cVv0g3
name: user
type: user
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otysbePhQ3yqt4cVv0g3"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscsbePhQ3yqt4cVv0g3"
target:
id: 0oa1qmn4LZQQEH0wZ0g4
name: okta_org2org
type: appuser
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1qmn4LZQQEH0wZ0g4"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/apps/0oa1qmn4LZQQEH0wZ0g4/default"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/mappings/prm1k48weFSOnEUnw0g4"
ListOfSecurityEventsProviderInstances:
summary: List of Security Events Providers
value:
- id: sse1qg25RpusjUP6m0g5
name: Security Events Provider with well-known URL
type: okta
status: ACTIVE
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
_links:
self:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5/lifecycle/deactivate
hints:
allow:
- POST
- id: sse1qu4fUtsoD12iF0g5
name: Security Events Provider with an issuer and a JWKS URL
type: okta
status: ACTIVE
settings:
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
_links:
self:
href: https://example.okta.com/api/v1/security-events-providers/sse1qu4fUtsoD12iF0g5
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://example.okta.com/api/v1/security-events-providers/sse1qu4fUtsoD12iF0g5/lifecycle/deactivate
hints:
allow:
- POST
ListPrivilegedAccounts:
summary: List Privileged Accounts with mixed account types
value:
- accountType: APP_ACCOUNT
description: This is for accessing AWS Prod-5
id: a747a818-a4c4-4446-8a87-704216495a08
name: AWS Prod-5 account
ownerGroupIds:
- 00g57qp78yZT2XBA40g7
ownerUserIds:
- 00u11s48P9zGW8yqm0g5
status: NO_ISSUES
statusDetail: ROTATED
created: 2023-04-04T15:56:05.000Z
lastUpdated: 2023-05-05T18:15:44.000Z
details:
credentials:
username: [email protected]
oktaApplicationId: aln1aqcs055ZRoizW0g8
appInstanceName: AWS Prod-5
appGlobalName: AWS Account Federation
- accountType: OKTA_USER_ACCOUNT
description: Shared admin account for managing AD integrations
id: d1b65a78-21ed-429b-8ea3-eec96f2748d6
name: AD Integrations Admin
ownerGroupIds:
- 00g57qp78yZT2XBA40g7
ownerUserIds:
- 00u11s48P9zGW8yqm0g5
status: INFO
statusDetail: ROTATING
created: 2023-04-04T15:56:05.000Z
lastUpdated: 2023-05-05T18:15:44.000Z
details:
credentials:
username: [email protected]
email: [email protected]
oktaUserId: 00u11s48P9zGW8yqm0g5
ListRealmAssignmentsResponse:
value:
- id: rul2jy7jLUlnO3ng00g4
status: ACTIVE
name: Realm Assignment 1
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: false
conditions:
profileSourceId: 0oa4enoRyjwSCy5hx0g4
expression:
value: user.profile.role ==\"Manager\"
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf0g5
priority: 0
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realm-assignments/rul2jy7jLUlnO3ng00g4
method: GET
- id: rul2jy7jLUlnO5ng00g4
status: ACTIVE
name: Catch-all
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: true
conditions:
profileSourceId: "0oa4enoRyjwSCy6hx0g4,"
expression:
value: string
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf2g5
priority: 499
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realm-assignments/rul2jy7jLUlnO5ng00g4
method: GET
ListRealmAwareUsersResponse:
summary: List all Users
value:
- id: 00u118oQYT4TBGuay0g4
status: ACTIVE
created: 2022-04-04T15:56:05.000Z
activated: null
statusChanged: null
lastLogin: 2022-05-04T19:50:52.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
passwordChanged: 2022-04-04T16:00:22.000Z
type:
id: oty1162QAr8hJjTaq0g4
profile:
firstName: Alice
lastName: Smith
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
realmId: guo1afiNtSnZYILxO0g4
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
self:
href: http://your-subdomain.okta.com/api/v1/users/00u118oQYT4TBGuay0g4
ListRealmsResponse:
value:
- id: guox9jQ16k9V8IFEL0g3
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: false
profile:
name: Car Co
realmType: PARTNER
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realms/guox9jQ16k9V8IFEL0g3
method: GET
ListRefreshTokensClientsResponse:
summary: List all refresh tokens for a Client
value:
- id: "{refreshTokenId}"
status: ACTIVE
created: 2023-09-21T19:59:56.000Z
lastUpdated: 2023-09-21T20:00:38.000Z
expiresAt: 2023-09-28T20:00:38.000Z
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
client_id: "{clientId}"
userId: "{userId}"
scopes:
- offline_access
- openid
_embedded:
scopes:
- id: "{scopeId}"
name: openid
displayName: openid
description: Signals that a request is an OpenID request
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/{scopeId}"
title: openid
- id: "{scopeID}"
name: offline_access
displayName: Keep you signed in to the app
description: "This keeps you signed in to the app, even when you aren't\
\ using it."
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/{scopeId}"
itle: Keep you signed in to the app
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
title: My Web App
authorizationServer:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
title: Authorization Server name
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/clients/{clientId}/tokens/{tokenId}"
revoke:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/clients/{clientId}/tokens/{tokenId}"
hints:
allow:
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: My Web App
user:
href: "https://{yourOktaDomain}/api/v1/users/{userId}"
title: Joe User
ListRiskProviderResponse:
summary: List Risk Provider response example
value:
- id: 00rp12r4skkjkjgsn
action: log_only
name: Risk-Partner-X
clientId: 00ckjsfgjkdkjdkkljjsd
created: 2021-01-05 22:18:30
lastUpdated: 2021-01-05 22:18:30
_links:
self:
href: "https://{yourOktaDomain}/api/v1/risk/providers/00rp12r4skkjkjgsn"
hints:
allow:
- GET
- PUT
ListSessionsResponseForGetSessions:
value:
- id: aps1qqonvr2SZv6o70h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: CREATED
importType: INCREMENTAL
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T16:15:44.000Z
- id: aps1quck606ngubVq0h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: TRIGGERED
importType: INCREMENTAL
created: 2022-04-04T16:56:05.000Z
lastUpdated: 2022-05-05T17:15:44.000Z
- id: aps1qzy2acb5jDlUc0h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: IN_PROGRESS
importType: INCREMENTAL
created: 2022-04-04T17:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
- id: aps1qqne8c1JHkMdF0h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: EXPIRED
importType: INCREMENTAL
created: 2022-04-04T18:56:05.000Z
lastUpdated: 2022-05-05T19:15:44.000Z
- id: aps1qqonvr2SZv6o70h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: CLOSED
importType: INCREMENTAL
created: 2022-04-04T19:56:05.000Z
lastUpdated: 2022-05-05T20:15:44.000Z
ListThemesResponse:
value:
- id: thdul904tTZ6kWVhP0g3
logo: "https://{yourOktaDomain}/assets/img/logos/okta-logo.47066819ac7db5c13f4c431b2687cef6.png"
favicon: "https://{yourOktaDomain}/favicon.ico"
backgroundImage: null
primaryColorHex: '#1662dd'
primaryColorContrastHex: '#000000'
secondaryColorHex: '#ebebed'
secondaryColorContrastHex: '#000000'
signInPageTouchPointVariant: OKTA_DEFAULT
endUserDashboardTouchPointVariant: OKTA_DEFAULT
errorPageTouchPointVariant: OKTA_DEFAULT
emailTemplateTouchPointVariant: OKTA_DEFAULT
loadingPageTouchPointVariant: OKTA_DEFAULT
ListUISchemaResponse:
summary: Lists all UI Schemas response
value:
- id: uis4a7liocgcRgcxZ0g7
uiSchema:
type: Group
label: Sign in
buttonLabel: Submit
elements:
- type: Control
scope: '#/properties/firstName'
label: First name
options:
format: text
- type: Control
scope: '#/properties/lastName'
label: Last name
options:
format: text
- type: Control
scope: '#/properties/email'
label: Email
options:
format: text
- type: Control
scope: '#/properties/countryCode'
label: Country code
options:
format: select
- type: Control
scope: '#/properties/bool2'
label: bool2
options:
format: checkbox
- type: Control
scope: '#/properties/date'
label: date
options:
format: text
- type: Control
scope: '#/properties/enum'
label: enum
options:
format: radio
created: 2022-07-25T12:56:31.000Z
lastUpdated: 2022-07-26T11:53:59.000Z
_links:
self:
href: https://example.com/api/v1/meta/uischemas/uis4a7liocgcRgcxZ0g7
hints:
allow:
- GET
- PUT
- DELETE
- id: uis4abjqkkKXVPGAU0g7
uiSchema:
type: Group
label: Sign in 2
buttonLabel: Submit
elements:
- type: Control
scope: '#/properties/firstName'
label: First name
options:
format: text
- type: Control
scope: '#/properties/lastName'
label: Last name
options:
format: text
- type: Control
scope: '#/properties/email'
label: Email
options:
format: text
- type: Control
scope: '#/properties/countryCode'
label: Country code
options:
format: select
- type: Control
scope: '#/properties/bool2'
label: bool2
options:
format: checkbox
- type: Control
scope: '#/properties/date'
label: date
- type: Control
scope: '#/properties/enum'
label: enum
options:
format: radio
created: 2022-07-25T12:56:31.000Z
lastUpdated: 2022-07-26T11:53:59.000Z
_links:
self:
href: https://example.com/api/v1/meta/uischemas/uis4abjqkkKXVPGAU0g7
hints:
allow:
- GET
- PUT
- DELETE
ListUserBlocksAnyDevicesResponse:
value:
- type: DEVICE_BASED
appliesTo: ANY_DEVICES
ListUserBlocksUnknownDevicesResponse:
value:
- type: DEVICE_BASED
appliesTo: UNKNOWN_DEVICES
ListUserClients:
value:
- client_id: 0oabskvc6442nkvQO0h7
client_name: My App
client_uri: null
logo_uri: null
_links:
grants:
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/grants"
tokens:
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens"
ListUserGroups:
value:
- id: 0gabcd1234
profile:
name: Cloud App Users
description: Users can access cloud apps
- id: 0gefgh5678
profile:
name: Internal App Users
description: Users can access internal apps
ListUsersResponse:
summary: List all Users
value:
- id: 00u118oQYT4TBTemp0g4
status: ACTIVE
created: 2022-04-04T15:56:05.000Z
activated: null
statusChanged: null
lastLogin: 2022-05-04T19:50:52.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
passwordChanged: 2022-04-04T16:00:22.000Z
type:
id: oty1162QAr8hJjTaq0g4
profile:
firstName: Alice
lastName: Smith
mobilePhone: null
secondEmail: null
login: [email protected]
email: [email protected]
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
self:
href: http://your-subdomain.okta.com/api/v1/users/00u118oQYT4TBGuay0g4
ListYubikeyOptTokensResponse:
summary: List Yubikey OPT Token response
value:
- id: ykkwcx13nrDq8g4oy0g3
created: 2020-01-14T21:53:09.000Z
lastVerified: 2020-01-14T21:53:06.000Z
lastUpdated: 2020-01-14T21:53:09.000Z
status: UNASSIGNED
profile:
serial: "000003632071"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/org/factors/yubikey_token/tokens/ykkwcx13nrDq8g4oy0g3"
hints:
allow:
- GET
- DELETE
- id: ykkxdtCA1fKVxyu6R0g3
created: 2020-06-09T23:42:05.000Z
activated: 2020-06-09T23:47:29.000Z
lastVerified: 2020-06-09T23:47:29.000Z
lastUpdated: 2020-06-09T23:47:29.000Z
status: ACTIVE
profile:
serial: "000009508427"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/org/factors/yubikey_token/tokens/ykkxdtCA1fKVxyu6R0g3"
hints:
allow:
- GET
user:
href: "https://{yourOktaDomain}/api/v1/users/00uu0x8sxTr9HcHOo0g3"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00uu0x8sxTr9HcHOo0g3/factors/ykfxduQAhl89YyPrV0g3"
hints:
allow:
- DELETE
ListsAllUserTypes:
summary: Lists all user types
value:
- id: otyfnly5cQjJT9PnR0g4
displayName: New User Type
name: newUserType
description: A new custom user type
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
- id: otyz9fj2jMiRBC1ZT1d6
displayName: User
name: user
description: Okta user profile template with default permission settings
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: true
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
ListsOwnerOneResponse:
summary: Lists a response with one owner
value:
- id: 00g1gae1k0znUcLuU0h8
type: GROUP
resolved: true
originId: "null"
originType: OKTA_DIRECTORY
displayName: Product & Engineering
lastUpdated: 2023-03-29 18:18:37.0
ListsOwnersMultipleResponse:
summary: Lists a response with multiple owners
value:
- id: 00u1cmbqjkkmFXeqb0h8
type: USER
resolved: true
originId: "null"
originType: OKTA_DIRECTORY
displayName: Mabel Mora
lastUpdated: 2023-03-29T18:30:58.000Z
- id: 00u1cmc52x5B86cnZ0h8
type: USER
resolved: true
originId: "null"
originType: OKTA_DIRECTORY
displayName: Cinda Canning
lastUpdated: 2023-03-29T18:30:55.000Z
LogStreamActivateResponse:
summary: Activate Log Stream response
value:
id: 0oa1orqUGCIoCGNxf0g4
type: aws_eventbridge
name: Example AWS EventBridge
lastUpdated: 2023-03-24T21:22:43.000Z
created: 2023-03-24T21:02:43.000Z
status: ACTIVE
settings:
accountId: "123456789012"
eventSourceName: your-event-source-name
region: us-east-2
_links:
self:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4"
method: GET
deactivate:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4/lifecycle/deactivate"
method: POST
LogStreamDeactivateResponse:
summary: Deactivate Log Stream response
value:
id: 0oa7agphh5FT7H521d7
type: splunk_cloud_logstreaming
name: Splunk Cloud Example
lastUpdated: 2023-03-24T21:23:00.000Z
created: 2023-03-24T21:15:13.000Z
status: INACTIVE
settings:
edition: aws
host: okexample.splunkcloud.com
_links:
self:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa7agphh5FT7H521d7"
method: GET
activate:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa7agphh5FT7H521d7/lifecycle/activate"
method: POST
LogStreamGetAllResponse:
summary: Lists all Log Streams
value:
- id: 0oa1orqUGCIoCGNxf0g4
type: aws_eventbridge
name: Example AWS EventBridge
lastUpdated: 2023-03-24T21:02:43.000Z
created: 2023-03-24T21:02:43.000Z
status: ACTIVE
settings:
accountId: "123456789012"
eventSourceName: your-event-source-name
region: us-east-2
_links:
self:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4"
method: GET
deactivate:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4/lifecycle/deactivate"
method: POST
LogStreamPostRequest:
summary: Create an AWS EventBridge Log Stream
value:
type: aws_eventbridge
name: Example AWS EventBridge
settings:
eventSourceName: your-event-source-name
accountId: "123456789012"
region: us-east-2
LogStreamPostResponse:
summary: AWS EventBridge Log Stream response
value:
id: 0oa1orqUGCIoCGNxf0g4
type: aws_eventbridge
name: Example AWS EventBridge
lastUpdated: 2023-03-24T21:02:43.000Z
created: 2023-03-24T21:02:43.000Z
status: ACTIVE
settings:
accountId: "123456789012"
eventSourceName: your-event-source-name
region: us-east-2
_links:
self:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4"
method: GET
deactivate:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4/lifecycle/deactivate"
method: POST
LogStreamPutRequest:
summary: Replace AWS EventBridge name
value:
type: aws_eventbridge
name: Updated AWS EventBridge
settings:
eventSourceName: your-event-source-name
accountId: "123456789012"
region: us-east-2
LogStreamPutResponse:
summary: Replace AWS EventBridge name response
value:
id: 0oa1orqUGCIoCGNxf0g4
type: aws_eventbridge
name: Updated AWS EventBridge
lastUpdated: 2023-03-24T21:12:43.000Z
created: 2023-03-24T21:02:43.000Z
status: ACTIVE
settings:
accountId: "123456789012"
eventSourceName: your-event-source-name
region: us-east-2
_links:
self:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4"
method: GET
deactivate:
href: "http://{yourOktaDomain}/api/v1/logStreams/0oa1orqUGCIoCGNxf0g4/lifecycle/deactivate"
method: POST
LogStreamSchemaAws:
value:
$schema: https://json-schema.org/draft/2020-12/schema
$id: "http://{yourOktaDomain}/api/v1/meta/schemas/logStream/aws_eventbridge"
title: AWS EventBridge
type: object
properties:
settings:
description: Configuration properties specific to AWS EventBridge
type: object
properties:
accountId:
title: AWS Account ID
description: Your Amazon AWS Account ID.
type: string
writeOnce: true
pattern: "^\\d{12}$"
eventSourceName:
title: AWS Event Source Name
description: An alphanumeric name (no spaces) to identify this event
source in AWS EventBridge.
type: string
writeOnce: true
pattern: "^[\\.\\-_A-Za-z0-9]{1,75}$"
region:
title: AWS Region
description: The destination AWS region for your system log events.
type: string
writeOnce: true
oneOf:
- title: US East (Ohio)
const: us-east-2
- title: US East (N. Virginia)
const: us-east-1
- title: US West (N. California)
const: us-west-1
- title: US West (Oregon)
const: us-west-2
- title: Canada (Central)
const: ca-central-1
- title: Europe (Frankfurt)
const: eu-central-1
- title: Europe (Ireland)
const: eu-west-1
- title: Europe (London)
const: eu-west-2
- title: Europe (Paris)
const: eu-west-3
- title: Europe (Milan)
const: eu-south-1
- title: Europe (Stockholm)
const: eu-north-1
required:
- eventSourceName
- accountId
- region
errorMessage:
properties:
accountId: Account number must be 12 digits.
eventSourceName: "Event source name can use numbers, letters, the\
\ symbols \".\", \"-\" or \"_\". It must use fewer than 76 characters."
name:
title: Name
description: A name for this log stream in Okta
type: string
writeOnce: false
pattern: "^.{1,100}$"
required:
- name
- settings
errorMessage:
properties:
name: Name can't exceed 100 characters.
LogStreamSchemaList:
value:
- $schema: https://json-schema.org/draft/2020-12/schema
$id: "http://{yourOktaDomain}/api/v1/meta/schemas/logStream/aws_eventbridge"
title: AWS EventBridge
type: object
properties:
settings:
description: Configuration properties specific to AWS EventBridge
type: object
properties:
accountId:
title: AWS Account ID
description: Your Amazon AWS Account ID.
type: string
writeOnce: true
pattern: "^\\d{12}$"
eventSourceName:
title: AWS Event Source Name
description: An alphanumeric name (no spaces) to identify this event
source in AWS EventBridge.
type: string
writeOnce: true
pattern: "^[\\.\\-_A-Za-z0-9]{1,75}$"
region:
title: AWS Region
description: The destination AWS region for your system log events.
type: string
writeOnce: true
oneOf:
- title: US East (Ohio)
const: us-east-2
- title: US East (N. Virginia)
const: us-east-1
- title: US West (N. California)
const: us-west-1
- title: US West (Oregon)
const: us-west-2
- title: Canada (Central)
const: ca-central-1
- title: Europe (Frankfurt)
const: eu-central-1
- title: Europe (Ireland)
const: eu-west-1
- title: Europe (London)
const: eu-west-2
- title: Europe (Paris)
const: eu-west-3
- title: Europe (Milan)
const: eu-south-1
- title: Europe (Stockholm)
const: eu-north-1
required:
- eventSourceName
- accountId
- region
errorMessage:
properties:
accountId: Account number must be 12 digits.
eventSourceName: "Event source name can use numbers, letters, the\
\ symbols \".\", \"-\" or \"_\". It must use fewer than 76 characters."
name:
title: Name
description: A name for this log stream in Okta
type: string
writeOnce: false
pattern: "^.{1,100}$"
required:
- name
- settings
errorMessage:
properties:
name: Name can't exceed 100 characters.
- $schema: https://json-schema.org/draft/2020-12/schema
id: "http://{yourOktaDomain}/api/v1/meta/schemas/logStream/splunk_cloud_logstreaming"
title: Splunk Cloud
type: object
properties:
settings:
description: Configuration properties specific to Splunk Cloud
type: object
properties:
host:
title: Host
description: "The domain for your Splunk Cloud instance without http\
\ or https. For example: acme.splunkcloud.com"
type: string
writeOnce: false
pattern: "^([a-z0-9]+(-[a-z0-9]+)*){1,100}\\.splunkcloud(gc|fed)?\\\
.com$"
token:
title: HEC Token
description: The token from your Splunk Cloud HTTP Event Collector
(HEC).
type: string
writeOnce: false
pattern: "[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}"
required:
- host
- token
errorMessage:
properties:
host: "Host should be a domain without http or https. For example:\
\ acme.splunkcloud.com"
name:
title: Name
description: A name for this log stream in Okta
type: string
writeOnce: false
pattern: "^.{1,100}$"
required:
- name
- settings
errorMessage:
properties:
name: Name can't exceed 100 characters.
LogStreamSchemaSplunk:
value:
$schema: https://json-schema.org/draft/2020-12/schema
id: "http://{yourOktaDomain}/api/v1/meta/schemas/logStream/splunk_cloud_logstreaming"
title: Splunk Cloud
type: object
properties:
settings:
description: Configuration properties specific to Splunk Cloud
type: object
properties:
host:
title: Host
description: "The domain for your Splunk Cloud instance without http\
\ or https. For example: acme.splunkcloud.com"
type: string
writeOnce: false
pattern: "^([a-z0-9]+(-[a-z0-9]+)*){1,100}\\.splunkcloud(gc|fed)?\\\
.com$"
token:
title: HEC Token
description: The token from your Splunk Cloud HTTP Event Collector
(HEC).
type: string
writeOnce: false
pattern: "[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}"
required:
- host
- token
errorMessage:
properties:
host: "Host should be a domain without http or https. For example:\
\ acme.splunkcloud.com"
name:
title: Name
description: A name for this log stream in Okta
type: string
writeOnce: false
pattern: "^.{1,100}$"
required:
- name
- settings
errorMessage:
properties:
name: Name can't exceed 100 characters.
LogTargetChangeDetails:
summary: Example of the `changeDetails` property on the target
value:
from:
vpnLocationOptions: DISABLED
vpnSettingsZones:
include: null
exclude: null
to:
message: You must a use VPN to connect to this application
vpnLocationOptions: ZONE
vpnSettingsZones:
include:
- ALL_ZONES
exclude: null
MicrosoftIdPResponse:
summary: Microsoft Identity Provider
value:
id: 0oajmvdFawBih4gey0g3
type: MICROSOFT
name: Microsoft
status: ACTIVE
created: 2016-03-29T16:47:36.000Z
lastUpdated: 2016-03-29T16:47:36.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://login.microsoftonline.com/common/oauth2/v2.0/authorize
binding: HTTP-REDIRECT
token:
url: https://login.microsoftonline.com/common/oauth2/v2.0/token
binding: HTTP-POST
scopes:
- openid
- email
- profile
- https://graph.microsoft.com/User.Read
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: |-
https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oajmvdFawBih4gey0g3&
client_id={clientId}&response_type={responseType}&response_mode={responseMode}&
scope={scopes}&redirect_uri={redirectUri}&state={state}
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
MultipleIdPCsrsResponse:
summary: Identity Provider CSRs
value:
- id: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
created: 2017-03-28T01:11:10.000Z
csr: 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
kty: RSA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
hints:
allow:
- GET
- DELETE
publish:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
hints:
allow:
- POST
- id: -_-BFwAGoUYN-DDvsSKQFdx7OXaPZqrEPpFDO1hu-rg
created: 2017-03-28T01:21:10.000Z
csr: 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
kty: RSA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/-_-BFwAGoUYN-DDvsSKQFdx7OXaPZqrEPpFDO1hu-rg"
hints:
allow:
- GET
- DELETE
publish:
href: "https://{yourOktaDomain}/api/v1/idps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/-_-BFwAGoUYN-DDvsSKQFdx7OXaPZqrEPpFDO1hu-rg/lifecycle/publish"
hints:
allow:
- POST
MultipleIdPKeyCredentialsResponse:
summary: Identity Provider Key Credentials
value:
- kid: your-key-id
created: 2016-01-03T18:15:47.000Z
lastUpdated: 2016-01-03T18:15:47.000Z
e: "65537"
"n": "101438407598598116085679865987760095721749307901605456708912786847324207000576780508113360584555007890315805735307890113536927352312915634368993759211767770602174860126854831344273970871509573365292777620005537635317282520456901584213746937262823585533063042033441296629204165064680610660631365266976782082747"
kty: RSA
use: sig
x5c:
- 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
x5t#S256: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
- kty: EC
created: 2020-04-24T20:51:20.000Z
lastUpdated: 2020-04-24T20:51:20.000Z
expiresAt: 2040-03-01T20:22:29.000Z
alg: EC
x5c:
- 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
x: Vv5Rh5de5ig7Qg-A-4HDGGDloMlkxp6PDE3nwzgAQPD3XXrLE7G364LhePRpYupQs62WgCoYb4CDXN0erf3WJXg
"y": ATeVjosChw6gt73EOR6CBc1xK4_l8NzXHlH0YdNeXji8ugk4tIuwxs5dUxcheips8PNNJhTLbhoV2_hbgtnFbpqT
crv: P-521
kid: your-kid
use: sig
x5t#S256: TUx-AIwypm2pZURHNqafk7ZDxqQP_ypzIyUwDDnPOlw
MultipleIdPSigningKeyCredentialsResponse:
summary: Identity Provider Signing Key Credentials
value:
- created: 2015-12-10T18:56:23.000Z
expiresAt: 2017-12-10T18:56:22.000Z
x5c:
- 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
kid: akm5hvbbevE341ovl0h7
kty: RSA
use: sig
x5t#S256: 5GOpy9CQVtfvBmu2T8BHvpKE4OGtC3BuS046t7p9pps
- created: 2015-12-10T18:55:35.000Z
expiresAt: 2045-01-23T02:15:23.000Z
x5c:
- MIIDqDCCApCgAwIBAgIGAVGNQFX5MA0GCSqGSIb3DQEBBQUAMIGUMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEUMBIGA1UECwwLU1NPUHJvdmlkZXIxFTATBgNVBAMMDGJhbGFjb21wdGVzdDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bva3RhLmNvbTAeFw0xNTEyMTAxODU1MjJaFw0xNzEyMTAxODU2MjJaMIGUMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEUMBIGA1UECwwLU1NPUHJvdmlkZXIxFTATBgNVBAMMDGJhbGFjb21wdGVzdDEcMBoGCSqGSIb3DQEJARYNaW5mb0Bva3RhLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJJjrcnI6cXBiXNq9YDgfYrQe2O5qEHG4MXP8Ue0sMeefFkFEHYHnHUeZCq6WTAGqR+1LFgOl+Eq9We5V+qNlGIfkFkQ3iHGBrIALKqLCd0Et76HicDiegz7j9DtN+lo0hG/gfcw5783L5g5xeQ7zVmCQMkFwoUA0uA3bsfUSrmfORHJL+EMNQT8XIXD8NkG4g6u7ylHVRTLgXbe+W/p04m3EP6l41xl+MhIpBaPxDsyUvcKCNwkZN3aZIin1O9Y4YJuDHxrM64/VtLLp0sC05iawAmfsLunF7rdJAkWUpPn+xkviyNQ3UpvwAYuDr+jKLUdh2reRnm1PezxMIXzBVMCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEARnFIjyitrCGbleFr3KeAwdOyeHiRmgeKupX5ZopgXtcseJoToUIinX5DVw2fVZPahqs0Q7/a0wcVnTRpw6946qZCwKd/PvZ1feVuVEA5Ui3+XvHuSH5xLp7NvYG1snNEvlbN3+NDUMlWj2NEbihowUBt9+UxTpQO3+N08q3aZk3hOZ+tHt+1Te7KEEL/4CM28GZ9MY7fSrS7MAgp1+ZXtn+kRlMrXnQ49qBda37brwDRqmSY9PwNMbev3r+9ZHwxr9W5wXW4Ev4C4xngA7RkVoyDbItSUho0I0M0u/LHuppclnXrw97xyO5Z883eIBvPVjfRcxsJxXJ8jx70ATDskw==
kid: akm5hvbn1vojA9Fsa0h7
kty: RSA
use: sig
x5t#S256: 7CCyXWwKzH4P6PoBP91B1S_iIZVzuGffVnUXu-BTYQQ
MultipleIdPsResponse:
summary: Multiple Identity Providers
value:
- id: 0oa62b57p7c8PaGpU0h7
type: FACEBOOK
name: Facebook
status: ACTIVE
created: 2016-03-24T23:18:27.000Z
lastUpdated: 2016-03-24T23:18:27.000Z
protocol:
type: OAUTH2
endpoints:
authorization:
url: https://www.facebook.com/dialog/oauth
binding: HTTP-REDIRECT
token:
url: https://graph.facebook.com/v2.5/oauth/access_token
binding: HTTP-POST
scopes:
- public_profile
- email
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62b57p7c8PaGpU0h7&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
- id: 0oa62bc8wppPw0UGr0h7
type: SAML2
name: Example SAML IdP
status: ACTIVE
created: 2016-03-24T23:14:54.000Z
lastUpdated: 2016-03-24T23:14:54.000Z
protocol:
type: SAML2
endpoints:
sso:
url: https://idp.example.com
binding: HTTP-POST
destination: https://idp.example.com
acs:
binding: HTTP-POST
type: INSTANCE
algorithms:
request:
signature:
algorithm: SHA-256
scope: REQUEST
response:
signature:
algorithm: SHA-256
scope: ANY
settings:
nameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
credentials:
trust:
issuer: https://idp.example.com
audience: http://www.okta.com/123
kid: your-key-id
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: saml.subjectNameId
filter: (\S+@example\.com)
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
metadata:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/metadata.xml"
type: application/xml
hints:
allow:
- GET
acs:
href: "https://{yourOktaDomain}/sso/saml2/0oa62bc8wppPw0UGr0h7"
type: application/xml
hints:
allow:
- POST
users:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/users"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/lifecycle/deactivate"
hints:
allow:
- POST
- id: 0oa62bfdiumsUndnZ0h7
type: GOOGLE
name: Google
status: ACTIVE
created: 2016-03-24T23:21:49.000Z
lastUpdated: 2016-03-24T23:21:49.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://accounts.google.com/o/oauth2/auth
binding: HTTP-REDIRECT
token:
url: https://www.googleapis.com/oauth2/v3/token
binding: HTTP-POST
scopes:
- profile
- email
- openid
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62bfdiumsUndnZ0h7&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
- id: 0oa62bfdjnK55Z5x80h7
type: LINKEDIN
name: LinkedIn
status: ACTIVE
created: 2016-03-24T23:23:59.000Z
lastUpdated: 2016-03-24T23:23:59.000Z
protocol:
type: OAUTH2
endpoints:
authorization:
url: https://www.linkedin.com/uas/oauth2/authorization
binding: HTTP-REDIRECT
token:
url: https://www.linkedin.com/uas/oauth2/accessToken
binding: HTTP-POST
scopes:
- r_basicprofile
- r_emailaddress
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oa62bfdjnK55Z5x80h7&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
- id: 0oajmvdFawBih4gey0g3
type: MICROSOFT
name: Microsoft
status: ACTIVE
created: 2016-03-29T16:47:36.000Z
lastUpdated: 2016-03-29T16:47:36.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://login.microsoftonline.com/common/oauth2/v2.0/authorize
binding: HTTP-REDIRECT
token:
url: https://login.microsoftonline.com/common/oauth2/v2.0/token
binding: HTTP-POST
scopes:
- openid
- email
- profile
- https://graph.microsoft.com/User.Read
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.userPrincipalName
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oajmvdFawBih4gey0g3&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
- id: 0oaulob4BFVa4zQvt0g3
type: OIDC
name: Example OpenID Connect IdP
status: ACTIVE
created: 2019-02-07T20:07:47.000Z
lastUpdated: 2019-02-07T20:07:47.000Z
protocol:
type: OIDC
endpoints:
authorization:
url: https://idp.example.com/authorize
binding: HTTP-REDIRECT
token:
url: https://idp.example.com/token
binding: HTTP-POST
userInfo:
url: https://idp.example.com/userinfo
binding: HTTP-REDIRECT
jwks:
url: https://idp.example.com/keys
binding: HTTP-REDIRECT
scopes:
- openid
issuer:
url: https://idp.example.com
credentials:
client:
client_id: your-client-id
client_secret: your-client-secret
policy:
provisioning:
action: AUTO
profileMaster: false
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.email
filter: null
matchType: USERNAME
matchAttribute: null
mapAMRClaims: false
maxClockSkew: 0
_links:
authorize:
href: "https://{yourOktaDomain}/oauth2/v1/authorize?idp=0oaulob4BFVa4zQvt0g3&client_id={clientId}&response_type={responseType}&response_mode={responseMode}&scope={scopes}&redirect_uri={redirectUri}&state={state}&nonce={nonce}"
templated: true
hints:
allow:
- GET
clientRedirectUri:
href: "https://{yourOktaDomain}/oauth2/v1/authorize/callback"
hints:
allow:
- POST
- id: 0oa6jxasyhwM2ZHJh0g4
type: X509
name: Smart Card IDP Name
status: ACTIVE
created: 2020-01-07T00:19:27.000Z
lastUpdated: 2020-01-07T00:19:27.000Z
properties:
additionalAmr:
- sc
- hwk
- pin
- mfa
protocol:
type: MTLS
endpoints:
sso:
url: "https://{yourOktaDomain}.okta.com/login/cert"
credentials:
trust:
issuer: "CN=Test Smart Card, OU=Test OU, O=Test O, C=US"
audience: null
kid: 45dec5ff-8cdc-48c0-85fe-a4869f1753dc
revocation: CRL
revocationCacheLifetime: 2880
policy:
provisioning:
action: DISABLED
profileMaster: false
groups: null
subject:
userNameTemplate:
template: idpuser.subjectAltNameEmail
filter: null
matchType: EMAIL
matchAttribute: null
mapAMRClaims: false
maxClockSkew: 0
_links:
deactivate:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/0oa6jxasyhwM2ZHJh0g4/lifecycle/deactivate"
hints:
allow:
- POST
users:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/0oa6jxasyhwM2ZHJh0g4/users"
hints:
allow:
- GET
keys:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/credentials/keys/45dec5ff-8cdc-48c0-85fe-a4869f1753dc"
hints:
allow:
- GET
NextAuthorizationServerKey:
summary: Next Authorization Server Key
value:
status: NEXT
alg: RS256
e: AQAB
"n": l1hZ_g2sgBE3oHvu34T-5XP18FYJWgtul_nRNg-5xra5ySkaXEOJUDRERUG0HrR42uqf9jYrUTwg9fp-SqqNIdHRaN8EwRSDRsKAwK
3 HIJ2NJfgmrrO2ABkeyUq6rzHxAumiKv1iLFpSawSIiTEBJERtUCDcjbbqyHVFuivIFgH8L37
- XDIDb0XG - R8DOoOHLJPTpsgH - rJe M5w96VIRZInsGC5OGWkFdtgk6OkbvVd7_TXcxLCpWeg1vlbmX
- 0 TmG5yjSj7ek05txcpxIqYu - 7 FIGT0KKvXge_BOSEUlJpBhLKU28 OtsOnmc3NLIGXB
- GeDiUZiBYQdPR - myB4ZoQ
kid: Y3vBOdYT-l-I0j-gRQ26XjutSX00TeWiSguuDhW3ngo
kty: RSA
use: sig
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/keys/Y3vBOdYT-l-I0j-gRQ26XjutSX00TeWiSguuDhW3ngo"
hints:
allow:
- GET
NzErrorApiValidationFailed:
summary: API Validation Failed
value:
errorCode: E0000003
errorSummary: The request body was not well-formed.
errorLink: E0000003
errorId: samplewNxQUR9iohr4QYlD0eg
errorCauses: []
NzErrorResourceNotFound:
summary: Resource Not Found
value:
errorCode: E0000007
errorSummary: "Not found: Resource not found: itd (NetworkZone)"
errorLink: E0000007
errorId: samplejCSVaKFDkCMElmKQ
errorCauses: []
OAuth2RefreshTokenResponseEx:
summary: OAuth 2.0 refresh token example
value:
id: oar579Mcp7OUsNTlo0g3
status: ACTIVE
created: 2023-03-09T03:18:06.000Z
lastUpdated: 2023-03-09T03:18:06.000Z
expiresAt: 2023-03-16T03:18:06.000Z
issuer: "https://{yourOktaDomain}/oauth2/ausain6z9zIedDCxB0h7"
clientId: 0oabskvc6442nkvQO0h7
userId: 00u5t60iloOHN9pBi0h7
scopes:
- offline_access
- car:drive
_embedded:
scopes:
- id: scppb56cIl4GvGxy70g3
name: offline_access
description: Requests a refresh token by default and is used to obtain
more access tokens without re-prompting the user for authentication
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scppb56cIl4GvGxy70g3"
title: offline_access
- id: scp142iq2J8IGRUCS0g4
name: car:drive
displayName: Drive car
description: Allows the user to drive a car
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scp142iq2J8IGRUCS0g4"
title: Drive car
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7"
title: Native
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
revoke:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
hints:
allow:
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oabskvc6442nkvQO0h7"
title: Example Client App
user:
href: "https://{yourOktaDomain}/api/v1/users/00upcgi9dyWEOeCwM0g3"
title: Saml Jackson
authorizationServer:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7"
title: Example Authorization Server
OAuth2RefreshTokenResponseListEx:
summary: App refresh token list example
value:
- id: oar579Mcp7OUsNTlo0g3
status: ACTIVE
created: 2023-03-09T03:18:06.000Z
lastUpdated: 2023-03-09T03:18:06.000Z
expiresAt: 2023-03-16T03:18:06.000Z
issuer: "https://{yourOktaDomain}/oauth2/ausain6z9zIedDCxB0h7"
clientId: 0oabskvc6442nkvQO0h7
userId: 00u5t60iloOHN9pBi0h7
scopes:
- offline_access
- car:drive
_embedded:
scopes:
- id: scppb56cIl4GvGxy70g3
name: offline_access
description: Requests a refresh token by default and is used to obtain
more access tokens without re-prompting the user for authentication
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scppb56cIl4GvGxy70g3"
title: offline_access
- id: scp142iq2J8IGRUCS0g4
name: car:drive
displayName: Drive car
description: Allows the user to drive a car
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scp142iq2J8IGRUCS0g4"
title: Drive car
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7"
title: Native
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
revoke:
href: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
hints:
allow:
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oabskvc6442nkvQO0h7"
title: Example Client App
user:
href: "https://{yourOktaDomain}/api/v1/users/00upcgi9dyWEOeCwM0g3"
title: Saml Jackson
authorizationServer:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7"
title: Example Authorization Server
OpenidConnectEx:
summary: OPENID_CONNECT
value:
name: oidc_client
label: Sample Client profile
signOnMode: OPENID_CONNECT
credentials:
oauthClient:
token_endpoint_auth_method: client_secret_post
profile:
label: oauth2 client app 1
settings:
oauthClient:
client_uri: http://localhost:8080
logo_uri: http://developer.okta.com/assets/images/logo-new.png
redirect_uris:
- https://example.com/oauth2/callback
- myapp://callback
response_types:
- token
- id_token
- code
grant_types:
- authorization_code
application_type: native
participate_slo: false
OpenidConnectPutEx:
summary: OPENID_CONNECT
value:
name: oidc_client
label: Sample Client profile updated
signOnMode: OPENID_CONNECT
OpenidConnectPutResponseEx:
summary: OPENID_CONNECT
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: true
web: true
appLinks:
oidc_client_link: true
name: oidc_client
label: Sample Client profile updated
features: []
signOnMode: OPENID_CONNECT
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: H34mvc6VrfV5yvy5wA8ikMFws6WInx4nvsAs-7EYbVc
oauthClient:
autoKeyRotation: true
client_id: 0oahonkqCRR6TSNlg4
client_secret: wj9bOsLK0BRNJqy7KMMnaE7m8qrW51bPO2n1-PYvkOmhHRYgcuOecQkEwq9MPYa5
token_endpoint_auth_method: client_secret_post
pkce_required: true
settings:
app: {}
oauthClient:
client_uri: http://localhost:8080
logo_uri: http://developer.okta.com/assets/images/logo-new.png
redirect_uris:
- https://example.com/oauth2/callback
- myapp://callback
response_types:
- token
- id_token
- code
grant_types:
- authorization_code
application_type: native
issuer_mode: DYNAMIC
idp_initiated_login:
mode: DISABLED
default_scope: []
wildcard_redirect: DISABLED
dpop_bound_access_tokens: false
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
OpenidConnectResponseEx:
summary: OPENID_CONNECT
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: true
web: true
appLinks:
oidc_client_link: true
name: oidc_client
label: Sample Client profile
features: []
signOnMode: OPENID_CONNECT
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: H34mvc6VrfV5yvy5wA8ikMFws6WInx4nvsAs-7EYbVc
oauthClient:
autoKeyRotation: true
client_id: 0oahonkqCRR6TSNlg4
client_secret: wj9bOsLK0BRNJqy7KMMnaE7m8qrW51bPO2n1-PYvkOmhHRYgcuOecQkEwq9MPYa5
token_endpoint_auth_method: client_secret_post
pkce_required: true
settings:
app: {}
oauthClient:
client_uri: http://localhost:8080
logo_uri: http://developer.okta.com/assets/images/logo-new.png
redirect_uris:
- https://example.com/oauth2/callback
- myapp://callback
response_types:
- token
- id_token
- code
grant_types:
- authorization_code
application_type: native
issuer_mode: DYNAMIC
idp_initiated_login:
mode: DISABLED
default_scope: []
wildcard_redirect: DISABLED
dpop_bound_access_tokens: false
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
profile:
label: oauth2 client app 1
OperationResponse:
value:
id: rre4mje4ez6B2a7B60g7
type: realm:assignment
status: COMPLETED
created: 2023-10-25T21:02:54.000Z
started: 2023-10-25T21:02:54.000Z
completed: 2023-10-25T21:02:54.000Z
realmId: 00g1b7rvh0xPLKXFf0g5
realmName: Realm Name
assignmentOperation:
configuration:
id: 0pr1b7rxZj2ibQzfP0g5
name: Realm Assignment 1
conditions:
profileSourceId: 0oa4enoRyjwSCy5hx0g4
expression:
value: string
actions:
assignUserToRealm:
realmId: 00g1b7rvh0xPLKXFf0g5
numUserMoved: 50
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/operations/rre4mje4ez6B2a7B60g7
method: GET
OptInStatusResponse:
summary: Opt in response
value:
optInStatus: OPTING_IN
_links:
optInStatus:
href: http://your-subdomain.okta.com/api/v1/iam/governance/optIn
OptOutStatusResponse:
summary: Opt out response
value:
optInStatus: OPTING_OUT
_links:
optInStatus:
href: http://your-subdomain.okta.com/api/v1/iam/governance/optIn
OrgCAPTCHASettingsConfigured:
summary: Org-wide Captcha Settings are configured
value:
captchaId: abcd4567
enabledPages:
- SSR
- SIGN_IN
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas/abcd4567
hints:
allow:
- GET
- POST
- PUT
- DELETE
OrgCAPTCHASettingsDisable:
summary: Disable Org-wide Captcha Settings
value:
captchaId: "null"
enabledPages: "null"
OrgCAPTCHASettingsDisabled:
summary: Disabled Org-wide Captcha Settings
value:
captchaId: "null"
enabledPages: "[]"
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas/
hints:
allow:
- GET
- PUT
OrgCAPTCHASettingsEmpty:
summary: Org-wide Captcha Settings aren't configured
value:
captchaId: null
enabledPages: []
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas
hints:
allow:
- GET
- POST
- PUT
- DELETE
OrgCAPTCHASettingsUpdate:
summary: Update Org-wide Captcha Settings
value:
captchaId: abcd4567
enabledPages:
- SSR
- SIGN_IN
OrgCAPTCHASettingsUpdated:
summary: Updated Org-wide Captcha Settings
value:
captchaId: abcd4567
enabledPages:
- SSR
- SIGN_IN
_links:
self:
href: https://your-subdomain.okta.com/api/v1/captchas/abcd4567
hints:
allow:
- GET
- POST
- PUT
- DELETE
OrgSettingResponse:
summary: Org setting response
value:
address1: 100 1st St
address2: 6th floor
city: San Fransico
companyName: okta
country: United States
endUserSupportHelpURL: support.okta.com
phoneNumber: "+18887227871"
postalCode: "94105"
state: California
supportPhoneNumber: "+18887227871"
website: www.okta.com
id: 00o3qqiw0vSCIwu8I0g7
created: 2024-01-24T14:15:22Z
lastUpdated: 2024-07-21T14:15:22Z
expiresAt: 2024-12-24T14:15:22Z
status: ACTIVE
subdomain: okta
_links:
preferences:
href: "https://{yourOktaDomain}/v1/org/preferences"
uploadLogo:
href: "https://{yourOktaDomain}/api/v1/org/logo"
hints:
allow:
- POST
oktaCommunication:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaCommunication"
logo: null
oktaSupport:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaSupport"
contacts:
href: https://vantest.oktapreview.com/api/v1/org/contacts
PasswordImportPayloadExample:
summary: An example password import inline hook request body
value:
eventId: 3o9jBzq1SmOGmmsDsqyyeQ
eventTime: 2020-01-17T21:23:56.000Z
eventType: com.okta.user.credential.password.import
eventTypeVersion: "1.0"
contentType: application/json
cloudEventVersion: "0.1"
source: "https://${yourOktaDomain}/api/v1/inlineHooks/cbl2ad6phv9fsPLcF0g7"
data:
context:
request:
id: XiIl6wn7005Rr@fjYqeC7CCDBxw
method: POST
url:
value: /idp/idx/challenge/answer
ipAddress: 66.124.153.138
credential:
username: [email protected]
password: Okta
action:
credential: UNVERIFIED
PasswordImportUnVerifiedResponse:
summary: A sample response for an unverified user password
value:
commands:
- type: com.okta.action.update
value:
credential: UNVERIFIED
PasswordImportVerifiedResponse:
summary: A sample response for a verified user password
value:
commands:
- type: com.okta.action.update
value:
credential: VERIFIED
PerClientRateLimitSettingsEnforceDefault:
value:
defaultMode: ENFORCE
PerClientRateLimitSettingsEnforceDefaultWithOverrides:
value:
defaultMode: ENFORCE
useCaseModeOverrides:
OAUTH2_AUTHORIZE: PREVIEW
OIE_APP_INTENT: DISABLE
PerClientRateLimitSettingsPreviewDefaultWithOverrides:
value:
defaultMode: PREVIEW
useCaseModeOverrides:
LOGIN_PAGE: ENFORCE
PermissionResponse:
value:
label: okta.users.manage
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.users.manage"
PermissionResponseWithConditions:
value:
label: okta.users.read
conditions:
include:
okta:ResourceAttribute/User/Profile:
- city
- state
- zipCode
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.users.read"
PermissionsResponse:
value:
permissions:
- label: okta.users.create
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.users.create"
- label: okta.users.read
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
conditions:
include:
okta:ResourceAttribute/User/Profile:
- city
- state
- zipCode
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.users.read"
- label: okta.groups.read
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.groups.read"
- label: okta.users.userprofile.manage
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions/okta.users.userprofile.manage"
PreviewEmailCustomizationResponse:
value:
subject: Welcome to Okta!
body: "
Hello, John. Click here to activate your account."
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/customizations/oel2kk1zYJBJbeaGo0g4/preview"
hints:
allow:
- GET
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
test:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test"
hints:
allow:
- POST
PreviewEmailTemplateDefaultContentResponse:
value:
subject: Welcome to Okta!
body: "
Hello, John. Click here to activate your account."
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/default-content/preview"
hints:
allow:
- GET
template:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation"
hints:
allow:
- GET
defaultContent:
href: "https://{yourOktaDomain}/api/v1/brands/{brandId}/templates/email/UserActivation/test/default-content"
hints:
allow:
- POST
PrincipalRateLimitEntityRequestEmptyPercentages:
value:
principalId: token1234
principalType: SSWS_TOKEN
PrincipalRateLimitEntityRequestSSWSToken:
value:
principalId: token1234
principalType: SSWS_TOKEN
defaultPercentage: 50
defaultConcurrencyPercentage: 75
PrincipalRateLimitEntityResponseSSWSToken:
value:
id: abcd1234
orgId: org1234
principalId: token1234
principalType: SSWS_TOKEN
defaultPercentage: 50
defaultConcurrencyPercentage: 75
createdDate: 2022-05-19T20:05:32.720Z
createdBy: user1234
lastUpdate: 2022-05-20T21:13:07.410Z
lastUpdatedBy: user4321
PrivilegedResourceClaimAppAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: APP_ACCOUNT
containerDetails:
appName: "google,"
containerId: "0oa103099SBEb3Z2b0g4,"
displayName: "Google App1,"
globalAppId: "964b82aa-85b4-5645-b790-83312c473480,"
passwordPushSupported: "true,"
provisioningEnabled: "true,"
_links:
login:
href: "https://appinstance-admin.oktapreview.com/home/google/0oa103099SBEb3Z2b0g4,"
logo:
href: "https://appinstance-admin.oktapreview.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png,"
credentials:
userName: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: ""
syncTime: ""
syncState: NOT_SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourceClaimOktaAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: OKTA_USER_ACCOUNT
resourceId: "00u100xTfFs4MasRf0g4,"
credentials:
userName: username
profile:
email: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: ""
syncTime: ""
syncState: NOT_SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourceCreateAppAccountRequest:
value:
resourceType: APP_ACCOUNT
containerDetails:
containerId: 0oa103099SBEb3Z2b0g4
credentials:
userName: [email protected]
PrivilegedResourceCreateAppAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: APP_ACCOUNT
containerDetails:
appName: "google,"
containerId: "0oa103099SBEb3Z2b0g4,"
displayName: "Google App1,"
globalAppId: "964b82aa-85b4-5645-b790-83312c473480,"
passwordPushSupported: "true,"
provisioningEnabled: "true,"
_links:
login:
href: "https://appinstance-admin.oktapreview.com/home/google/0oa103099SBEb3Z2b0g4,"
logo:
href: "https://appinstance-admin.oktapreview.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png,"
credentials:
userName: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: INACTIVE
credentialSyncInfo:
secretVersionId: ""
syncTime: ""
syncState: NOT_SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourceCreateOktaAccountRequestConvert:
value:
resourceType: OKTA_USER_ACCOUNT
resourceId: 00u100xTfFs4MasRf0g4
PrivilegedResourceCreateOktaAccountRequestNew:
value:
resourceType: OKTA_USER_ACCOUNT
credentials:
userName: username
profile:
email: [email protected]
PrivilegedResourceCreateOktaAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: OKTA_USER_ACCOUNT
resourceId: "00u100xTfFs4MasRf0g4,"
credentials:
userName: username
profile:
email: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: INACTIVE
credentialSyncInfo:
secretVersionId: ""
syncTime: ""
syncState: NOT_SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourceRotatePasswordAppAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: APP_ACCOUNT
containerDetails:
appName: "google,"
containerId: "0oa103099SBEb3Z2b0g4,"
displayName: "Google App1,"
globalAppId: "964b82aa-85b4-5645-b790-83312c473480,"
passwordPushSupported: "true,"
provisioningEnabled: "true,"
_links:
login:
href: "https://appinstance-admin.oktapreview.com/home/google/0oa103099SBEb3Z2b0g4,"
logo:
href: "https://appinstance-admin.oktapreview.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png,"
credentials:
userName: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: 9f8400-e29b-41d4-a716-926655440034
syncTime: ""
syncState: SYNCING
errorCode: ""
errorReason: ""
PrivilegedResourceRotatePasswordOktaAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: OKTA_USER_ACCOUNT
resourceId: "00u100xTfFs4MasRf0g4,"
credentials:
userName: username
profile:
email: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: 9f8400-e29b-41d4-a716-926655440034
syncTime: 2024-06-11T11:11:01.000Z
syncState: SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourcesAppAccountUpdateRequest:
value:
username: username
PrivilegedResourcesGetAppAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: APP_ACCOUNT
containerDetails:
appName: "google,"
containerId: "0oa103099SBEb3Z2b0g4,"
displayName: "Google App1,"
globalAppId: "964b82aa-85b4-5645-b790-83312c473480,"
passwordPushSupported: "true,"
provisioningEnabled: "true,"
_links:
login:
href: "https://appinstance-admin.oktapreview.com/home/google/0oa103099SBEb3Z2b0g4,"
logo:
href: "https://appinstance-admin.oktapreview.com/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png,"
credentials:
userName: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: 9f8400-e29b-41d4-a716-926655440034
syncTime: 2024-06-10T11:30:01.000Z
syncState: SYNC_FAILED
errorCode: UNKNOWN_ERROR
errorReason: Password update failed
PrivilegedResourcesGetOktaAccountResponse:
value:
id: opa100xTfFs4MasRf0g4
resourceType: OKTA_USER_ACCOUNT
resourceId: "00u100xTfFs4MasRf0g4,"
credentials:
userName: [email protected]
profile:
email: [email protected]
created: 2024-06-10T11:11:01.000Z
lastUpdated: 2024-06-10T11:11:01.000Z
status: ACTIVE
credentialSyncInfo:
secretVersionId: 9f8400-e29b-41d4-a716-926655440034
syncTime: 2024-06-10T11:30:01.000Z
syncState: SYNCED
errorCode: ""
errorReason: ""
PrivilegedResourcesOktaUserAccountUpdateRequest:
value:
username: username
profile:
email: [email protected]
ProfileEnrollmentRequest:
summary: An example Profile Enrollment (SSR) inline hook request body
value:
eventId: 04Dmt8BcT_aEgM
eventTime: 2022-04-25T17:35:27.000Z
eventType: com.okta.user.pre-registration
eventTypeVersion: 1
contentType: application/json
cloudEventVersion: 0.1
source: regt4qeBKU29vSoPz0g3
requestType: self.service.registration
data:
context:
request:
method: POST
ipAddress: 127.0.0.1
id: 123testId456
url:
value: /idp/idx/enroll/new
userProfile:
firstName: Rosario
lastName: Jones
login: [email protected]
email: [email protected]
action: ALLOW
ProfileEnrollmentResponse:
summary: An example Profile Enrollment (SSR) inline hook response
value:
commands:
- type: com.action.update
value:
registration: ALLOW
ProfileEnrollmentResponseDeny:
summary: An example Profile Enrollment (SSR) inline hook Deny response
value:
commands:
- type: com.action.update
value:
registration: DENY
error:
errorSummary: Incorrect email address. Please contact your admin.
errorCauses:
- errorSummary: Only example.com emails can register.
reason: INVALID_EMAIL_DOMAIN
locationType: body
location: data.userProfile.email
domain: end-user
ProgressiveProfileRequest:
summary: An example Progressive Profile inline hook request
value:
eventId: vzYp_zMwQu2htIWRbNJdfw
eventTime: 2022-04-25T04:04:41.000Z
eventType: com.okta.user.pre-registration
eventTypeVersion: 1
contentType: application/json
cloudEventVersion: 0.1
source: regt4qeBKU29vS
requestType: progressive.profile
data:
context:
request:
method: POST
ipAddress: 127.0.0.1
id: 123dummyId456
url:
value: /idp/idx/enroll/update
user:
passwordChanged: 2022-01-01T00:00:00.000Z
_links:
groups:
href: /api/v1/users/00u48gwcu01WxvNol0g7/groups
factors:
href: /api/v1/users/00u48gwcu01WxvNol0g7/factors
profile:
firstName: Rosario
lastName: Jones"
timeZone: America/Los_Angeles
login: [email protected]
locale: en_US
id: 00u48gwcu01WxvNo
action: ALLOW
userProfileUpdate:
employeeNumber: 1234
ProgressiveProfileResponse:
summary: An example Progressive Profile inline hook response
value:
commands:
- type: com.okta.user.progressive.profile.update'
value: "request.body.data.userProfileUpdate['employeeNumber']"
ProgressiveProfileResponseDeny:
summary: An example Progressive Profile inline hook Deny response
value:
commands:
- type: com.action.update
value:
registration: DENY
error:
errorSummary: Incorrect employee number. Enter an employee number with 4
digits.
errorCauses:
- errorSummary: Only employee numbers with 4 digits can register.
reason: INVALID_EMPLOYEE_NUMBER
locationType: body
location: data.userProfile.employeeNumber
domain: end-user
ProvisioningConnectionOauthO365RequestEx:
summary: Provisioning Connection with OAuth 2.0 for Microsoft Office 365 app
value:
profile:
authScheme: OAUTH2
settings:
adminUsername: office_admin-username
adminPassword: office_admin-password
ProvisioningConnectionOauthRequestEx:
summary: Provisioning Connection with OAuth 2.0
value:
profile:
authScheme: OAUTH2
ProvisioningConnectionOauthResponseEx:
summary: Provisioning Connection with OAuth 2.0 for Microsoft Office 365 app
value:
status: ENABLED
profile:
authScheme: OAUTH2
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default"
hints:
allow:
- GET
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default/lifecycle/deactivate"
hints:
allow:
- POST
authorize:
href: https://login.microsoftonline.com/myofficetenant.onmicrosoft.com/oauth2/authorize?response_type=code&state=>&client_id=&redirect_uri=&scope=
hints:
allow:
- GET
guidance:
- Specifies the URI to invoke in a browser for granting scope consent
required to complete the OAuth 2.0 connection.
ProvisioningConnectionTokenOrg2OrgRequestEx:
summary: Provisioning Connection with token for Okta Org2Org app
value:
profile:
authScheme: TOKEN
clientId: 0oa2h6su6bVFyJzIf1d7
ProvisioningConnectionTokenRequestEx:
summary: Provisioning Connection with token for Zscaler 2.0 (`zscalerbyz`) app
value:
baseUrl: https://scim.zscalerbeta.net/1234567/890/scim
profile:
authScheme: TOKEN
token: 00NgAPZqUVy8cX9ehNzzahEE5b-On9sImTcInvWp-x
ProvisioningConnectionTokenResponseWithProfileOrg2OrgEx:
summary: Provisioning Connection with token for Okta Org2Org (`okta_org2org`)
app
value:
authScheme: TOKEN
status: ENABLED
baseUrl: https://targetorg.okta.com
profile:
authScheme: TOKEN
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default"
hints:
allow:
- GET
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default/lifecycle/deactivate"
hints:
allow:
- POST
ProvisioningConnectionTokenResponseWithProfileZscalerEx:
summary: Provisioning Connection with token for Zscaler 2.0 (`zscalerbyz`) app
value:
authScheme: TOKEN
status: ENABLED
baseUrl: https://scim.zscalerbeta.net/1234567/890/scim
profile:
authScheme: TOKEN
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default"
hints:
allow:
- GET
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/connections/default/lifecycle/deactivate"
hints:
allow:
- POST
PushProviderAPNsRequest:
value:
name: APNs Example
providerType: APNS
configuration:
keyId: KEY_ID
teamId: TEAM_ID
tokenSigningKey: '-----BEGIN PRIVATE KEY-----\nPRIVATE_KEY\n-----END PRIVATE
KEY-----\n'
fileName: fileName.p8
PushProviderAPNsResponse:
value:
id: ppctekcmngGaqeiBxB0g4
name: APNs Example
providerType: APNS
lastUpdatedDate: 2022-01-01T00:00:00.000Z
configuration:
keyId: KEY_ID
teamId: TEAM_ID
fileName: fileName.p8
_links:
self:
href: https://your-subdomain.okta.com/api/v1/push-providers/ppctekcmngGaqeiBxB0g4
hints:
allow:
- DELETE
- GET
- PUT
PushProviderFCMRequest:
value:
name: FCM Example
providerType: FCM
configuration:
serviceAccountJson:
type: service_account
project_id: PROJECT_ID
private_key_id: KEY_ID
private_key: '-----BEGIN PRIVATE KEY-----\nPRIVATE_KEY\n-----END PRIVATE
KEY-----\n'
client_email: SERVICE_ACCOUNT_EMAIL
client_id: CLIENT_ID
auth_uri: https://accounts.google.com/o/oauth2/auth
token_uri: https://accounts.google.com/o/oauth2/token
auth_provider_x509_cert_url: https://www.googleapis.com/oauth2/v1/certs
client_x509_cert_url: https://www.googleapis.com/robot/v1/metadata/x509/SERVICE_ACCOUNT_EMAIL
fileName: fileName.json
PushProviderFCMResponse:
value:
id: ppctekcmngGaqeiBxB0g4
name: FCM Example
providerType: FCM
lastUpdatedDate: 2022-01-01T00:00:00.000Z
configuration:
projectId: PROJECT_ID
fileName: fileName.p8
_links:
self:
href: https://your-subdomain.okta.com/api/v1/push-providers/ppctekcmngGaqeiBxB0g4
hints:
allow:
- DELETE
- GET
- PUT
RateLimitAdminNotificationsDisabled:
value:
notificationsEnabled: false
RateLimitAdminNotificationsEnabled:
value:
notificationsEnabled: true
RateLimitWarningThresholdValidExample:
value:
warningThreshold: 66
RealmResponse:
value:
id: guox9jQ16k9V8IFEL0g3
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
isDefault: false
profile:
name: Car Co
_links:
self:
rel: self
href: http://your-subdomain.okta.com/api/v1/realms/guox9jQ16k9V8IFEL0g3
method: GET
RefreshCurrentSessionResponse:
summary: Refresh current session
value:
amr:
- pwd
createdAt: 2019-08-24T14:15:22Z
expiresAt: 2019-08-24T14:15:22Z
id: l7FbDVqS8zHSy65uJD85
idp:
id: 01a2bcdef3GHIJKLMNOP
type: ACTIVE_DIRECTORY
lastFactorVerification: 2019-08-24T14:15:22Z
lastPasswordVerification: 2019-08-24T14:15:22Z
login: [email protected]
status: ACTIVE
userId: 00u0abcdefGHIJKLMNOP
_links:
self:
hints:
allow:
- GET
- DELETE
href: "https://{yourOktaDomain}/api/v1/sessions/me"
refresh:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/sessions/me/lifecycle/refresh"
user:
hints:
allow:
- GET
href: "https://{yourOktaDomain}/api/v1/users/me"
name: User Name
RefreshSessionResponse:
summary: Refresh an existing Session using the session ID
value:
amr:
- pwd
createdAt: 2019-08-25T14:17:22Z
expiresAt: 2019-08-25T14:17:22Z
id: l7FbDVqS8zHSy65uJD85
idp:
id: 01a2bcdef3GHIJKLMNOP
type: ACTIVE_DIRECTORY
lastFactorVerification: 2019-08-24T14:15:22Z
lastPasswordVerification: 2019-08-24T14:15:22Z
login: [email protected]
status: ACTIVE
userId: 00u0abcdefGHIJKLMNOP
_links:
self:
hints:
allow:
- DELETE
href: "https://{yourOktaDomain}/api/v1/sessions/l7FbDVqS8zHSy65uJD85"
RemoveMappingBody:
summary: Update an existing profile mapping by removing one or more properties
value:
properties:
nickName:
expression: null
pushStatus: null
RemoveMappingResponse:
summary: Update an existing profile mapping by removing one or more properties
value:
id: prm1k47ghydIQOTBW0g4
source:
id: otysbePhQ3yqt4cVv0g3
name: user
type: user
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otysbePhQ3yqt4cVv0g3"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscsbePhQ3yqt4cVv0g3"
target:
id: 0oa1qmn4LZQQEH0wZ0g4
name: okta_org2org
type: appuser
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1qmn4LZQQEH0wZ0g4"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/apps/0oa1qmn4LZQQEH0wZ0g4/default"
properties:
fullName:
expression: user.firstName + user.lastName
pushStatus: PUSH
_links:
self:
href: "https://{yourOktaDomain}/api/v1/mappings/prm1k48weFSOnEUnw0g4"
ReplaceAnEventHookWithFilter:
summary: Replace an event hook
value:
name: Event Hook with Filter
description: An event hook using an Okta Expression Language filter
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter:
type: EXPRESSION_LANGUAGE
eventFilterMap:
- event: group.user_membership.add
condition:
expression: "event.target.?[type eq 'UserGroup'].size()>0 && event.target.?[displayName\
\ eq 'Sales'].size()>0"
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
authScheme:
type: HEADER
key: Authorization
value: my-shared-secret
ReplaceAuthServerBody:
summary: Replace a custom authorization server
value:
name: New Authorization Server
description: Authorization Server description
audiences:
- api://default
credentials:
signing:
rotationMode: AUTO
use: sig
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: ORG_URL
status: ACTIVE
ReplaceAuthServerResponse:
summary: Replace a custom authorization server
value:
id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: ORG_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: AUTO
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
_links:
scopes:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes"
hints:
allow:
- GET
claims:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims"
hints:
allow:
- GET
policies:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- GET
- DELETE
- PUT
metadata:
- name: oauth-authorization-server
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/oauth-authorization-server"
hints:
allow:
- GET
- name: openid-configuration
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/openid-configuration"
hints:
allow:
- GET
rotateKey:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/lifecycle/keyRotate"
hints:
allow:
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/lifecycle/deactivate"
hints:
allow:
- POST
ReplaceCustomTokenClaimBody:
summary: Replace a custom token Claim
value:
- alwaysIncludeInToken: true
claimType: IDENTITY
conditions:
scopes:
- profile
group_filter_type: CONTAINS
name: Knowledge_Base
status: ACTIVE
system: false
value: Knowledge Base
valueType: GROUPS
ReplaceCustomTokenClaimResponse:
summary: Replace a custom token Claim response
value:
- id: "{claimId}"
name: Knowledge_Base
status: ACTIVE
claimType: IDENTITY
valueType: GROUPS
value: Knowledge Base
conditions:
scopes:
- profile
system: false
alwaysIncludeInToken: true
apiResourceId: null
group_filter_type: CONTAINS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims/{claimId}"
hints:
allow:
- GET
- PUT
- DELETE
ReplaceIdPRequestResponse:
summary: Replace an Identity Provider
value:
id: 0oa62bc8wppPw0UGr0h7
type: SAML2
name: Example SAML IdP
status: INACTIVE
created: null
lastUpdated: 2016-03-29T21:23:45.000Z
protocol:
type: SAML2
endpoints:
sso:
url: https://idp.example.com/saml2/sso
binding: HTTP-REDIRECT
destination: https://idp.example.com/saml2/sso
acs:
binding: HTTP-POST
type: INSTANCE
algorithms:
request:
signature:
algorithm: SHA-256
scope: REQUEST
response:
signature:
algorithm: SHA-256
scope: ANY
settings:
nameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
credentials:
trust:
issuer: https://idp.example.com
audience: https://www.okta.com/saml2/service-provider/spCQJRNaaxs7ANqKBO7M
kid: your-key-id
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: idpuser.subjectNameId
filter: null
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 120000
_links:
metadata:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/metadata.xml"
type: application/xml
hints:
allow:
- GET
acs:
href: "https://{yourOktaDomain}/sso/saml2/0oa62bc8wppPw0UGr0h7"
type: application/xml
hints:
allow:
- POST
users:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/users"
hints:
allow:
- GET
activate:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/lifecycle/activate"
hints:
allow:
- POST
ReplaceKeyResponse:
summary: Replace a key response example
value:
id: HKY1p7jWLndGQV9M60g4
keyId: 7fbc27fd-e3df-4522-86bf-1930110256ad
name: My updated new key
created: 2022-08-31T18:09:58.000Z
lastUpdated: 2022-08-31T18:16:59.000Z
isUsed: "false"
ReplaceNetworkZone:
summary: Replace a Network Zone
value:
type: IP
id: nzovw2rFz2YoqmvwZ0g9
name: UpdatedNetZone
status: ACTIVE
system: false
usage: POLICY
gateways:
- type: CIDR
value: 10.2.3.4/24
- type: CIDR
value: 12.2.3.4/24
- type: RANGE
value: 13.4.5.6-13.4.5.8
- type: CIDR
value: 14.2.3.4/24
proxies:
- type: CIDR
value: 12.2.3.4/24
- type: CIDR
value: 13.3.4.5/24
- type: RANGE
value: 14.4.5.6-14.4.5.8
- type: RANGE
value: 15.5.6.7/24-15.5.6.9
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzovw2rFz2YoqmvwZ0g9"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzovw2rFz2YoqmvwZ0g9/lifecycle/deactivate"
hints:
allow:
- POST
ReplaceNetworkZoneResponse:
summary: Replace Network Zone
value:
type: IP
id: nzovw2rFz2YoqmvwZ0g9
name: UpdatedNetZone
status: ACTIVE
usage: POLICY
created: 2022-05-08T18:25:05.000Z
lastUpdated: 2022-05-10T13:15:22.000Z
system: false
gateways:
- type: CIDR
value: 10.2.3.4/24
- type: CIDR
value: 12.2.3.4/24
- type: RANGE
value: 13.4.5.6-13.4.5.8
- type: CIDR
value: 14.2.3.4/24
proxies:
- type: CIDR
value: 12.2.3.4/24
- type: CIDR
value: 13.3.4.5/24
- type: RANGE
value: 14.4.5.6-14.4.5.8
- type: RANGE
value: 15.5.6.7/24-15.5.6.9
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzovw2rFz2YoqmvwZ0g9"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzovw2rFz2YoqmvwZ0g9/lifecycle/deactivate"
hints:
allow:
- POST
ReplaceResourceSetRequest:
value:
label: SF-IT-People
description: People in the IT department of San Francisco
ReplaceRoleRequest:
value:
label: UserCreator
description: Create users
ReplaceUserTypePutRequest:
summary: Replace user type request
value:
displayName: Replacement Display Name
description: Replacement description
name: newUserType
ReplaceUserTypePutResponse:
summary: Replace user type response
value:
id: otyfnly5cQjJT9PnR0g4
displayName: Replacement Display Name
name: newUserType
description: Replacement description
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
ResetPwdWithoutSendingEmailResponse:
value:
summary: Reset password without sending email
resetPasswordUrl: "https://{yourOktaDomain}/reset_password/XE6wE17zmphl3KqAPFxO"
ResourceSelectorCreateRequestExample:
value:
name: All applications except Workday applications
description: All applications except Workday applications
schema: /api/v1/apps
filter: name ne "workday"
ResourceSelectorCreateResponseExample:
value:
id: rsl1hx31gVEa6x10v0g5
name: All applications except Workday applications
description: All applications except Workday applications
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:resource_selectors:rsl1hx31gVEa6x10v0g5:apps
_links:
self:
href: "https://{yourOktaDomain}/api/v1/resource-selectors/rsl1hx31gVEa6x10v0g5"
resources:
href: "https://{yourOktaDomain}/api/v1/apps?filter=\"name ne \"workday\"\
\""
ResourceSelectorPatchRequestExample:
value:
name: All applications except Facebook applications
description: All applications except Facebook applications
filter: name ne "facebook"
ResourceSelectorPatchResponseExample:
value:
id: rsl1hx31gVEa6x10v0g5
name: All applications except Facebook applications
description: All applications except Facebook applications
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:resource_selectors:rsl1hx31gVEa6x10v0g5:apps
_links:
self:
href: "https://{yourOktaDomain}/api/v1/resource-selectors/rsl1hx31gVEa6x10v0g5"
resources:
href: "https://{yourOktaDomain}/api/v1/apps?filter=\"name ne \"facebook\"\
\""
ResourceSelectorResponseExample:
value:
id: rsl1hx31gVEa6x10v0g5
name: All applications except a specific application
description: All applications except a specific application
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:resource_selectors:rsl1hx31gVEa6x10v0g5:apps
_links:
self:
href: "https://{yourOktaDomain}/api/v1/resource-selectors/rsl1hx31gVEa6x10v0g5"
resources:
href: "https://{yourOktaDomain}/api/v1/apps?filter=\"id ne 0oafxqAAJWWGELFTYASH\""
ResourceSelectorsResponseExample:
value:
resourceSelectors:
- id: rsl1hx31gVEa6x10v0g5
name: All applications except Workday applications
description: All applications except Workday applications
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:resource_selectors:rsl1hx31gVEa6x10v0g5:apps
_links:
resources:
href: "http://${yourOktaDomain}/api/v1/apps?filter=\"id ne 0oafxqCAJWWGELFTYASJ\""
- id: rsl1hx31gVEa6x10v0g6
name: All applications except Facebook applications
description: All applications except Facebook applications
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:resource_selectors:rsl1hx31gVEa6x10v0g6:apps
_links:
resources:
href: "http://${yourOktaDomain}/api/v1/apps?filter=\"id ne 0oafxqAAJWWGELFTYASH"
_links:
next:
href: "https://{yourOktaDomain}/api/v1/resource-selectors?after=rsl1hx31gVEa6x10v0g6"
ResourceSetBindingAddMembersRequestExample:
value:
additions:
- "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
- "https://{yourOktaDomain}/api/v1/users/00u67DU2qNCjNZYO0g3"
ResourceSetBindingCreateRequestExample:
value:
role: cr0Yq6IJxGIr0ouum0g3
members:
- "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
ResourceSetBindingMemberResponse:
value:
id: irb1qe6PGuMc7Oh8N0g4
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00uuk41Hjga5qGfQ30g3"
ResourceSetBindingMembersResponse:
value:
members:
- id: irb1qe6PGuMc7Oh8N0g4
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00uuk41Hjga5qGfQ30g3"
- id: irb1q92TFAHzySt3x0g4
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
_links:
binding:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3"
next:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3/members?after=0ouRq6IJmGIr3ouum0g3"
ResourceSetBindingResponseExample:
value:
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3"
bindings:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
ResourceSetBindingResponseWithIdExample:
value:
id: cr0Yq6IJxGIr0ouum0g3
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3"
bindings:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
ResourceSetBindingsResponse:
value:
roles:
- id: cr0WxyzJxGIr0ouum0g4
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0WxyzJxGIr0ouum0g4"
members:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0WxyzJxGIr0ouum0g4/members"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
next:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings?after=cr0WxyzJxGIr0ouum0g4"
ResourceSetRequest:
value:
label: SF-IT-People
description: People in the IT department of San Francisco
resources:
- "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
- "https://{yourOktaDomain}/api/v1/groups/00gu67DU2qNCjNZYO0g3/users"
- "https://{yourOktaDomain}/api/v1/users"
ResourceSetResourcePatchRequestExample:
value:
additions:
- "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
- "https://{yourOktaDomain}/api/v1/groups/00gu67DU2qNCjNZYO0g3/users"
ResourceSetResourcePostRequestExample:
summary: Resource Set with conditions request
value:
resourceOrnOrUrl: "https://{yourOktaDomain}/api/v1/apps"
conditions:
Exclude:
okta:ORN:
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:0oa1014FmyZ2H0oRY0g4
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:slack
ResourceSetResourcePutRequestExample:
value:
conditions:
Exclude:
okta:ORN:
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:0oa1014FmyZ2H0oRY0g4
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:slack
ResourceSetResourceResponse:
summary: Resource Set response
value:
id: ire106sQKoHoXXsAe0g4
orn: orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps
conditions:
Exclude:
okta:ORN:
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:0oa1014FmyZ2H0oRY0g4
- orn:okta:idp:00o5rb5mt2H3d1TJd0h7:apps:slack
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps"
resource:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources/ire2snv2xSY7a4iSe0g1"
ResourceSetResourcesResponse:
value:
resources:
- id: ire106sQKoHoXXsAe0g4
orn: "orn:{partition}:directory:{yourOrgId}:groups:00guaxWZ0AOa5NFAj0g3"
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/groups/00guaxWZ0AOa5NFAj0g3"
resource:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources/ire2snv2xSY7a4iSe0g1"
- id: ire106riDrTYl4qA70g4
orn: "orn:{partition}:directory:{yourOrgId}:groups:00gu67DU2qNCjNZYO0g3:contained_resources"
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/groups/00gu67DU2qNCjNZYO0g3/users"
resource:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources/ire2snv2xSY7a4iSe0g2"
- id: irezvo4AwE2ngpMw40g3
orn: "orn:{partition}:directory:{yourOrgId}:users"
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users"
users:
href: "https://{yourOktaDomain}/api/v1/users"
- id: ire2j4iDnxHhUFaZN0g4
orn: "orn:{partition}:directory:{yourOrgId}:groups"
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/groups"
groups:
href: "https://{yourOktaDomain}/api/v1/groups"
resource:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources/ire2snv2xSY7a4iSe0g3"
_links:
next:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources?after=irezvn1ZZxLSIBM2J0g3"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
ResourceSetResponse:
value:
id: iamoJDFKaJxGIr0oamd9g
label: SF-IT-People
description: People in the IT department of San Francisco
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
resources:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources"
bindings:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings"
ResourceSetsResponse:
value:
resource-sets:
- id: iamoJDFKaJxGIr0oamd9g
label: SF-IT-1
description: First San Francisco IT Resource Set
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
resources:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/resources"
bindings:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings"
- id: iamoJDFKaJxGIr0oamd0q
label: SF-IT-2
description: Second San Francisco IT Resource Set
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd0q"
resources:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd0q/resources"
bindings:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd0q/bindings"
_links:
next:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets?after=iamoJDFKaJxGIr0oamd0q"
RetrieveADeactivatedEventHook:
summary: Deactivated event hook
value:
id: who8vt36qfNpCGz9H1e6
status: INACTIVE
verificationStatus: VERIFIED
name: Event Hook Test
description: null
created: 2023-07-07T13:41:56.000Z
createdBy: 00u7xut94qEWYx5ss1e5
lastUpdated: 2023-07-07T13:43:03.000Z
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter: null
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
headers:
- key: X-Other-Header
value: my-header-value
method: POST
authScheme:
type: HEADER
key: authorization
_links:
self:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6
verify:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/verify
hints:
allow:
- POST
deactivate:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/deactivate
hints:
allow:
- POST
RetrieveAllEventHooks:
summary: Retrieves all event hooks
value:
- id: who8tsqyrhCdmetzx135
status: ACTIVE
verificationStatus: VERIFIED
name: Event Hook Test
description: null
created: 2023-07-07T17:41:56.000Z
createdBy: 00u7xut94qEWYx5ss1e5
lastUpdated: 2023-07-07T17:43:03.000Z
events:
type: EVENT_TYPE
items:
- user.lifecycle.deactivate
- user.lifecycle.activate
filter: null
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userDeactivate
headers: []
method: POST
authScheme:
type: HEADER
key: authorization
_links:
self:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx135
verify:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx135/lifecycle/verify
hints:
allow:
- POST
deactivate:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx135/lifecycle/deactivate
hints:
allow:
- POST
- id: who8vt36qfNpCGz9H1e6
status: ACTIVE
verificationStatus: VERIFIED
name: Event Hook with Filter
description: An event hook using an Okta Expression Language filter
created: 2023-07-07T13:41:56.000Z
createdBy: 00u7xut94qEWYx5ss1e5
lastUpdated: 2023-07-07T13:43:03.000Z
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter:
type: EXPRESSION_LANGUAGE
eventFilterMap:
- event: group.user_membership.add
condition:
version: null
expression: "event.target.?[type eq 'UserGroup'].size()>0 && event.target.?[displayName\
\ eq 'Sales'].size()>0"
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
headers: []
method: POST
authScheme:
type: HEADER
key: authorization
_links:
self:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6
verify:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/verify
hints:
allow:
- POST
deactivate:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/deactivate
hints:
allow:
- POST
RetrieveAllZones:
summary: Retrieves all Network Zones
value:
- type: DYNAMIC_V2
id: nzok0oz2xYHOZtIch0g4
name: testZone106
status: ACTIVE
usage: BLOCKLIST
create: 2024-05-13T16:33:44.000Z
lastUpdated: 2024-05-13T16:33:44.000Z
system: false
locations:
include: []
exclude: []
asns:
include: []
exclude: []
ipServiceCategories:
include:
- ALL_ANONYMIZERS
exclude: []
_links:
self:
href: "http://{yourOktaDomain}/api/v1/zones/nzok0oz2xYHOZtIch0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "http://{yourOktaDomain}/api/v1/zones/nzok0oz2xYHOZtIch0g4/lifecycle/deactivate"
hints:
allow:
- POST
- type: DYNAMIC
id: nzoy0ox5xADOZtKrh0g6
name: test
status: ACTIVE
usage: POLICY
created: 2022-05-19T15:33:32.000Z
lastUpdated: 2022-05-19T15:33:32.000Z
system: false
locations:
- country: AF
region: AF-BGL
proxyType: ANY
asns:
- "23457"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzoy0ox5xADOZtKrh0g6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzoy0ox5xADOZtKrh0g6/lifecycle/deactivate"
hints:
allow:
- POST
- type: IP
id: nzowc1U5Jh5xuAK0o0g3
name: MyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-24T20:37:32.000Z
lastUpdated: 2021-06-24T20:37:32.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
proxies:
- type: RANGE
value: 3.3.4.5-3.3.4.15
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3/lifecycle/deactivate"
hints:
allow:
- POST
- type: IP
id: nzou3u0stMCmgOzXK1d6
name: BlockedIpZone
status: ACTIVE
usage: BLOCKLIST
created: 2021-06-09T21:32:46.000Z
lastUpdated: 2021-06-09T21:32:46.000Z
system: true
gateways: null
proxies: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6/lifecycle/deactivate"
hints:
allow:
- POST
- type: DYNAMIC_V2
id: nzohcnxFrSgsiwyHp0g4
name: DefaultEnhancedDynamicZone
status: ACTIVE
usage: BLOCKLIST
created: 2024-05-06T19:12:29.000Z
lastUpdated: 2024-05-09T21:02:31.000Z
system: true
locations:
include: []
exclude: []
ipServiceCategories:
include:
- ALL_ANONYMIZERS
exclue: []
asns:
include: []
exclude: []
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0stMCmgOzXK1d6/lifecycle/deactivate"
hints:
allow:
- POST
- type: IP
id: nzou3u0ssJfZjYsWL1d6
name: LegacyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-09T21:32:46.000Z
lastUpdated: 2021-06-09T21:32:46.000Z
system: true
gateways: null
proxies: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0ssJfZjYsWL1d6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzou3u0ssJfZjYsWL1d6/lifecycle/deactivate"
hints:
allow:
- POST
RetrieveAllZonesWithFilter:
summary: Retrieves Network Zones with filter
value:
- type: IP
id: nzowc1U5Jh5xuAK0o0g3
name: MyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-24T20:37:32.000Z
lastUpdated: 2021-06-24T20:37:32.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
proxies:
- type: RANGE
value: 3.3.4.5-3.3.4.15
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3/lifecycle/deactivate"
hints:
allow:
- POST
RetrieveAnEventHook:
summary: Retrieve an event hook
value:
id: who8vt36qfNpCGz9H1e6
status: ACTIVE
verificationStatus: VERIFIED
name: Event Hook Test
description: null
created: 2023-07-07T13:41:56.000Z
createdBy: 00u7xut94qEWYx5ss1e5
lastUpdated: 2023-07-07T13:43:03.000Z
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter: null
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
headers:
- key: X-Other-Header
value: my-header-value
method: POST
authScheme:
type: HEADER
key: authorization
_links:
self:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6
verify:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/verify
hints:
allow:
- POST
deactivate:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/deactivate
hints:
allow:
- POST
RetrieveAnEventHookWithFilter:
summary: Retrieve an event hook
value:
id: who8vt36qfNpCGz9H1e6
status: ACTIVE
verificationStatus: VERIFIED
name: Event Hook with Filter
description: An event hook using an Okta Expression Language filter
created: 2023-07-07T13:41:56.000Z
createdBy: 00u7xut94qEWYx5ss1e5
lastUpdated: 2023-07-07T13:43:03.000Z
events:
type: EVENT_TYPE
items:
- group.user_membership.add
filter:
type: EXPRESSION_LANGUAGE
eventFilterMap:
- event: group.user_membership.add
condition:
version: null
expression: "event.target.?[type eq 'UserGroup'].size()>0 && event.target.?[displayName\
\ eq 'Sales'].size()>0"
channel:
type: HTTP
version: 1.0.0
config:
uri: https://example_external_service/userAdded
method: POST
authScheme:
type: HEADER
key: authorization
_links:
self:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6
verify:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/verify
hints:
allow:
- POST
deactivate:
href: https://example.com/api/v1/eventHooks/who8tsqyrhCdmetzx1e6/lifecycle/deactivate
hints:
allow:
- POST
RetrieveAuthServerResponse:
summary: Retrieve a custom authorization server
value:
id: "{authorizationServerId}"
name: Sample Authorization Server
description: Sample Authorization Server description
audiences:
- https://api.resource.com
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
issuerMode: ORG_URL
status: ACTIVE
created: 2023-05-17T22:25:57.000Z
lastUpdated: 2023-05-17T22:25:57.000Z
credentials:
signing:
rotationMode: AUTO
lastRotated: 2023-05-17T22:25:57.000Z
nextRotation: 2023-08-15T22:25:57.000Z
kid: WYQxoK4XAwGFn5Zw5AzLxFvqEKLP79BbsKmWeuc5TB4
_links:
scopes:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes"
hints:
allow:
- GET
claims:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims"
hints:
allow:
- GET
policies:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/policies"
hints:
allow:
- GET
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
hints:
allow:
- GET
- DELETE
- PUT
metadata:
- name: oauth-authorization-server
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/oauth-authorization-server"
hints:
allow:
- GET
- name: openid-configuration
href: "https://{yourOktaDomain}/oauth2/{authorizationServerId}/.well-known/openid-configuration"
hints:
allow:
- GET
rotateKey:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/credentials/lifecycle/keyRotate"
hints:
allow:
- POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/lifecycle/deactivate"
hints:
allow:
- POST
RetrieveCurrentSessionResponse:
summary: Retrieve current session
value:
amr:
- pwd
createdAt: 2019-08-24T14:15:22Z
expiresAt: 2019-08-24T14:15:22Z
id: l7FbDVqS8zHSy65uJD85
idp:
id: 01a2bcdef3GHIJKLMNOP
type: ACTIVE_DIRECTORY
lastFactorVerification: 2019-08-24T14:15:22Z
lastPasswordVerification: 2019-08-24T14:15:22Z
login: [email protected]
status: ACTIVE
userId: 00u0abcdefGHIJKLMNOP
_links:
self:
hints:
allow:
- GET
- DELETE
href: "https://{yourOktaDomain}/api/v1/sessions/me"
refresh:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/sessions/me/lifecycle/refresh"
user:
hints:
allow:
- GET
href: "https://{yourOktaDomain}/api/v1/users/me"
name: User Name
RetrieveCustomTokenClaimResponse:
summary: Retrieve a custom token Claim response
value:
- id: "{claimId}"
name: Support
status: ACTIVE
claimType: IDENTITY
valueType: GROUPS
value: Support
conditions:
scopes:
- profile
system: false
alwaysIncludeInToken: true
apiResourceId: null
group_filter_type: CONTAINS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/claims/{claimId}"
hints:
allow:
- GET
- PUT
- DELETE
RetrieveFeaturesResponse:
summary: Retrieve a feature by ID
value:
id: ftrZooGoT8b41iWRiQs7
description: Example feature description
name: Example feature name
stage:
state: CLOSED
value: BETA
status: DISABLED
type: self-service
_links:
self:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/features/ftrZooGoT8b41iWRiQs7"
dependents:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependents"
dependencies:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependencies"
RetrieveKeyResponse:
summary: Retrieve a key by id response example
value:
id: HKY1p7jWLndGQV9M60g4
keyId: 7fbc27fd-e3df-4522-86bf-1930110256ad
name: My new key
created: 2022-08-31T18:09:58.000Z
lastUpdated: 2022-08-31T18:09:58.000Z
isUsed: "false"
RetrieveMappingsResponse:
summary: Retrieve a single Profile Mapping
value:
id: prm1k47ghydIQOTBW0g4
source:
id: otysbePhQ3yqt4cVv0g3
name: user
type: user
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otysbePhQ3yqt4cVv0g3"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscsbePhQ3yqt4cVv0g3"
target:
id: 0oa1qmn4LZQQEH0wZ0g4
name: okta_org2org
type: appuser
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1qmn4LZQQEH0wZ0g4"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/apps/0oa1qmn4LZQQEH0wZ0g4/default"
properties:
firstName:
expression: user.firstName
pushStatus: PUSH
lastName:
expression: user.lastName
pushStatus: PUSH
_links:
self:
href: "https://{yourOktaDomain}/api/v1/mappings/prm1k48weFSOnEUnw0g4"
RetrieveNetworkZoneDynamic:
summary: Dynamic Network Zone
value:
type: DYNAMIC
id: nzoy0ox5xADOZtKrh0g6
name: test
status: ACTIVE
usage: POLICY
created: 2022-05-19T15:33:32.000Z
lastUpdated: 2022-05-19T15:33:32.000Z
system: false
locations:
- country: AF
region: AF-BGL
proxyType: ANY
asns:
- "23457"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzoy0ox5xADOZtKrh0g6"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzoy0ox5xADOZtKrh0g6/lifecycle/deactivate"
hints:
allow:
- POST
RetrieveNetworkZoneIP:
summary: IP Network Zone
value:
type: IP
id: nzowc1U5Jh5xuAK0o0g3
name: MyIpZone
status: ACTIVE
usage: POLICY
created: 2021-06-24T20:37:32.000Z
lastUpdated: 2021-06-24T20:37:32.000Z
system: false
gateways:
- type: CIDR
value: 1.2.3.4/24
proxies:
- type: RANGE
value: 3.3.4.5-3.3.4.15
_links:
self:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/zones/nzowc1U5Jh5xuAK0o0g3/lifecycle/deactivate"
hints:
allow:
- POST
RetrievePublicKeyResponse:
summary: Retrieve Public Key response example
value:
_embedded:
kty: RSA
alg: RSA
kid: 7fbc27fd-e3df-4522-86bf-1930110256ad
use: null
e: AQAB
"n": 2naqCnv6r4xNQs7207lRtKQvdtnlVND-8k5iYBIiqoKGY3CqUmRm1jleoOniiQoMkFX8Wj2DmVqr002efF3vOQ7_gjtTatBTVUNbNIQLybun4dkVoUtfP7pRc5SLpcP3eGPRVar734ZrpQXzmCEdpqBt3jrVjwYjNE5DqOjbYXFJtMsy8CWE9LRJ3kyHEoHPzo22dG_vMrXH0_sAQoCk_4TgNCbvyzVmGVYXI_BkUnp0hv2pR4bQVRYzGB9dKJdctOh8zULqc_EJ8tiYsS05YnF7whrWEyARK0rH-e4d4W-OmBTga_zhY4kJ4NsoQ4PyvcatZkxjPO92QHQOFDnf3w`
RetrieveRefreshTokenClientResponse:
summary: Retrieve a refresh token for a Client
value:
- id: "{refreshTokenId}"
status: ACTIVE
created: 2023-09-21T19:59:56.000Z
lastUpdated: 2023-09-21T20:00:38.000Z
expiresAt: 2023-09-28T20:00:38.000Z
issuer: "https://{yourOktaDomain}/oauth2/{authorizationServerId}"
client_id: "{clientId}"
userId: "{userId}"
scopes:
- offline_access
- openid
_embedded:
scopes:
- id: "{scopeID}"
name: offline_access
displayName: Keep you signed in to the app
description: "This keeps you signed in to the app, even when you aren't\
\ using it."
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/{scopeId}"
title: Keep you signed in to the app
- id: "{scopeId}"
name: openid
displayName: openid
description: Signals that a request is an OpenID request
_links:
scope:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/{scopeId}"
title: openid
_links:
app:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
title: My Web App
authorizationServer:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}"
title: Authorization Server name
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/clients/{clientId}/tokens/{tokenId}"
revoke:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/clients/{clientId}/tokens/{tokenId}"
hints:
allow:
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/{clientId}"
title: My Web App
user:
href: "https://{yourOktaDomain}/api/v1/users/{userId}"
title: Joe User
RetrieveSessionResponse:
summary: Retrieve Session information for a single session ID
value:
amr:
- pwd
createdAt: 2019-08-24T14:15:22Z
expiresAt: 2019-08-24T14:15:22Z
id: l7FbDVqS8zHSy65uJD85
idp:
id: 01a2bcdef3GHIJKLMNOP
type: ACTIVE_DIRECTORY
lastFactorVerification: 2019-08-24T14:15:22Z
lastPasswordVerification: 2019-08-24T14:15:22Z
login: [email protected]
status: ACTIVE
userId: 00u0abcdefGHIJKLMNOP
_links:
self:
hints:
allow:
- DELETE
href: "https://{yourOktaDomain}/api/v1/sessions/l7FbDVqS8zHSy65uJD85"
RetrieveUISchemaResponse:
summary: Retrieves a UI Schema response
value:
id: uis4a7liocgcRgcxZ0g7
uiSchema:
type: Group
label: Sign in
buttonLabel: Submit
elements:
- type: Control
scope: '#/properties/firstName'
label: First name
options:
format: text
- type: Control
scope: '#/properties/lastName'
label: Last name
options:
format: text
- type: Control
scope: '#/properties/email'
label: Email
options:
format: text
- type: Control
scope: '#/properties/countryCode'
label: Country code
options:
format: select
- type: Control
scope: '#/properties/bool2'
label: bool2
options:
format: checkbox
- type: Control
scope: '#/properties/date'
label: date
- type: Control
scope: '#/properties/enum'
label: enum
options:
format: radio
created: 2022-07-25T12:56:31.000Z
lastUpdated: 2022-07-26T11:53:59.000Z
_links:
self:
href: https://exmaple.com/api/v1/meta/uischemas/uis4a7liocgcRgcxZ0g7
hints:
allow:
- GET
- PUT
- DELETE
RiskEventsRequestExample:
summary: Risk Events payload example
value:
- timestamp: 2021-01-20T00:00:00.001Z
subjects:
- ip: 6.7.6.7
riskLevel: MEDIUM
- ip: 1.1.1.1
riskLevel: HIGH
message: Detected Attack tooling and suspicious activity
- timestamp: 2021-01-20T01:00:00.001Z
subjects:
- ip: 6.7.6.7
riskLevel: LOW
- ip: 2.2.2.2
riskLevel: HIGH
RiskProviderPutRequest:
summary: Replace Risk Provider request example
value:
name: Risk-Partner-Y
action: enforce_and_log
clientId: 00ckjsfgjkdkjdkkljjsd
RiskProviderPutResponse:
summary: Replace Risk Provider response example
value:
id: 00rp12r4skkjkjgsn
action: enforce_and_log
name: Risk-Partner-Y
clientId: 00ckjsfgjkdkjdkkljjsd
created: 2021-01-05 22:18:30
lastUpdated: 2021-01-05 23:18:30
_links:
self:
href: "https://{yourOktaDomain}/api/v1/risk/providers/00rp12r4skkjkjgsn"
hints:
allow:
- GET
- PUT
RiskProviderRequest:
summary: Risk Provider payload example
value:
name: Risk-Partner-X
action: log_only
clientId: 00ckjsfgjkdkjdkkljjsd
RiskProviderResponse:
summary: Risk Provider response example
value:
id: 00rp12r4skkjkjgsn
action: log_only
name: Risk-Partner-X
clientId: 00ckjsfgjkdkjdkkljjsd
created: 2021-01-05 22:18:30
lastUpdated: 2021-01-05 22:18:30
_links:
self:
href: "https://{yourOktaDomain}/api/v1/risk/providers/00rp12r4skkjkjgsn"
hints:
allow:
- GET
- PUT
RoleAssignedUsersResponseExample:
value:
value:
- id: 00u118oQYT4TBGuay0g4
orn: orn:okta:00o5rb5mt2H3d1TJd0h7:users:00u118oQYT4TBGuay0g4
_links:
self:
href: http://your-subdomain.okta.com/api/v1/users/00u118oQYT4TBGuay0g4
roles:
href: http://your-subdomain.okta.com/api/v1/users/00u118oQYT4TBGuay0g4/roles
_links:
next:
href: http://your-subdomain.okta.com/api/v1/iam/assignees/users?after=00u118oQYT4TBGuay0g4&limit=1
RoleRequest:
value:
label: UserCreator
description: Create users
permissions:
- okta.users.create
- okta.users.read
- okta.groups.read
- okta.users.userprofile.manage
RoleResponse:
value:
id: cr0Yq6IJxGIr0ouum0g3
label: UserCreator
description: Create users
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
RolesResponse:
value:
roles:
- id: cr0Yq6IJxGIr0ouum0g3
label: UserCreator
description: Create users
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3/permissions"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
- id: cr0Fw7HKcWIroo88m3r1
label: GroupMembershipManager
description: Manage group membership
created: 2021-02-06T16:20:57.000Z
lastUpdated: 2021-02-06T16:20:57.000Z
_links:
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Fw7HKcWIroo88m3r1/permissions"
self:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Fw7HKcWIroo88m3r1"
_links:
next:
href: "https://{yourOktaDomain}/api/v1/iam/roles?after=cr0Fw7HKcWIroo88m3r1"
SAMLHookResponseExample:
summary: A sample response for a SAML inline hook
value:
commands:
- type: com.okta.assertion.patch
value:
- op: replace
path: /claims/array/attributeValues/1/value
value: replacementValue
- op: replace
path: /authentication/authnContext
value:
authnContextClassRef: replacementValue
- op: add
path: /claims/extPatientId
value:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:basic
attributeValues:
- attributes:
xsi:type: xs:string
value: "4321"
- op: add
path: /authentication/sessionLifetime
value: 300
- type: com.okta.assertion.patch
value:
- op: replace
path: /authentication/sessionIndex
value: exampleSession
SAMLHookResponseWithURIFormat:
summary: An example with `replace` and `add` operations with the URI formatted
claim encoded
value:
commands:
- type: com.okta.assertion.patch
value:
- op: replace
path: /claims/http:~1~1schemas.xmlsoap.org~1ws~12005~105~1identity~1claims~1foo/attributeValues/0/value
value: replacementValue
- op: replace
path: /claims/http:~1~1schemas.xmlsoap.org~1ws~12005~105~1identity~1claims~1foo/attributes
value:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:basic
- op: add
path: /claims/http:~1~1schemas.xmlsoap.org~1ws~12005~105~1identity~1claims~1bar
value:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:basic
attributeValues:
- attributes:
xsi:type: xs:string
value: bearer
SAMLPayLoadExample:
summary: An example SAML assertion inline hook request body
value:
source: "https://${yourOktaDomain}/app/saml20app_1/exkth8lMzFm0HZOTU0g3/sso/saml"
eventId: XMFoHCM1S4Wi_SGWzL8T9A
eventTime: 2019-03-28T19:15:23.000Z
data:
context:
request:
id: reqqXypjzYJRSu2j1G1imUovA
method: GET
url:
value: "https://${yourOktaDomain}/app/saml20app_1/exkth8lMzFm0HZOTU0g3/sso/saml"
ipAddress: 127.0.0.1
protocol:
type: SAML2.0
issuer:
id: 0oath92zlO60urQOP0g3
name: SAML 2.0 App
uri: http://www.okta.com/exkth8lMzFm0HZOTU0g3
session:
id: 102LN9Bnuc4S_ewfc9BYwageA
userId: 00uq8tMo3zV0OfJON0g3
login: [email protected]
createdAt: 2019-03-28T16:45:55.000Z
expiresAt: 2019-03-28T21:15:23.000Z
status: ACTIVE
lastPasswordVerification: 2019-03-28T16:45:55.000Z
amr:
- PASSWORD
idp:
id: 00oq6kcVwvrDY2YsS0g3
type: OKTA
mfaActive: false
user:
id: 00uq8tMo3zV0OfJON0g3
passwordChanged: 2018-09-11T23:19:12.000Z
profile:
login: [email protected]
firstName: Admin
lastName: Last
locale: en
timeZone: America/Los_Angeles
_links:
groups:
href: "https://${yourOktaDomain}/00uq8tMo3zV0OfJON0g3/groups"
factors:
href: "https://${yourOktaDomain}/api/v1/users/00uq8tMo3zV0OfJON0g3/factors"
assertion:
subject:
nameId: [email protected]
nameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
confirmation:
method: urn:oasis:names:tc:SAML:2.0:cm:bearer
data:
recipient: http://www.example.com:7070/saml/sso
authentication:
sessionIndex: id1553800523546.312669168
authnContext:
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
conditions:
audienceRestriction:
- urn:example:sp
claims:
extPatientId:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
attributeValues:
- attributes:
xsi:type: xs:integer
value: "4321"
array:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
attributeValues:
- attributes:
xsi:type: xs:string
value: Array 1
- attributes:
xsi:type: xs:string
value: Array2
- attributes:
xsi:type: xs:string
value: Array3
middle:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
attributeValues:
- attributes:
xsi:type: xs:string
value: admin
firstAndLast:
attributes:
NameFormat: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
attributeValues:
- attributes:
xsi:type: xs:string
value: 7d6a50c8-4d7e-4058-9c5b-2cc98cecd294
lifetime:
expiration: 300
eventTypeVersion: "1.0"
cloudEventVersion: "0.1"
eventType: com.okta.saml.tokens.transform
contentType: application/json
SMSTemplateEditablePropertyValues:
value:
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
SMSTemplateListResponse:
value:
- id: 6NQUJ5yR3bpgEiYmq8IC
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
SMSTemplateResponseValues:
value:
id: 6NQUJ5yR3bpgEiYmq8IC
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
Saml2.0Ex:
summary: SAML_2_0
value:
label: Example Custom SAML 2.0 App
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
signOnMode: SAML_2_0
settings:
signOn:
defaultRelayState: ""
ssoAcsUrl: http://testorgone.okta
idpIssuer: "http://www.okta.com/${org.externalKey}"
audience: asdqwe123
recipient: http://testorgone.okta
destination: http://testorgone.okta
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
samlAssertionLifetimeSeconds: 3600
slo:
enabled: true
issuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
participateSlo:
enabled: true
logoutRequestUrl: https://testorgone.okta.com/logout/participate
sessionIndexRequired: true
bindingType: REDIRECT
spCertificate:
x5c:
- "MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\r\
\n"
requestCompressed: false
allowMultipleAcsEndpoints: true
acsEndpoints:
- url: http://testorgone.okta
index: 0
- url: http://testorgone.okta/1
index: 1
attributeStatements:
- type: EXPRESSION
name: Attribute
namespace: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
values:
- Value
Saml2.0PutEx:
summary: SAML_2_0
value:
label: Example Custom SAML 2.0 App updated
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
signOnMode: SAML_2_0
settings:
signOn:
defaultRelayState: ""
ssoAcsUrl: http://testorgone.okta
idpIssuer: "http://www.okta.com/${org.externalKey}"
audience: asdqwe123
recipient: http://testorgone.okta
destination: http://testorgone.okta
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
samlAssertionLifetimeSeconds: 3600
slo:
enabled: true
issuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
participateSlo:
enabled: true
logoutRequestUrl: https://testorgone.okta.com/logout/participate
sessionIndexRequired: true
bindingType: REDIRECT
spCertificate:
x5c:
- "MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\r\
\n..."
requestCompressed: false
allowMultipleAcsEndpoints: true
acsEndpoints:
- url: http://testorgone.okta
index: 0
- url: http://testorgone.okta/1
index: 1
attributeStatements:
- type: EXPRESSION
name: Attribute
namespace: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
values:
- Value
Saml2.0PutResponseEx:
summary: SAML_2_0
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
testorgone_examplecustomsaml20app_1_link: true
name: testorgone_examplecustomsaml20app_1
label: Example Custom SAML 2.0 App updated
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: mh_16Cc8sIfHMFDMlHnp194cxKvJ6yXqs_mNn_6ZC0Q
settings:
app: {}
signOn:
defaultRelayState: null
ssoAcsUrl: http://testorgone.okta
idpIssuer: "http://www.okta.com/${org.externalKey}"
audience: asdqwe123
recipient: http://testorgone.okta
destination: http://testorgone.okta
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
spIssuer: https://testorgone.okta.com
samlAssertionLifetimeSeconds: 3600
slo:
enabled: true
issuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
requestCompressed: false
allowMultipleAcsEndpoints: false
acsEndpoints: []
samlSignedRequestEnabled: false
attributeStatements:
- type: EXPRESSION
name: Attribute
namespace: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
values:
- Value
inlineHooks: []
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
Saml2.0ResponseEx:
summary: SAML_2_0
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
testorgone_examplecustomsaml20app_1_link: true
name: testorgone_examplecustomsaml20app_1
label: Example Custom SAML 2.0 App
features: []
signOnMode: SAML_2_0
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: mh_16Cc8sIfHMFDMlHnp194cxKvJ6yXqs_mNn_6ZC0Q
settings:
app: {}
signOn:
defaultRelayState: null
ssoAcsUrl: http://testorgone.okta
idpIssuer: "http://www.okta.com/${org.externalKey}"
audience: asdqwe123
recipient: http://testorgone.okta
destination: http://testorgone.okta
subjectNameIdTemplate: "${user.userName}"
subjectNameIdFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
responseSigned: true
assertionSigned: true
signatureAlgorithm: RSA_SHA256
digestAlgorithm: SHA256
honorForceAuthn: true
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
spIssuer: https://testorgone.okta.com
samlAssertionLifetimeSeconds: 3600
slo:
enabled: true
issuer: https://testorgone.okta.com
logoutUrl: https://testorgone.okta.com/logout
requestCompressed: false
allowMultipleAcsEndpoints: false
acsEndpoints: []
samlSignedRequestEnabled: false
attributeStatements:
- type: EXPRESSION
name: Attribute
namespace: urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
values:
- Value
inlineHooks: []
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
SamlIdPResponse:
summary: SAML 2.0 Identity Provider
value:
id: 0oa62bc8wppPw0UGr0h7
type: SAML2
name: Example SAML IdP
status: ACTIVE
created: 2016-03-24T23:14:54.000Z
lastUpdated: 2016-03-24T23:14:54.000Z
protocol:
type: SAML2
endpoints:
sso:
url: https://idp.example.com
binding: HTTP-POST
destination: https://idp.example.com
acs:
binding: HTTP-POST
type: INSTANCE
algorithms:
request:
signature:
algorithm: SHA-256
scope: REQUEST
response:
signature:
algorithm: SHA-256
scope: ANY
settings:
nameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
credentials:
trust:
issuer: https://idp.example.com
audience: http://www.okta.com/123
kid: your-key-id
policy:
provisioning:
action: AUTO
profileMaster: true
groups:
action: NONE
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter: null
action: AUTO
subject:
userNameTemplate:
template: saml.subjectNameId
filter: (\S+@example\.com)
matchType: USERNAME
mapAMRClaims: false
maxClockSkew: 0
_links:
metadata:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/metadata.xml"
type: application/xml
hints:
allow:
- GET
acs:
href: "https://{yourOktaDomain}/sso/saml2/0oa62bc8wppPw0UGr0h7"
type: application/xml
hints:
allow:
- POST
users:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/users"
hints:
allow:
- GET
deactivate:
href: "https://{yourOktaDomain}/api/v1/idps/0oa62bc8wppPw0UGr0h7/lifecycle/deactivate"
hints:
allow:
- POST
SecurePasswordStoreEx:
summary: SECURE_PASSWORD_STORE
value:
name: template_sps
label: Example SWA App
signOnMode: SECURE_PASSWORD_STORE
settings:
app:
url: https://example.com/login.html
passwordField: '#txtbox-password'
usernameField: '#txtbox-username'
optionalField1: param1
optionalField1Value: somevalue
optionalField2: param2
optionalField2Value: yetanothervalue
optionalField3: param3
optionalField3Value: finalvalue
SecurePasswordStorePutEx:
summary: SECURE_PASSWORD_STORE
value:
name: template_sps
label: Example SWA App updated
signOnMode: SECURE_PASSWORD_STORE
settings:
app:
url: https://example.com/login.html
passwordField: '#txtbox-password'
usernameField: '#txtbox-username'
optionalField1: param1
optionalField1Value: somevalue_updated
optionalField2: param2
optionalField2Value: yetanothervalue
optionalField3: param3
optionalField3Value: finalvalue_updated
SecurePasswordStorePutResponseEx:
summary: SECURE_PASSWORD_STORE
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_sps
label: Example SWA App updated
features: []
signOnMode: SECURE_PASSWORD_STORE
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
url: https://example.com/login.html
passwordField: '#txtbox-password'
usernameField: '#txtbox-username'
optionalField1: param1
optionalField1Value: somevalue_updated
optionalField2: param2
optionalField2Value: yetanothervalue
optionalField3: param3
optionalField3Value: finalvalue_updated
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
SecurePasswordStoreResponseEx:
summary: SECURE_PASSWORD_STORE
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_sps
label: Example SWA App
features: []
signOnMode: SECURE_PASSWORD_STORE
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
revealPassword: false
signing: {}
settings:
app:
url: https://example.com/login.html
passwordField: '#txtbox-password'
usernameField: '#txtbox-username'
optionalField1: param1
optionalField1Value: somevalue
optionalField2: param2
optionalField2Value: yetanothervalue
optionalField3: param3
optionalField3Value: finalvalue
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
SecurityEventsProviderRequestIssuerAndJwksUrl:
summary: Provider with issuer and JWKS
value:
name: Security Events Provider with an issuer and a JWKS URL
type: okta
settings:
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
SecurityEventsProviderRequestWellKnownUrl:
summary: Provider with well-known URL
value:
name: Security Events Provider with well-known URL
type: okta
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
SecurityEventsProviderResponseIssuerAndJwksUrl:
summary: Provider with issuer and JWKS
value:
id: sse1qu4fUtsoD12iF0g5
name: Security Events Provider with an issuer and a JWKS URL
type: okta
status: ACTIVE
settings:
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
_links:
self:
href: https://example.okta.com/api/v1/security-events-providers/sse1qu4fUtsoD12iF0g5
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://example.okta.com/api/v1/security-events-providers/sse1qu4fUtsoD12iF0g5/lifecycle/deactivate
hints:
allow:
- POST
SecurityEventsProviderResponseWellKnownUrl:
summary: Provider with well-known URL
value:
id: sse1qg25RpusjUP6m0g5
name: Security Events Provider with well-known URL
type: okta
status: ACTIVE
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
issuer: Issuer
jwks_url: https://example.okta.com/jwks/path
_links:
self:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://example.okta.com/api/v1/security-events-providers/sse1qg25RpusjUP6m0g5/lifecycle/deactivate
hints:
allow:
- POST
SimulatePolicyBody:
description: Simulate policy request body
summary: Simulate policy request body
value:
policyType:
- OKTA_SIGN_ON
- MFA_ENROLL
appInstance: 0oa4eroj3nYCIJIW70g7
policyContext:
groups:
ids:
- 00g4eralvekR5RLuS0g7
- 00g4eralvekR5RLuS0g8
risk:
level: LOW
zones:
ids:
- nzo4eralxcRnbIHYJ0g7
device:
platform: IOS
registered: true
managed: true
SimulatePolicyElExpressionBody:
description: Simulate policy request body with EL context
summary: Simulate policy request body with EL context
value:
appInstance: 0oa4fdudGhhB5FNKR0g4
policyContext:
user:
id: 00u10wvS3zms2JVaO0g4
status: ACTIVE
created: 2024-04-29T18:05:24.000Z
lastUpdated: 2024-04-29T18:05:24.000Z
passwordChanged: 2024-04-29T18:05:24.000Z
lastLogin: 2024-04-29T18:05:24.000Z
profile:
city: string
costCenter: string
countryCode: st
department: string
displayName: string
division: string
email: [email protected]
employeeNumber: string
firstName: string
honorificPrefix: string
honorificSuffix: string
lastName: string
locale: string
login: string
manager: string
managerId: string
middleName: string
mobilePhone: string
nickName: string
organization: string
postalAddress: string
preferredLanguage: string
primaryPhone: string
profileUrl: string
secondEmail: [email protected]
state: string
streetAddress: string
timezone: string
title: string
userType: string
zipCode: string
SimulatePolicyElExpressionResponse:
description: Simulate policy response body with EL Context
summary: Simulate policy response body with EL Context
value:
evaluation:
- status: null
policyType: OKTA_SIGN_ON
result:
policies:
- id: 00p4eromwukk6qUku0g7
name: test policy
status: MATCH
conditions: []
rules:
- id: 0pr4erof85nGcyC7Y0g7
name: test rule
status: MATCH
conditions:
- type: people.groups.include
status: MATCH
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: MFA_ENROLL
result:
policies:
- id: 00p4eram2kw1aLcrx0g7
name: Default Policy
status: MATCH
conditions: []
rules:
- id: 0pr4eram2lMQT5FZF0g7
name: null
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: ACCESS_POLICY
result:
policies:
- id: rst4eram06ZKZewEe0g7
name: Any two factors
status: MATCH
conditions: []
rules:
- id: rul4eram07VsWgybo0g7
name: Catch-all rule
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: PROFILE_ENROLLMENT
result:
policies:
- id: rst4eram08ZSjPTOl0g7
name: Default Policy
status: MATCH
conditions: []
rules:
- id: rul4eram094PrQ2BX0g7
name: Catch-all rule
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
SimulatePolicyResponse:
description: Simulate policy response body
summary: Simulate policy response body
value:
evaluation:
- status: null
policyType: OKTA_SIGN_ON
result:
policies:
- id: 00p4eromwukk6qUku0g7
name: test policy
status: MATCH
conditions: []
rules:
- id: 0pr4erof85nGcyC7Y0g7
name: test rule
status: MATCH
conditions:
- type: people.groups.include
status: MATCH
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: MFA_ENROLL
result:
policies:
- id: 00p4eram2kw1aLcrx0g7
name: Default Policy
status: MATCH
conditions: []
rules:
- id: 0pr4eram2lMQT5FZF0g7
name: null
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: ACCESS_POLICY
result:
policies:
- id: rst4eram06ZKZewEe0g7
name: Any two factors
status: MATCH
conditions: []
rules:
- id: rul4eram07VsWgybo0g7
name: Catch-all rule
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
- status: null
policyType: PROFILE_ENROLLMENT
result:
policies:
- id: rst4eram08ZSjPTOl0g7
name: Default Policy
status: MATCH
conditions: []
rules:
- id: rul4eram094PrQ2BX0g7
name: Catch-all rule
status: MATCH
conditions: []
undefined:
policies: []
evaluated:
policies: []
SmartCardIdPResponse:
summary: SmartCard Identity Provider
value:
id: 0oa6jxasyhwM2ZHJh0g4
type: X509
name: Smart Card IDP Name
status: ACTIVE
created: 2020-01-07T00:19:27.000Z
lastUpdated: 2020-01-07T00:19:27.000Z
properties:
additionalAmr:
- sc
- hwk
- pin
- mfa
protocol:
type: MTLS
endpoints:
sso:
url: "https://{yourOktaDomain}.okta.com/login/cert"
credentials:
trust:
issuer: "CN=Test Smart Card, OU=Test OU, O=Test O, C=US"
audience: null
kid: 45dec5ff-8cdc-48c0-85fe-a4869f1753dc
revocation: CRL
revocationCacheLifetime: 2880
policy:
provisioning:
action: DISABLED
profileMaster: false
groups: null
subject:
userNameTemplate:
template: idpuser.subjectAltNameEmail
filter: null
matchType: EMAIL
matchAttribute: null
mapAMRClaims: false
maxClockSkew: 120000
_links:
deactivate:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/0oa6jxasyhwM2ZHJh0g4/lifecycle/deactivate"
hints:
allow:
- POST
users:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/0oa6jxasyhwM2ZHJh0g4/users"
hints:
allow:
- GET
keys:
href: "https://{yourOktaDomain}.okta.com/api/v1/idps/credentials/keys/45dec5ff-8cdc-48c0-85fe-a4869f1753dc"
hints:
allow:
- GET
SocialAuthTokensResponse:
summary: Social Authentication Tokens
value:
- id:
token: JBTWGV22G4ZGKV3N
tokenType: urn:ietf:params:oauth:token-type:access_token
tokenAuthScheme: Bearer
expiresAt: 2014-08-06T16:56:31.000Z
scopes:
- openid
- foo
- id:
token: JBTWGV22G4ZJBRXJ
tokenType: urn:ietf:params:oauth:token-type:id_token
tokenAuthScheme: null
StandardAndCustomRolesListResponse:
value:
- id: IFIFAX2BIRGUSTQ
label: Application Administrator
type: APP_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: JBCUYUC7IRCVGS27IFCE2SKO
label: Help Desk Administrator
type: HELP_DESK_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: ra125eqBFpETrMwu80g4
label: Organization Administrator
type: ORG_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: gra25fapn1prGTBKV0g4
label: API Access Management Administrator
type: API_ACCESS_MANAGEMENT_ADMIN
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: GROUP
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/groups/00g1ousb3XCr9Dkr20g4"
- id: irb1q92TFAHzySt3x0g4
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: USER
resource-set: iamoJDFKaJxGIr0oamd9g
_links:
assignee:
href": "https://{yourOktaDomain}/api/v1/users/00u1gytb3XCr9Dkr18r2"
resource-set:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g"
member:
href: "https://{yourOktaDomain}/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{yourOktaDomain}/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{yourOktaDomain}/api/v1/iam/permission-sets/cr0Yq6IJxGIr0ouum0g3/permissions"
- id: irb5e92YgBazyyQ3x1q5
role: cr0Yq6IJxGIr0ouum0g3
label: UserCreatorRole
type: CUSTOM
status: ACTIVE
created: 2019-02-06T16:20:57.000Z
lastUpdated: 2019-02-06T16:20:57.000Z
assignmentType: GROUP
resource-set: iamoakjsdQaJxGIr03int1o
_links:
assignee:
href: "https://{ yourOktaDomain }/api/v1/groups/00g1ousb3XCr9Dkr20g4"
resource-set:
href: "https://{ yourOktaDomain }/api/v1/iam/resource-sets/iamoakjsdQaJxGIr03int1o"
member:
href: "https://{ yourOktaDomain }/api/v1/iam/resource-sets/iamoJDFKaJxGIr0oamd9g/bindings/cr0Yq6IJxGIr0ouum0g3/members/irb1qe6PGuMc7Oh8N0g4"
role:
href: "https://{ yourOktaDomain }/api/v1/iam/roles/cr0Yq6IJxGIr0ouum0g3"
permissions:
href: "https://{ yourOktaDomain }/api/v1/iam/permission-sets/cr0Yq6IJxGIr0ouum0g3/permissions"
StandardRoleAssignmentRequest:
value:
type: HELP_DESK_ADMIN
StandardRoleResponseClient:
value:
id: JBCUYUC7IRCVGS27IFCE2SKO
label: Help Desk Administrator
type: HELP_DESK_ADMIN
status: ACTIVE
created: 2023-05-01T14:24:54.000Z
lastUpdated: 2023-05-01T14:24:54.000Z
assignmentType: CLIENT
_links:
assignee:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0jrabyQWm4B9zVJPbotY/roles"
StandardRoleResponseUser:
value:
id: ra1b8anIk7rx7em7L0g4
label: Super Organization Administrator
type: SUPER_ADMIN
status: ACTIVE
created: 2015-09-06T15:28:47.000Z
lastUpdated: 2015-09-06T15:28:47.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
StandardRolesListResponse:
value:
- id: IFIFAX2BIRGUSTQ
label: Application Administrator
type: APP_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: JBCUYUC7IRCVGS27IFCE2SKO
label: Help Desk Administrator
type: HELP_DESK_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: ra125eqBFpETrMwu80g4
label: Organization Administrator
type: ORG_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: USER
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
- id: gra25fapn1prGTBKV0g4
label: API Access Management Administrator
type: API_ACCESS_MANAGEMENT_ADMIN
status: ACTIVE
created": 2019-02-06T16:20:57.000Z
lastUpdated": 2019-02-06T16:20:57.000Z
assignmentType": GROUP
_links":
assignee":
href": "https://{yourOktaDomain}/api/v1/groups/00g1ousb3XCr9Dkr20g4"
StandardRolesListResponseClient:
value:
- id: JBCUYUC7IRCVGS27IFCE2SKO
label: Help Desk Administrator
type: HELP_DESK_ADMIN
status: ACTIVE
created: 2023-05-01T14:24:54.000Z
lastUpdated: 2023-05-01T14:24:54.000Z
assignmentType: CLIENT
_links:
assignee:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0jrabyQWm4B9zVJPbotY/roles"
StandardRolesListResponseGroup:
value:
- id: IFIFAX2BIRGUSTQ
label: Application Administrator
type: APP_ADMIN
status: ACTIVE
created: 2019-02-06T16:17:40.000Z
lastUpdated: 2019-02-06T16:17:40.000Z
assignmentType: GROUP
_links:
assignee:
href: "https://{yourOktaDomain}/api/v1/users/00ur32Vg0fvpyHZeQ0g3"
SubmissionOidcRequest:
summary: Submission OIDC request example
value:
name: Strawberry Central
description: Your one source for in-season strawberry deals
logo: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
sso:
oidc:
redirectUris:
- "https://${org.subdomain}.example.com/strawberry/oidc/login"
initiateLoginUri: "https://${org.subdomain}.example.com/strawberry/oidc/sp-init"
postLogoutUris:
- "https://${org.subdomain}.example.com/strawberry/oidc/logged-out"
doc: https://example.com/strawberry/help/oidcSetup
config:
- name: subdomain
label: Subdomain
SubmissionOidcResponse:
summary: Submission OIDC response example
value:
id: acme_strawberrycentral_1
name: Strawberry Central
description: Your one source for in-season strawberry deals
logo: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
sso:
oidc:
redirectUris:
- "https://${org.subdomain}.example.com/strawberry/oidc/login"
initiateLoginUri: "https://${org.subdomain}.example.com/strawberry/oidc/sp-init"
postLogoutUris:
- "https://${org.subdomain}.example.com/strawberry/oidc/logged-out"
doc: https://example.com/strawberry/help/oidcSetup
config:
- name: subdomain
label: Subdomain
status: New
lastUpdated: 2023-08-24T14:15:22.000Z
lastUpdatedBy: 00ub0oNGTSWTBKOLGLNR
lastPublished: 2023-09-01T13:23:45.000Z
SubmissionSamlRequest:
summary: Submission SAML request example
value:
name: Strawberry Central
description: Your one source for in-season strawberry deals
logo: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
sso:
saml:
acs:
- url: "https://${org.subdomain}.example.com/saml/login"
entityId: "https://${org.subdomain}.example.com"
claims:
- name: manager
values:
- "${user.manager}"
groups:
- name: groups
doc: https://example.com/strawberry/help/samlSetup
config:
- name: subdomain
label: Subdomain
SubmissionSamlResponse:
summary: Submission SAML response example
value:
id: acme_strawberrycentral_1
name: Strawberry Central
description: Your one source for in-season strawberry deals
logo: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
sso:
saml:
acs:
- url: "https://${org.subdomain}.example.com/saml/login"
entityId: "https://${org.subdomain}.example.com"
claims:
- name: manager
values:
- "${user.manager}"
groups:
- name: groups
doc: https://example.com/strawberry/help/samlSetup
config:
- name: subdomain
label: Subdomain
status: To be reviewed by Okta
lastUpdated: 2023-08-24T14:15:22.000Z
lastUpdatedBy: 00ub0oNGTSWTBKOLGLNR
lastPublished: null
SubmissionsResponse:
summary: Submission list example
value:
- id: acme_strawberrycentral_1
name: Strawberry Central
description: Your one source for in-season strawberry deals
logo: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
sso:
saml:
acs:
- url: "https://${org.subdomain}.example.com/saml/login"
entityId: "https://${org.subdomain}.example.com"
claims:
- name: manager
values:
- "${user.manager}"
groups:
- name: groups
doc: https://example.com/strawberry/help/samlSetup
config:
- name: subdomain
label: Subdomain
status: Complete
lastUpdated: 2023-08-24T14:15:22.000Z
lastUpdatedBy: 00ub0oNGTSWTBKOLGLNR
lastPublished: 2023-09-01T13:23:45.000Z
SupportedFactorResults:
value:
- factorType: question
provider: OKTA
vendorName: OKTA
_links:
questions:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/questions"
hints:
allow:
- GET
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
- factorType: token:software:totp
provider: OKTA
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
- factorType: token:software:totp
provider: GOOGLE
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
- factorType: sms
provider: OKTA
vendorName: OKTA
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
_embedded:
phones:
- id: mblldntFJevYKbyQQ0g3
profile:
phoneNumber: "+14081234567"
status: ACTIVE
- factorType: call
provider: OKTA
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
- factorType: token
provider: RSA
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
- factorType: token
provider: SYMANTEC
_links:
enroll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors"
hints:
allow:
- POST
TelephonyFailureResponse:
summary: A sample response for external webservice returning failure
value:
error:
- errorSummary: Failed to deliver SMS OTP to [email protected]
- errorCauses:
errorSummary: Provider could not deliver OTP
reason: The content of the message is not supported
location: South Africa
TelephonyPayloadExample:
summary: An example Telephony inline hook request body
value:
eventId: uS5871kJThSsU8qlA1LTcg
eventTime: 2020-01-17T21:23:56.000Z
eventType: com.okta.telephony.provider
eventTypeVersion: "1.0"
contentType: application/json
cloudEventVersion: "0.1"
source: "https://${yourOktaDomain}/api/v1/inlineHooks/cbl2ad6phv9fsPLcF0g7"
data:
context:
request:
id: reqRgSk8IBBRhuo0YdlEDTmUw
method: POST
url:
value: /api/internal/v1/inlineHooks/com.okta.telephony.provider/generatePreview
ipAddress: 127.0.0.1
userProfile:
firstName: test
lastName: user
login: [email protected]
userId: 00uyxxSknGtK8022w0g3
messageProfile:
msgTemplate: (HOOK)Your code is 11111
phoneNumber: 9876543210
otpExpires: 2022-01-28T21:48:34.321Z
deliveryChannel: SMS
otpCode: 11111
locale: EN-US
TelephonySuccessResponse:
summary: A sample response for external webservice returning success
value:
commands:
- type: com.okta.telephony.action
- value:
status: FAILURE
provider: VONAGE
transactionId: SM49a8ece2822d44e4adaccd7ed268f954
transactionMetadata: Duration=300ms
TestInfoOidcRequest:
summary: OIDC SSO Submission Testing Information request
value:
testAccount:
url: https://example.com/strawberry/login
username: [email protected]
password: sUperP@ssw0rd
instructions: Go to your app URL from a browser and enter your credentials
escalationSupportContact: [email protected]
oidcTestConfiguration:
jit: false
spInitiateUrl: https://test.example.com/strawberry/oidc/sp-init
TestInfoOidcResponse:
summary: OIDC SSO Submission Testing Information response
value:
testAccount:
url: https://example.com/strawberry/login
username: [email protected]
password: sUperP@ssw0rd
instructions: Go to your app URL from a browser and enter your credentials
escalationSupportContact: [email protected]
oidcTestConfiguration:
idp: true
sp: true
jit: false
spInitiateUrl: https://test.example.com/strawberry/oidc/sp-init
TestInfoSamlRequest:
summary: SAML SSO Submission Testing Information request
value:
testAccount:
url: https://example.com/strawberry/login
username: [email protected]
password: sUperP@ssw0rd
instructions: Go to your app URL from a browser and enter your credentials
escalationSupportContact: [email protected]
samlTestConfiguration:
idp: true
sp: true
jit: false
spInitiateUrl: https://test.example.com/strawberry/saml/sp-init
spInitiateDescription: Go to the app URL from a browser and enter your username
TestInfoSamlResponse:
summary: SAML SSO Submission Testing Information response
value:
testAccount:
url: https://example.com/strawberry/login
username: [email protected]
password: sUperP@ssw0rd
instructions: Go to your app URL from a browser and enter your credentials
escalationSupportContact: [email protected]
samlTestConfiguration:
idp: true
sp: true
jit: false
spInitiateUrl: https://test.example.com/strawberry/saml/sp-init
spInitiateDescription: Go to the app URL from a browser and enter your username
ThreatInsightResponseExample:
summary: ThreatInsight response
value:
action: none
excludeZones: []
created: 2020-08-05T22:18:30.629Z
lastUpdated: 2020-08-05T22:18:30.629Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/threats/configuration"
hints:
allow:
- GET
- POST
ThreatInsightUpdateRequestExample:
summary: ThreatInsight update request
value:
action: audit
excludeZones:
- nzo1q7jEOsoCnoKcj0g4
- nzouagptWUz5DlLfM0g3
ThreatInsightUpdateResponseExample:
summary: ThreatInsight update response
value:
action: audit
excludeZones:
- nzo1q7jEOsoCnoKcj0g4
- nzouagptWUz5DlLfM0g3
created: 2020-08-05T22:18:30.629Z
lastUpdated: 2020-10-13T21:23:10.178Z
_links:
self:
href: "https://{yourOktaDomain}/api/v1/threats/configuration"
hints:
allow:
- GET
- POST
TokenHookErrorExample:
summary: Error response
value:
error:
errorSummary: Human-readable summary of the error
TokenHookModifyLifetime:
summary: Modify token lifetime
value:
commands:
- type: com.okta.identity.patch
value:
- op: replace
path: /token/lifetime/expiration
value: 36000
- type: com.okta.access.patch
value:
- op: replace
path: /token/lifetime/expiration
value: 36000
TokenHookRemoveClaim:
summary: Remove claim
value:
commands:
- type: com.okta.identity.patch
value:
- op: remove
path: /claims/birthdate
value: null
- type: com.okta.access.patch
value:
- op: remove
path: /claims/external_guid
TokenHookRemoveFromArray:
summary: Remove from array
value:
commands:
- type: com.okta.identity.patch
value:
- op: remove
path: /claims/preferred_airports/1
TokenHookRemoveFromObject:
summary: Remove from JSON object
value:
commands:
- type: com.okta.identity.patch
value:
- op: remove
path: /claims/employee_profile/email
TokenHookReplaceExisting:
summary: Replace an existing claim
value:
commands:
- type: com.okta.identity.patch
value:
- op: replace
path: /claims/extPatientId
value: "1234"
- op: replace
path: /claims/external_guid
value: F0384685-F87D-474B-848D-2058AC5655A7
TokenHookReplaceInPath:
summary: Replace within JSON object
value:
commands:
- type: com.okta.identity.patch
value:
- op: replace
path: /claims/employee_profile/email
value: [email protected]
TokenHookResponse:
summary: Add a claim
value:
commands:
- type: com.okta.assertion.patch
value:
- op: add
path: /claims/extPatientId
value: "1234"
- type: com.okta.assertion.patch
value:
- op: add
path: /claims/external_guid
value: F0384685-F87D-474B-848D-2058AC5655A7
TokenHookResponseAppendArray:
summary: Append to array
value:
commands:
- type: com.okta.identity.patch
value:
- op: add
path: /claims/preferred_airports/3
value: lax
TokenHookResponseWithURIFormat:
summary: Add new members to existing JSON objects
value:
commands:
- type: com.okta.identity.patch
value:
- op: add
path: /claims/employee_profile/department_id
value: "4947"
TokenPayLoadExample:
description: An example token inline hook request body
summary: Example token inline hook request body
value:
source: "https://{yourOktaDomain}/oauth2/default/v1/authorize"
eventId: 3OWo4oo-QQ-rBWfRyTmQYw
eventTime: 2019-01-15T23:20:47.000Z
eventTypeVersion: "1.0"
cloudEventVersion: "0.1"
contentType: application/json
eventType: com.okta.oauth2.tokens.transform
data: null
context:
request:
id: reqv66CbCaCStGEFc8AdfS0ng
method: GET
url:
value: "https://{yourOktaDomain}/oauth2/default/v1/authorize?scope=openid+profile+email&response_type=token+id_token&redirect_uri=https%3A%2F%2Fhttpbin.org%2Fget&state=foobareere&nonce=asf&client_id=customClientIdNative"
ipAddress: 127.0.0.1
protocol:
type: OAUTH2.0
request:
scope: openid profile email
state: foobareere
redirect_uri: https://httpbin.org/get
response_mode: fragment
response_type: token id_token
client_id: customClientIdNative
issuer:
uri: "https://{yourOktaDomain}/oauth2/default"
client:
id: customClientIdNative
name: Native client
type: PUBLIC
session:
id: 102Qoe7t5PcRnSxr8j3I8I6pA
userId: 00uq8tMo3zV0OfJON0g3
login: [email protected]
createdAt: 2019-01-15T23:17:09.000Z
expiresAt: 2019-01-16T01:20:46.000Z
status: ACTIVE
lastPasswordVerification: 2019-01-15T23:17:09.000Z
amr:
- PASSWORD
idp:
id: 00oq6kcVwvrDY2YsS0g3
type: OKTA
mfaActive: false
user:
id: 00uq8tMo3zV0OfJON0g3
passwordChanged: 2018-09-11T23:19:12.000Z
profile:
login: [email protected]
firstName: Add-Min
lastName: O'Cloudy Tud
locale: en
timeZone: America/Los_Angeles
_links:
groups:
href: "https://{yourOktaDomain}/00uq8tMo3zV0OfJON0g3/groups"
factors:
href: "https://{yourOktaDomain}/api/v1/users/00uq8tMo3zV0OfJON0g3/factors"
policy:
id: 00pq8lGaLlI8APuqY0g3
rule:
id: 0prq8mLKuKAmavOvq0g3
identity:
claims:
sub: 00uq8tMo3zV0OfJON0g3
name: Add-Min O'Cloudy Tud
email: [email protected]
ver: 1
iss: "https://{yourOktaDomain}/oauth2/default"
aud: customClientIdNative
jti: ID.YxF2whJfB3Eu4ktG_7aClqtCgjDq6ab_hgpiV7-ZZn0
amr:
- pwd
idp: 00oq6kcVwvrDY2YsS0g3
nonce: asf
preferred_username: [email protected]
auth_time: 1547594229
token:
lifetime:
expiration: 3600
access:
claims:
ver: 1
jti: AT.W-rrB-z-kkZQmHW0e6VS3Or--QfEN_YvoWJa46A7HAA
iss: "https://{yourOktaDomain}/oauth2/default"
aud: api://default
cid: customClientIdNative
uid: 00uq8tMo3zV0OfJON0g3
sub: [email protected]
firstName: Add-Min
preferred_username: [email protected]
token:
lifetime:
expiration: 3600
scopes:
openid:
id: scpq7bW1cp6dcvrz80g3
action: GRANT
profile:
id: scpq7cWJ81CIP5Qkr0g3
action: GRANT
email:
id: scpq7dxsoz6LQlRj00g3
action: GRANT
refresh_token:
jti: oarob4a0tckCkGcyo1d6
TriggerSessionResponse:
value:
- id: aps1qqonvr2SZv6o70h8
identitySourceId: 0oa3l6l6WK6h0R0QW0g4
status: TRIGGERED
importType: INCREMENTAL
created: 2022-04-04T15:56:05.000Z
lastUpdated: 2022-05-05T18:15:44.000Z
TrustedOriginBody:
summary: Trusted origin request body
value:
name: New Trusted Origin
origin: http://example.com
scopes:
- type: CORS
- type: REDIRECT
TrustedOriginBodyWithIframeEmbedding:
description: "Creates a new Trusted Origin for iFrame embedding of an Okta resource\
\ within that origin. In this example, the type \nof Okta resource is both\
\ the Okta End-User Dashboard and the Okta sign-in page.\n"
summary: Trusted origin request body with iFrame embedding (Okta End-User Dashboard
and Okta sign-in page)
value:
name: New Trusted Origin
origin: http://example.com
scopes:
- type: IFRAME_EMBED
allowedOktaApps:
- OKTA_ENDUSER
TrustedOriginBodyWithIframeEmbeddingSignIn:
description: "Creates a new Trusted Origin for iFrame embedding of an Okta resource\
\ within that origin. In this example, the Okta \nresource is the Okta sign-in\
\ page.\n"
summary: Trusted origin request body with iFrame embedding (Okta sign-in page)
value:
name: New Trusted Origin
origin: http://example.com
scopes:
- type: IFRAME_EMBED
allowedOktaApps: []
TrustedOriginInactiveResponse:
summary: Trusted origin response
value:
id: tos10hu7rkbtrFt1M0g4
name: New Trusted Origin
origin: http://example.com
status: INACTIVE
scopes:
- type: CORS
- type: REDIRECT
created: 2018-01-13T01:11:44.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastedUpdated: 2018-01-13T01:11:44.000Z
lastedUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4/lifecycle/activate"
hints:
allow:
- POST
self:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4"
hints:
allow:
- GET
- PUT
- DELETE
TrustedOriginPut:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: CORS
- type: REDIRECT
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginPutBody:
summary: Trusted origin request body
value:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: CORS
- type: REDIRECT
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginPutBodyWithIframeEmbedding:
summary: Trusted origin request body with iFrame embedding
value:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: IFRAME_EMBED
allowedOktaApps:
- OKTA_ENDUSER
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginPutResponse:
summary: Trusted origin response body
value:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: CORS
- type: REDIRECT
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginPutResponseWithIframeEmbedding:
summary: Trusted origin response body with iFrame embedding
value:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: IFRAME_EMBED
allowedOktaApps:
- OKTA_ENDUSER
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginPutWithIframeEmbedding:
value:
id: tosue7JvguwJ7U6kz0g3
name: Updated Example Trusted Origin
origin: http://updated.example.com
scopes:
- type: IFRAME_EMBED
allowedOktaApps:
- OKTA_ENDUSER
status: ACTIVE
created: 2017-12-16T05:01:12.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastUpdated: 2017-12-16T05:01:12.000Z
lastUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://${yourOktaDomain}/api/v1/trustedOrigins/tosue7JvguwJ7U6kz0g3/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginResponse:
summary: Trusted origin response
value:
id: tos10hu7rkbtrFt1M0g4
name: New Trusted Origin
origin: http://example.com
status: ACTIVE
scopes:
- type: CORS
- type: REDIRECT
created: 2018-01-13T01:11:44.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastedUpdated: 2018-01-13T01:11:44.000Z
lastedUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginResponseWithIframeEmbedding:
summary: Trusted origin response with iFrame embedding (End-User Dashboard and
Okta sign-in page)
value:
id: tos10hu7rkbtrFt1M0g4
name: New Trusted Origin
origin: http://example.com
status: ACTIVE
scopes:
- type: IFRAME_EMBED
allowedOktaApps:
- OKTA_ENDUSER
created: 2018-01-13T01:11:44.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastedUpdated: 2018-01-13T01:11:44.000Z
lastedUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginResponseWithIframeEmbeddingSignIn:
summary: Trusted origin response with iFrame embedding (Okta sign-in page)
value:
id: tos10hu7rkbtrFt1M0g4
name: New Trusted Origin
origin: http://example.com
status: ACTIVE
scopes:
- type: IFRAME_EMBED
allowedOktaApps: []
created: 2018-01-13T01:11:44.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastedUpdated: 2018-01-13T01:11:44.000Z
lastedUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4/lifecycle/deactivate"
hints:
allow:
- POST
TrustedOriginsResponse:
summary: Trusted origins response
value:
- id: tos10hu7rkbtrFt1M0g4
name: New Trusted Origin
origin: http://example.com
status: ACTIVE
scopes:
- type: CORS
- type: REDIRECT
created: 2018-01-13T01:11:44.000Z
createdBy: 00ut5t92p6IEOi4bu0g3
lastedUpdated: 2018-01-13T01:11:44.000Z
lastedUpdatedBy: 00ut5t92p6IEOi4bu0g3
_links:
self:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/trustedOrigins/tos10hu7rkbtrFt1M0g4/lifecycle/deactivate"
hints:
allow:
- POST
UpdateAppFeatureRequestEx:
summary: Update USER_PROVISIONING request
value:
create:
lifecycleCreate:
status: ENABLED
update:
lifecycleDeactivate:
status: ENABLED
profile:
status: ENABLED
password:
status: ENABLED
seed: RANDOM
change: CHANGE
UpdateAppFeatureResponseEx:
summary: Update USER_PROVISIONING response
value:
name: USER_PROVISIONING
status: ENABLED
description: User provisioning settings from Okta to a downstream application
capabilities:
create:
lifecycleCreate:
status: ENABLED
update:
lifecycleDeactivate:
status: ENABLED
profile:
status: ENABLED
password:
status: ENABLED
seed: RANDOM
change: CHANGE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/features/USER_PROVISIONING"
hints:
allow:
- GET
- PUT
UpdateAuthorizationServerPolicyRequest:
summary: Update Authorization Server Policy
value:
id: 00p5m9xrrBffPd9ah0g4
type: OAUTH_AUTHORIZATION_POLICY
status: ACTIVE
name: Default Policy
description: Default policy description
priority: 1
system: false
conditions:
clients":
include":
- ALL_CLIENTS
UpdateAuthorizationServerPolicyRuleRequest:
summary: Update Authorization Server Policy Rule
value:
type: RESOURCE_ACCESS
name: Default Policy Rule
priority: 1
status: ACTIVE
conditions:
people:
groups:
include:
- EVERYONE
grantTypes:
include:
- implicit
- client_credentials
- authorization_code
- password
scopes:
include:
- '*'
actions:
token:
accessTokenLifetimeMinutes: 60
refreshTokenLifetimeMinutes: 0
refreshTokenWindowMinutes: 10080
inlineHook:
id: cal4egvp1mbMldrYN0g7
UpdateBrandRequest:
value:
customPrivacyPolicyUrl: https://www.someHost.com/privacy-policy
agreeToCustomPrivacyPolicy: true
removePoweredByOkta: true
name: New Name For Brand
emailDomainId: OeD114iNkrcN6aR680g4
locale: en
defaultApp:
appInstanceId: 0oa114iNkrcN6aR680g4
appLinkName: null
classicApplicationUri: null
UpdateBrandResponse:
value:
id: bnd114iNkrcN6aR680g4
removePoweredByOkta: true
agreeToCustomPrivacyPolicy: true
name: New Name For Brand
isDefault: true
customPrivacyPolicyUrl: https://www.someHost.com/privacy-policy
emailDomainId: OeD114iNkrcN6aR680g4
defaultApp:
appInstanceId: 0oa114iNkrcN6aR680g4
appLinkName: null
classicApplicationUri: null
locale: en
_links:
self:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
- DELETE
themes:
href: "https://{yourOktaDomain}/api/v1/brands/bnd114iNkrcN6aR680g4/themes"
hints:
allow:
- GET
emailDomain:
href: "https://{yourOktaDomain}/api/v1/email-domains/OeD114iNkrcN6aR680g4"
hints:
allow:
- GET
- PUT
UpdateEmailDomainRequest:
value:
displayName: IT Admin
userName: noreply
UpdateFeatureLifecycleResponse:
summary: Update the feature lifecycle status
value:
description: Example feature description
id: ftrZooGoT8b41iWRiQs7
name: Example feature name
stage:
state: OPEN
value: BETA
status: DISABLED
type: self-service
_links:
self:
hints:
allow:
- POST
href: "https://{yourOktaDomain}/api/v1/features/ftrZooGoT8b41iWRiQs7"
dependents:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependents"
dependencies:
href: "https://{yourOktaDomain}/api/v1/features/ftrlBDFcGwYP2epXCGYn/dependencies"
UpdateInboundProvisioningFeatureRequestEx:
summary: Update INBOUND_PROVISIONING request
value:
capabilities:
importSettings:
username:
userNameFormat: EMAIL
schedule:
status: ENABLED
fullImport:
expression: 0 0 * * 0
timezone: America/New_York
incrementalImport:
expression: 0 */3 * * *
timezone: America/New_York
importRules:
userCreateAndMatch:
exactMatchCriteria: EMAIL
allowPartialMatch: false
autoConfirmPartialMatch: false
autoConfirmExactMatch: false
autoConfirmNewUsers: false
autoActivateNewUsers: false
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
UpdateInboundProvisioningFeatureResponseEx:
summary: Update INBOUND_PROVISIONING response
value:
name: INBOUND_PROVISIONING
status: ENABLED
description: In-bound provisioning settings from an application to Okta
capabilities:
importSettings:
username:
userNameFormat: EMAIL
schedule:
status: ENABLED
fullImport:
expression: 0 0 * * 0
timezone: America/New_York
incrementalImport:
expression: 0 */3 * * *
timezone: America/New_York
importRules:
userCreateAndMatch:
exactMatchCriteria: EMAIL
allowPartialMatch: false
autoConfirmPartialMatch: false
autoConfirmExactMatch: false
autoConfirmNewUsers: false
autoActivateNewUsers: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/${appId}/features/INBOUND_PROVISIONING"
hints:
allow:
- GET
- PUT
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
UpdateMappingBody:
summary: Update an existing profile mapping by updating one or more properties
value:
properties:
nickName:
expression: user.honorificPrefix + user.displayName
pushStatus: DONT_PUSH
UpdateMappingResponse:
summary: Update an existing profile mapping by updating one or more properties
value:
id: prm1k47ghydIQOTBW0g4
source:
id: otysbePhQ3yqt4cVv0g3
name: user
type: user
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otysbePhQ3yqt4cVv0g3"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscsbePhQ3yqt4cVv0g3"
target:
id: 0oa1qmn4LZQQEH0wZ0g4
name: okta_org2org
type: appuser
_links:
self:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1qmn4LZQQEH0wZ0g4"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/apps/0oa1qmn4LZQQEH0wZ0g4/default"
properties:
fullName:
expression: user.firstName + user.lastName
pushStatus: PUSH
nickName:
expression: user.honorificPrefix + user.displayName
pushStatus: DONT_PUSH
_links:
self:
href: "https://{yourOktaDomain}/api/v1/mappings/prm1k48weFSOnEUnw0g4"
UpdateOAuth2ScopeRequest:
summary: Example scope
value:
description: Order car
name: car:order
metadataPublish: ALL_CLIENTS
UpdateOrgSettingEx:
summary: Org setting request
value:
address1: 100 1st St
address2: 6th floor
city: San Fransico
companyName: okta
country: United States
endUserSupportHelpURL: support.okta.com
phoneNumber: "+18887227871"
postalCode: "94105"
state: California
supportPhoneNumber: "+18887227871"
website: www.okta.com
UpdateRecQuestionRequest:
value:
password:
value: tlpWENT2m
recovery_question:
question: How many roads must a man walk down?
answer: forty two
UpdateRecQuestionResponse:
value:
password: {}
recovery_question:
question: How many roads must a man walk down?
provider:
type: OKTA
name: OKTA
UpdateSMSTemplateRequest:
value:
translations:
de: "${org.name}: ihre bestätigungscode ist ${code}."
UpdateSMSTemplateResponse:
value:
id: 6NQUJ5yR3bpgEiYmq8IC
name: Custom
type: SMS_VERIFY_CODE
template: "${org.name}: your verification code is ${code}"
translations:
es: "${org.name}: el código de verificación es ${code}"
fr: "${org.name}: votre code de vérification est ${code}"
it: "${org.name}: il codice di verifica è ${code}"
de: "${org.name}: ihre bestätigungscode ist ${code}."
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
UpdateThemeRequest:
value:
primaryColorHex: '#1662dd'
primaryColorContrastHex: '#000000'
secondaryColorHex: '#ebebed'
secondaryColorContrastHex: '#000000'
signInPageTouchPointVariant: OKTA_DEFAULT
endUserDashboardTouchPointVariant: OKTA_DEFAULT
errorPageTouchPointVariant: OKTA_DEFAULT
emailTemplateTouchPointVariant: OKTA_DEFAULT
loadingPageTouchPointVariant: OKTA_DEFAULT
UpdateThemeResponse:
value:
id: thdul904tTZ6kWVhP0g3
logo: "https://{yourOktaDomain}/assets/img/logos/okta-logo.47066819ac7db5c13f4c431b2687cef6.png"
favicon: "https://{yourOktaDomain}/favicon.ico"
backgroundImage: null
primaryColorHex: '#1662dd'
primaryColorContrastHex: '#000000'
secondaryColorHex: '#ebebed'
secondaryColorContrastHex: '#000000'
signInPageTouchPointVariant: OKTA_DEFAULT
endUserDashboardTouchPointVariant: OKTA_DEFAULT
errorPageTouchPointVariant: OKTA_DEFAULT
emailTemplateTouchPointVariant: OKTA_DEFAULT
loadingPageTouchPointVariant: OKTA_DEFAULT
UpdateUserTypePostRequest:
summary: Update user type request
value:
displayName: Updated Display Name
UpdateUserTypePostResponse:
summary: Update user type response
value:
id: otyfnly5cQjJT9PnR0g4
displayName: Updated Display Name
name: newUserType
description: A new custom user type
createdBy: sprz9fj1ycBcsgopy1d6
lastUpdatedBy: sprz9fj1ycBcsgopy1d6
created: 2021-07-05T20:40:38.000Z
lastUpdated: 2021-07-05T20:40:38.000Z
default: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscz9fj2jMiRBC1ZT1d6"
UpdatedEmailDomainResponse:
value:
id: OeD114iNkrcN6aR680g4
validationStatus: NOT_STARTED
displayName: IT Admin
userName: noreply
domain: example.com
validationSubdomain: mail
dnsValidationRecords:
- recordType: TXT
fqdn: _oktaverification.example.com
verificationValue: 759080212bda43e3bc825a7d73b4bb64
- recordType: CNAME
fqdn: mail.example.com
verificationValue: u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t02._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t022._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
UpdatedOAuth2ScopeResponse:
summary: Updated scope
value:
id: scp5yu8kLOnDzo7lh0g4
name: car:order
description: Order car
system: false
default: false
displayName: Saml Jackson
consent: REQUIRED
optional: false
metadataPublish: ALL_CLIENTS
_links:
self:
href: "https://{yourOktaDomain}/api/v1/authorizationServers/{authorizationServerId}/scopes/scp5yu8kLOnDzo7lh0g4"
hints:
allow:
- GET
- PUT
- DELETE
UploadYubikeyTokenSeedRequest:
summary: Yubikey OTP Seed
value:
serialNumber: "7886622"
publicId: ccccccijgibu
privateId: b74be6169486
aesKey: 1fcc6d8ce39bf1604e0b17f3e0a11067
UploadYubikeyTokenSeedResponse:
value:
id: ykkut4G6ti62DD8Dy0g3
created: 2020-01-10T23:04:10.000Z
lastVerified: 2020-01-10T23:04:10.000Z
lastUpdated: 2020-01-10T23:04:10.000Z
status: UNASSIGNED
profile:
serial: "000007886622"
_links:
self:
href: "https://{yourOktaDomain}/api/v1/org/factors/yubikey_token/tokens/ykkut4G6ti62DD8Dy0g3"
hints:
allow:
- GET
- DELETE
UserFactorChallengeCallResponse:
summary: call challenge
value:
factorResult: CHALLENGE
profile:
phoneNumber: "+12532236986"
phoneExtension: "1234"
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clff17zuKEUMYQAQGCOV/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/clff17zuKEUMYQAQGCOV"
hints:
allow:
- GET
- DELETE
UserFactorChallengeEmailResponse:
summary: email challenge
value:
factorResult: CHALLENGE
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/emfnf3gSScB8xXoXK0g3/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/emfnf3gSScB8xXoXK0g3"
hints:
allow:
- GET
- DELETE
UserFactorChallengePushResponse:
summary: push challenge
value:
expiresAt: 2015-04-01T15:57:32.000Z
factorResult: WAITING
_links:
poll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/transactions/mst1eiHghhPxf0yhp0g"
hints:
allow:
- GET
cancel:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/transactions/mst1eiHghhPxf0yhp0g"
hints:
allow:
- DELETE
UserFactorChallengeSmsResponse:
summary: sms challenge
value:
factorResult: CHALLENGE
profile:
phoneNumber: "+12532236986"
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/smsszf1YNUtGWTx4j0g3/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/smsszf1YNUtGWTx4j0g3"
hints:
allow:
- GET
- DELETE
UserFactorChallengeU2fResponse:
summary: u2f challenge
value:
factorResult: CHALLENGE
profile:
credentialId: GAiiLsVab2m3-zL1Fi3bVtNrM9G6_MntUITHKjxkV24ktGKjLSCRnz72wCEdHCe18IvC69Aia0sE4UpsO0HpFQ
version: U2F_V2
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fuf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
- DELETE
_embedded:
challenge:
nonce: vQFwTt6zKzMV7HFPzjS2
timeoutSeconds: 20
UserFactorChallengeWebauthnResponse:
summary: webAuthn challenge
value:
factorResult: CHALLENGE
profile:
credentialId: l3Br0n-7H3g047NqESqJynFtIgf3Ix9OfaRoNwLoloso99Xl2zS_O7EXUkmPeAIzTVtEL4dYjicJWBz7NpqhGA
authenticatorName: MacBook Touch ID
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/fwf2rovRxogXJ0nDy0g4"
hints:
allow:
- GET
- DELETE
_embedded:
challenge:
challenge: vQFwTt6zKzMV7HFPzjS2
extensions: {}
UserFactorVerifyCallSuccessResponse:
summary: call verify
value:
factorResult: SUCCESS
UserFactorVerifyEmailSuccessResponse:
summary: email verify
value:
factorResult: SUCCESS
UserFactorVerifyPushRejectedResponse:
summary: push verification rejected
value:
factorResult: REJECTED
profile:
credentialId: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3"
hints:
allow:
- GET
- DELETE
UserFactorVerifyPushTransactionApproved:
summary: SUCCESS
value:
factorResult: SUCCESS
UserFactorVerifyPushTransactionRejected:
summary: REJECTED
value:
factorResult: REJECTED
profile:
credentialId: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3"
hints:
allow:
- GET
- DELETE
UserFactorVerifyPushTransactionTimeout:
summary: TIMEOUT
value:
factorResult: TIMEOUT
profile:
credentialId: [email protected]
_links:
verify:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/verify"
hints:
allow:
- POST
factor:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3"
hints:
allow:
- GET
- DELETE
UserFactorVerifyPushTransactionWaiting:
summary: WAITING
value:
expiresAt: 2015-04-01T15:57:32.000Z
factorResult: WAITING
profile:
credentialId: [email protected]
_links:
poll:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/transactions/v2mst.GldKV5VxTrifyeZmWSQguA"
hints:
allow:
- GET
cancel:
href: "https://{yourOktaDomain}/api/v1/users/00u15s1KDETTQMQYABRL/factors/opfh52xcuft3J4uZc0g3/transactions/v2mst.GldKV5VxTrifyeZmWSQguA"
hints:
allow:
- DELETE
UserFactorVerifySecurityQuestionRequest:
summary: security question verify
value:
answer: mayonnaise
UserFactorVerifySuccessSmsResponse:
summary: sms verify
value:
factorResult: SUCCESS
UserFactorVerifySuccessSqResponse:
summary: security question verify
value:
factorResult: SUCCESS
UserFactorVerifySuccessTokenResponse:
summary: token verify
value:
factorResult: SUCCESS
UserFactorVerifySuccessTotpResponse:
summary: totp verify
value:
factorResult: SUCCESS
UserFactorVerifySuccessYubikeyResponse:
summary: yubikey verify
value:
factorResult: SUCCESS
UserFactorVerifyU2fRequest:
summary: u2f verify
value:
clientData: eyJ0eXAiOiJuYXZpZ2F0b3IuaWQuZ2V0QXNzZXJ0aW9uIiwiY2hhbGxlbmdlIjoiS2NCLXRqUFU0NDY0ZThuVFBudXIiLCJvcmlnaW4iOiJodHRwczovL2xvY2FsaG9zdDozMDAwIiwiY2lkX3B1YmtleSI6InVudXNlZCJ9
signatureData: AQAAACYwRgIhAKPktdpH0T5mlPSm_9uGW5w-VaUy-LhI9tIacexpgItkAiEAncRVZURVPOq7zDwIw-OM5LtSkdAxOkfv0ZDVUx3UFHc
UserFactorVerifyU2fResponse:
summary: u2f verify response
value:
factorResult: SUCCESS
profile:
credentialId: h1bFwJFU9wnelYkexJuQfoUHZ5lX3CgQMTZk4H3I8kM9Nn6XALiQ-BIab4P5EE0GQrA7VD-kAwgnG950aXkhBw
version: U2F_V2
UserFactorVerifyWebauthnRequest:
summary: WebAuthn verify challenge (posts a signed assertion using the challenge
`nonce`)
value:
clientData: eyJ0eXAiOiJuYXZpZ2F0b3IuaWQuZ2V0QXNzZXJ0aW9uIiwiY2hhbGxlbmdlIjoiS2NCLXRqUFU0NDY0ZThuVFBudXIiLCJvcmlnaW4iOiJodHRwczovL2xvY2FsaG9zdDozMDAwIiwiY2lkX3B1YmtleSI6InVudXNlZCJ9
authenticatorData: SBv04caJ+NLZ0bTeotGq9esMhHJ8YC5z4bMXXPbT95UFXbDsOg==
signatureData: AQAAACYwRgIhAKPktdpH0T5mlPSm_9uGW5w-VaUy-LhI9tIacexpgItkAiEAncRVZURVPOq7zDwIw-OM5LtSkdAxOkfv0ZDVUx3UFHc
UserFactorVerifyWebauthnResponse:
summary: WebAuthn verify
value:
factorResult: SUCCESS
profile:
credentialId: l3Br0n-7H3g047NqESqJynFtIgf3Ix9OfaRoNwLoloso99Xl2zS_O7EXUkmPeAIzTVtEL4dYjicJWBz7NpqhGA
authenticatorName: MacBook Touch ID
UserImportChangeAppUserProfileExample:
summary: Update an app user's profile response
value:
commands:
- type: com.okta.appUser.profile.update
value:
firstName: Stan
UserImportChangeUserProfileExample:
summary: Update an Okta user's profile response
value:
commands:
- type: com.okta.user.profile.update
value:
firstName: Stan
UserImportCreateANewUserExample:
summary: Create a new Okta user profile response
value:
commands:
- type: com.okta.action.update
value:
result: CREATE_USER
UserImportErrorExample:
summary: Return an error object
value:
error:
errorSummary: Error at third-party service. Please contact your admin.
UserImportMatchExample:
summary: Match an existing Okta user response
value:
commands:
- type: com.okta.action.update
value:
result: LINK_USER
- type: com.okta.user.update
value:
id: 00garwpuyxHaWOkdV0g3
UserImportPayloadExample:
summary: A sample Okta user import request
value:
source: cal7eyxOsnb20oWbZ0g4
eventId: JUGOUiYZTaKPmH6db0nDag
eventTime: 2019-02-27T20:59:04.000Z
eventTypeVersion: "1.0"
cloudEventVersion: "0.1"
eventType: com.okta.import.transform
contentType: application/json
data:
context:
conflicts:
- login
application:
name: test_app
id: 0oa7ey7aLRuBvcYUD0g4
label: Test App
status: ACTIVE
job:
id: ij17ez2AWtMZRfCZ60g4
type: import:users
matches: []
policy:
- EMAIL
- FIRST_AND_LAST_NAME
action:
result: CREATE_USER
appUser:
profile:
firstName: Sally2
lastName: Admin2
mobilePhone: null
accountType: PRO
secondEmail: null
failProvisioning: null
failDeprovisioning: null
externalId: user221
groups:
- [email protected]
- [email protected]
userName: administrator2
email: [email protected]
user:
profile:
lastName: Admin2
zipCode: null
city: null
secondEmail: null
postAddress: null
login: [email protected]
firstName: Sally2
primaryPhone: null
mobilePhone: null
streetAddress: null
countryCode: null
typeId: null
state: null
email: [email protected]
UserRiskNoneResponse:
summary: Example User Risk with NONE risk level response
value:
riskLevel: NONE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/{userId}/risk"
hints:
allow:
- GET
- PUT
user:
href: "https://{yourOktaDomain}/api/v1/users/{userId}"
hints:
allow:
- GET
UserRiskRequest:
summary: Example upsert the risk for a user request
value:
riskLevel: HIGH
UserRiskResponse:
summary: Example User Risk response
value:
riskLevel: HIGH
reason: Admin override risk
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/{userId}/risk"
hints:
allow:
- GET
- PUT
user:
href: "https://{yourOktaDomain}/api/v1/users/{userId}"
hints:
allow:
- GET
UserSchemaAddRequest:
value:
definitions:
custom:
id: '#custom'
type: object
properties:
twitterUserName:
title: Twitter username
description: Twitter Username
type: string
required: false
minLength: 1
maxLength: 20
permissions:
- principal: SELF
action: READ_WRITE
required: []
UserSchemaResponse:
value:
id: "https://{yourOktaDomain}/meta/schemas/user/default"
$schema: http://json-schema.org/draft-04/schema#
name: user
title: Default Okta User
lastUpdated: 2015-09-05T10:40:45.000Z
created: 2015-02-02T10:27:36.000Z
definitions:
base:
id: '#base'
type: object
properties:
login:
title: Username
type: string
required: true
minLength: 5
maxLength: 100
permissions:
- principal: SELF
action: READ_WRITE
firstName:
title: First name
type: string
required: true
minLength: 1
maxLength: 50
permissions:
- principal: SELF
action: READ_WRITE
lastName:
title: Last name
type: string
required: true
minLength: 1
maxLength: 50
permissions:
- principal: SELF
action: READ_WRITE
email:
title: Primary email
type: string
required: true
format: email
permissions:
- principal: SELF
action: READ_WRITE
required:
- login
- firstName
- lastName
- email
custom:
id: '#custom'
type: object
properties:
twitterUserName:
title: Twitter username
description: User's username for twitter.com
type: string
required: false
minLength: 1
maxLength: 20
permissions:
- principal: SELF
action: READ_WRITE
required: []
type: object
properties:
profile:
allOf:
- $ref: '#/definitions/base'
- $ref: '#/definitions/custom'
VerifiedEmailDomainResponse:
value:
id: OeD114iNkrcN6aR680g4
validationStatus: VERIFIED
displayName: IT Admin
userName: noreply
domain: example.com
validationSubdomain: mail
dnsValidationRecords:
- recordType: TXT
fqdn: _oktaverification.example.com
verificationValue: 759080212bda43e3bc825a7d73b4bb64
- recordType: CNAME
fqdn: mail.example.com
verificationValue: u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t02._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
- recordType: CNAME
fqdn: t022._domainkey.example.com
verificationValue: t02.domainkey.u22224444.wl024.sendgrid.net
WSFederationEx:
summary: WS_FEDERATION
value:
name: template_wsfed
label: Sample WS-Fed App
signOnMode: WS_FEDERATION
settings:
app:
audienceRestriction: urn:example:app
groupValueFormat: windowsDomainQualifiedName
wReplyURL: https://example.com/
nameIDFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
siteURL: https://example.com
usernameAttribute: username
WSFederationPutEx:
summary: WS_FEDERATION
value:
name: template_wsfed
label: Sample WS-Fed App updated
signOnMode: WS_FEDERATION
settings:
app:
audienceRestriction: urn:exampleupdated:app
groupValueFormat: windowsDomainQualifiedName
wReplyURL: https://example.com/
nameIDFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
siteURL: https://example.com
usernameAttribute: username
WSFederationPutResponseEx:
summary: WS_FEDERATION
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_wsfed
label: Sample WS-Fed App updated
features: []
signOnMode: WS_FEDERATION
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: FzJvvXtBHvs_-n70T4C2Rb2d64AyN4fqOme6piHOUKU
settings:
app:
groupFilter: null
siteURL: https://example.com
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
wReplyOverride: false
digestAlgorithm: SHA1
usernameAttribute: username
signatureAlgorithm: RSA_SHA1
audienceRestriction: urn:exampleupdated:app
wReplyURL: https://example.com/
groupName: http://schemas.microsoft.com/ws/2008/06/identity/claims/role
attributeStatements: null
nameIDFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
realm: urn:okta:app:exkarjfNMKUjTmzTZ0g4
groupValueFormat: windowsDomainQualifiedName
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
WSFederationResponseEx:
summary: WS_FEDERATION
value:
id: 0oafxqCAJWWGELFTYASJ
status: ACTIVE
lastUpdated: 2023-01-21T14:11:24.000Z
created: 2023-01-21T14:11:24.000Z
accessibility:
selfService: false
errorRedirectUrl: null
loginRedirectUrl: null
_links:
uploadLogo:
href: "http://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/logo"
hints:
allow:
- POST
appLinks:
- name: customswaapp_link
href: "http://{yourOktaDomain}/home/{appName}/0oafxqCAJWWGELFTYASJ/aln5vjkW5oUmDGLMX0g4"
type: text/html
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/groups"
logo:
- name: medium
href: "http://{yourOktaDomain}/assets/img/logos/default.6770228fb0dab49a1695ef440a5279bb.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafxqCAJWWGELFTYASJ/lifecycle/deactivate"
visibility:
autoLaunch: false
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
name: template_wsfed
label: Sample WS-Fed App
features: []
signOnMode: WS_FEDERATION
credentials:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
signing:
kid: FzJvvXtBHvs_-n70T4C2Rb2d64AyN4fqOme6piHOUKU
settings:
app:
groupFilter: null
siteURL: https://example.com
authnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
wReplyOverride: false
digestAlgorithm: SHA1
usernameAttribute: username
signatureAlgorithm: RSA_SHA1
audienceRestriction: urn:example:app
wReplyURL: https://example.com/
groupName: http://schemas.microsoft.com/ws/2008/06/identity/claims/role
attributeStatements: null
nameIDFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
realm: urn:okta:app:exkarjfNMKUjTmzTZ0g4
groupValueFormat: windowsDomainQualifiedName
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
WellKnownAppAuthenticatorConfigurationCustomApp:
value:
- authenticatorId: aut22f6xzargnJZYE3l7
orgId: 00o1vhf34q20MfCFC3l7
type: app
key: custom_app
name: EnergyAus Authenticator
createdDate: 2022-10-11T08:56:45.000Z
lastUpdated: 2023-09-07T11:31:35.000Z
settings:
userVerification: PREFERRED
supportedMethods:
- type: push
status: ACTIVE
settings:
algorithms:
- RS256
- ES256
keyProtection: ANY
appAuthenticatorEnrollEndpoint: "https://{yourOktaDomain}/idp/myaccount/app-authenticators"
WellKnownOrgMetadataResponseClassic:
value:
id: 00o5rb5mt2H3d1TJd0h7
_links:
organization:
href: "https://{{yourOktaDomain}}"
pipeline: v1
settings:
analyticsCollectionEnabled: false
bugReportingEnabled: true
omEnabled: true
WellKnownOrgMetadataResponseCustomUrlOie:
value:
id: 00o47wwoytgsDqEtz0g7
_links:
organization:
href: "https://{yourSubdomain}.okta.com"
alternate:
href: "https://{yourCustomDomain}"
pipeline: idx
settings:
analyticsCollectionEnabled: false
bugReportingEnabled: true
omEnabled: false
activateOAuth2ClientSecretResponse:
summary: Activate Secret response example
value:
id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
secret_hash: 0WOOvBSzV9clc4Nr7Rbaug
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
activeAPIServiceIntegrationInstanceSecretResponse:
summary: Activate Secret response example
value:
id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: '***MQGQ'
secret_hash: 0WOOvBSzV9clc4Nr7Rbaug
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
bulkDeletePayload:
value:
entityType: USERS
profiles:
- externalId: EXT123456784C2IF
- externalId: EXT123456784C3IF
- externalId: EXT123456784C4IF
bulkUpsertPayload:
value:
entityType: USERS
profiles:
- externalId: EXT123456784C2IF
profile:
userName: [email protected]
firstName: Isaac
lastName: Brock
email: [email protected]
secondEmail: [email protected]
mobilePhone: 123-456-7890
homeAddress: "Kirkland, WA"
cloud-rule:
description: This global session policy uses a rule to challenge cloud users
summary: Global session policy - Challenge cloud users
value:
type: SIGN_ON
name: Challenge Cloud Users
conditions:
people:
users:
include: []
exclude: []
groups:
include: []
exclude: []
network:
connection: ZONE
include:
- 00u7yq5goxNFTiMjW1d7
authContext:
authType: ANY
actions:
signon:
access: ALLOW
requireFactor: true
factorPromptMode: ALWAYS
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
cloud-rule-response:
description: The response body from the creation of a global session policy
that uses a rule to challenge cloud users
summary: Global session policy - Challenge cloud users
value:
id: rule8jjozjGMGbHyC1d6
status: ACTIVE
type: SIGN_ON
name: Challenge Cloud Users
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
people:
users:
include: []
exclude: []
groups:
include: []
exclude: []
network:
connection: ZONE
include:
- 00u7yq5goxNFTiMjW1d7
authContext:
authType: ANY
risk:
behaviors: []
riskScore:
level: ANY
identityProvider:
provider: ANY
actions:
signon:
access: ALLOW
requireFactor: true
primaryFactor: PASSWORD_IDP_ANY_FACTOR
factorPromptMode: ALWAYS
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
create-auth-policy-rule-condition:
description: Creates an authentication policy rule with a conditions object.
summary: Authentication policy - Create rule with conditions
value:
system: false
type: ACCESS_POLICY
name: Rule with conditions
conditions:
userType:
include: []
exclude:
- otyezu4m0xN6w5JEa1d7
network:
connection: ZONE
exclude:
- 00u7yq5goxNFTiMjW1d7
riskScore:
level: ANY
people:
users:
exclude:
- 00u7yq5goxNFTiMjW1d7
include: []
groups:
include:
- 00g9i12jictsYdZdi1d7
exclude: []
platform:
include:
- type: MOBILE
os:
type: IOS
- type: MOBILE
os:
type: ANDROID
- type: DESKTOP
os:
type: MACOS
elCondition:
condition: security.risk.level == 'HIGH'
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
reauthenticateIn: PT2H
constraints:
- knowledge:
reauthenticateIn: PT2H
types:
- password
type: ASSURANCE
create-auth-policy-rule-condition-response:
description: The response body from the creation of an authentication policy
rule with conditions.
summary: Authentication policy - Policy rule with conditions
value:
id: rule8jjozjGMGbHyC1d6
status: ACTIVE
name: Rule with conditions
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
people:
users:
exclude:
- 00u7yq5goxNFTiMjW1d7
groups:
include:
- 00g9i12jictsYdZdi1d7
network:
connection: ZONE
exclude:
- nzo9o4rctwQCJNE6y1d7
platform:
include:
- type: MOBILE
os:
type: IOS
- type: MOBILE
os:
type: ANDROID
- type: DESKTOP
os:
type: MACOS
exclude: []
riskScore:
level: ANY
userType:
include: []
exclude:
- otyezu4m0xN6w5JEa1d7
elCondition:
condition: security.risk.level == 'HIGH'
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT2H
constraints:
knowledge:
required: true
types:
- password
reauthenticateIn: PT2H
type: ACCESS_POLICY
_links:
self:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
- DELETE
create-group-rule-request-example:
summary: Create group rule request example
value:
type: group_rule
name: Engineering group rule
conditions:
people:
users:
exclude:
- 00u22w79JPMEeeuLr0g4
groups:
exclude: []
expression:
value: user.role=="Engineer"
type: urn:okta:expression:1.0
actions:
assignUserToGroups:
groupIds:
- 00gjitX9HqABSoqTB0g3
create-user-in-group-request:
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
groupIds:
- 00g1emaKYZTWRYYRRTSK
- 00garwpuyxHaWOkdV0g4
create-user-in-group-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: STAGED
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: null
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
provider:
type: OKTA
name: OKTA
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-authentication-provider-request:
description: Set `activate` parameter to `true`
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
provider:
type: FEDERATION
name: FEDERATION
create-user-with-authentication-provider-response:
value:
id: 00uijntSwJjSHtDY70g3
status: ACTIVE
created: 2016-01-19T22:02:08.000Z
activated: 2016-01-19T22:02:08.000Z
statusChanged: 2016-01-19T22:02:08.000Z
lastLogin: null
lastUpdated: 2016-01-19T22:02:08.000Z
passwordChanged: null
profile:
login: [email protected]
firstName: Isaac
lastName: Brock
mobilePhone: 555-415-1337
email: [email protected]
secondEmail: null
credentials:
provider:
type: FEDERATION
name: FEDERATION
_links:
resetPassword:
href: "https://{yourOktaDomain}/api/v1/users/00uijntSwJjSHtDY70g3/lifecycle/reset_password"
method: POST
changeRecoveryQuestion:
href: "https://{yourOktaDomain}/api/v1/users/00uijntSwJjSHtDY70g3/credentials/change_recovery_question"
method: POST
deactivate:
href: "https://{yourOktaDomain}/api/v1/users/00uijntSwJjSHtDY70g3/lifecycle/deactivate"
method: POST
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-imported-hashed-password-request:
description: Set `activate` parameter to `true`
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password:
hash:
algorithm: BCRYPT
workFactor: 10
salt: rwh3vH166HCH/NT9XV5FYu
value: qaMqvAPULkbiQzkTCWo5XDcvzpk8Tna
create-user-with-imported-hashed-password-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: ACTIVE
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: 2013-07-02T21:36:25.344Z
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password: {}
provider:
type: IMPORT
name: IMPORT
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-non-default-user-type-request:
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
type:
id: otyfnjfba4ye7pgjB0g4
create-user-with-non-default-user-type-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: STAGED
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: null
type:
id: otyfnjfba4ye7pgjB0g4
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
provider:
type: OKTA
name: OKTA
_links:
schema:
href: "https://{yourOktaDomain}/api/v1/meta/schemas/user/oscfnjfba4ye7pgjB0g4"
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
type:
href: "https://{yourOktaDomain}/api/v1/meta/types/user/otyfnjfba4ye7pgjB0g4"
create-user-with-password-and-recovery-question-request:
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password:
value: tlpWENT2m
recovery_question:
question: Who is a major player in the cowboy scene?
answer: Annie Oakley
create-user-with-password-and-recovery-question-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: STAGED
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: 2013-07-02T21:36:25.344Z
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password: {}
recovery_question:
question: Who's a major player in the cowboy scene?
provider:
type: OKTA
name: OKTA
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-password-import-inline-hook-request:
description: Set `activate` parameter to `true`
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password:
hook:
type: default
create-user-with-password-import-inline-hook-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: ACTIVE
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: 2013-07-02T21:36:25.344Z
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password: {}
provider:
type: IMPORT
name: IMPORT
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-password-request:
description: Set `activate` parameter to `true`
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password:
value: tlpWENT2m
create-user-with-password-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: ACTIVE
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: 2013-07-02T21:36:25.344Z
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-with-recovery-question-request:
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
recovery_question:
question: Who is a major player in the cowboy scene?
answer: Annie Oakley
create-user-with-recovery-question-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: STAGED
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: null
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
recovery_question:
question: Who's a major player in the cowboy scene?
provider:
type: OKTA
name: OKTA
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
create-user-without-credentials-request:
value:
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
create-user-without-credentials-response:
value:
id: 00ub0oNGTSWTBKOLGLNR
status: STAGED
created: 2013-07-02T21:36:25.344Z
activated: null
statusChanged: null
lastLogin: null
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: null
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
credentials:
provider:
type: OKTA
name: OKTA
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR/lifecycle/activate"
self:
href: "https://{yourOktaDomain}/api/v1/users/00ub0oNGTSWTBKOLGLNR"
createOAuth2ClientSecretCustomRequestBody:
summary: Add a user provided client secret
value:
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
status: ACTIVE
createOAuth2ClientSecretSystemGeneratedRequestBody:
summary: Add a system-generated client secret
value: {}
deactivateOAuth2ClientJsonWebKeyResponse:
summary: Deactivate JSON Web Key example
value:
id: pks2f50kZB0cITmYU0g4
kid: ASHJHGasa782333-Sla3x3POBiIxDreBCdZuFs5B
kty: RSA
alg: RS256
use: sig
e: AQAB
"n": AJncrzOrouIUCSMlRL0HU.....Kuine49_CEVR4GPn=
status: INACTIVE
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/jwks/pks2f50kZB0cITmYU0g4/lifecycle/activate"
hints:
allow:
- POST
deactivateOAuth2ClientSecretResponse:
summary: Deactivate Secret response example
value:
id: ocs2f4zrZbs8nUa7p0g4
status: INACTIVE
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
created: 2023-02-21T20:08:24.000Z
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4/lifecycle/activate"
hints:
allow:
- POST
delete:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4"
hints:
allow:
- DELETE
deny-rule:
description: This global session policy uses a rule to deny users
summary: Global session policy - Deny users
value:
type: SIGN_ON
name: Deny users
conditions:
network:
connection: ANYWHERE
authContext:
authType: ANY
actions:
signon:
access: DENY
requireFactor: false
deny-rule-response:
description: The response body from the creation of a global session policy
that uses a rule to deny users
summary: Global session policy - Deny users
value:
id: rule8jjozjGMGbHyC1d6
status: ACTIVE
type: SIGN_ON
name: Deny
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
authContext:
authType: ANY
risk:
behaviors: []
riskScore:
level: ANY
identityProvider:
provider: ANY
actions:
signon:
access: DENY
requireFactor: false
primaryFactor: PASSWORD_IDP
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 120
maxSessionLifetimeMinutes: 0
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
editFeatureExample:
summary: Enable Okta Personal admin settings
value:
enableExportApps: true
enableEnduserEntryPoints: true
getBlockListExample:
summary: List of blocked email domains
value:
domains:
- yahoo.com
- google.com
group-example:
description: Example of a Group
summary: Group example
value:
id: 00g1emaKYZTWRYYRRTSK
created: 2015-02-06T10:11:28.000Z
lastUpdated: 2015-10-05T19:16:43.000Z
lastMembershipUpdated: 2015-11-28T19:15:32.000Z
objectClass:
- okta:user_group
type: OKTA_GROUP
profile:
name: West Coast Users
description: All Users West of The Rockies
_links:
logo:
- name: medium
href: "https://{yourOktaDomain}/img/logos/groups/okta-medium.png"
type: image/png
- name: large
href: "https://{yourOktaDomain}/img/logos/groups/okta-large.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK/users"
apps:
href: "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK/apps"
group-rule-example:
description: Example of a group rule
summary: Group rule example
value:
type: group_rule
id: 0pr3f7zMZZHPgUoWO0g4
status: INACTIVE
name: Engineering group rule
created: 2016-12-01T14:40:04.000Z
lastUpdated: 2016-12-01T14:40:04.000Z
conditions:
people:
users:
exclude:
- 00u22w79JPMEeeuLr0g4
groups:
exclude: []
expression:
value: user.role=="Engineer"
type: urn:okta:expression:1.0
actions:
assignUserToGroups:
groupIds:
- 00gjitX9HqABSoqTB0g3
idp-discovery-dynamic-routing-rule:
description: This routing rule uses a dynamic Identity Provider.
summary: IdP discovery policy - Dynamic routing rule
value:
name: Dynamic routing rule
priority: 1
status: ACTIVE
conditions:
network:
connection: ANYWHERE
actions:
idp:
providers: []
idpSelectionType: DYNAMIC
matchCriteria:
- providerExpression: login.identifier.substringAfter('@')
propertyName: name
system: false
type: IDP_DISCOVERY
idp-discovery-dynamic-routing-rule-response:
summary: IdP discovery policy - Dynamic routing rule
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: Dynamic routing rule
priority: 1
status: ACTIVE
conditions:
network:
connection: ANYWHERE
actions:
idp:
providers: []
idpSelectionType: DYNAMIC
matchCriteria:
- providerExpression: login.identifier.substringAfter('@')
propertyName: name
system: false
type: IDP_DISCOVERY
idp-discovery-policy-response:
summary: IDP_DISCOVERY
value:
type: IDP_DISCOVERY
id: policyId
status: ACTIVE
name: Policy name
description: Policy description
priority: 1
system: true
created: createdDate
lastUpdated: lastUpdated
conditions: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
rules:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules"
hints:
allow:
- POST
- GET
idp-discovery-specific-routing-rule:
description: This routing rule uses a specific Identity Provider.
summary: IdP discovery policy - Specific routing rule
value:
name: Specific routing rule
priority: 1
status: ACTIVE
conditions:
network:
connection: ANYWHERE
actions:
idp:
providers:
- type: GOOGLE
id: 0oa5ks3WmHLRh8Ivr0g4
idpSelectionType: SPECIFIC
system: false
type: IDP_DISCOVERY
idp-discovery-specific-routing-rule-response:
summary: IdP discovery policy - Specific routing rule
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: Specific routing rule
priority: 1
status: ACTIVE
conditions:
network:
connection: ANYWHERE
actions:
idp:
providers:
- type: GOOGLE
id: 0oa5ks3WmHLRh8Ivr0g4
idpSelectionType: SPECIFIC
system: false
type: IDP_DISCOVERY
inactiveAPIServiceIntegrationInstanceSecretResponse:
summary: Deactivate Secret response example
value:
id: ocs2f4zrZbs8nUa7p0g4
status: INACTIVE
client_secret: '***DhOW'
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
created: 2023-02-21T20:08:24.000Z
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4/lifecycle/activate"
hints:
allow:
- POST
delete:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4"
hints:
allow:
- DELETE
list-all-policy-rule-response-array:
description: List all policy rules response (Sign-on policy)
summary: List all policy rules response (Sign-on policy)
value:
- id: 0prh1sd28q5sXGW08697
status: ACTIVE
name: Test Sign-on policy
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
risk:
behaviors: []
riskScore:
level: ANY
identityProvider:
provider: ANY
actions:
signon:
requireFactor: false
factorPromptMode: ALWAYS
factorLifetime: 15
access: ALLOW
primaryFactor: PASSWORD_IDP_ANY_FACTOR
session:
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
usePersistentCookie: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- POST
type: SIGN_ON
list-apps-example:
description: List all apps example
summary: List apps example
value:
- id: 0oafwvZDWJKVLDCUWUAC
name: template_basic_auth
label: Sample Basic Auth App
status: ACTIVE
lastUpdated: 2013-09-30T00:56:52.000Z
created: 2013-09-30T00:56:52.000Z
accessibility:
selfService: false
errorRedirectUrl: null
visibility:
autoSubmitToolbar: false
hide:
iOS: false
web: false
appLinks:
login: true
features: []
signOnMode: BASIC_AUTH
credentials:
scheme: EDIT_USERNAME_AND_PASSWORD
userNameTemplate:
template: "${source.login}"
type: BUILT_IN
settings:
app:
url: https://example.com/login.html
authURL: https://example.com/auth.html
_links:
appLinks:
- href: "https://{yourOktaDomain}/home/template_basic_auth/0oafwvZDWJKVLDCUWUAC/1438"
name: login
type: text/html
users:
href: "https://{yourOktaDomain}/api/v1/apps/0oafwvZDWJKVLDCUWUAC/users"
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oafwvZDWJKVLDCUWUAC/lifecycle/deactivate"
groups:
href: "https://{yourOktaDomain}/api/v1/apps/0oafwvZDWJKVLDCUWUAC/groups"
list-group-rules-example:
description: List all group rules example
summary: List Group rules example
value:
- type: group_rule
id: 0pr3f7zMZZHPgUoWO0g4
status: INACTIVE
name: Engineering group rule
created: 2016-12-01T14:40:04.000Z
lastUpdated: 2016-12-01T14:40:04.000Z
conditions:
people:
users:
exclude:
- 00u22w79JPMEeeuLr0g4
groups:
exclude: []
expression:
value: user.role=="Engineer"
type: urn:okta:expression:1.0
actions:
assignUserToGroups:
groupIds:
- 00gjitX9HqABSoqTB0g3
list-groups-examples:
description: Lists an example of an OKTA_GROUP and an APP_GROUP
summary: List all groups example
value:
- id: 00g1emaKYZTWRYYRRTSK
created: 2015-02-06T10:11:28.000Z
lastUpdated: 2015-10-05T19:16:43.000Z
lastMembershipUpdated: 2015-11-28T19:15:32.000Z
objectClass:
- okta:user_group
type: OKTA_GROUP
profile:
name: West Coast Users
description: All Users West of The Rockies
_links:
logo:
- name: medium
href: "https://{yourOktaDomain}/img/logos/groups/okta-medium.png"
type: image/png
- name: large
href: "https://{yourOktaDomain}/img/logos/groups/okta-large.png"
type: image/png
users:
href: "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK/users"
apps:
href: "https://{yourOktaDomain}/api/v1/groups/00g1emaKYZTWRYYRRTSK/apps"
- id: 00garwpuyxHaWOkdV0g4
created: 2015-08-15T19:15:17.000Z
lastUpdated: 2015-11-18T04:02:19.000Z
lastMembershipUpdated: 2015-08-15T19:15:17.000Z
objectClass:
- okta:windows_security_principal
type: APP_GROUP
profile:
name: Engineering Users
description: corp.example.com/Engineering/Engineering Users
groupType: Security
samAccountName: Engineering Users
objectSid: S-1-5-21-717838489-685202119-709183397-1177
groupScope: Global
dn: "CN=Engineering Users,OU=Engineering,DC=corp,DC=example,DC=com"
windowsDomainQualifiedName: CORP\Engineering Users
externalId: OZJdWdONCU6h7WjQKp+LPA==
source:
id: 0oa2v0el0gP90aqjJ0g7
_links:
logo:
- name: medium
href: "https://{yourOktaDomain}/img/logos/groups/active_directory-medium.png"
type: image/png
- name: large
href: "https://{yourOktaDomain}/img/logos/groups/active_directory-large.png"
type: image/png
source:
href: "https://{yourOktaDomain}/api/v1/apps/0oa2v0el0gP90aqjJ0g7"
users:
href: "https://{yourOktaDomain}/api/v1/groups/00garwpuyxHaWOkdV0g4/users"
apps:
href: "https://{yourOktaDomain}/api/v1/groups/00garwpuyxHaWOkdV0g4/apps"
list-user-example:
value:
- id: 00u1f96ECLNVOKVMUSEA
status: ACTIVE
created: 2013-12-12T16:14:22.000Z
activated: 2013-12-12T16:14:22.000Z
statusChanged: 2013-12-12T22:14:22.000Z
lastLogin: 2013-12-12T22:14:22.000Z
lastUpdated: 2015-11-15T19:23:32.000Z
passwordChanged: 2013-12-12T22:14:22.000Z
profile:
firstName: Easy
lastName: E
email: [email protected]
login: [email protected]
mobilePhone: null
credentials:
password: {}
provider:
type: OKTA
name: OKTA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u1f96ECLNVOKVMUSEA"
listStreamConfigurationExample:
summary: List of SSF Stream configurations example
value:
- aud: https://example.com
delivery:
method: urn:ietf:rfc:8935
endpoint_url: https://example.com
events_delivered:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
events_requested:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
events_supported:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
format: iss_sub
iss: "https://{yourOktaDomain}"
min_verification_interval: 0
stream_id: esc1k235GIIztAuGK0g5
mfa-enroll-policy-response:
summary: MFA_ENROLL
value:
type: MFA_ENROLL
id: policyId
status: ACTIVE
name: Policy name
description: Policy description
priority: 1
system: true
created: createdDate
lastUpdated: lastUpdated
conditions:
people:
groups:
include:
- groupId
settings:
factors:
okta_otp:
enroll:
self: OPTIONAL
consent:
type: NONE
okta_push:
enroll:
self: OPTIONAL
consent:
type: NONE
okta_password:
enroll:
self: OPTIONAL
consent:
type: NONE
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
rules:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules"
hints:
allow:
- POST
- GET
newAPIServiceIntegrationInstanceSecretResponse:
summary: New secret response example
value:
id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: DRUFXGF9XbLnS9k-Sla3x3POBiIxDreBCdZuFs5B
secret_hash: FpCwXwSjTRQNtEI11I00-g
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
oAuth2ClientSecretResponse:
summary: Client secret response example
value:
id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
secret_hash: FpCwXwSjTRQNtEI11I00-g
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
oAuthClientJsonWebKey:
summary: JSON Web Key example
value:
id: pks2f50kZB0cITmYU0g4
kid: ASHJHGasa782333-Sla3x3POBiIxDreBCdZuFs5B
kty: RSA
alg: RS256
use: sig
e: AQAB
"n": AJncrzOrouIUCSMlRL0HU.....Kuine49_CEVR4GPn=
status: ACTIVE
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/jwks/pks2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
oAuthClientJsonWebKeyListResponse:
summary: JSON Web Key list response example
value:
jwks:
keys:
- id: pks2f4zrZbs8nUa7p0g4
kid: DRUFXGF9XbLnS9k-Sla3x3POBiIxDreBCdZuFs5B
kty: RSA
alg: RS256
use: sig
e: AQAB
"n": AJncrKuine49_CEVR4GPn.....zOrouIUCSMlRL0HU=
status: INACTIVE
created: 2023-02-21T20:08:24.000Z
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/jwks/pks2f4zrZbs8nUa7p0g4/lifecycle/activate"
hints:
allow:
- POST
delete:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/jwks/pks2f4zrZbs8nUa7p0g4"
hints:
allow:
- DELETE
- id: pks2f50kZB0cITmYU0g4
kid: ASHJHGasa782333-Sla3x3POBiIxDreBCdZuFs5B
kty: RSA
alg: RS256
use: sig
e: AQAB
"n": AJncrzOrouIUCSMlRL0HU.....Kuine49_CEVR4GPn=
status: ACTIVE
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/jwks/pks2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
oAuthClientJsonWebKeyRequest:
summary: JSON Web Key Request example
value:
id: pks2f50kZB0cITmYU0g4
kid: ASHJHGasa782333-Sla3x3POBiIxDreBCdZuFs5B
kty: RSA
alg: RS256
use: sig
e: AQAB
"n": AJncrzOrouIUCSMlRL0HU.....Kuine49_CEVR4GPn=
status: ACTIVE
oAuthClientSecretListResponse:
summary: Secrets list response example
value:
- id: ocs2f4zrZbs8nUa7p0g4
status: INACTIVE
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
created: 2023-02-21T20:08:24.000Z
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4/lifecycle/activate"
hints:
allow:
- POST
delete:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f4zrZbs8nUa7p0g4"
hints:
allow:
- DELETE
- id: ocs2f50kZB0cITmYU0g4
status: ACTIVE
client_secret: HAGDTYU9XbLnS......3xasFDDwecdZuFs5B
secret_hash: 0WOOvBSzV9clc4Nr7Rbaug
created: 2023-04-06T21:32:33.000Z
lastUpdated: 2023-04-06T21:32:33.000Z
_links:
deactivate:
href: "https://{yourOktaDomain}/api/v1/apps/0oa1nkheCuDn82XVI0g4/credentials/secrets/ocs2f50kZB0cITmYU0g4/lifecycle/deactivate"
hints:
allow:
- POST
oamp-id-proofing-policy-rule:
description: This account management policy rule enables ID proofing for enrollment
processes
summary: Account Management Policy - Account management policy rule with ID
proofing enabled
value:
id: ruleId
name: Account Management Policy Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
appSignOn:
access: ALLOW
verificationMethod:
id: entity_id
type: ID_PROOFING
oamp-id-proofing-policy-rule-response:
description: This account management policy rule response enables ID proofing
for enrollment processes
summary: Account Management Policy - Account management policy rule with ID
proofing enabled
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: Account Management Policy Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
appSignOn:
access: ALLOW
verificationMethod:
id: entity_id
type: ID_PROOFING
orgCommunicationOptInResponse:
summary: Opt in to communication emails
value:
optOutEmailUsers: false
_links:
optOut:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaCommunication/optOut"
hints:
allow:
- POST
orgCommunicationOptOutResponse:
summary: Opt out of communication emails
value:
optOutEmailUsers: true
_links:
optIn:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaCommunication/optIn"
hints:
allow:
- POST
orgContactTypeResponse:
summary: Org Contact Types
value:
- contactType: BILLING
_links:
billing:
href: "https://{yourOktaDomain}/api/v1/org/contacts/billing"
- contactType: TECHNICAL
_links:
technical:
href: "https://{yourOktaDomain}/api/v1/org/contacts/technical"
orgContactUserResponse:
summary: Contact User
value:
userId: 00ux3u0ujW1r5AfZC1d7
_links:
user:
href: "https://{yourOktaDomain}/api/v1/users/00ux3u0ujW1r5AfZC1d7"
orgHideFooterPrefResponse:
summary: Hide footer response
value:
showEndUserFooter: false
_links:
showEndUserFooter:
href: "https://{yourOktaDomain}/api/v1/org/preferences/showEndUserFooter"
hints:
allow:
- POST
orgShowFooterPrefResponse:
summary: Show footer response
value:
showEndUserFooter: true
_links:
hideEndUserFooter:
href: "https://{yourOktaDomain}/api/v1/org/preferences/hideEndUserFooter"
hints:
allow:
- POST
orgSupportSettingsResponse:
summary: Org Support Settings
value:
support: ENABLED
expiration: 2024-01-24T11:13:14.000Z
_links:
extend:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaSupport/extend"
hints:
allow:
- POST
revoke:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaSupport/revoke"
hints:
allow:
- POST
orgSupportSettingsRevokeResponse:
summary: Revoked Org Support
value:
support: DISABLED
expiration: null
_links:
grant:
href: "https://{yourOktaDomain}/api/v1/org/privacy/oktaSupport/grant"
hints:
allow:
- POST
password-policy-response:
summary: PASSWORD
value:
type: PASSWORD
id: policyId
status: ACTIVE
name: Policy name
description: Policy description
priority: 1
system: true
created: createdDate
lastUpdated: lastUpdated
conditions:
people:
groups:
include:
- groupId
authProvider:
provider: provider
settings:
password:
complexity:
minLength: 8
minLowerCase: 1
minUpperCase: 1
minNumber: null
minSymbol: 0
excludeUsername: true
dictionary:
common:
exclude: false
excludeAttributes: []
age:
maxAgeDays: 0
expireWarnDays: 0
minAgeMinutes: 0
historyCount: 4
lockout:
maxAttempts: 0
autoUnlockMinutes: 0
userLockoutNotificationChannels: []
showLockoutFailures: false
recovery:
factors:
recovery_question:
status: ACTIVE
properties:
complexity:
complexity: 4
okta_email:
status: ACTIVE
properties:
recoveryToken:
tokenLifetimeMinutes: 10080
okta_sms:
status: INACTIVE
okta_call:
status: INACTIVE
delegation:
options:
skipUnlock: false
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
rules:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules"
hints:
allow:
- POST
- GET
policy-mapping-list-response:
summary: List all Mappings for a policy
value:
- id: policyId
_links:
application:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
hints:
allow:
- GET
- PUT
- DELETE
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/mappings/{mappingId}"
hints:
allow:
- GET
- PUT
- DELETE
policy:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
- DELETE
policy-mapping-response:
summary: Policy Mapping for a Policy
value:
id: policyId
_links:
application:
href: "https://{yourOktaDomain}/api/v1/apps/{appId}"
hints:
allow:
- GET
- PUT
- DELETE
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/mappings/{mappingId}"
hints:
allow:
- GET
- PUT
- DELETE
policy:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
- DELETE
postAPIServiceIntegrationRequest:
value:
type: my_app_cie
grantedScopes:
- okta.logs.read
- okta.groups.read
- okta.users.read
postAPIServiceIntegrationResponse:
summary: Post response example
value:
id: 0oa72lrepvp4WqEET1d9
type: my_app_cie
name: My App Cloud Identity Engine
createdAt: 2023-02-21T20:08:24.000Z
createdBy: 00uu3u0ujW1P6AfZC2d5
clientSecret: CkF69kXtag0q0P4pXU8OnP5IAzgGlwx6eqGy7Fmg
configGuideUrl: "https://{docDomain}/my-app-cie/configuration-guide"
grantedScopes:
- okta.logs.read
- okta.groups.read
- okta.users.read
_links:
self:
href: "https://{yourOktaDomain}/integrations/api/v1/api-services/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
- DELETE
client:
href: "https://{yourOktaDomain}/oauth2/v1/clients/0oa72lrepvp4WqEET1d9"
hints:
allow:
- GET
logo:
name: small
href: "https://{logoDomain}/{logoPath}/my_app_cie_small_logo"
profile-enrollment-policy-response:
summary: PROFILE_ENROLLMENT
value:
type: PROFILE_ENROLLMENT
id: policyId
status: ACTIVE
name: Policy name
description: Policy description
priority: 1
system: true
created: createdDate
lastUpdated: lastUpdated
conditions: null
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}"
hints:
allow:
- GET
- PUT
rules:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules"
hints:
allow:
- POST
- GET
radius-rule:
description: This global session policy uses a rule to challenge VPN users with
Radius
summary: Global session policy - Challenge VPN users with Radius
value:
type: SIGN_ON
status: ACTIVE
name: Challenge VPN users
conditions:
network:
connection: ANYWHERE
authContext:
authType: RADIUS
people:
users:
exclude: []
risk:
behaviors: []
riskScore:
level: ANY
identityProvider:
provider: ANY
actions:
signon:
access: ALLOW
requireFactor: true
primaryFactor: PASSWORD_IDP_ANY_FACTOR
factorPromptMode: ALWAYS
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
radius-rule-response:
description: The response body from the creation of a global session policy
that uses a rule to challenge VPN users with Radius
summary: Global session policy - Challenge VPN users with Radius
value:
id: rule8jjozjGMGbHyC1d6
status: ACTIVE
type: SIGN_ON
name: Challenge VPN users
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
network:
connection: ANYWHERE
authContext:
authType: RADIUS
actions:
signon:
access: ALLOW
requireFactor: true
factorPromptMode: ALWAYS
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
replace-user-request:
value:
credentials:
password:
value: tlpWENT2m
recovery_question:
question: Who's a major player in the cowboy scene?
answer: Annie Oakley
provider:
type: OKTA
name: OKTA
profile:
firstName: Isaac
lastName: Brock
email: [email protected]
login: [email protected]
mobilePhone: 555-415-1337
settingsResponseBaseEx:
value:
notifications:
vpn:
network:
connection: DISABLED
message: null
helpUrl: null
manualProvisioning: false
implicitAssignment: false
notes:
admin: null
enduser: null
sign-on-policy-rule:
description: Sign-on policy rule with a factor mode always
summary: Sign-on policy - Rule with factor mode always
value:
type: SIGN_ON
name: Test Sign On
conditions:
network:
connection: ANYWHERE
riskScore:
level: ANY
identityProvider:
provider: ANY
authContext:
authType: ANY
actions:
signon:
requireFactor: false
factorPromptMode: ALWAYS
factorLifetime: 15
access: ALLOW
session:
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
usePersistentCookie: false
primaryFactor: PASSWORD_IDP_ANY_FACTOR
sign-on-policy-rule-response:
description: Sign-on policy rule with a factor mode always
summary: Sign-on policy - Rule with factor mode always
value:
type: SIGN_ON
name: Test Sign On
id: 0prh1sd28q5sXGW08697
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
status: ACTIVE
conditions:
network:
connection: ANYWHERE
riskScore:
level: ANY
identityProvider:
provider: ANY
authContext:
authType: ANY
people:
users:
exclude: []
actions:
signon:
requireFactor: false
factorPromptMode: ALWAYS
factorLifetime: 15
access: ALLOW
session:
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
usePersistentCookie: false
primaryFactor: PASSWORD_IDP_ANY_FACTOR
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
skip-factor-challenge-on-prem-rule:
description: This global session policy uses a rule to skip factor challenge
for on-prem sign-in use
summary: Global session policy - Skip factor challenge for on-prem sign-in use
value:
type: SIGN_ON
status: ACTIVE
name: Skip Factor Challenge when On-Prem
conditions:
network:
connection: ZONE
include:
- 00u7yq5goxNFTiMjW1d7
authContext:
authType: ANY
actions:
signon:
access: ALLOW
requireFactor: false
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
skip-factor-challenge-on-prem-rule-response:
description: The response body from the creation of a global session policy
that uses a rule to skip the factor challenge for on-prem sign-in use
summary: Global session policy - Skip factor challenge for on-prem sign-in use
value:
id: rule8jjozjGMGbHyC1d6
status: ACTIVE
name: Skip Factor Challenge when On-Prem
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
network:
connection: ZONE
include:
- 00u7yq5goxNFTiMjW1d7
authContext:
authType: ANY
people:
users:
exclude: []
risk:
behaviors: []
riskScore:
level: ANY
identityProvider:
provider: ANY
actions:
signon:
access: ALLOW
requireFactor: false
primaryFactor: PASSWORD_IDP_ANY_FACTOR
rememberDeviceByDefault: false
session:
usePersistentCookie: false
maxSessionIdleMinutes: 720
maxSessionLifetimeMinutes: 0
type: SIGN_ON
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
sspr-enabled-OAMP:
description: This policy defers to the Okta account management policy to define
SSPR authentication requirements.
summary: Password policy - SSPR with Okta account management policy
value:
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
accessControl: AUTH_POLICY
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-OAMP-response:
summary: Password policy - SSPR with access control set to Okta account management
policy
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
accessControl: AUTH_POLICY
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-OAMP-update:
description: This policy defers to the Okta account management policy to define
SSPR authentication requirements.
summary: Password policy - SSPR with Okta account management policy
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
accessControl: AUTH_POLICY
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-no-step-up:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS or email are initial authenticators with no secondary\
\ authentication required."
summary: Password policy - SSPR with no step up
value:
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-no-step-up-response:
summary: Password policy - SSPR with no step up
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-no-step-up-update:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS or email are initial authenticators with no secondary\
\ authentication required."
summary: Password policy - SSPR with no step up
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- sms
- email
stepUp:
required: false
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sq-step-up:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS and Okta Verify push are the initial authenticators,\
\ and the secondary authentication is a security question."
summary: Password policy - SSPR with security question as step-up auth
value:
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
methods:
- security_question
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sq-step-up-response:
summary: Password policy - SSPR with security question as step up
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
methods:
- security_question
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sq-step-up-update:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS and Okta Verify push are initial authenticators, and\
\ the secondary authentication is a security question."
summary: Password policy - SSPR with security question as step up
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
methods:
- security_question
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS or email are initial authenticators. The step-up authentication\
\ required is any active SSO authenticator."
summary: Password policy - SSPR with any SSO authenticator as step up
value:
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up-response:
summary: Password policy - SSPR with any SSO authenticator as step up
value:
id: ruleId
_links:
self:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up-update:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Phone SMS or email are initial authenticators. The step-up authentication\
\ required is any active SSO authenticator."
summary: Password policy - SSPR with any SSO authenticator as step up
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up-with-constraints:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Okta Verify push, Phone SMS, or Google OTP are initial authenticators.\
\ The secondary authentication required is any SSO authenticator. The `methodConstraints`\
\ property limits OTP authenticators to Google."
summary: Password policy - Enable SSPR with OTP enabled and Google authenticator
constraint
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
- otp
methodConstraints:
- method: otp
allowedAuthenticators:
- key: google_otp
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up-with-constraints-response:
summary: Password policy - Enable SSPR with OTP enabled and Google authenticator
constraint
value:
id: ruleId
_links:
self:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}"
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: "https://{yourOktaDomain}/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
- otp
methodConstraints:
- method: otp
allowedAuthenticators:
- key: google_otp
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
sspr-enabled-sso-step-up-with-constraints-update:
description: "This password policy permits self-service password change, reset,\
\ and unlock. Okta Verify push, Phone SMS, or Google OTP are initial authenticators.\
\ The secondary authentication required is any SSO authenticator. The `methodConstraints`\
\ property limits OTP authenticators to Google."
summary: Password policy - Enable SSPR with OTP enabled and Google authenticator
constraint
value:
id: ruleId
name: SSPR Rule
priority: 1
status: ACTIVE
conditions:
people:
users:
exclude: []
network:
connection: ANYWHERE
actions:
passwordChange:
access: ALLOW
selfServicePasswordReset:
access: ALLOW
requirement:
primary:
methods:
- push
- sms
- otp
methodConstraints:
- method: otp
allowedAuthenticators:
- key: google_otp
stepUp:
required: true
selfServiceUnlock:
access: ALLOW
system: false
type: PASSWORD
streamConfigurationExample:
summary: SSF Stream configuration example
value:
aud: https://example.com
delivery:
method: urn:ietf:rfc:8935
endpoint_url: https://example.com
events_delivered:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
events_requested:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
events_supported:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
format: iss_sub
iss: "https://{yourOktaDomain}"
min_verification_interval: 0
stream_id: esc1k235GIIztAuGK0g5
twofa-enabled-disallow-password-allow-phishing:
description: This two-factor authentication policy uses a rule to disallow passwords
and require phishing resistance for possession authenticators for authentication.
summary: Authentication policy - 2FA with granular authentication
value:
name: Passwordless 2FA
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT0S
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
possession:
deviceBound: REQUIRED
phishingREsistant: REQUIRED
type: ACCESS_POLICY
twofa-enabled-disallow-password-allow-phishing-response:
description: The rule from a two-factor authentication policy that disallows
passwords and requires phishing resistance
summary: Authentication policy - 2FA with granular authentication
value:
id: rul7yut96gmsOzKAA1d6
status: ACTIVE
name: Passwordless 2FA
priority: 0
created: 2023-05-01T21:13:15.000Z
lastUpdated: 2023-05-01T21:13:15.000Z
system: false
conditions: null
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT0S
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
required: false
possession:
deviceBound: REQUIRED
phishingREsistant: REQUIRED
required: true
type: ACCESS_POLICY
_links:
self:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
twofa-enabled-post-auth-kmsi-disabled:
description: This two-factor authentication policy uses a rule that doesn't
prompt the user to stay signed in post-authentication.
summary: Authentication policy - 2FA with granular authentication (KMSI disabled)
value:
name: 2FA with Post Auth KMSI prompt disabled
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT2H
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
keepMeSignedIn:
postAuth: NOT_ALLOWED
type: ACCESS_POLICY
twofa-enabled-post-auth-kmsi-disabled-response:
description: This two-factor authentication policy uses a rule that doesn't
prompt the user to stay signed in post-authentication.
summary: Authentication policy - 2FA with granular authentication (KMSI disabled)
value:
id: rul7yut96gmsOzKAA1d6
status: ACTIVE
name: 2FA with Post Auth KMSI prompt disabled
priority: 0
created: 2023-05-01T21:13:15.000Z
lastUpdated: 2023-05-01T21:13:15.000Z
system: false
conditions: null
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT0S
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
required: true
keepMeSignedIn:
postAuth: NOT_ALLOWED
type: ACCESS_POLICY
_links:
self:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
twofa-enabled-post-auth-kmsi-enabled:
description: This two-factor authentication policy uses a rule to prompt the
user to stay signed in post authentication.
summary: Authentication policy - 2FA with granular authentication (KMSI enabled)
value:
name: 2FA with Post Auth KMSI prompt enabled
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT2H
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
keepMeSignedIn:
postAuth: ALLOWED
postAuthPromptFrequency: P30D
twofa-enabled-post-auth-kmsi-enabled-response:
description: This two-factor authentication policy uses a rule to prompt the
user to stay signed in post authentication.
summary: Authentication policy - 2FA with granular authentication (KMSI enabled)
value:
id: rul7yut96gmsOzKAA1d6
status: ACTIVE
name: 2FA with Post Auth KMSI prompt enabled
priority: 0
created: 2023-05-01T21:13:15.000Z
lastUpdated: 2023-05-01T21:13:15.000Z
system: false
conditions: null
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT0S
constraints:
knowledge:
excludedAuthenticationMethods:
key: okta_password
required: true
keepMeSignedIn:
postAuth: ALLOWED
postAuthPromptFrequency: PT720H
type: ACCESS_POLICY
_links:
self:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
deactivate:
href: "https://sampleorg.okta.com/api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate"
hints:
allow:
- POST
update-auth-policy-rule-condition:
description: Updates the conditions object on the request body of an authentication
policy rule.
summary: Authentication policy - Update rule with conditions
value:
type: ACCESS_POLICY
name: Rule with conditions - exclude a group
description: Updated policy rule
conditions:
userType:
include: []
exclude:
- otyezu4m0xN6w5JEa1d7
network:
connection: ZONE
exclude:
- nzo9o4rctwQCJNE6y1d7
riskScore:
level: ANY
people:
users:
exclude:
- 00u7yq5goxNFTiMjW1d7
include: []
groups:
include: []
exclude:
- 00g8vta8qzkxPEfKC1d7
platform:
include:
- type: MOBILE
os:
type: IOS
- type: MOBILE
os:
type: ANDROID
- type: DESKTOP
os:
type: MACOS
elCondition:
condition: security.risk.level == 'HIGH'
update-auth-policy-rule-condition-response:
description: The response body from an updated conditions object of an authentication
policy rule.
summary: Authentication policy - Update rule with conditions
value:
id: rulezuo73ySrHndLb1d7
status: ACTIVE
name: Rule with conditions - exclude a group
priority: 0
created: 2024-04-25T17:35:02.000Z
lastUpdated: 2024-04-25T17:35:02.000Z
system: false
conditions:
people:
users:
exclude: []
groups:
exclude:
- 00u7yq5goxNFTiMjW1d7
network:
connection: ZONE
exclude:
- nzo9o4rctwQCJNE6y1d7
platform:
include:
- type: MOBILE
os:
type: IOS
- type: MOBILE
os:
type: ANDROID
- type: DESKTOP
os:
type: MACOS
exclude: []
riskScore:
level: ANY
userType:
include: []
exclude:
- otyezu4m0xN6w5JEa1d7
elCondition:
condition: security.risk.level == 'HIGH'
actions:
appSignOn:
access: ALLOW
verificationMethod:
factorMode: 2FA
type: ASSURANCE
reauthenticateIn: PT2H
constraints:
knowledge:
required: true
types:
- password
reauthenticateIn: PT2H
type: ACCESS_POLICY
_links:
self:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
- DELETE
deactivate:
href: https://sampleorg.okta.com/api/v1/policies/rst7xus97faIAgmti1d7/rules/rul7yut96gmsOzKAA1d6
hints:
allow:
- GET
- PUT
- DELETE
update-user-profile-request:
value:
profile:
firstName: Isaac
email: [email protected]
mobilePhone: 555-415-1337
update-user-set-password-request:
value:
credentials:
password:
value: "uTVM,TPw55"
update-user-set-recovery-question-and-answer:
value:
credentials:
recovery_question:
question: How many roads must a man walk down?
answer: forty two
user-example:
summary: User example
value:
id: 00ub0oNGTSWTBKOLGLNR
status: ACTIVE
created: 2013-06-24T16:39:18.000Z
activated: 2013-06-24T16:39:19.000Z
statusChanged: 2013-06-24T16:39:19.000Z
lastLogin: 2013-06-24T17:39:19.000Z
lastUpdated: 2013-07-02T21:36:25.344Z
passwordChanged: 2013-07-02T21:36:25.344Z
profile:
login: [email protected]
firstName: Isaac
lastName: Brock
nickName: issac
displayName: Isaac Brock
email: [email protected]
secondEmail: [email protected]
profileUrl: http://www.example.com/profile
preferredLanguage: en-US
userType: Employee
organization: Okta
title: Director
division: R&D
department: Engineering
costCenter: "10"
employeeNumber: "187"
mobilePhone: +1-555-415-1337
primaryPhone: +1-555-514-1337
streetAddress: 301 Brannan St.
city: San Francisco
state: CA
zipCode: "94107"
countryCode: US
credentials:
password: {}
recovery_question:
question: What's my childhood elementary school?
provider:
type: OKTA
name: OKTA
_links:
self:
href: "https://{yourOktaDomain}/api/v1/users/00u1f96ECLNVOKVMUSEA"
userNameTemplateResponseBaseEx:
value:
userNameTemplate:
template: "${source.email}"
type: BUILT_IN
wellKnownSSFMetadataExample:
summary: Well-Known SSF Metadata example
value:
configuration_endpoint: "https://{yourOktaDomain}/api/v1/ssf/stream"
delivery_methods_supported:
- https://schemas.openid.net/secevent/risc/delivery-method/push
- urn:ietf:rfc:8935
issuer: "https://{yourOktaDomain}"
jwks_uri: "https://{yourOktaDomain}/oauth2/v1/keys"
parameters:
OktaResponse:
description: |-
Specifies the media type of the resource. Optional `okta-response` value can be included for performance optimization.
Complex DelAuth configurations may degrade performance when fetching specific parts of the response, and passing this parameter can omit these parts, bypassing the bottleneck.
Enum values for `okta-response`:
* `omitCredentials`: Omits the credentials subobject from the response.
* `omitCredentialsLinks`: Omits the following HAL links from the response: Change Password, Change Recovery Question, Forgot Password, Reset Password, Reset Factors, Unlock.
* `omitTransitioningToStatus`: Omits the `transitioningToStatus` field from the response.
examples:
Omit credentials subobject and credentials links:
summary: Omits the credentials subobject and credentials links from the
response. Does not apply performance optimization.
value: "application/json; okta-response=omitCredentials,omitCredentialsLinks"
Omit credentials, credentials links, and `transitioningToStatus` field:
summary: "Omits the credentials, credentials links, and `transitioningToStatus`\
\ field from the response. Applies performance optimization."
value: "application/json; okta-response=\"omitCredentials,omitCredentialsLinks,\
\ omitTransitioningToStatus\""
explode: false
in: header
name: Content-Type
required: false
schema:
type: string
style: simple
UISchemaId:
description: The unique ID of the UI Schema
explode: false
in: path
name: id
required: true
schema:
example: uis4a7liocgcRgcxZ0g7
type: string
style: simple
appInstanceId:
description: ID of the AD AppInstance in Okta
explode: false
in: path
name: appInstanceId
required: true
schema:
type: string
style: simple
assignmentId:
description: '`id` of the Realm Assignment'
explode: false
in: path
name: assignmentId
required: true
schema:
example: rul2jy7jLUlnO3ng00g4
type: string
style: simple
authenticatorEnrollmentId:
description: ID for a WebAuthn Preregistration Factor in Okta
explode: false
in: path
name: authenticatorEnrollmentId
required: true
schema:
type: string
style: simple
domain:
description: The okta domain name of your org or one of your custom domains
explode: false
in: path
name: domain
required: true
schema:
type: string
style: simple
limitParameter:
description: "Defines the number of policy rules returned. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: limit
required: false
schema:
type: string
style: form
pathApiServiceId:
description: '`id` of the API Service Integration instance'
example: 000lr2rLjZ6NsGn1P0g3
explode: false
in: path
name: apiServiceId
required: true
schema:
type: string
style: simple
pathApiTokenId:
description: id of the API Token
explode: false
in: path
name: apiTokenId
required: true
schema:
example: 00Tabcdefg1234567890
type: string
style: simple
pathAppId:
description: Application ID
explode: false
in: path
name: appId
required: true
schema:
example: 0oafxqCAJWWGELFTYASJ
type: string
style: simple
pathAppName:
description: Application name for the app type
explode: false
in: path
name: appName
required: true
schema:
example: oidc_client
type: string
style: simple
pathAppUserId:
description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00u13okQOVWZJGDOAUVR
type: string
style: simple
pathAssociatedServerId:
description: '`id` of the associated Authorization Server'
explode: false
in: path
name: associatedServerId
required: true
schema:
example: aus6xt9jKPmCyn6kg0g4
type: string
style: simple
pathAuthServerId:
description: '`id` of the Authorization Server'
explode: false
in: path
name: authServerId
required: true
schema:
example: GeGRTEr7f3yu2n7grw22
type: string
style: simple
pathAuthenticatorId:
description: '`id` of the Authenticator'
explode: false
in: path
name: authenticatorId
required: true
schema:
example: aut1nd8PQhGcQtSxB0g4
type: string
style: simple
pathBehaviorId:
description: id of the Behavior Detection Rule
explode: false
in: path
name: behaviorId
required: true
schema:
example: abcd1234
type: string
style: simple
pathBrandId:
description: The ID of the brand
explode: false
in: path
name: brandId
required: true
schema:
type: string
style: simple
pathBundleId:
description: The `id` of a bundle
explode: false
in: path
name: bundleId
required: true
schema:
example: 08ab2db568c7c300079fefd0
type: string
style: simple
pathCaptchaId:
description: The unique key used to identify your CAPTCHA instance
explode: false
in: path
name: captchaId
required: true
schema:
type: string
style: simple
pathClaimId:
description: '`id` of Claim'
explode: false
in: path
name: claimId
required: true
schema:
example: hNJ3Uk76xLagWkGx5W3N
type: string
style: simple
pathClientId:
description: '`client_id` of the app'
explode: false
in: path
name: clientId
required: true
schema:
example: 52Uy4BUWVBOjFItcg2jWsmnd83Ad8dD
type: string
style: simple
pathClientSecretId:
description: Unique `id` of the OAuth 2.0 Client Secret
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
pathContactType:
explode: false
in: path
name: contactType
required: true
schema:
description: Type of contact
enum:
- BILLING
- TECHNICAL
example: BILLING
type: string
style: simple
pathCredentialKeyId:
description: '`id` of the certificate key'
explode: false
in: path
name: keyId
required: true
schema:
example: P7jXpG-LG2ObNgY9C0Mn2uf4InCQTmRZMDCZoVNxdrk
type: string
style: simple
pathCsrId:
description: '`id` of the CSR'
explode: false
in: path
name: csrId
required: true
schema:
example: fd7x1h7uTcZFx22rU1f7
type: string
style: simple
pathCustomizationId:
description: The ID of the email customization
explode: false
in: path
name: customizationId
required: true
schema:
type: string
style: simple
pathDeviceAssuranceId:
description: Id of the Device Assurance Policy
explode: false
in: path
name: deviceAssuranceId
required: true
schema:
type: string
style: simple
pathDeviceCheckId:
description: Id of the Device Check
explode: false
in: path
name: deviceCheckId
required: true
schema:
type: string
style: simple
pathDeviceId:
description: '`id` of the device'
explode: false
in: path
name: deviceId
required: true
schema:
example: guo4a5u7JHHhjXrMK0g4
type: string
style: simple
pathDomainId:
description: '`id` of the Domain'
explode: false
in: path
name: domainId
required: true
schema:
example: OmWNeywfTzElSLOBMZsL
type: string
style: simple
pathEmailDomainId:
explode: false
in: path
name: emailDomainId
required: true
schema:
description: The ID of the email domain.
type: string
style: simple
pathEmailServerId:
explode: false
in: path
name: emailServerId
required: true
schema:
description: ID of your SMTP Server configuration
type: string
style: simple
pathEntitlementId:
description: The `id` of a bundle entitlement
explode: false
in: path
name: entitlementId
required: true
schema:
example: 0obfxqCAJWWGELFTYASJ
type: string
style: simple
pathEventHookId:
description: '`id` of the Event Hook'
explode: false
in: path
name: eventHookId
required: true
schema:
example: who8vt36qfNpCGz9H1e6
type: string
style: simple
pathFactorId:
description: ID of an existing user Factor
explode: false
in: path
name: factorId
required: true
schema:
example: zAgrsaBe0wVGRugDYtdv
type: string
style: simple
pathFeatureId:
description: '`id` of the feature'
explode: false
in: path
name: featureId
required: true
schema:
example: R5HjqNn1pEqWGy48E9jg
type: string
style: simple
pathFeatureName:
description: Name of the Feature
explode: false
in: path
name: featureName
required: true
schema:
$ref: '#/components/schemas/ApplicationFeatureType'
style: simple
pathFirstPartyAppName:
description: |
The key name for the Okta app.
Supported apps:
* Okta Admin Console (`admin-console`)
explode: false
in: path
name: appName
required: true
schema:
example: admin-console
type: string
style: simple
pathGrantId:
description: Grant ID
explode: false
in: path
name: grantId
required: true
schema:
example: iJoqkwx50mrgX4T9LcaH
type: string
style: simple
pathGroupId:
description: The `id` of the group
explode: false
in: path
name: groupId
required: true
schema:
example: 00g1emaKYZTWRYYRRTSK
type: string
style: simple
pathGroupRuleId:
description: The `id` of the group rule
explode: false
in: path
name: groupRuleId
required: true
schema:
example: 0pr3f7zMZZHPgUoWO0g4
type: string
style: simple
pathHookKeyId:
description: ID of the Hook Key
explode: false
in: path
name: id
required: true
schema:
example: XreKU5laGwBkjOTehusG
type: string
style: simple
pathId:
description: "`id`, `login`, or `login shortname` (as long as it is unambiguous)\
\ of user"
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
pathIdentitySourceId:
description: The ID of the Identity Source for which the session is created
example: 0oa3l6l6WK6h0R0QW0g4
explode: false
in: path
name: identitySourceId
required: true
schema:
type: string
style: simple
pathIdentitySourceSessionId:
description: The ID of the Identity Source Session
example: aps1qqonvr2SZv6o70h8
explode: false
in: path
name: sessionId
required: true
schema:
type: string
style: simple
pathIdpCsrId:
description: '`id` of the IdP CSR'
explode: false
in: path
name: idpCsrId
required: true
schema:
example: 1uEhyE65oV3H6KM9gYcN
type: string
style: simple
pathIdpId:
description: '`id` of IdP'
explode: false
in: path
name: idpId
required: true
schema:
example: 0oa62bfdjnK55Z5x80h7
type: string
style: simple
pathInlineHookId:
description: '`id` of the Inline Hook'
explode: false
in: path
name: inlineHookId
required: true
schema:
example: Y7Rzrd4g4xj6WdKzrBHH
type: string
style: simple
pathJsonWebKeyId:
description: Unique `id` of the OAuth 2.0 Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
explode: false
in: path
name: keyId
required: true
schema:
type: string
style: simple
pathKeyId:
description: ID of the Key Credential for the application
explode: false
in: path
name: keyId
required: true
schema:
example: sjP9eiETijYz110VkhHN
type: string
style: simple
pathKid:
description: Unique `id` of the IdP Key Credential
explode: false
in: path
name: kid
required: true
schema:
example: KmMo85SSsU7TZzOShcGb
type: string
style: simple
pathLifecycle:
description: Whether to `ENABLE` or `DISABLE` the feature
explode: false
in: path
name: lifecycle
required: true
schema:
$ref: '#/components/schemas/FeatureLifecycle'
style: simple
pathLinkedObjectName:
description: Primary or Associated name
explode: false
in: path
name: linkedObjectName
required: true
schema:
type: string
style: simple
pathLogStreamId:
description: Unique identifier for the Log Stream
explode: false
in: path
name: logStreamId
required: true
schema:
example: 0oa1orzg0CHSgPcjZ0g4
type: string
style: simple
pathLogStreamType:
explode: false
in: path
name: logStreamType
required: true
schema:
$ref: '#/components/schemas/LogStreamType'
style: simple
pathMappingId:
description: '`id` of the Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: cB6u7X8mptebWkffatKA
type: string
style: simple
pathMemberId:
description: '`id` of the Member'
explode: false
in: path
name: memberId
required: true
schema:
example: irb1qe6PGuMc7Oh8N0g4
type: string
style: simple
pathMethodType:
description: Type of authenticator method
explode: false
in: path
name: methodType
required: true
schema:
$ref: '#/components/schemas/AuthenticatorMethodType'
style: simple
pathNotificationType:
explode: false
in: path
name: notificationType
required: true
schema:
$ref: '#/components/schemas/NotificationType'
style: simple
pathOAuthProvisioningAppName:
explode: false
in: path
name: appName
required: true
schema:
$ref: '#/components/schemas/OAuthProvisioningEnabledApp'
style: simple
pathOperation:
explode: false
in: path
name: operation
required: true
schema:
type: string
style: simple
pathOwnerId:
description: The `id` of the group owner
explode: false
in: path
name: ownerId
required: true
schema:
example: 00u1emaK22TWRYd3TtG
type: string
style: simple
pathPermissionType:
description: An okta permission type
explode: false
in: path
name: permissionType
required: true
schema:
example: okta.users.manage
type: string
style: simple
pathPolicyId:
description: '`id` of the Policy'
explode: false
in: path
name: policyId
required: true
schema:
example: 00plrilJ7jZ66Gn0X0g3
type: string
style: simple
pathPolicyMappingId:
description: '`id` of the policy resource Mapping'
explode: false
in: path
name: mappingId
required: true
schema:
example: maplr2rLjZ6NsGn1P0g3
type: string
style: simple
pathPoolId:
description: Id of the agent pool for which the settings will apply
explode: false
in: path
name: poolId
required: true
schema:
type: string
style: simple
pathPrimaryRelationshipName:
description: Name of the `primary` relationship being assigned
explode: false
in: path
name: primaryRelationshipName
required: true
schema:
example: manager
type: string
style: simple
pathPrimaryUserId:
description: User ID to be assigned to the `primary` relationship for the `associated`
user
explode: false
in: path
name: primaryUserId
required: true
schema:
type: string
style: simple
pathPrincipalRateLimitId:
description: id of the Principal Rate Limit
explode: false
in: path
name: principalRateLimitId
required: true
schema:
example: abcd1234
type: string
style: simple
pathPublicKeyId:
description: id" of the Public Key
explode: false
in: path
name: keyId
required: true
schema:
example: FcH2P9Eg7wr0o8N2FuV0
type: string
style: simple
pathPushProviderId:
description: Id of the push provider
explode: false
in: path
name: pushProviderId
required: true
schema:
type: string
style: simple
pathQueryRoleExpand:
description: "An optional parameter used to return targets configured for the\
\ standard Role Assignment in the `embedded` property. Supported values: `targets/groups`\
\ or `targets/catalog/apps`"
examples:
groupTarget:
summary: Return Group targets
value: targets/groups
appTarget:
summary: Return App targets
value: targets/catalog/apps
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
pathRealmId:
description: '`id` of the Realm'
explode: false
in: path
name: realmId
required: true
schema:
example: vvrcFogtKCrK9aYq3fgV
type: string
style: simple
pathRelationshipName:
description: Name of the `primary` or `associated` relationship being queried
examples:
manager:
summary: Example of a `primary` name
value: manager
subordinate:
summary: Example of an `associated` name
value: subordinate
explode: false
in: path
name: relationshipName
required: true
schema:
type: string
style: simple
pathResourceId:
description: '`id` of the Resource'
explode: false
in: path
name: resourceId
required: true
schema:
example: ire106sQKoHoXXsAe0g4
type: string
style: simple
pathResourceSelectorId:
description: '`id` of a Resource Selector'
explode: false
in: path
name: resourceSelectorId
required: true
schema:
example: rsl1hx31gVEa6x10v0g5
type: string
style: simple
pathResourceSetIdOrLabel:
description: '`id` or `label` the Resource Set'
explode: false
in: path
name: resourceSetIdOrLabel
required: true
schema:
example: iamoJDFKaJxGIr0oamd9g
type: string
style: simple
pathRiskProviderId:
description: '`id` of the Risk Provider object'
explode: false
in: path
name: riskProviderId
required: true
schema:
example: 00rp12r4skkjkjgsn
type: string
style: simple
pathRoleAssignmentId:
description: The `id` of the Role Assignment
explode: false
in: path
name: roleAssignmentId
required: true
schema:
example: JBCUYUC7IRCVGS27IFCE2SKO
type: string
style: simple
pathRoleId:
description: '`id` of the Role'
explode: false
in: path
name: roleId
required: true
schema:
example: 3Vg1Pjp3qzw4qcCK5EdO
type: string
style: simple
pathRoleIdOrLabel:
description: '`id` or `label` of the Role'
explode: false
in: path
name: roleIdOrLabel
required: true
schema:
example: cr0Yq6IJxGIr0ouum0g3
type: string
style: simple
pathRoleRef:
description: "A reference to an existing role. Standard roles require a `roleType`,\
\ while Custom Roles require a `roleId`. See [Standard Roles](/openapi/okta-management/guides/roles/#standard-roles)."
explode: false
in: path
name: roleRef
required: true
schema:
$ref: '#/components/schemas/listSubscriptionsRole_roleRef_parameter'
style: simple
pathRuleId:
description: '`id` of the Policy Rule'
explode: false
in: path
name: ruleId
required: true
schema:
example: ruld3hJ7jZh4fn0st0g3
type: string
style: simple
pathSchemaId:
explode: false
in: path
name: schemaId
required: true
schema:
type: string
style: simple
pathScopeId:
description: '`id` of Scope'
explode: false
in: path
name: scopeId
required: true
schema:
example: 0TMRpCWXRKFjP7HiPFNM
type: string
style: simple
pathSecretId:
description: '`id` of the API Service Integration instance Secret'
example: ocs2f4zrZbs8nUa7p0g4
explode: false
in: path
name: secretId
required: true
schema:
type: string
style: simple
pathSection:
explode: false
in: path
name: section
required: true
schema:
type: string
style: simple
pathSecurityEventProviderId:
description: '`id` of the Security Events Provider instance'
explode: false
in: path
name: securityEventProviderId
required: true
schema:
example: sse1qg25RpusjUP6m0g5
type: string
style: simple
pathSessionId:
description: '`id` of the Session'
explode: false
in: path
name: sessionId
required: true
schema:
example: l7FbDVqS8zHSy65uJD85
type: string
style: simple
pathSubmissionId:
description: OIN Integration ID
explode: false
in: path
name: submissionId
required: true
schema:
example: acme_submissionapp_1
type: string
style: simple
pathTargetGroupId:
explode: false
in: path
name: targetGroupId
required: true
schema:
example: 00g1e9dfjHeLAsdX983d
type: string
style: simple
pathTemplateId:
description: '`id` of the Template'
explode: false
in: path
name: templateId
required: true
schema:
example: 6NQUJ5yR3bpgEiYmq8IC
type: string
style: simple
pathTemplateName:
description: The name of the email template
explode: false
in: path
name: templateName
required: true
schema:
type: string
style: simple
pathThemeId:
description: The ID of the theme
explode: false
in: path
name: themeId
required: true
schema:
type: string
style: simple
pathTokenId:
description: '`id` of Token'
explode: false
in: path
name: tokenId
required: true
schema:
example: sHHSth53yJAyNSTQKDJZ
type: string
style: simple
pathTransactionId:
description: ID of an existing Factor verification transaction
explode: false
in: path
name: transactionId
required: true
schema:
example: gPAQcN3NDjSGOCAeG2Jv
type: string
style: simple
pathTrustedOriginId:
description: '`id` of the Trusted Origin'
explode: false
in: path
name: trustedOriginId
required: true
schema:
example: 7j2PkU1nyNIDe26ZNufR
type: string
style: simple
pathTypeId:
explode: false
in: path
name: typeId
required: true
schema:
description: The unique key for the User Type
type: string
style: simple
pathUpdateId:
description: Id of the update
explode: false
in: path
name: updateId
required: true
schema:
type: string
style: simple
pathUserId:
description: ID of an existing Okta user
explode: false
in: path
name: userId
required: true
schema:
example: 00ub0oNGTSWTBKOLGLNR
type: string
style: simple
pathUserIdOrLogin:
description: |-
If for the `self` link, the ID of the User for whom you want to get the primary User ID. If for the `associated` relation, the User ID or login value of the User assigned the associated relationship.
This can be `me` to represent the current session User.
examples:
manager:
summary: Example ID of `primary`
value: 00u5zex6ztMbOZhF50h7
subordinate:
summary: Example ID of `associated`
value: 00u5zex6ztMbOZhF50h7
explode: false
in: path
name: userIdOrLogin
required: true
schema:
type: string
style: simple
pathZoneId:
description: '`id` of the Network Zone'
example: nzowc1U5Jh5xuAK0o0g3
explode: false
in: path
name: zoneId
required: true
schema:
type: string
style: simple
privilegedAccountId:
description: ID of an existing Privileged Account
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
privilegedResourceId:
description: ID of an existing privileged resource
explode: false
in: path
name: id
required: true
schema:
type: string
style: simple
queryAfter:
description: "The cursor to use for pagination. It is an opaque string that\
\ specifies your current location in the list and is obtained from the `Link`\
\ response header. See [Pagination](https://developer.okta.com/docs/api/#pagination)."
explode: true
in: query
name: after
required: false
schema:
type: string
style: form
queryAppAfter:
description: "Specifies the pagination cursor for the next page of results.\
\ Treat this as an opaque value obtained through the next link relationship.\
\ See [Pagination](/#pagination)."
explode: true
in: query
name: after
required: false
schema:
example: "16275000448691"
type: string
style: form
queryAppGrantsExpand:
description: "An optional parameter to return scope details in the `_embedded`\
\ property. Valid value: `scope`"
explode: true
in: query
name: expand
required: false
schema:
example: scope
type: string
style: form
queryAppLimit:
description: |
Specifies the number of objects to return per page.
If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it).
See [Pagination](/#pagination).
explode: true
in: query
name: limit
required: false
schema:
default: 50
format: int32
maximum: 500
minimum: 1
type: integer
style: form
queryAppUserExpand:
description: |-
An optional query parameter to return the corresponding [User](/openapi/okta-management/management/tag/User/) object in the `_embedded` property.
Valid value: `user`
explode: true
in: query
name: expand
required: false
schema:
example: user
type: string
style: form
queryAppUserQ:
description: |
Specifies a filter for the list of Application Users returned based on their profile attributes.
The value of `q` is matched against the beginning of the following profile attributes: `userName`, `firstName`, `lastName`, and `email`.
This filter only supports the `startsWith` operation that matches the `q` string against the beginning of the attribute values.
> **Note:** For OIDC apps, user profiles don't contain the `firstName` or `lastName` attributes. Therefore, the query only matches against the `userName` or `email` attributes.
explode: true
in: query
name: q
required: false
schema:
example: sam
type: string
style: form
queryAppsExpand:
description: |-
An optional parameter used for link expansion to embed more resources in the response.
Only supports `expand=user/{userId}` and must be used with the `user.id eq "{userId}"` filter query for the same user.
Returns the assigned [Application User](/openapi/okta-management/management/tag/ApplicationUsers/) in the `_embedded` property.
explode: true
in: query
name: expand
required: false
schema:
example: user/0oa1gjh63g214q0Hq0g4
type: string
style: form
queryExpand:
description: "Valid value: `scope`. If specified, scope details are included\
\ in the `_embedded` attribute."
explode: true
in: query
name: expand
required: false
schema:
type: string
style: form
queryExpandBrand:
description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- themes
- domains
- emailDomain
type: string
type: array
style: form
queryExpandEmailDomain:
description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- brands
type: string
type: array
style: form
queryExpandEmailTemplate:
description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- settings
- customizationCount
type: string
type: array
style: form
queryExpandPageRoot:
description: Specifies additional metadata to be included in the response
explode: false
in: query
name: expand
required: false
schema:
items:
enum:
- default
- customized
- customizedUrl
- preview
- previewUrl
type: string
type: array
style: form
queryFilter:
description: Searches the records for matching value
explode: true
in: query
name: q
required: false
schema:
type: string
style: form
queryGroupAssignmentLimit:
description: |-
Specifies the number of objects to return per page.
If there are multiple pages of results, the Link header contains a `next` link that you need to use as an opaque value (follow it, don't parse it).
See [Pagination](/#pagination).
examples:
min:
summary: Minimum limit value
value: 20
hundred:
summary: Sample limit value
value: 100
max:
summary: Maximum limit value
value: 200
explode: true
in: query
name: limit
required: false
schema:
default: 20
format: int32
maximum: 200
minimum: 20
type: integer
style: form
queryGroupAssignmentWithGroupExpand:
description: "An optional query parameter to return the corresponding assigned\
\ [Group](/openapi/okta-management/management/tag/Group/) or \nthe group assignment\
\ metadata details in the `_embedded` property. "
examples:
group:
summary: Embedded assigned Group
value: group
metadata:
summary: Embedded group assignment metadata
value: metadata
explode: true
in: query
name: expand
required: false
schema:
example: group
type: string
style: form
queryGroupAssignmentWithMetadataExpand:
description: "An optional query parameter to return the corresponding assigned\
\ [Group](/openapi/okta-management/management/tag/Group/) or \nthe group assignment\
\ metadata details in the `_embedded` property. "
examples:
group:
summary: Embedded assigned Group
value: group
metadata:
summary: Embedded group assignment metadata
value: metadata
explode: true
in: query
name: expand
required: false
schema:
example: metadata
type: string
style: form
queryLanguage:
description: The language to use for the email. Defaults to the current user's
language if unspecified.
explode: true
in: query
name: language
required: false
schema:
$ref: '#/components/schemas/Language'
style: form
queryLimit:
description: A limit on the number of objects to return
explode: true
in: query
name: limit
required: false
schema:
default: 20
maximum: 200
minimum: 1
type: integer
style: form
queryLimitPerPoolType:
description: Maximum number of AgentPools being returned
explode: true
in: query
name: limitPerPoolType
required: false
schema:
default: 5
type: integer
style: form
queryPoolType:
description: Agent type to search for
explode: true
in: query
name: poolType
required: false
schema:
$ref: '#/components/schemas/AgentType'
style: form
queryScheduled:
description: Scope the list only to scheduled or ad-hoc updates. If the parameter
is not provided we will return the whole list of updates.
explode: true
in: query
name: scheduled
required: false
schema:
type: boolean
style: form
queryUserExpand:
description: "An optional parameter to include metadata in the `_embedded` attribute.\
\ Valid value: `blocks`"
explode: true
in: query
name: expand
required: false
schema:
example: blocks
type: string
style: form
simulateParameter:
description: Use `expand=EVALUATED` to include a list of evaluated but not matched
policies and policy rules. Use `expand=RULE` to include details about why
a rule condition wasn't matched.
explode: true
in: query
name: expand
required: false
schema:
example: EVALUATED
type: string
style: form
yubikeyTokenId:
description: ID of a Yubikey token
explode: false
in: path
name: tokenId
required: true
schema:
example: ykkxdtCA1fKVxyu6R0g3
type: string
style: simple
requestBodies:
AuthenticatorRequestBody:
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorRequestDuo'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
required: true
responses:
ErrorAppUserForbidden403:
content:
application/json:
examples:
AppUserProvEx:
$ref: '#/components/examples/ErrorAppUserForbiddenAction'
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
ErrorAppUserUpdateBadRequest400:
content:
application/json:
examples:
AppUserUpdateCredEx:
$ref: '#/components/examples/ErrorAppUserUpdateBadRequest'
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
AuthenticatorResponse:
content:
application/json:
examples:
Duo:
$ref: '#/components/examples/AuthenticatorResponseDuo'
Email:
$ref: '#/components/examples/AuthenticatorResponseEmail'
Password:
$ref: '#/components/examples/AuthenticatorResponsePassword'
Phone:
$ref: '#/components/examples/AuthenticatorResponsePhone'
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseWebAuthn'
SecurityQuestion:
$ref: '#/components/examples/AuthenticatorResponseSecurityQuestion'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
AuthenticatorResponseInactiveWebAuthn:
content:
application/json:
examples:
WebAuthn:
$ref: '#/components/examples/AuthenticatorResponseInactiveWebAuthn'
schema:
$ref: '#/components/schemas/AuthenticatorBase'
description: OK
ErrorApiValidationFailed400:
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/ErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
ErrorMissingRequiredParameter400:
content:
application/json:
examples:
MissingRequiredParameter:
$ref: '#/components/examples/ErrorMissingRequiredParameter'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
ErrorInvalidToken401:
content:
application/json:
examples:
InvalidTokenProvided:
$ref: '#/components/examples/ErrorInvalidTokenProvided'
schema:
$ref: '#/components/schemas/Error'
description: Unauthorized
ErrorAccessDenied403:
content:
application/json:
examples:
AccessDenied:
$ref: '#/components/examples/ErrorAccessDenied'
schema:
$ref: '#/components/schemas/Error'
description: Forbidden
ErrorResourceNotFound404:
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/ErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
ErrorTooManyRequests429:
content:
application/json:
examples:
TooManyRequests:
$ref: '#/components/examples/ErrorTooManyRequests'
schema:
$ref: '#/components/schemas/Error'
description: Too Many Requests
Error502NoConnectedAgents:
content:
application/json:
examples:
AgentTimeOut:
$ref: '#/components/examples/ErrorAgentTimeOut'
schema:
$ref: '#/components/schemas/Error'
description: There are no connected agents.
Error504AgentTimeOut:
content:
application/json:
examples:
AgentTimeOut:
$ref: '#/components/examples/ErrorNoConnectedAgents'
schema:
$ref: '#/components/schemas/Error'
description: Timed out waiting for agent.
DRStatusResponse:
content:
application/json:
schema:
description: List of domains and their disaster recovery status
items:
$ref: '#/components/schemas/DRStatusItem'
type: array
description: OK
headers:
Link:
description: A link to the next page of responses
explode: false
schema:
type: string
style: simple
ErrorResponse:
content:
application/json:
schema:
$ref: '#/components/schemas/ErrorResponse'
description: |
400 - When request validation fails
401 - When the user is not authenticated or the feature is not enabled
403 - When the user is not authorized
429 - When rate limits are exceeded
500 - When an internal server error is encountred
501 - When the operation is not supported
GetFactorResponse:
content:
application/json:
examples:
SMS:
$ref: '#/components/examples/FactorResponseSms'
Email:
$ref: '#/components/examples/FactorEmail'
schema:
$ref: '#/components/schemas/UserFactor'
description: Success
Error-FF-NotEnabled-Response-401:
content:
application/json:
examples:
Unauthorized:
value:
errorCode: E0000015
errorSummary: You do not have permission to access the feature you
are requesting
errorLink: E0000015
errorId: oaeStOuPPxDRUm3PJhf-tL7bQ
errorCauses: []
description: Unauthorized
ErrorInternalServer500:
content:
application/json:
examples:
InternalServerError:
$ref: '#/components/examples/ErrorInternalServer'
schema:
$ref: '#/components/schemas/Error'
description: Internal Server Error
NzErrorApiValidationFailed400:
content:
application/json:
examples:
APIValidationFailed:
$ref: '#/components/examples/NzErrorApiValidationFailed'
schema:
$ref: '#/components/schemas/Error'
description: Bad Request
NzErrorResourceNotFound404:
content:
application/json:
examples:
ResourceNotFound:
$ref: '#/components/examples/NzErrorResourceNotFound'
schema:
$ref: '#/components/schemas/Error'
description: Not Found
schemas:
AAGUIDGroupObject:
description: |
The AAGUID Group object supports the Early Access (Self-Service) Allow List for FIDO2 (WebAuthn) Authenticators feature. Enable the feature for your org from the **Settings** > **Features** page in the Admin Console.
This feature has several limitations when enrolling a security key:
- Enrollment is currently unsupported on Firefox.
- Enrollment is currently unsupported on Chrome if User Verification is set to DISCOURAGED and a PIN is set on the security key.
- If prompted during enrollment, users must allow Okta to see the make and model of the security key.
properties:
aaguids:
description: "A list of YubiKey hardware FIDO2 Authenticator Attestation\
\ Global Unique Identifiers (AAGUIDs). The available [AAGUIDs](https://support.yubico.com/hc/en-us/articles/360016648959-YubiKey-Hardware-FIDO2-AAGUIDs)\
\ (opens new window) are provided by the FIDO Alliance Metadata Service."
items:
description: AAGUID
type: string
type: array
name:
description: A name to identify the group of YubiKey hardware FIDO2 AAGUIDs
type: string
type: object
APIServiceIntegrationInstance:
example:
createdAt: 2023-02-21T20:08:24.000Z
grantedScopes:
- okta.logs.read
createdBy: 00uu3u0ujW1P6AfZC2d5
_links:
client:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: My App Cloud Identity Engine
id: 0oa72lrepvp4WqEET1d9
type: my_app_cie
configGuideUrl: "https://{docDomain}/my-app-cie/configuration-guide"
properties:
configGuideUrl:
description: The URL to the API service integration configuration guide
example: "https://{docDomain}/my-app-cie/configuration-guide"
readOnly: true
type: string
createdAt:
description: Timestamp when the API Service Integration instance was created
example: 2023-02-21T20:08:24.000Z
readOnly: true
type: string
createdBy:
description: The user ID of the API Service Integration instance creator
example: 00uu3u0ujW1P6AfZC2d5
readOnly: true
type: string
grantedScopes:
description: "The list of Okta management scopes granted to the API Service\
\ Integration instance. See [Okta management OAuth 2.0 scopes](/oauth2/#okta-admin-management)."
example:
- okta.logs.read
items:
type: string
type: array
id:
description: The ID of the API Service Integration instance
example: 0oa72lrepvp4WqEET1d9
readOnly: true
type: string
name:
description: The name of the API service integration that corresponds with
the `type` property. This is the full name of the API service integration
listed in the Okta Integration Network (OIN) catalog.
example: My App Cloud Identity Engine
readOnly: true
type: string
type:
description: "The type of the API service integration. This string is an\
\ underscore-concatenated, lowercased API service integration name. For\
\ example, `my_api_log_integration`."
example: my_app_cie
type: string
_links:
$ref: '#/components/schemas/APIServiceIntegrationLinks'
type: object
APIServiceIntegrationInstanceSecret:
example:
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
delete:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2023-02-21T20:08:24.000Z
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
client_secret: DRUFXGF9XbLnS9k-Sla3x3POBiIxDreBCdZuFs5B
id: ocs2f4zrZbs8nUa7p0g4
status: ACTIVE
properties:
client_secret:
description: "The OAuth 2.0 client secret string. The client secret string\
\ is returned in the response of a Secret creation request. In other responses\
\ (such as list, activate, or deactivate requests), the client secret\
\ is returned as an undisclosed hashed value."
example: DRUFXGF9XbLnS9k-Sla3x3POBiIxDreBCdZuFs5B
readOnly: true
type: string
created:
description: Timestamp when the API Service Integration instance Secret
was created
example: 2023-02-21T20:08:24.000Z
readOnly: true
type: string
id:
description: The ID of the API Service Integration instance Secret
example: ocs2f4zrZbs8nUa7p0g4
readOnly: true
type: string
lastUpdated:
description: Timestamp when the API Service Integration instance Secret
was updated
example: 2023-02-21T20:08:24.000Z
readOnly: true
type: string
secret_hash:
description: OAuth 2.0 client secret string hash
example: yk4SVx4sUWVJVbHt6M-UPA
readOnly: true
type: string
status:
description: Status of the API Service Integration instance Secret
enum:
- ACTIVE
- INACTIVE
example: ACTIVE
type: string
_links:
$ref: '#/components/schemas/APIServiceIntegrationSecretLinks'
required:
- _links
- client_secret
- created
- id
- lastUpdated
- secret_hash
- status
type: object
APIServiceIntegrationLinks:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
client:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
client:
$ref: '#/components/schemas/HrefObjectClientLink'
logo:
$ref: '#/components/schemas/HrefObjectLogoLink'
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
readOnly: true
APIServiceIntegrationSecretLinks:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
delete:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
activate:
$ref: '#/components/schemas/HrefObjectActivateLink'
deactivate:
$ref: '#/components/schemas/HrefObjectDeactivateLink'
delete:
$ref: '#/components/schemas/HrefObjectDeleteLink'
readOnly: true
APNSConfiguration:
properties:
fileName:
description: (Optional) File name for Admin Console display
type: string
keyId:
description: 10-character Key ID obtained from the Apple developer account
type: string
teamId:
description: 10-character Team ID used to develop the iOS app
type: string
tokenSigningKey:
description: APNs private authentication token signing key
type: string
writeOnly: true
APNSPushProvider:
allOf:
- $ref: '#/components/schemas/PushProvider'
- properties:
configuration:
$ref: '#/components/schemas/APNSConfiguration'
type: object
AccessPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
description: Policy conditions aren't supported. Conditions are applied
at the rule level for this policy type.
nullable: true
type: string
type: object
AccessPolicyConstraint:
properties:
authenticationMethods:
description: This property specifies the precise authenticator and method
for authentication.
items:
$ref: '#/components/schemas/AuthenticationMethodObject'
type: array
excludedAuthenticationMethods:
description: This property specifies the precise authenticator and method
to exclude from authentication.
items:
$ref: '#/components/schemas/AuthenticationMethodObject'
type: array
methods:
description: The Authenticator methods that are permitted
items:
enum:
- PASSWORD
- SECURITY_QUESTION
- SMS
- VOICE
- EMAIL
- PUSH
- SIGNED_NONCE
- OTP
- TOTP
- WEBAUTHN
- DUO
- IDP
- CERT
type: string
type: array
reauthenticateIn:
description: "The duration after which the user must re-authenticate regardless\
\ of user activity. This re-authentication interval overrides the Verification\
\ Method object's `reauthenticateIn` interval. The supported values use\
\ ISO 8601 period format for recurring time intervals (for example, `PT1H`)."
type: string
required:
description: "This property indicates whether the knowledge or possession\
\ factor is required by the assurance. It's optional in the request, but\
\ is always returned in the response. By default, this field is `true`.\
\ If the knowledge or possession constraint has values for `excludedAuthenticationMethods`\
\ the `required` value is false. "
type: boolean
types:
description: The Authenticator types that are permitted
items:
enum:
- SECURITY_KEY
- PHONE
- EMAIL
- PASSWORD
- SECURITY_QUESTION
- APP
- FEDERATED
type: string
type: array
type: object
AccessPolicyConstraints:
properties:
knowledge:
$ref: '#/components/schemas/KnowledgeConstraint'
possession:
$ref: '#/components/schemas/PossessionConstraint'
type: object
AccessPolicyLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the app access policy resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AccessPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/AccessPolicyRuleActions'
conditions:
$ref: '#/components/schemas/AccessPolicyRuleConditions'
type: object
AccessPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
appSignOn:
$ref: '#/components/schemas/AccessPolicyRuleApplicationSignOn'
type: object
AccessPolicyRuleApplicationSignOn:
properties:
access:
$ref: '#/components/schemas/AccessPolicyRuleApplicationSignOnAccess'
verificationMethod:
$ref: '#/components/schemas/VerificationMethod'
type: object
AccessPolicyRuleApplicationSignOnAccess:
enum:
- ALLOW
- DENY
type: string
AccessPolicyRuleConditions:
allOf:
- properties:
device:
$ref: '#/components/schemas/DeviceAccessPolicyRuleCondition'
elCondition:
$ref: '#/components/schemas/AccessPolicyRuleCustomCondition'
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
platform:
$ref: '#/components/schemas/PlatformPolicyRuleCondition'
riskScore:
$ref: '#/components/schemas/RiskScorePolicyRuleCondition'
userType:
$ref: '#/components/schemas/UserTypeCondition'
type: object
AccessPolicyRuleCustomCondition:
properties:
condition:
description: expression to match
type: string
required:
- condition
AcsEndpoint:
description: An array of ACS endpoints. You can configure a maximum of 100 endpoints.
properties:
index:
description: Index of the URL in the array of ACS endpoints
example: 0
type: integer
url:
description: URL of the ACS
example: https://www.example.com/sso/saml
maxLength: 1024
type: string
required:
- index
- url
type: object
Actions:
example:
assignUserToRealm:
realmId: realmId
properties:
assignUserToRealm:
$ref: '#/components/schemas/AssignUserToRealm'
type: object
AdminConsoleSettings:
description: Settings specific to the Okta Admin Console
example:
sessionMaxLifetimeMinutes: 6077
sessionIdleTimeoutMinutes: 62
properties:
sessionIdleTimeoutMinutes:
default: 15
description: The maximum idle time before the Okta Admin Console session
expires. Must be no more than 12 hours.
maximum: 720
minimum: 5
type: integer
sessionMaxLifetimeMinutes:
default: 720
description: The absolute maximum session lifetime of the Okta Admin Console.
Must be no more than 7 days.
maximum: 10080
minimum: 5
type: integer
title: Okta Admin Console Settings
type: object
Agent:
description: Agent details
example:
operationalStatus: DEGRADED
isLatestGAedVersion: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
updateStatus: Cancelled
name: name
poolId: poolId
id: id
type: AD
version: version
updateMessage: updateMessage
isHidden: true
lastConnection: 2000-01-23T04:56:07.000+00:00
properties:
id:
readOnly: true
type: string
isHidden:
type: boolean
isLatestGAedVersion:
type: boolean
lastConnection:
format: date-time
type: string
name:
type: string
operationalStatus:
$ref: '#/components/schemas/OperationalStatus'
poolId:
type: string
type:
$ref: '#/components/schemas/AgentType'
updateMessage:
type: string
updateStatus:
$ref: '#/components/schemas/AgentUpdateInstanceStatus'
version:
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
AgentAction:
description: Details about the AD Group membership update
example:
id: id
parameters:
values:
- values
- values
action: ADD
attribute: attribute
properties:
id:
description: ID of the AD group to update
type: string
parameters:
$ref: '#/components/schemas/Parameters'
type: object
AgentPool:
description: "An AgentPool is a collection of agents that serve a common purpose.\
\ An AgentPool has a unique ID within an org, and contains a collection of\
\ agents disjoint to every other AgentPool (i.e. no two AgentPools share an\
\ Agent)."
example:
operationalStatus: null
name: name
id: id
type: null
agents:
- operationalStatus: DEGRADED
isLatestGAedVersion: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
updateStatus: Cancelled
name: name
poolId: poolId
id: id
type: AD
version: version
updateMessage: updateMessage
isHidden: true
lastConnection: 2000-01-23T04:56:07.000+00:00
- operationalStatus: DEGRADED
isLatestGAedVersion: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
updateStatus: Cancelled
name: name
poolId: poolId
id: id
type: AD
version: version
updateMessage: updateMessage
isHidden: true
lastConnection: 2000-01-23T04:56:07.000+00:00
properties:
agents:
items:
$ref: '#/components/schemas/Agent'
type: array
id:
readOnly: true
type: string
name:
type: string
operationalStatus:
$ref: '#/components/schemas/OperationalStatus'
type:
$ref: '#/components/schemas/AgentType'
type: object
AgentPoolUpdate:
description: Various information about agent auto update configuration
example:
reason: reason
schedule:
cron: cron
duration: 6
lastUpdated: 2000-01-23T04:56:07.000+00:00
delay: 0
timezone: timezone
agentType: AD
notifyAdmin: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
sortOrder: 1
name: name
id: id
enabled: true
agents:
- operationalStatus: DEGRADED
isLatestGAedVersion: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
updateStatus: Cancelled
name: name
poolId: poolId
id: id
type: AD
version: version
updateMessage: updateMessage
isHidden: true
lastConnection: 2000-01-23T04:56:07.000+00:00
- operationalStatus: DEGRADED
isLatestGAedVersion: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
updateStatus: Cancelled
name: name
poolId: poolId
id: id
type: AD
version: version
updateMessage: updateMessage
isHidden: true
lastConnection: 2000-01-23T04:56:07.000+00:00
status: Cancelled
targetVersion: targetVersion
properties:
agents:
items:
$ref: '#/components/schemas/Agent'
type: array
agentType:
$ref: '#/components/schemas/AgentType'
enabled:
type: boolean
id:
readOnly: true
type: string
name:
type: string
notifyAdmin:
type: boolean
reason:
type: string
schedule:
$ref: '#/components/schemas/AutoUpdateSchedule'
sortOrder:
type: integer
status:
$ref: '#/components/schemas/AgentUpdateJobStatus'
targetVersion:
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
AgentPoolUpdateSetting:
description: Setting for auto-update
example:
releaseChannel: BETA
agentType: AD
latestVersion: latestVersion
poolId: poolId
continueOnError: true
minimalSupportedVersion: minimalSupportedVersion
poolName: poolName
properties:
agentType:
$ref: '#/components/schemas/AgentType'
continueOnError:
type: boolean
latestVersion:
type: string
minimalSupportedVersion:
type: string
poolId:
readOnly: true
type: string
poolName:
type: string
releaseChannel:
$ref: '#/components/schemas/ReleaseChannel'
type: object
AgentType:
description: Agent types that are being monitored
enum:
- AD
- IWA
- LDAP
- MFA
- OPP
- RUM
- Radius
type: string
AgentUpdateInstanceStatus:
description: Status for one agent regarding the status to auto-update that agent
enum:
- Cancelled
- Failed
- InProgress
- PendingCompletion
- Scheduled
- Success
type: string
AgentUpdateJobStatus:
description: Overall state for the auto-update job from admin perspective
enum:
- Cancelled
- Failed
- InProgress
- Paused
- Scheduled
- Success
type: string
AllowedForEnum:
description: The allowed types of uses for the Authenticator
enum:
- any
- none
- recovery
- sso
type: string
ApiToken:
description: An API token for an Okta User. This token is NOT scoped any further
and can be used for any API the user has permissions to call.
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
tokenWindow: tokenWindow
_link:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
clientName: clientName
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
userId: userId
expiresAt: 2000-01-23T04:56:07.000+00:00
network:
include:
- include
- include
connection: connection
exclude:
- exclude
- exclude
properties:
clientName:
readOnly: true
type: string
created:
format: date-time
readOnly: true
type: string
expiresAt:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
name:
type: string
network:
$ref: '#/components/schemas/ApiToken_network'
tokenWindow:
description: "A time duration specified as an [ISO-8601 duration](https://en.wikipedia.org/wiki/ISO_8601#Durations)."
pattern: ^P(?:$)(\d+Y)?(\d+M)?(\d+W)?(\d+D)?(T(?:\d)(\d+H)?(\d+M)?(\d+S)?)?$
type: string
userId:
type: string
_link:
$ref: '#/components/schemas/LinksSelf'
required:
- name
title: API Token
type: object
ApiTokenUpdate:
description: An API Token Update Object for an Okta user. This token is NOT
scoped any further and can be used for any API that the user has permissions
to call.
example:
clientName: clientName
created: 2000-01-23T04:56:07.000+00:00
name: name
userId: userId
network:
include:
- include
- include
connection: connection
exclude:
- exclude
- exclude
properties:
clientName:
description: The client name associated with the API Token
readOnly: true
type: string
created:
description: The creation date of the API Token
format: date-time
readOnly: true
type: string
name:
description: The name associated with the API Token
type: string
network:
$ref: '#/components/schemas/ApiToken_network'
userId:
description: The userId of the user who created the API Token
type: string
title: API Token Update
type: object
AppAccountContainerDetails:
description: Container details for resource type APP_ACCOUNT
properties:
appName:
description: The application name
example: google
readOnly: true
type: string
containerId:
description: The application ID associated with the privileged account
example: 0oa103099SBEb3Z2b0g4
type: string
displayName:
description: Human-readable name of the container that owns the privileged
resource
example: Google App1
readOnly: true
type: string
globalAppId:
description: The application global ID
example: 964b82aa-85b4-5645-b790-83312c473480
readOnly: true
type: string
passwordPushSupported:
description: Indicates if the application supports password push
example: true
readOnly: true
type: boolean
provisioningEnabled:
description: Indicates if provisioning is enabled for this application
example: true
readOnly: true
type: boolean
status:
$ref: '#/components/schemas/AppInstanceContainerStatus'
_links:
$ref: '#/components/schemas/appLink'
required:
- containerId
type: object
AppAndInstanceConditionEvaluatorAppOrInstance:
properties:
id:
description: ID of the app
readOnly: false
type: string
name:
description: Name of the app type
type: string
type:
$ref: '#/components/schemas/AppAndInstanceType'
type: object
AppAndInstancePolicyRuleCondition:
properties:
exclude:
description: The list of applications to exclude
items:
$ref: '#/components/schemas/AppAndInstanceConditionEvaluatorAppOrInstance'
type: array
include:
description: The list of apps or app instances to match on
items:
$ref: '#/components/schemas/AppAndInstanceConditionEvaluatorAppOrInstance'
type: array
type: object
AppAndInstanceType:
description: Type of app
enum:
- APP
- APP_TYPE
type: string
AppCsrPkcs10:
description: Base64URL-encoded CSR in DER format
format: base64
type: string
AppCustomHrefObject:
properties:
hints:
$ref: '#/components/schemas/AppCustomHrefObject_hints'
href:
description: Link URI
type: string
title:
description: Link name
type: string
type:
description: "The media type of the link. If omitted, it is implicitly `application/json`."
type: string
readOnly: true
required:
- href
type: object
AppInstanceContainerStatus:
description: Current status of the application instance
enum:
- ACTIVE
- DELETED
- INACTIVE
readOnly: true
type: string
AppInstancePolicyRuleCondition:
properties:
exclude:
items:
type: string
type: array
include:
items:
type: string
type: array
type: object
AppLink:
example:
appInstanceId: appInstanceId
credentialsSetup: true
hidden: true
appName: appName
appAssignmentId: appAssignmentId
sortOrder: 0
linkUrl: linkUrl
id: id
label: label
logoUrl: logoUrl
properties:
appAssignmentId:
readOnly: true
type: string
appInstanceId:
readOnly: true
type: string
appName:
readOnly: true
type: string
credentialsSetup:
readOnly: true
type: boolean
hidden:
readOnly: true
type: boolean
id:
readOnly: true
type: string
label:
readOnly: true
type: string
linkUrl:
readOnly: true
type: string
logoUrl:
readOnly: true
type: string
sortOrder:
readOnly: true
type: integer
type: object
AppResourceHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/apps/0oabskvc6442nkvQO0h7"
type: string
title:
description: Link name
example: My App
type: string
type: object
AppUser:
description: The Application User object defines a user's app-specific profile
and credentials for an app
example:
credentials:
password:
value: value
userName: [email protected]
_links:
app:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
group:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: ""
profile:
key: ""
syncState: SYNCHRONIZED
externalId: 70c14cc17d3745e8a9f98d599a68329c
lastUpdated: ""
passwordChanged: 2014-06-24T15:27:59Z
lastSync: 2014-06-24T15:27:59Z
_embedded:
key: "{}"
scope: USER
statusChanged: 2014-06-24T15:28:14Z
id: 00u11z6WHMYCGPCHCRFK
status: ACTIVE
properties:
created:
allOf:
- $ref: '#/components/schemas/createdProperty'
- example: 2014-06-24T15:27:59.000Z
credentials:
$ref: '#/components/schemas/AppUserCredentials'
externalId:
description: |-
The ID of the user in the target app that's linked to the Okta Application User object.
This value is the native app-specific identifier or primary key for the user in the target app.
The `externalId` is set during import when the user is confirmed (reconciled) or during provisioning when the user is created in the target app.
This value isn't populated for SSO app assignments (for example, SAML or SWA) because it isn't synchronized with a target app.
example: 70c14cc17d3745e8a9f98d599a68329c
readOnly: true
type: string
id:
description: Unique identifier for the Okta User
example: 00u11z6WHMYCGPCHCRFK
type: string
lastSync:
description: Timestamp of the last synchronization operation. This value
is only updated for apps with the `IMPORT_PROFILE_UPDATES` or `PUSH PROFILE_UPDATES`
feature.
example: 2014-06-24T15:27:59Z
format: date-time
readOnly: true
type: string
lastUpdated:
allOf:
- $ref: '#/components/schemas/lastUpdatedProperty'
- example: 2014-06-24T15:28:14.000Z
passwordChanged:
description: Timestamp when the Application User password was last changed
example: 2014-06-24T15:27:59Z
format: date-time
nullable: true
readOnly: true
type: string
profile:
additionalProperties: true
description: |
Specifies the default and custom profile properties for a user.
Properties that are visible in the Admin Console for an app assignment can also be assigned through the API.
Some properties are reference properties that are imported from the target app and can't be configured.
See [profile](/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response).
type: object
scope:
description: Indicates if the assignment is direct (`USER`) or by group
membership (`GROUP`).
enum:
- USER
- GROUP
example: USER
type: string
status:
$ref: '#/components/schemas/AppUserStatus'
statusChanged:
description: Timestamp when the Application User status was last changed
example: 2014-06-24T15:28:14Z
format: date-time
readOnly: true
type: string
syncState:
$ref: '#/components/schemas/AppUserSyncState'
_embedded:
additionalProperties:
properties: {}
type: object
description: "Embedded resources related to the Application User using the\
\ [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
readOnly: true
type: object
_links:
$ref: '#/components/schemas/LinksAppAndUser'
title: Application User
type: object
AppUserAssignRequest:
allOf:
- $ref: '#/components/schemas/AppUser'
- required:
- id
example:
credentials:
password:
value: value
userName: [email protected]
_links:
app:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
group:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: ""
profile:
key: ""
syncState: SYNCHRONIZED
externalId: 70c14cc17d3745e8a9f98d599a68329c
lastUpdated: ""
passwordChanged: 2014-06-24T15:27:59Z
lastSync: 2014-06-24T15:27:59Z
_embedded:
key: "{}"
scope: USER
statusChanged: 2014-06-24T15:28:14Z
id: 00u11z6WHMYCGPCHCRFK
status: ACTIVE
AppUserCredentials:
description: |
Specifies a user's credentials for the app.
This parameter can be omitted for apps with [sign-on mode](/openapi/okta-management/management/tag/Application/#tag/Application/operation/getApplication!c=200&path=0/signOnMode&t=response) (`signOnMode`) or [authentication schemes](/openapi/okta-management/management/tag/Application/#tag/Application/operation/getApplication!c=200&path=0/credentials/scheme&t=response) (`credentials.scheme`) that don't require credentials.
example:
password:
value: value
userName: [email protected]
properties:
password:
$ref: '#/components/schemas/AppUserPasswordCredential'
userName:
description: |-
The user's username in the app
> **Note:** The [userNameTemplate](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=0/credentials/userNameTemplate&t=request) in the Application object defines the default username generated when a user is assigned to that app.
> If you attempt to assign a username or password to an app with an incompatible [authentication scheme](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication!path=0/credentials/scheme&t=request), the following error is returned:
> "Credentials should not be set on this resource based on the scheme."
example: [email protected]
maxLength: 100
minLength: 1
type: string
type: object
AppUserCredentialsRequestPayload:
description: Updates the assigned user credentials
example:
credentials:
password:
value: value
userName: [email protected]
properties:
credentials:
$ref: '#/components/schemas/AppUserCredentials'
title: Credentials
type: object
AppUserPasswordCredential:
description: The user's password. This is a write-only property. An empty `password`
object is returned to indicate that a password value exists.
example:
value: value
properties:
value:
description: Password value
format: password
type: string
writeOnly: true
type: object
AppUserProfile:
additionalProperties: true
description: |
Specifies the default and custom profile properties for a user.
Properties that are visible in the Admin Console for an app assignment can also be assigned through the API.
Some properties are reference properties that are imported from the target app and can't be configured.
See [profile](/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response).
type: object
AppUserProfileRequestPayload:
description: |-
Updates the assigned user profile
> **Note:** The Okta API currently doesn't support entity tags for conditional updates. As long as you're the only user updating the the user profile, Okta recommends you fetch the most recent profile with [Retrieve an Application User](/openapi/okta-management/management/tag/ApplicationUsers/#tag/ApplicationUsers/operation/getApplicationUser), apply your profile update, and then `POST` back the updated profile.
properties:
profile:
additionalProperties: true
description: |
Specifies the default and custom profile properties for a user.
Properties that are visible in the Admin Console for an app assignment can also be assigned through the API.
Some properties are reference properties that are imported from the target app and can't be configured.
See [profile](/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response).
type: object
title: Profile
type: object
AppUserStatus:
description: Status of an Application User
enum:
- ACTIVE
- APPROVED
- DEPROVISIONED
- IMPLICIT
- IMPORTED
- INACTIVE
- MATCHED
- PENDING
- PROVISIONED
- REVOKED
- STAGED
- SUSPENDED
- UNASSIGNED
example: ACTIVE
readOnly: true
type: string
x-enumDescriptions:
ACTIVE: "The Application User is provisioned and is enabled to use the app.\
\ This status also occurs if the app has the `IMPORT_PROFILE_UPDATES` feature\
\ enabled and user import is confirmed, or if the app doesn't have provisioning\
\ enabled."
INACTIVE: "The Application User is provisioned, but isn't enabled to use the\
\ app. Application Users in this status can be reactivated with a password\
\ reset or permanently deleted."
IMPORTED: The Application User is created based on imported data.
MATCHED: The imported user is matched with an existing Application User.
UNASSIGNED: "The Application User was imported, but the user-matching operation\
\ was skipped."
SUSPENDED: "The Application User is provisioned, but isn't enabled to use\
\ the app. Application Users in this status can be reactivated without a\
\ password reset."
PENDING: "The Application User is provisioned, but in a pending state and\
\ can't use the app. The status moves to `ACTIVE` when the Application User\
\ is activated."
APPROVED: The Application User was created but not provisioned. This status
can occur when manual provisioning acknowledgment is required.
REVOKED: The Application User is disabled and waiting for deprovisioning acknowledgment.
The Application User can be deleted after deprovisioning acknowledgment.
IMPLICIT: The Application User is now migrated to use implicit app assignment.
STAGED: The Application User doesn't have `externalId` set and the background
provisioning operation is queued. This applies to apps with the `PUSH_NEW_USERS`
feature enabled.
PROVISIONED: The background provisioning operation completed and the Application
User was assigned an `externalId` successfully.
DEPROVISIONED: The user was removed by the provisioning operation and the
`externalId` property is unassigned.
AppUserSyncState:
description: |-
The synchronization state for the Application User.
The Application User's `syncState` depends on whether the `PROFILE_MASTERING` feature is enabled for the app.
> **Note:** User provisioning currently must be configured through the Admin Console.
enum:
- DISABLED
- ERROR
- OUT_OF_SYNC
- SYNCHRONIZED
- SYNCING
example: SYNCHRONIZED
readOnly: true
type: string
x-enumDescriptions:
DISABLED: The provisioning feature is disabled for the app (`PROFILE_MASTERING`
feature is disabled).
OUT_OF_SYNC: The Application User has changes that haven't been pushed to
the target app.
SYNCING: A background provisioning operation is running to update the user's
profile in the target app.
SYNCHRONIZED: All changes to the Application User profile have successfully
been synchronized with the target app.
ERROR: A background provisioning operation failed to update the user's profile
in the target app. You must resolve the provisioning task in the Admin Console
before you retry the operation.
AppUserUpdateRequest:
oneOf:
- $ref: '#/components/schemas/AppUserCredentialsRequestPayload'
- $ref: '#/components/schemas/AppUserProfileRequestPayload'
AppleClientSigning:
description: |-
Information used to generate the secret JSON Web Token for the token requests to Apple IdP
> **Note:** The `privateKey` property is required for a CREATE request. For an UPDATE request, it can be null and keeps the existing value if it's null. The `privateKey` property isn't returned for LIST and GET requests or UPDATE requests if it's null.
properties:
kid:
description: The Key ID that you obtained from Apple when you created the
private key for the client
example: test key id
maxLength: 1024
type: string
privateKey:
description: The PKCS \#8 encoded private key that you created for the client
and downloaded from Apple
example: MIGTAgEAMBM........Cb9PnybCnzDv+3cWSGWqpAIsQQZ
maxLength: 1024
type: string
teamId:
description: The Team ID associated with your Apple developer account
example: test team id
maxLength: 1024
type: string
type: object
Application:
discriminator:
mapping:
AUTO_LOGIN: '#/components/schemas/AutoLoginApplication'
BASIC_AUTH: '#/components/schemas/BasicAuthApplication'
BOOKMARK: '#/components/schemas/BookmarkApplication'
BROWSER_PLUGIN: '#/components/schemas/BrowserPluginApplication'
OPENID_CONNECT: '#/components/schemas/OpenIdConnectApplication'
SAML_1_1: '#/components/schemas/Saml11Application'
SAML_2_0: '#/components/schemas/SamlApplication'
SECURE_PASSWORD_STORE: '#/components/schemas/SecurePasswordStoreApplication'
WS_FEDERATION: '#/components/schemas/WsFederationApplication'
propertyName: signOnMode
example:
visibility:
hide:
web: true
iOS: false
appLinks:
key: true
autoLaunch: true
autoSubmitToolbar: true
accessibility:
errorRedirectUrl: errorRedirectUrl
selfService: true
loginRedirectUrl: loginRedirectUrl
_links:
help:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
metadata:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
appLinks:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
accessPolicy:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
key: ""
signOnMode: AUTO_LOGIN
orn: orn
label: label
features:
- GROUP_PUSH
- GROUP_PUSH
lastUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
user:
key: "{}"
id: id
licensing:
seatCount: 0
status: ACTIVE
properties:
accessibility:
$ref: '#/components/schemas/ApplicationAccessibility'
created:
description: Timestamp when the Application object was created
format: date-time
readOnly: true
type: string
features:
description: |
Enabled app features
> **Note:** Some apps can support optional provisioning features. See [Application Features](/openapi/okta-management/management/tag/ApplicationFeatures/)
items:
enum:
- GROUP_PUSH
- IMPORT_NEW_USERS
- IMPORT_PROFILE_UPDATES
- IMPORT_USER_SCHEMA
- PROFILE_MASTERING
- PUSH_NEW_USERS
- PUSH_PASSWORD_UPDATES
- PUSH_PROFILE_UPDATES
- PUSH_USER_DEACTIVATION
- REACTIVATE_USERS
- OUTBOUND_DEL_AUTH
- DESKTOP_SSO
- FEDERATED_PROFILE
- SUPPRESS_ACTIVATION_EMAIL
- PUSH_PENDING_USERS
- MFA
- UPDATE_EXISTING_USERNAME
- EXCLUDE_USERNAME_UPDATE_ON_PROFILE_PUSH
- EXCHANGE_ACTIVE_SYNC
- IMPORT_SYNC
- IMPORT_SYNC_CONTACTS
- DEVICE_COMPLIANCE
- VPN_CONFIG
- IMPORT_SCHEMA_ENUM_VALUES
- SCIM_PROVISIONING
- DEVICE_FILTER_IN_SIGN_ON_RULES
- PROFILE_TEMPLATE_UPGRADE
- DEFAULT_PUSH_STATUS_TO_PUSH
- REAL_TIME_SYNC
- SSO
- AUTHN_CONTEXT
- JIT_PROVISIONING
- GROUP_SYNC
- OPP_SCIM_INCREMENTAL_IMPORTS
- IN_MEMORY_APP_USER
- LOG_STREAMING
- OAUTH_INTEGRATION
- IDP
- PUSH_NEW_USERS_WITHOUT_PASSWORD
- SKYHOOK_SERVICE
- ENTITLEMENT_MANAGEMENT
- PUSH_NEW_USERS_WITH_HASHED_PASSWORD
type: string
x-enumDescriptions:
GROUP_PUSH: Creates or links a group in the app when a mapping is defined
for a group in Okta. Okta is the source for group memberships and
all group members in Okta who are also assigned to the app are synced
as group members to the app.
IMPORT_NEW_USERS: Creates or links a user in Okta to a user from the
app
IMPORT_PROFILE_UPDATES: Updates a linked user's app profile during manual
or scheduled imports
IMPORT_USER_SCHEMA: Discovers the profile schema for a user from the
app automatically
PROFILE_MASTERING: Designates the app as the identity lifecycle and
profile attribute authority for linked users. The user's profile in
Okta is read-only.
PUSH_NEW_USERS: Creates or links a user account in the app when assigning
the app to a user in Okta
PUSH_PASSWORD_UPDATES: Updates the user's app password when their password
changes in Okta
PUSH_PROFILE_UPDATES: Updates a user's profile in the app when the user's
profile changes in Okta (the profile source)
PUSH_USER_DEACTIVATION: Deactivates a user's account in the app when
unassigned from the app in Okta or deactivated
REACTIVATE_USERS: Reactivates an existing inactive user when provisioning
a user to the app
OUTBOUND_DEL_AUTH: Okta user authentication requests are delegated to
a third-party app
DESKTOP_SSO: Okta user authentication requests are handled by desktop
SSO negotiation (if possible)
FEDERATED_PROFILE: App User profiles are synchronized at sign-in and
profile-view instances instead of during bulk imports
SUPPRESS_ACTIVATION_EMAIL: Activation emails aren't sent to users sourced
by AD and orgs with DelAuth enabled
PUSH_PENDING_USERS: Users are in PENDING state in Okta and are created
but not active in the sourced app user
MFA: App can verify credentials as a second factor
UPDATE_EXISTING_USERNAME: App can update the user name for existing
users
EXCLUDE_USERNAME_UPDATE_ON_PROFILE_PUSH: Exclude username update during
profile push
EXCHANGE_ACTIVE_SYNC: App supports synchronizing credentials with OMM
enrolled devices
IMPORT_SYNC: Synchronize import events
IMPORT_SYNC_CONTACTS: Synchronize contacts
DEVICE_COMPLIANCE: Apps support device compliance rules
VPN_CONFIG: App supports pushing VPN configuration to OMM enrolled devices
IMPORT_SCHEMA_ENUM_VALUES: App supports downloading schema enum values.
You can download custom objects and integrating them with UD without
being tied to the type metadata system.
SCIM_PROVISIONING: App supports generic SCIM client provisioning and
can leverage SCIM standard for provisioning and push custom attributes
to a third-party app
DEVICE_FILTER_IN_SIGN_ON_RULES: App supports filtering by client type
in app sign-on rules
PROFILE_TEMPLATE_UPGRADE: App supports profile template upgrades. This
is primarily to help roll out the profile template upgrade feature
for individual apps
DEFAULT_PUSH_STATUS_TO_PUSH: "App defaults Push status to `PUSH`. This\
\ feature is for apps, such as SharePoint, that want to receive App\
\ User profile updates even though they didn't implement traditional\
\ PUSH_PROFILE_UPDATES in the client API."
REAL_TIME_SYNC: Apps support real-time synchronization
SSO: Apps support establishing a subject based on claims from an IdP
AUTHN_CONTEXT: Apps support establishing an authentication context based
on claims from an IdP
JIT_PROVISIONING: Apps support provisioning a user based on claims from
an IdP
GROUP_SYNC: Apps support syncing group information based on claims from
an IdP
OPP_SCIM_INCREMENTAL_IMPORTS: Apps support incremental imports. Used
for SCIM app instances
IN_MEMORY_APP_USER: Apps support in-memory App Users. This feature is
used as an alternative to Implicit App Assignment for a non-persisted
App User.
LOG_STREAMING: Apps support Log Streaming
OAUTH_INTEGRATION: App is an OAuth 2.0 Integration
IDP: Apps support IdP functionalities
PUSH_NEW_USERS_WITHOUT_PASSWORD: Don't send generated password for new
users
SKYHOOK_SERVICE: Use the Skyhook microservice for LCM operations
ENTITLEMENT_MANAGEMENT: Marker to showcase which OIN apps are entitlement
enabled
PUSH_NEW_USERS_WITH_HASHED_PASSWORD: Send hashed password for new users.
This feature is only used for CIS to CIC migration.
type: array
id:
description: Unique ID for the app instance
readOnly: true
type: string
label:
description: User-defined display name for app
type: string
lastUpdated:
description: Timestamp when the Application object was last updated
format: date-time
readOnly: true
type: string
licensing:
$ref: '#/components/schemas/ApplicationLicensing'
orn:
description: The Okta resource name (ORN) for the current app instance
readOnly: true
type: string
profile:
additionalProperties: true
description: |-
Contains any valid JSON schema for specifying properties that can be referenced from a request (only available to OAuth 2.0 client apps).
For example, add an app manager contact email address or define an allowlist of groups that you can then reference using the Okta Expression Language `getFilteredGroups` function.
> **Notes:**
> * `profile` isn't encrypted, so don't store sensitive data in it.
> * `profile` doesn't limit the level of nesting in the JSON schema you created, but there is a practical size limit. Okta recommends a JSON schema size of 1 MB or less for best performance.
type: object
signOnMode:
$ref: '#/components/schemas/ApplicationSignOnMode'
status:
$ref: '#/components/schemas/ApplicationLifecycleStatus'
visibility:
$ref: '#/components/schemas/ApplicationVisibility'
_embedded:
$ref: '#/components/schemas/Application__embedded'
_links:
$ref: '#/components/schemas/ApplicationLinks'
required:
- label
- signOnMode
type: object
ApplicationAccessibility:
description: Specifies access settings for the app
example:
errorRedirectUrl: errorRedirectUrl
selfService: true
loginRedirectUrl: loginRedirectUrl
properties:
errorRedirectUrl:
description: Custom error page URL for the app
type: string
loginRedirectUrl:
description: |-
Custom login page URL for the app
> **Note:** The `loginRedirectUrl` property is deprecated in Identity Engine. This property is used with the custom app login feature. Orgs that actively use this feature can continue to do so. See [Okta-hosted sign-in (redirect authentication)](https://developer.okta.com/docs/guides/redirect-authentication/) or [configure IdP routing rules](https://help.okta.com/okta_help.htm?type=oie&id=ext-cfg-routing-rules) to redirect users to the appropriate sign-in app for orgs that don't use the custom app login feature.
type: string
selfService:
description: Represents whether the app can be self-assignable by users
type: boolean
type: object
ApplicationCredentials:
description: Credentials for the specified `signOnMode`
properties:
signing:
$ref: '#/components/schemas/ApplicationCredentialsSigning'
userNameTemplate:
$ref: '#/components/schemas/ApplicationCredentialsUsernameTemplate'
type: object
ApplicationCredentialsOAuthClient:
properties:
autoKeyRotation:
default: true
description: Requested key rotation mode
type: boolean
client_id:
description: |-
Unique identifier for the OAuth 2.0 client app
> **Notes:**
> * If you don't specify the `client_id`, this immutable property is populated with the [Application instance ID](/openapi/okta-management/management/tag/Application/#tag/Application/operation/getApplication!c=200&path=4/id&t=response).
> * The `client_id` must consist of alphanumeric characters or the following special characters: `$-_.+!*'(),`.
> * You can't use the reserved word `ALL_CLIENTS`.
maxLength: 100
minLength: 6
type: string
client_secret:
description: |-
OAuth 2.0 client secret string (used for confidential clients)
> **Notes:** If a `client_secret` isn't provided on creation, and the `token_endpoint_auth_method` requires one, Okta generates a random `client_secret` for the client app.
> The `client_secret` is only shown when an OAuth 2.0 client app is created or updated (and only if the `token_endpoint_auth_method` requires a client secret).
maxLength: 100
minLength: 14
type: string
pkce_required:
default: true
description: "Requires Proof Key for Code Exchange (PKCE) for additional\
\ verification. If `token_endpoint_auth_method` is `none`, then `pkce_required`\
\ must be `true`. The default is `true` for browser and native app types."
type: boolean
token_endpoint_auth_method:
$ref: '#/components/schemas/OAuthEndpointAuthenticationMethod'
type: object
ApplicationCredentialsScheme:
description: |
Apps with `BASIC_AUTH`, `BROWSER_PLUGIN`, or `SECURE_PASSWORD_STORE` sign-on modes have credentials vaulted by Okta and can be configured with the following schemes.
enum:
- ADMIN_SETS_CREDENTIALS
- EDIT_PASSWORD_ONLY
- EDIT_USERNAME_AND_PASSWORD
- EXTERNAL_PASSWORD_SYNC
- SHARED_USERNAME_AND_PASSWORD
type: string
x-enumDescriptions:
ADMIN_SETS_CREDENTIALS: Admin sets username and password
EDIT_PASSWORD_ONLY: "Admin sets username, user sets password"
EDIT_USERNAME_AND_PASSWORD: User sets username and password
EXTERNAL_PASSWORD_SYNC: "Admin sets username, password is the same as user's\
\ Okta password"
SHARED_USERNAME_AND_PASSWORD: Users share a single username and password set
by the admin
ApplicationCredentialsSigning:
description: |
App signing key properties
> **Note:** Only apps with SAML_2_0, SAML_1_1, WS_FEDERATION, or OPENID_CONNECT `signOnMode` support the key rotation feature.
properties:
kid:
description: |-
Key identifier used for signing assertions
> **Note:** Currently, only the X.509 JWK format is supported for apps with SAML_2_0 `signOnMode`.
type: string
lastRotated:
description: Timestamp when the signing key was last rotated
format: date-time
readOnly: true
type: string
nextRotation:
description: The scheduled time for the next signing key rotation
format: date-time
readOnly: true
type: string
rotationMode:
description: The mode of key rotation
type: string
use:
$ref: '#/components/schemas/ApplicationCredentialsSigningUse'
type: object
ApplicationCredentialsSigningUse:
description: Specifies the intended use of the key
enum:
- sig
type: string
ApplicationCredentialsUsernameTemplate:
description: The template used to generate the username when the app is assigned
through a group or directly to a user
properties:
pushStatus:
description: Determines if the username is pushed to the app on updates
for CUSTOM `type`
enum:
- PUSH
- DONT_PUSH
- NOT_CONFIGURED
type: string
template:
default: "${source.login}"
description: |-
Mapping expression used to generate usernames.
The following are supported mapping expressions that are used with the `BUILT_IN` template type:
| Name | Template Expression |
| ------------------------------- | ---------------------------------------------- |
| AD Employee ID | `${source.employeeID}` |
| AD SAM Account Name | `${source.samAccountName}` |
| AD SAM Account Name (lowercase) | `${fn:toLowerCase(source.samAccountName)}` |
| AD User Principal Name | `${source.userName}` |
| AD User Principal Name prefix | `${fn:substringBefore(source.userName, "@")}` |
| Email | `${source.email}` |
| Email (lowercase) | `${fn:toLowerCase(source.email)}` |
| Email prefix | `${fn:substringBefore(source.email, "@")}` |
| LDAP UID + custom suffix | `${source.userName}${instance.userSuffix}` |
| Okta username | `${source.login}` |
| Okta username prefix | `${fn:substringBefore(source.login, "@")}` |
type: string
type:
default: BUILT_IN
description: Type of mapping expression. Empty string is allowed.
enum:
- NONE
- BUILT_IN
- CUSTOM
type: string
userSuffix:
description: An optional suffix appended to usernames for `BUILT_IN` mapping
expressions
type: string
type: object
ApplicationFeature:
description: |
The Feature object is used to configure app feature settings.
discriminator:
mapping:
USER_PROVISIONING: '#/components/schemas/UserProvisioningApplicationFeature'
INBOUND_PROVISIONING: '#/components/schemas/InboundProvisioningApplicationFeature'
propertyName: name
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: USER_PROVISIONING
description: Settings for provisioning users from Okta to a downstream app
status: ""
properties:
description:
description: Description of the feature
example: Settings for provisioning users from Okta to a downstream app
readOnly: true
type: string
name:
$ref: '#/components/schemas/ApplicationFeatureType'
status:
allOf:
- $ref: '#/components/schemas/EnabledStatus'
- default: DISABLED
- example: ENABLED
- readOnly: true
_links:
$ref: '#/components/schemas/ApplicationFeature__links'
type: object
ApplicationFeatureType:
description: |
Key name of the feature
| Feature name | Description |
| --------- | ------------- |
| USER_PROVISIONING | User profiles are pushed from Okta to the third-party app. Represents the **To App** provisioning feature setting in the Admin Console. |
| INBOUND_PROVISIONING | User profiles are imported from the third-party app into Okta. This feature represents the **To Okta** provisioning feature setting in the Admin Console. |
Select the feature:
enum:
- USER_PROVISIONING
- USER_PROVISIONING
- INBOUND_PROVISIONING
example: USER_PROVISIONING
type: string
ApplicationGroupAssignment:
description: The Application Group object that defines a group of users' app-specific
profile and credentials for an app
example:
lastUpdated: ""
_embedded:
key: "{}"
_links:
app:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
group:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
profile:
key: ""
id: 00g4hb1HChfUriNgW0g4
priority: 99
properties:
id:
description: "ID of the [Group](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/)"
example: 00g4hb1HChfUriNgW0g4
readOnly: true
type: string
lastUpdated:
allOf:
- $ref: '#/components/schemas/lastUpdatedProperty'
- example: 2014-06-24T15:28:14.000Z
priority:
description: |-
Priority assigned to the group. If an app has more than one group assigned to the same user, then the group with the higher priority has its profile applied to the [Application User](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/ApplicationUsers/).
If a priority value isn't specified, then the next highest priority is assigned by default.
See [Assign attribute group priority](https://help.okta.com/okta_help.htm?type=oie&id=ext-usgp-app-group-priority) and the [sample priority use case](https://help.okta.com/okta_help.htm?type=oie&id=ext-usgp-combine-values-use).
example: 99
type: integer
profile:
additionalProperties: true
description: "Specifies the profile properties applied to [Application Users](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/ApplicationUsers/)\
\ that are assigned to the app through group membership. \nSome reference\
\ properties are imported from the target app and can't be configured.\
\ See [profile](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response)."
type: object
_embedded:
additionalProperties:
properties: {}
type: object
description: "Embedded resource related to the Application Group using the\
\ [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification.\nIf the `expand=group` query parameter is specified,\
\ then the [Group](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Group/)\
\ object is embedded. \nIf the `expand=metadata` query parameter is specified,\
\ then the group assignment metadata is embedded."
readOnly: true
type: object
_links:
$ref: '#/components/schemas/ApplicationGroupAssignment__links'
title: Application Group Assignment
type: object
ApplicationLabel:
description: User-defined display name for app
type: string
ApplicationLayout:
properties:
elements:
items:
additionalProperties: {}
type: object
type: array
label:
type: string
options:
additionalProperties: {}
type: object
rule:
$ref: '#/components/schemas/ApplicationLayout_rule'
scope:
type: string
type:
type: string
type: object
ApplicationLayoutRuleCondition:
properties:
schema:
additionalProperties: {}
type: object
scope:
type: string
type: object
ApplicationLayouts:
properties:
_links:
$ref: '#/components/schemas/ApplicationLayouts__links'
type: object
ApplicationLayoutsLinksItem:
items:
$ref: '#/components/schemas/HrefObject'
type: array
ApplicationLicensing:
description: Licenses for the app
example:
seatCount: 0
properties:
seatCount:
description: Number of licenses purchased for the app
type: integer
type: object
ApplicationLifecycleStatus:
description: App instance status
enum:
- ACTIVE
- DELETED
- INACTIVE
readOnly: true
type: string
ApplicationLinks:
description: Discoverable resources related to the app
example:
help:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
metadata:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
appLinks:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
accessPolicy:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
accessPolicy:
$ref: '#/components/schemas/AccessPolicyLink'
activate:
$ref: '#/components/schemas/HrefObjectActivateLink'
appLinks:
description: List of app link resources
items:
$ref: '#/components/schemas/HrefObject'
type: array
deactivate:
$ref: '#/components/schemas/HrefObjectDeactivateLink'
groups:
$ref: '#/components/schemas/GroupsLink'
help:
$ref: '#/components/schemas/HelpLink'
logo:
description: List of app logo resources
items:
$ref: '#/components/schemas/HrefObject'
type: array
metadata:
$ref: '#/components/schemas/MetadataLink'
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
users:
$ref: '#/components/schemas/UsersLink'
readOnly: true
ApplicationSettings:
description: App settings
properties:
identityStoreId:
description: "Identifies an additional identity store app, if your app supports\
\ it. The `identityStoreId` value must be a valid identity store app ID.\
\ This identity store app must be created in the same org as your app."
type: string
implicitAssignment:
description: Controls whether Okta automatically assigns users to the app
based on the user's role or group membership.
type: boolean
inlineHookId:
description: "Identifier of an inline hook. Inline hooks are outbound calls\
\ from Okta to your own custom code, triggered at specific points in Okta\
\ process flows. They allow you to integrate custom functionality into\
\ those flows. See [Inline hooks](/openapi/okta-management/management/tag/InlineHook/)."
type: string
notes:
$ref: '#/components/schemas/ApplicationSettingsNotes'
notifications:
$ref: '#/components/schemas/ApplicationSettingsNotifications'
signOn:
$ref: '#/components/schemas/AutoLoginApplicationSettingsSignOn'
type: object
ApplicationSettingsNotes:
description: App notes visible to either the admin or end user
properties:
admin:
description: An app message that's visible to admins
type: string
enduser:
description: A message that's visible in the End-User Dashboard
type: string
type: object
ApplicationSettingsNotifications:
description: Specifies notifications settings for the app
properties:
vpn:
$ref: '#/components/schemas/ApplicationSettingsNotificationsVpn'
type: object
ApplicationSettingsNotificationsVpn:
description: Sends customizable messages with conditions to end users when a
VPN connection is required
properties:
helpUrl:
description: An optional URL to a help page to assist your end users in
signing in to your company VPN
type: string
message:
description: A VPN requirement message that's displayed to users
type: string
network:
$ref: '#/components/schemas/ApplicationSettingsNotificationsVpnNetwork'
required:
- network
type: object
ApplicationSettingsNotificationsVpnNetwork:
description: Defines network zones for VPN notification
properties:
connection:
description: Specifies the VPN connection details required to access the
app
enum:
- DISABLED
- ANYWHERE
- ON_NETWORK
- OFF_NETWORK
- ZONE
type: string
x-enumDescriptions:
DISABLED: The default state. Retain this setting for apps that don't require
a VPN connection.
ANYWHERE: Displays VPN connection information regardless of the browser's
client IP. The notification appears before the end user can access the
app.
ON_NETWORK: Displays VPN connection information only when a browser's
client IP matches the configured Public Gateway IPs. The notification
appears before the end user can access the app.
OFF_NETWORK: Displays VPN connection information only when the browser's
client IP doesn't match the configured Public Gateway IPs. The notification
appears before the end user can access the app.
exclude:
description: Defines the IP addresses or network ranges that are excluded
from the VPN requirement
items:
type: string
type: array
include:
description: Defines the IP addresses or network ranges that are required
to use the VPN
items:
type: string
type: array
type: object
ApplicationSignOnMode:
description: |
Authentication mode for the app
| signOnMode | Description |
| ---------- | ----------- |
| AUTO_LOGIN | Secure Web Authentication (SWA) |
| BASIC_AUTH | HTTP Basic Authentication with Okta Browser Plugin |
| BOOKMARK | Just a bookmark (no-authentication) |
| BROWSER_PLUGIN | Secure Web Authentication (SWA) with Okta Browser Plugin |
| OPENID_CONNECT | Federated Authentication with OpenID Connect (OIDC) |
| SAML_1_1 | Federated Authentication with SAML 1.1 WebSSO (not supported for custom apps) |
| SAML_2_0 | Federated Authentication with SAML 2.0 WebSSO |
| SECURE_PASSWORD_STORE | Secure Web Authentication (SWA) with POST (plugin not required) |
| WS_FEDERATION | Federated Authentication with WS-Federation Passive Requestor Profile |
Select the `signOnMode` for your custom app:
enum:
- AUTO_LOGIN
- BASIC_AUTH
- BOOKMARK
- BROWSER_PLUGIN
- OPENID_CONNECT
- SAML_1_1
- SAML_2_0
- SECURE_PASSWORD_STORE
- WS_FEDERATION
type: string
ApplicationType:
description: "The type of client application. Default value: `web`."
enum:
- browser
- native
- service
- web
type: string
ApplicationVisibility:
description: Specifies visibility settings for the app
example:
hide:
web: true
iOS: false
appLinks:
key: true
autoLaunch: true
autoSubmitToolbar: true
properties:
appLinks:
additionalProperties:
type: boolean
description: Links or icons that appear on the End-User Dashboard if they're
set to `true`.
type: object
autoLaunch:
description: Automatically signs in to the app when user signs into Okta
type: boolean
autoSubmitToolbar:
description: Automatically sign in when user lands on the sign-in page
type: boolean
hide:
$ref: '#/components/schemas/ApplicationVisibilityHide'
type: object
ApplicationVisibilityHide:
description: Hides the app for specific end-user apps
example:
web: true
iOS: false
properties:
iOS:
default: false
description: Okta Mobile for iOS or Android (pre-dates Android)
example: false
type: boolean
web:
default: false
description: Okta End-User Dashboard on a web browser
example: true
type: boolean
type: object
AssignGroupOwnerRequestBody:
example:
id: id
type: GROUP
properties:
id:
description: The `id` of the group owner
type: string
type:
$ref: '#/components/schemas/GroupOwnerType'
type: object
AssignRoleRequest:
properties:
type:
$ref: '#/components/schemas/RoleType'
type: object
AssignUserToRealm:
example:
realmId: realmId
properties:
realmId:
type: string
type: object
AssociatedServerMediated:
example:
trusted:
- trusted
- trusted
properties:
trusted:
description: A list of the authorization server IDs
items:
type: string
type: array
type: object
AssuranceMethod:
allOf:
- $ref: '#/components/schemas/VerificationMethod'
- properties:
constraints:
items:
$ref: '#/components/schemas/AccessPolicyConstraints'
type: array
factorMode:
$ref: '#/components/schemas/AssuranceMethodFactorMode'
inactivityPeriod:
description: "The inactivity duration after which the user must re-authenticate.\
\ Use the ISO 8601 period format (for example, PT2H)."
type: string
reauthenticateIn:
description: "The duration after which the user must re-authenticate,\
\ regardless of user activity. Keep in mind that the re-authentication\
\ intervals for constraints take precedent over this value. Use the\
\ ISO 8601 period format for recurring time intervals (for example,\
\ PT2H, PT0S, PT43800H, and so on)."
type: string
type: object
AssuranceMethodFactorMode:
enum:
- 1FA
- 2FA
type: string
AttackProtectionAuthenticatorSettings:
example:
verifyKnowledgeSecondWhen2faRequired: false
properties:
verifyKnowledgeSecondWhen2faRequired:
default: false
description: "If true, requires users to verify a possession factor before\
\ verifying a knowledge factor when the assurance requires two-factor\
\ authentication (2FA)."
type: boolean
type: object
AuthServerLinks:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
claims:
$ref: '#/components/schemas/AuthServerLinks_allOf_claims'
deactivate:
allOf:
- $ref: '#/components/schemas/HrefObjectDeactivateLink'
metadata:
description: Link to the authorization server metadata
items:
$ref: '#/components/schemas/HrefObject'
type: array
policies:
$ref: '#/components/schemas/AuthServerLinks_allOf_policies'
rotateKey:
$ref: '#/components/schemas/AuthServerLinks_allOf_rotateKey'
scopes:
$ref: '#/components/schemas/AuthServerLinks_allOf_scopes'
type: object
example:
metadata:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rotateKey:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
claims:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
policies:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
scopes:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate: ""
AuthenticationMethod:
properties:
hardwareProtection:
default: OPTIONAL
description: Indicates if any secrets or private keys used during authentication
must be hardware protected and not exportable. This property is only set
for `POSSESSION` constraints.
enum:
- OPTIONAL
- REQUIRED
type: string
id:
description: An ID that identifies the authenticator
type: string
key:
description: A label that identifies the authenticator
type: string
method:
description: Specifies the method used for the authenticator
type: string
phishingResistant:
default: OPTIONAL
description: Indicates if phishing-resistant Factors are required. This
property is only set for `POSSESSION` constraints
enum:
- OPTIONAL
- REQUIRED
type: string
userVerification:
default: OPTIONAL
description: Indicates the user interaction requirement (PIN or biometrics)
to ensure verification of a possession factor
enum:
- OPTIONAL
- REQUIRED
type: string
required:
- key
- method
type: object
AuthenticationMethodChain:
properties:
authenticationMethods:
items:
$ref: '#/components/schemas/AuthenticationMethod'
type: array
next:
description: The next steps of the authentication method chain. This is
an array of `AuthenticationMethodChain`. Only supports one item in the
array.
items:
type: object
type: array
reauthenticateIn:
description: "Specifies how often the user should be prompted for authentication\
\ using duration format for the time period. \nFor example, `PT2H30M`\
\ for two and a half hours. This parameter can't be set at the same time\
\ as the `reauthenticateIn` property on the `verificationMethod`."
type: string
type: object
AuthenticationMethodChainMethod:
allOf:
- $ref: '#/components/schemas/VerificationMethod'
- properties:
chains:
description: Authentication method chains. Only supports 5 items in the
array. Each chain can support maximum 3 steps.
items:
$ref: '#/components/schemas/AuthenticationMethodChain'
type: array
reauthenticateIn:
description: "Specifies how often the user should be prompted for authentication\
\ using duration format for the time period. \nFor example, `PT2H30M`\
\ for two and a half hours. Don't set this parameter if you're setting\
\ the `reauthenticateIn` parameter in `chains`."
type: string
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: true
AuthenticationMethodObject:
properties:
key:
description: A label that identifies the authenticator
type: string
method:
description: Specifies the method used for the authenticator
type: string
required:
- key
type: object
AuthenticationProvider:
description: |-
Specifies the authentication provider that validates the User's password credential. The User's current provider
is managed by the Delegated Authentication settings for your organization. The provider object is **read-only**.
example:
name: name
type: ACTIVE_DIRECTORY
properties:
name:
description: The name of the authentication provider
type: string
type:
$ref: '#/components/schemas/AuthenticationProviderType'
type: object
AuthenticationProviderType:
description: The type of authentication provider
enum:
- ACTIVE_DIRECTORY
- FEDERATION
- IMPORT
- LDAP
- OKTA
- SOCIAL
type: string
x-enumDescriptions:
ACTIVE_DIRECTORY: Specifies the directory instance name as the `name` property
FEDERATION: Doesn't support a `password` or `recovery question` credential
and must authenticate through a trusted Identity Provider
IMPORT: Specifies a hashed password that was imported from an external source
LDAP: Specifies the directory instance name as the `name` property
OKTA: Specifies the Okta Identity Provider
SOCIAL: Doesn't support a `password` or `recovery question` credential and
must authenticate through a trusted Identity Provider
AuthenticatorBase:
discriminator:
mapping:
custom_app: '#/components/schemas/AuthenticatorKeyCustomApp'
duo: '#/components/schemas/AuthenticatorKeyDuo'
okta_email: '#/components/schemas/AuthenticatorKeyEmail'
google_otp: '#/components/schemas/AuthenticatorKeyGoogleOtp'
external_idp: '#/components/schemas/AuthenticatorKeyExternalIdp'
okta_password: '#/components/schemas/AuthenticatorKeyPassword'
okta_verify: '#/components/schemas/AuthenticatorKeyOktaVerify'
onprem_mfa: '#/components/schemas/AuthenticatorKeyOnprem'
phone_number: '#/components/schemas/AuthenticatorKeyPhone'
security_key: '#/components/schemas/AuthenticatorKeySecurityKey'
security_question: '#/components/schemas/AuthenticatorKeySecurityQuestion'
symantec_vip: '#/components/schemas/AuthenticatorKeySymantecVip'
smart_card_idp: '#/components/schemas/AuthenticatorKeySmartCard'
webauthn: '#/components/schemas/AuthenticatorKeyWebauthn'
yubikey_token: '#/components/schemas/AuthenticatorKeyYubikey'
propertyName: key
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
methods: ""
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
type: app
key: custom_app
status: ACTIVE
properties:
created:
description: Timestamp when the Authenticator was created
format: date-time
readOnly: true
type: string
id:
description: A unique identifier for the Authenticator
readOnly: true
type: string
key:
$ref: '#/components/schemas/AuthenticatorKeyEnum'
lastUpdated:
description: Timestamp when the Authenticator was last modified
format: date-time
readOnly: true
type: string
name:
description: Display name of the Authenticator
type: string
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
$ref: '#/components/schemas/AuthenticatorType'
_links:
$ref: '#/components/schemas/AuthenticatorLinks'
type: object
AuthenticatorEnrollmentPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyConditions'
settings:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicySettings'
type: object
AuthenticatorEnrollmentPolicyAuthenticatorSettings:
properties:
constraints:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyAuthenticatorSettings_constraints'
enroll:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyAuthenticatorSettings_enroll'
key:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyAuthenticatorType'
type: object
AuthenticatorEnrollmentPolicyAuthenticatorStatus:
default: NOT_ALLOWED
description: Requirements for the user-initiated enrollment
enum:
- NOT_ALLOWED
- OPTIONAL
- REQUIRED
type: string
AuthenticatorEnrollmentPolicyAuthenticatorType:
description: A label that identifies the authenticator
enum:
- custom_app
- custom_otp
- duo
- external_idp
- google_otp
- okta_email
- okta_password
- okta_verify
- onprem_mfa
- phone_number
- rsa_token
- security_question
- symantec_vip
- webauthn
- yubikey_token
type: string
AuthenticatorEnrollmentPolicyConditions:
allOf:
- properties:
people:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyConditions_allOf_people'
type: object
AuthenticatorEnrollmentPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyRuleActions'
conditions:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyRuleConditions'
type: object
AuthenticatorEnrollmentPolicyRuleActionEnroll:
description: "Specifies whether the User is to be enrolled the first time they\
\ `LOGIN`, the next time they are in the `CHALLENGE` process, or `NEVER`"
properties:
self:
enum:
- CHALLENGE
- LOGIN
- NEVER
type: string
type: object
AuthenticatorEnrollmentPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
enroll:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyRuleActionEnroll'
type: object
AuthenticatorEnrollmentPolicyRuleConditions:
properties:
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
people:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyRuleConditions_people'
type: object
AuthenticatorEnrollmentPolicySettings:
description: "**Note:** In Identity Engine, the Multifactor (MFA) Enrollment\
\ Policy name has changed to authenticator enrollment policy. The policy type\
\ of `MFA_ENROLL` remains unchanged. However, the `settings` data is updated\
\ for authenticators. Policy `settings` are included only for those authenticators\
\ that are enabled."
properties:
authenticators:
description: |
List of authenticator policy settings
For orgs with the Authenticator enrollment policy feature enabled, the new default authenticator enrollment policy created by Okta contains the `authenticators` property in the policy settings. Existing default authenticator enrollment policies from a migrated Classic Engine org remain unchanged. The policies still use the `factors` property in their settings. The `authenticators` parameter allows you to configure all available authenticators, including authentication and recovery. The `factors` parameter only allows you to configure multifactor authentication.
items:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyAuthenticatorSettings'
type: array
type:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicySettingsType'
type: object
AuthenticatorEnrollmentPolicySettingsType:
default: FACTORS
description: |
Type of policy configuration object
The `type` property in the policy `settings` is only applicable to the authenticator enrollment policy available in Identity Engine.
enum:
- AUTHENTICATORS
- FACTORS
type: string
AuthenticatorIdentity:
description: Represents a particular authenticator serving as a constraint on
a method
properties:
key:
type: string
type: object
AuthenticatorKeyCustomApp:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
agreeToTerms:
description: "A value of `true` indicates that the administrator accepts\
\ the [terms](https://www.okta.com/privacy-policy/)for creating a new\
\ authenticator. Okta requires that you accept the terms when creating\
\ a new `custom_app` authenticator. Other authenticators don't require\
\ this field."
type: boolean
provider:
$ref: '#/components/schemas/AuthenticatorKeyCustomApp_allOf_provider'
settings:
$ref: '#/components/schemas/AuthenticatorKeyCustomApp_allOf_settings'
type: object
AuthenticatorKeyDuo:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
provider:
$ref: '#/components/schemas/AuthenticatorKeyDuo_allOf_provider'
type: object
AuthenticatorKeyEmail:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorKeyEmail_allOf_settings'
type: object
AuthenticatorKeyEnum:
description: A human-readable string that identifies the Authenticator
enum:
- custom_app
- duo
- external_idp
- google_otp
- okta_email
- okta_password
- okta_verify
- onprem_mfa
- phone_number
- security_key
- security_question
- smart_card_idp
- symantec_vip
- webauthn
- yubikey_token
type: string
AuthenticatorKeyExternalIdp:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyGoogleOtp:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyOktaVerify:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorKeyOktaVerify_allOf_settings'
type: object
AuthenticatorKeyOnprem:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyPassword:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyPhone:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorKeyPhone_allOf_settings'
type: object
AuthenticatorKeySecurityKey:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeySecurityQuestion:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorKeyPhone_allOf_settings'
type: object
AuthenticatorKeySmartCard:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeySymantecVip:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyWebauthn:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorKeyYubikey:
allOf:
- $ref: '#/components/schemas/AuthenticatorSimple'
AuthenticatorLinks:
allOf:
- $ref: '#/components/schemas/LinksSelfAndLifecycle'
- properties:
methods:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Link to Authenticator methods
type: object
example:
methods: ""
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthenticatorMethodAlgorithm:
enum:
- ES256
- RS256
type: string
AuthenticatorMethodBase:
discriminator:
mapping:
sms: '#/components/schemas/AuthenticatorMethodSimple'
voice: '#/components/schemas/AuthenticatorMethodSimple'
email: '#/components/schemas/AuthenticatorMethodSimple'
push: '#/components/schemas/AuthenticatorMethodPush'
signed_nonce: '#/components/schemas/AuthenticatorMethodSignedNonce'
totp: '#/components/schemas/AuthenticatorMethodTotp'
otp: '#/components/schemas/AuthenticatorMethodOtp'
password: '#/components/schemas/AuthenticatorMethodSimple'
webauthn: '#/components/schemas/AuthenticatorMethodWebAuthn'
security_question: '#/components/schemas/AuthenticatorMethodSimple'
idp: '#/components/schemas/AuthenticatorMethodWithVerifiableProperties'
duo: '#/components/schemas/AuthenticatorMethodWithVerifiableProperties'
cert: '#/components/schemas/AuthenticatorMethodWithVerifiableProperties'
propertyName: type
example:
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
type: cert
status: ACTIVE
properties:
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
$ref: '#/components/schemas/AuthenticatorMethodType'
_links:
$ref: '#/components/schemas/LinksSelfAndLifecycle'
type: object
AuthenticatorMethodConstraint:
description: "Limits the authenticators that can be used for a given method.\
\ Currently, only the `otp` method supports constraints, and Google authenticator\
\ (key : 'google_otp') is the only allowed authenticator."
properties:
allowedAuthenticators:
items:
$ref: '#/components/schemas/AuthenticatorIdentity'
type: array
method:
enum:
- otp
type: string
type: object
AuthenticatorMethodOtp:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodWithVerifiableProperties'
- properties:
acceptableAdjacentIntervals:
description: "The number of acceptable adjacent intervals, also known\
\ as the clock drift interval. This setting allows you to build in tolerance\
\ for any time difference between the token and the server. For example,\
\ with a `timeIntervalInSeconds` of 60 seconds and an `acceptableAdjacentIntervals`\
\ value of 5, Okta accepts passcodes within 300 seconds (60 * 5) before\
\ or after the end user enters their code."
maximum: 10
minimum: 0
type: integer
algorithm:
$ref: '#/components/schemas/OtpTotpAlgorithm'
encoding:
$ref: '#/components/schemas/OtpTotpEncoding'
factorProfileId:
description: The `id` value of the factor profile
example: aut1nd8PQhGcQtSxB0g4
type: string
passCodeLength:
$ref: '#/components/schemas/OtpTotpPassCodeLength'
protocol:
$ref: '#/components/schemas/OtpProtocol'
timeIntervalInSeconds:
$ref: '#/components/schemas/OtpTotpTimeIntervalInSeconds'
type: object
AuthenticatorMethodProperty:
enum:
- DEVICE_BOUND
- HARDWARE_PROTECTED
- PHISHING_RESISTANT
- USER_PRESENCE
- USER_VERIFYING
type: string
AuthenticatorMethodPush:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorMethodPush_allOf_settings'
type: object
AuthenticatorMethodSignedNonce:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorMethodSignedNonce_allOf_settings'
type: object
AuthenticatorMethodSimple:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
AuthenticatorMethodTotp:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorMethodTotp_allOf_settings'
type: object
AuthenticatorMethodTransactionType:
enum:
- CIBA
- LOGIN
type: string
AuthenticatorMethodType:
description: The type of authenticator method
enum:
- cert
- duo
- email
- idp
- otp
- password
- push
- security_question
- signed_nonce
- sms
- totp
- voice
- webauthn
type: string
AuthenticatorMethodWebAuthn:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
- properties:
settings:
$ref: '#/components/schemas/AuthenticatorMethodWebAuthn_allOf_settings'
type: object
AuthenticatorMethodWithVerifiableProperties:
allOf:
- $ref: '#/components/schemas/AuthenticatorMethodBase'
- properties:
verifiableProperties:
items:
$ref: '#/components/schemas/AuthenticatorMethodProperty'
type: array
type: object
AuthenticatorSimple:
allOf:
- $ref: '#/components/schemas/AuthenticatorBase'
AuthenticatorType:
description: The type of Authenticator
enum:
- app
- email
- federated
- password
- phone
- security_key
- security_question
type: string
AuthorizationServer:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
credentials:
signing:
nextRotation: 2000-01-23T04:56:07.000+00:00
use: sig
kid: kid
rotationMode: AUTO
lastRotated: 2000-01-23T04:56:07.000+00:00
_links:
metadata:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rotateKey:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
claims:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
policies:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
scopes:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate: ""
created: 2000-01-23T04:56:07.000+00:00
name: name
audiences:
- audiences
- audiences
description: description
id: id
issuer: issuer
issuerMode: issuerMode
status: ACTIVE
properties:
audiences:
description: The recipients that the tokens are intended for. This becomes
the `aud` claim in an access token. Okta currently supports only one audience.
items:
type: string
type: array
created:
format: date-time
readOnly: true
type: string
credentials:
$ref: '#/components/schemas/AuthorizationServerCredentials'
description:
description: The description of the custom authorization server
type: string
id:
description: The ID of the custom authorization server
readOnly: true
type: string
issuer:
description: The complete URL for the custom authorization server. This
becomes the `iss` claim in an access token.
type: string
issuerMode:
description: |-
Indicates which value is specified in the issuer of the tokens that a custom authorization server returns: the Okta org domain URL or a custom domain URL.
`issuerMode` is visible if you have a custom URL domain configured or the Dynamic Issuer Mode feature enabled. If you have a custom URL domain configured, you can set a custom domain URL in a custom authorization server, and this property is returned in the appropriate responses.
When set to `ORG_URL`, then in responses, `issuer` is the Okta org domain URL: `https://${yourOktaDomain}`.
When set to `CUSTOM_URL`, then in responses, `issuer` is the custom domain URL configured in the administration user interface.
When set to `DYNAMIC`, then in responses, `issuer` is the custom domain URL if the OAuth 2.0 request was sent to the custom domain, or is the Okta org's domain URL if the OAuth 2.0 request was sent to the original Okta org domain.
After you configure a custom URL domain, all new custom authorization servers use `CUSTOM_URL` by default. If the Dynamic Issuer Mode feature is enabled, then all new custom authorization servers use `DYNAMIC` by default. All existing custom authorization servers continue to use the original value until they're changed using the Admin Console or the API. This way, existing integrations with the client and resource server continue to work after the feature is enabled.
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
name:
description: The name of the custom authorization server
type: string
status:
$ref: '#/components/schemas/LifecycleStatus'
_links:
$ref: '#/components/schemas/AuthServerLinks'
type: object
AuthorizationServerCredentials:
example:
signing:
nextRotation: 2000-01-23T04:56:07.000+00:00
use: sig
kid: kid
rotationMode: AUTO
lastRotated: 2000-01-23T04:56:07.000+00:00
properties:
signing:
$ref: '#/components/schemas/AuthorizationServerCredentialsSigningConfig'
type: object
AuthorizationServerCredentialsRotationMode:
description: The Key rotation mode for the authorization server
enum:
- AUTO
- MANUAL
type: string
AuthorizationServerCredentialsSigningConfig:
example:
nextRotation: 2000-01-23T04:56:07.000+00:00
use: sig
kid: kid
rotationMode: AUTO
lastRotated: 2000-01-23T04:56:07.000+00:00
properties:
kid:
description: The ID of the JSON Web Key used for signing tokens issued by
the authorization server
readOnly: true
type: string
lastRotated:
description: The timestamp when the authorization server started using the
`kid` for signing tokens
format: date-time
readOnly: true
type: string
nextRotation:
description: The timestamp when the authorization server changes the Key
for signing tokens. This is only returned when `rotationMode` is set to
`AUTO`.
format: date-time
readOnly: true
type: string
rotationMode:
$ref: '#/components/schemas/AuthorizationServerCredentialsRotationMode'
use:
$ref: '#/components/schemas/AuthorizationServerCredentialsUse'
type: object
AuthorizationServerCredentialsUse:
description: How the key is used
enum:
- sig
type: string
AuthorizationServerJsonWebKey:
example:
kty: kty
e: e
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
use: use
kid: kid
alg: alg
"n": "n"
status: status
properties:
alg:
description: "The algorithm used with the Key. Valid value: `RS256`"
type: string
e:
description: RSA key value (public exponent) for Key binding
readOnly: true
type: string
kid:
description: Unique identifier for the key
readOnly: true
type: string
kty:
description: "Cryptographic algorithm family for the certificate's keypair.\
\ Valid value: `RSA`"
readOnly: true
type: string
"n":
description: RSA modulus value that is used by both the public and private
keys and provides a link between them
type: string
status:
description: |-
An `ACTIVE` Key is used to sign tokens issued by the authorization server. Supported values: `ACTIVE`, `NEXT`, or `EXPIRED`
A `NEXT` Key is the next Key that the authorization server uses to sign tokens when Keys are rotated. The `NEXT` Key might not be listed if it hasn't been generated.
An `EXPIRED` Key is the previous Key that the authorization server used to sign tokens. The `EXPIRED` Key might not be listed if no Key has expired or the expired Key was deleted.
type: string
use:
description: "Acceptable use of the key. Valid value: `sig`"
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
AuthorizationServerPolicy:
allOf:
- properties:
id:
description: ID of the Policy
type: string
type:
description: Indicates that the Policy is an authorization server Policy
enum:
- OAUTH_AUTHORIZATION_POLICY
type: string
name:
description: Name of the Policy
type: string
conditions:
$ref: '#/components/schemas/AuthorizationServerPolicyConditions'
description:
description: Description of the Policy
type: string
priority:
description: Specifies the order in which this Policy is evaluated in
relation to the other Policies in a custom authorization server
type: integer
status:
description: Specifies whether requests have access to this Policy
enum:
- ACTIVE
- INACTIVE
type: string
system:
description: Specifies whether Okta created this Policy
type: boolean
created:
description: Timestamp when the Policy was created
format: date-time
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Policy was last updated
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/AuthorizationServerPolicy_allOf__links'
type: object
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: true
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rules:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
description: description
id: id
type: OAUTH_AUTHORIZATION_POLICY
conditions:
clients:
include:
- include
- include
priority: 0
status: ACTIVE
AuthorizationServerPolicyConditions:
example:
clients:
include:
- include
- include
properties:
clients:
$ref: '#/components/schemas/ClientPolicyCondition'
type: object
AuthorizationServerPolicyPeopleCondition:
description: Identifies Users and Groups that are used together
example:
groups:
include:
- include
- include
users:
include:
- include
- include
properties:
groups:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleGroupCondition'
users:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleUserCondition'
type: object
AuthorizationServerPolicyRule:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: true
_links: ""
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
conditions:
grantTypes:
include:
- include
- include
scopes:
include:
- include
- include
people:
groups:
include:
- include
- include
users:
include:
- include
- include
priority: 5
type: RESOURCE_ACCESS
actions:
token:
refreshTokenWindowMinutes: 1
accessTokenLifetimeMinutes: 0
inlineHook:
id: id
refreshTokenLifetimeMinutes: 6
status: ACTIVE
properties:
actions:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleActions'
conditions:
$ref: '#/components/schemas/AuthorizationServerPolicyRuleConditions'
created:
description: Timestamp when the rule was created
format: date-time
readOnly: true
type: string
id:
description: Identifier of the rule
readOnly: true
type: string
lastUpdated:
description: Timestamp when the rule was last modified
format: date-time
readOnly: true
type: string
name:
description: Name of the rule
type: string
priority:
description: Priority of the rule
type: integer
status:
description: Status of the rule
enum:
- ACTIVE
- INACTIVE
type: string
system:
description: Set to `true` for system rules. You can't delete system rules.
type: boolean
type:
description: Rule type
enum:
- RESOURCE_ACCESS
type: string
_links:
allOf:
- $ref: '#/components/schemas/LinksSelfAndLifecycle'
type: object
AuthorizationServerPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
token:
$ref: '#/components/schemas/TokenAuthorizationServerPolicyRuleAction'
type: object
example:
token:
refreshTokenWindowMinutes: 1
accessTokenLifetimeMinutes: 0
inlineHook:
id: id
refreshTokenLifetimeMinutes: 6
AuthorizationServerPolicyRuleConditions:
example:
grantTypes:
include:
- include
- include
scopes:
include:
- include
- include
people:
groups:
include:
- include
- include
users:
include:
- include
- include
properties:
grantTypes:
$ref: '#/components/schemas/GrantTypePolicyRuleCondition'
people:
$ref: '#/components/schemas/AuthorizationServerPolicyPeopleCondition'
scopes:
$ref: '#/components/schemas/OAuth2ScopesMediationPolicyRuleCondition'
type: object
AuthorizationServerPolicyRuleGroupCondition:
description: Specifies a set of Groups whose Users are to be included
example:
include:
- include
- include
properties:
include:
description: Groups to be included
items:
type: string
type: array
type: object
AuthorizationServerPolicyRuleRequest:
allOf:
- $ref: '#/components/schemas/AuthorizationServerPolicyRule'
- required:
- conditions
- name
- type
type: object
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: true
_links: ""
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
conditions:
grantTypes:
include:
- include
- include
scopes:
include:
- include
- include
people:
groups:
include:
- include
- include
users:
include:
- include
- include
priority: 0
type: RESOURCE_ACCESS
actions:
token:
refreshTokenWindowMinutes: 1
accessTokenLifetimeMinutes: 0
inlineHook:
id: id
refreshTokenLifetimeMinutes: 6
status: ACTIVE
AuthorizationServerPolicyRuleUserCondition:
description: Specifies a set of Users to be included
example:
include:
- include
- include
properties:
include:
description: Users to be included
items:
type: string
type: array
type: object
AuthorizationServerResourceHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7"
type: string
title:
description: Link name
example: Example Authorization Server
type: string
type: object
AutoAssignAdminAppSetting:
description: The org setting that automatically assigns the Okta Admin Console
when an admin role is assigned
properties:
autoAssignAdminAppSetting:
description: Automatically assigns the Okta Admin Console to the user when
an admin role is assigned
type: boolean
type: object
AutoLoginApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/SchemeApplicationCredentials'
name:
description: A unique key is generated for the custom SWA app instance
when you use AUTO_LOGIN `signOnMode`.
readOnly: true
type: string
settings:
$ref: '#/components/schemas/AutoLoginApplicationSettings'
type: object
AutoLoginApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
signOn:
$ref: '#/components/schemas/AutoLoginApplicationSettingsSignOn'
type: object
AutoLoginApplicationSettingsSignOn:
properties:
loginUrl:
description: Primary URL of the sign-in page for this app
type: string
redirectUrl:
description: Secondary URL of the sign-in page for this app
type: string
required:
- loginUrl
type: object
AutoUpdateSchedule:
description: The schedule of auto-update configured by admin.
example:
cron: cron
duration: 6
lastUpdated: 2000-01-23T04:56:07.000+00:00
delay: 0
timezone: timezone
properties:
cron:
type: string
delay:
description: delay in days
type: integer
duration:
description: duration in minutes
type: integer
lastUpdated:
description: "last time when the updated finished (success or failed, exclude\
\ cancelled), null if job haven't finished once yet."
format: date-time
type: string
timezone:
type: string
type: object
AwsAccountId:
description: Your AWS account ID
example: "123456789012"
maxLength: 12
minLength: 12
type: string
AwsEventSourceName:
description: An alphanumeric name (no spaces) to identify this event source
in AWS EventBridge
example: your-event-source-name
maxLength: 75
minLength: 1
pattern: "^[a-zA-Z0-9.\\-_]$"
type: string
AwsRegion:
description: The destination AWS region where your event source is located
enum:
- ap-northeast-1
- ap-northeast-2
- ap-northeast-3
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- ca-central-1
- eu-central-1
- eu-north-1
- eu-west-1
- eu-west-2
- eu-west-3
- sa-east-1
- us-east-1
- us-east-2
- us-west-1
- us-west-2
type: string
BaseContext:
description: "This object contains a number of sub-objects, each of which provide\
\ some type of contextual information."
properties:
request:
$ref: '#/components/schemas/InlineHookRequestObject'
session:
$ref: '#/components/schemas/BaseContext_session'
user:
$ref: '#/components/schemas/BaseContext_user'
type: object
BaseEmailDomain:
properties:
displayName:
type: string
userName:
type: string
required:
- displayName
- userName
type: object
BaseEmailServer:
properties:
alias:
description: Human-readable name for your SMTP server
example: CustomServer1
type: string
enabled:
description: "If `true`, routes all email traffic through your SMTP server"
type: boolean
host:
description: Hostname or IP address of your SMTP server
example: 192.168.160.1
type: string
port:
description: Port number of your SMTP server
example: 587
type: integer
username:
description: Username used to access your SMTP server
example: aUser
type: string
type: object
BaseToken:
properties:
claims:
description: "Claims included in the token. Consists of name-value pairs\
\ for each included claim. For descriptions of the claims that you can\
\ include, see the Okta [OpenID Connect and OAuth 2.0 API reference](/openapi/okta-oauth/guides/overview/#claims)."
type: object
lifetime:
$ref: '#/components/schemas/BaseToken_lifetime'
type: object
BasicApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
$ref: '#/components/schemas/BasicApplicationSettingsApplication'
type: object
BasicApplicationSettingsApplication:
properties:
authURL:
description: The URL of the authenticating site for this app
type: string
url:
description: The URL of the sign-in page for this app
type: string
required:
- authURL
- url
type: object
BasicAuthApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/SchemeApplicationCredentials'
name:
description: '`template_basic_auth` is the key name for a Basic Authentication
scheme app instance'
enum:
- template_basic_auth
type: string
settings:
$ref: '#/components/schemas/BasicApplicationSettings'
required:
- name
- settings
type: object
x-okta-defined-as:
name: template_basic_auth
BeforeScheduledActionPolicyRuleCondition:
properties:
duration:
$ref: '#/components/schemas/Duration'
lifecycleAction:
$ref: '#/components/schemas/ScheduledUserLifecycleAction'
type: object
BehaviorRule:
discriminator:
mapping:
ANOMALOUS_LOCATION: '#/components/schemas/BehaviorRuleAnomalousLocation'
ANOMALOUS_IP: '#/components/schemas/BehaviorRuleAnomalousIP'
ANOMALOUS_DEVICE: '#/components/schemas/BehaviorRuleAnomalousDevice'
VELOCITY: '#/components/schemas/BehaviorRuleVelocity'
propertyName: type
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_link:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
type: ANOMALOUS_DEVICE
status: ACTIVE
properties:
created:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
name:
maxLength: 128
type: string
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
$ref: '#/components/schemas/BehaviorRuleType'
_link:
$ref: '#/components/schemas/LinksSelf'
required:
- name
- type
title: Behavior Detection Rule
type: object
BehaviorRuleAnomalousDevice:
allOf:
- $ref: '#/components/schemas/BehaviorRule'
- properties:
settings:
$ref: '#/components/schemas/BehaviorRuleSettingsAnomalousDevice'
type: object
BehaviorRuleAnomalousIP:
allOf:
- $ref: '#/components/schemas/BehaviorRule'
- properties:
settings:
$ref: '#/components/schemas/BehaviorRuleSettingsAnomalousIP'
type: object
BehaviorRuleAnomalousLocation:
allOf:
- $ref: '#/components/schemas/BehaviorRule'
- properties:
settings:
$ref: '#/components/schemas/BehaviorRuleSettingsAnomalousLocation'
type: object
BehaviorRuleSettings:
title: Behavior Detection Rule Settings
type: object
BehaviorRuleSettingsAnomalousDevice:
allOf:
- $ref: '#/components/schemas/BehaviorRuleSettingsHistoryBased'
BehaviorRuleSettingsAnomalousIP:
allOf:
- $ref: '#/components/schemas/BehaviorRuleSettingsHistoryBased'
- properties:
maxEventsUsedForEvaluation:
default: 50
maximum: 100
minimum: 0
type: integer
type: object
BehaviorRuleSettingsAnomalousLocation:
allOf:
- $ref: '#/components/schemas/BehaviorRuleSettingsHistoryBased'
- properties:
granularity:
$ref: '#/components/schemas/LocationGranularity'
radiusKilometers:
description: Required when `granularity` is `LAT_LONG`. Radius from the
provided coordinates in kilometers.
type: integer
required:
- granularity
type: object
BehaviorRuleSettingsHistoryBased:
allOf:
- $ref: '#/components/schemas/BehaviorRuleSettings'
- properties:
maxEventsUsedForEvaluation:
default: 20
maximum: 100
minimum: 1
type: integer
minEventsNeededForEvaluation:
default: 0
maximum: 10
minimum: 0
type: integer
title: Behavior Detection Rule Settings based on Event History
type: object
BehaviorRuleSettingsVelocity:
allOf:
- $ref: '#/components/schemas/BehaviorRuleSettings'
- properties:
velocityKph:
default: 805
minimum: 1
type: integer
required:
- velocityKph
title: Behavior Detection Rule Settings based on device velocity in kilometers
per hour.
type: object
BehaviorRuleType:
enum:
- ANOMALOUS_DEVICE
- ANOMALOUS_IP
- ANOMALOUS_LOCATION
- VELOCITY
type: string
BehaviorRuleVelocity:
allOf:
- $ref: '#/components/schemas/BehaviorRule'
- properties:
settings:
$ref: '#/components/schemas/BehaviorRuleSettingsVelocity'
type: object
BindingMethod:
description: The method used to bind the out-of-band channel with the primary
channel.
enum:
- none
- prompt
- transfer
type: string
BookmarkApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/ApplicationCredentials'
name:
description: '`bookmark` is the key name for a Bookmark app'
enum:
- bookmark
type: string
settings:
$ref: '#/components/schemas/BookmarkApplicationSettings'
required:
- name
- settings
type: object
x-okta-defined-as:
name: bookmark
BookmarkApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
$ref: '#/components/schemas/BookmarkApplicationSettingsApplication'
type: object
BookmarkApplicationSettingsApplication:
properties:
requestIntegration:
default: false
description: Would you like Okta to add an integration for this app?
type: boolean
url:
description: The URL of the launch page for this app
type: string
required:
- url
type: object
BouncesRemoveListError:
example:
reason: reason
emailAddress: emailAddress
properties:
emailAddress:
description: An email address with a validation error
type: string
reason:
description: Validation error reason
type: string
type: object
BouncesRemoveListObj:
example:
emailAddresses:
- emailAddresses
- emailAddresses
properties:
emailAddresses:
description: A list of email addresses to remove from the email-service
bounce list
items:
description: Email address
type: string
type: array
type: object
BouncesRemoveListResult:
example:
errors:
- reason: reason
emailAddress: emailAddress
- reason: reason
emailAddress: emailAddress
properties:
errors:
description: A list of emails that wasn't added to the email-bounced remove
list and the error reason
items:
$ref: '#/components/schemas/BouncesRemoveListError'
type: array
type: object
Brand:
example:
agreeToCustomPrivacyPolicy: true
defaultApp:
appInstanceId: appInstanceId
appLinkName: appLinkName
classicApplicationUri: classicApplicationUri
isDefault: true
removePoweredByOkta: false
name: name
id: id
emailDomainId: emailDomainId
locale: locale
customPrivacyPolicyUrl: customPrivacyPolicyUrl
properties:
agreeToCustomPrivacyPolicy:
description: Consent for updating the custom privacy URL. Not required when
resetting the URL.
type: boolean
customPrivacyPolicyUrl:
description: Custom privacy policy URL
type: string
defaultApp:
$ref: '#/components/schemas/DefaultApp'
emailDomainId:
description: The ID of the email domain
type: string
id:
description: The Brand ID
readOnly: true
type: string
isDefault:
description: "If `true`, the Brand is used for the Okta subdomain"
readOnly: true
type: boolean
locale:
description: "The language specified as an [IETF BCP 47 language tag](https://datatracker.ietf.org/doc/html/rfc5646)"
type: string
name:
description: The name of the Brand
type: string
removePoweredByOkta:
default: false
description: "Removes \"Powered by Okta\" from the sign-in page in redirect\
\ authentication deployments, and \"© [current year] Okta, Inc.\" from\
\ the Okta End-User Dashboard"
type: boolean
type: object
BrandDomains:
items:
$ref: '#/components/schemas/DomainResponse'
title: BrandDomains
type: array
BrandRequest:
example:
agreeToCustomPrivacyPolicy: true
defaultApp:
appInstanceId: appInstanceId
appLinkName: appLinkName
classicApplicationUri: classicApplicationUri
removePoweredByOkta: false
name: name
emailDomainId: emailDomainId
locale: locale
customPrivacyPolicyUrl: customPrivacyPolicyUrl
properties:
agreeToCustomPrivacyPolicy:
description: Consent for updating the custom privacy URL. Not required when
resetting the URL.
type: boolean
customPrivacyPolicyUrl:
description: Custom privacy policy URL
type: string
defaultApp:
$ref: '#/components/schemas/DefaultApp'
emailDomainId:
description: The ID of the email domain
type: string
locale:
description: "The language specified as an [IETF BCP 47 language tag](https://datatracker.ietf.org/doc/html/rfc5646)"
type: string
name:
description: The name of the Brand
type: string
removePoweredByOkta:
default: false
description: "Removes \"Powered by Okta\" from the sign-in page in redirect\
\ authentication deployments, and \"© [current year] Okta, Inc.\" from\
\ the Okta End-User Dashboard"
type: boolean
required:
- name
type: object
BrandWithEmbedded:
allOf:
- $ref: '#/components/schemas/Brand'
example:
_embedded: "{}"
_links: ""
properties:
_embedded:
properties:
themes:
items:
$ref: '#/components/schemas/ThemeResponse'
type: array
domains:
items:
$ref: '#/components/schemas/DomainResponse'
type: array
emailDomain:
$ref: '#/components/schemas/EmailDomainResponse'
readOnly: true
type: object
_links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
themes:
$ref: '#/components/schemas/HrefObject'
type: object
BrowserPluginApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/SchemeApplicationCredentials'
name:
description: The key name for the app definition
enum:
- template_swa
- template_swa3field
type: string
x-enumDescriptions:
template_swa: The key name for a SWA app instance that requires a browser
plugin
template_swa3field: The key name for a SWA app instance that requires
a browser plugin and supports three CSS selectors
settings:
$ref: '#/components/schemas/SwaApplicationSettings'
required:
- name
- settings
type: object
BulkDeleteRequestBody:
example:
entityType: USERS
profiles:
- externalId: externalId
- externalId: externalId
properties:
entityType:
enum:
- USERS
type: string
profiles:
items:
$ref: '#/components/schemas/IdentitySourceUserProfileForDelete'
type: array
type: object
BulkUpsertRequestBody:
example:
entityType: USERS
profiles:
- profile:
firstName: firstName
lastName: lastName
mobilePhone: mobilePhone
secondEmail: secondEmail
userName: userName
email: email
homeAddress: homeAddress
externalId: externalId
- profile:
firstName: firstName
lastName: lastName
mobilePhone: mobilePhone
secondEmail: secondEmail
userName: userName
email: email
homeAddress: homeAddress
externalId: externalId
properties:
entityType:
enum:
- USERS
type: string
profiles:
items:
$ref: '#/components/schemas/BulkUpsertRequestBody_profiles_inner'
type: array
type: object
BundleEntitlement:
properties:
description:
type: string
id:
type: string
name:
type: string
role:
type: string
_links:
$ref: '#/components/schemas/BundleEntitlement__links'
type: object
BundleEntitlementsResponse:
properties:
entitlements:
items:
$ref: '#/components/schemas/BundleEntitlement'
type: array
_links:
$ref: '#/components/schemas/BundleEntitlementsResponse__links'
type: object
ByDateTimeExpiry:
allOf:
- $ref: '#/components/schemas/DateTime'
ByDurationExpiry:
allOf:
- $ref: '#/components/schemas/TimeDuration'
description: |-
A time duration specified as an [ISO-8601 duration](https://en.wikipedia.org/wiki/ISO_8601#Durations).
Must be between 1 and 180 days inclusive.
CAPTCHAInstance:
description: ""
example:
siteKey: siteKey
secretKey: secretKey
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: HCAPTCHA
properties:
id:
description: The unique key for the CAPTCHA instance
readOnly: true
type: string
name:
description: The name of the CAPTCHA instance
type: string
secretKey:
description: The secret key issued from the CAPTCHA provider to perform
server-side validation for a CAPTCHA token
type: string
writeOnly: true
siteKey:
description: The site key issued from the CAPTCHA provider to render a CAPTCHA
on a page
type: string
type:
$ref: '#/components/schemas/CAPTCHAType'
_links:
$ref: '#/components/schemas/LinksSelf'
title: CAPTCHAInstance
type: object
CAPTCHAType:
description: The type of CAPTCHA provider
enum:
- HCAPTCHA
- RECAPTCHA_V2
type: string
CSRLinks:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of a CSR object using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
publish:
hints:
allow:
- POST
- POST
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
self:
hints:
allow:
- GET
- GET
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
properties:
publish:
$ref: '#/components/schemas/HrefCsrPublishLink'
self:
$ref: '#/components/schemas/HrefCsrSelfLink'
readOnly: true
CaepDeviceComplianceChangeEvent:
description: The subject's device compliance was revoked
properties:
current_status:
description: Current device compliance status
enum:
- compliant
- not-compliant
example: non-compliant
type: string
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
previous_status:
description: Previous device compliance status
enum:
- compliant
- not-compliant
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- current_status
- event_timestamp
- previous_status
- subject
type: object
CaepSecurityEvent:
properties:
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- event_timestamp
- subject
type: object
CaepSessionRevokedEvent:
description: The session of the subject was revoked
properties:
current_ip:
description: Current IP of the session
example: 123.4.5.6
type: string
current_user_agent:
description: Current User Agent of the session
example: CurrentUserAgent
type: string
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
last_known_ip:
description: Last known IP of the session
example: 123.4.5.6
type: string
last_known_user_agent:
description: Last known User Agent of the session
example: LastUserAgent
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- event_timestamp
- subject
type: object
CapabilitiesCreateObject:
description: |
Determines whether Okta assigns a new app account to each user managed by Okta.
Okta doesn't create a new account if it detects that the username specified in Okta already exists in the app.
The user's Okta username is assigned by default.
properties:
lifecycleCreate:
$ref: '#/components/schemas/LifecycleCreateSettingObject'
type: object
CapabilitiesImportRulesObject:
description: Defines user import rules
properties:
userCreateAndMatch:
$ref: '#/components/schemas/CapabilitiesImportRulesUserCreateAndMatchObject'
type: object
CapabilitiesImportRulesUserCreateAndMatchObject:
description: Rules for matching and creating users
properties:
allowPartialMatch:
description: "Allows user import upon partial matching. Partial matching\
\ occurs when the first and last names of an imported user match those\
\ of an existing Okta user, even if the username or email attributes don't\
\ match."
type: boolean
autoActivateNewUsers:
description: "If set to `true`, imported new users are automatically activated."
type: boolean
autoConfirmExactMatch:
description: "If set to `true`, exact-matched users are automatically confirmed\
\ on activation. If set to `false`, exact-matched users need to be confirmed\
\ manually."
type: boolean
autoConfirmNewUsers:
description: "If set to `true`, imported new users are automatically confirmed\
\ on activation. This doesn't apply to imported users that already exist\
\ in Okta."
type: boolean
autoConfirmPartialMatch:
description: "If set to `true`, partially matched users are automatically\
\ confirmed on activation. If set to `false`, partially matched users\
\ need to be confirmed manually."
type: boolean
exactMatchCriteria:
description: Determines the attribute to match users
enum:
- EMAIL
- USERNAME
type: string
type: object
CapabilitiesImportSettingsObject:
description: Defines import settings
properties:
schedule:
$ref: '#/components/schemas/ImportScheduleObject'
username:
$ref: '#/components/schemas/ImportUsernameObject'
type: object
CapabilitiesInboundProvisioningObject:
description: Defines the configuration for the INBOUND_PROVISIONING feature
properties:
importRules:
$ref: '#/components/schemas/CapabilitiesImportRulesObject'
importSettings:
$ref: '#/components/schemas/CapabilitiesImportSettingsObject'
required:
- importRules
- importSettings
title: INBOUND_PROVISIONING
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
CapabilitiesObject:
description: Defines the configurations for the USER_PROVISIONING feature
properties:
create:
$ref: '#/components/schemas/CapabilitiesCreateObject'
update:
$ref: '#/components/schemas/CapabilitiesUpdateObject'
title: USER_PROVISIONING
type: object
CapabilitiesUpdateObject:
description: Determines whether updates to a user's profile are pushed to the
app
properties:
lifecycleDeactivate:
$ref: '#/components/schemas/LifecycleDeactivateSettingObject'
password:
$ref: '#/components/schemas/PasswordSettingObject'
profile:
$ref: '#/components/schemas/ProfileSettingObject'
type: object
CatalogApplication:
example:
features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
properties:
category:
type: string
description:
type: string
displayName:
type: string
features:
items:
type: string
type: array
id:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
name:
type: string
signOnModes:
items:
type: string
type: array
status:
$ref: '#/components/schemas/CatalogApplicationStatus'
verificationStatus:
type: string
website:
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
CatalogApplicationStatus:
enum:
- ACTIVE
- INACTIVE
type: string
ChallengeType:
enum:
- http://auth0.com/oauth/grant-type/mfa-oob
- http://auth0.com/oauth/grant-type/mfa-otp
type: string
ChangeEnum:
default: KEEP_EXISTING
description: Determines whether a change in a user's password also updates the
user's password in the app
enum:
- CHANGE
- KEEP_EXISTING
example: CHANGE
type: string
ChangePasswordRequest:
example:
oldPassword:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
newPassword:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
revokeSessions: false
properties:
newPassword:
$ref: '#/components/schemas/PasswordCredential'
oldPassword:
$ref: '#/components/schemas/PasswordCredential'
revokeSessions:
default: false
description: "When set to `true`, revokes all User sessions, except for\
\ the current session"
type: boolean
type: object
Channel:
description: The out-of-band channel for use with authentication. Required for
all `/oob-authenticate` requests and any `/challenge` request with an out-of-band
authenticator.
enum:
- push
- sms
- voice
type: string
ChannelBinding:
properties:
required:
$ref: '#/components/schemas/RequiredEnum'
style:
enum:
- NUMBER_CHALLENGE
type: string
type: object
ChildOrg:
example:
settings:
key: ""
website: https://www.okta.com
_links:
key: ""
created: 2022-08-25T00:05:00Z
admin:
credentials:
password:
value: pa$$word
recovery_question:
answer: se7en
question: what is your favourite movie?
profile:
firstName: firstName
lastName: lastName
login: login
email: email
edition: SKU
token: token
lastUpdated: 2022-08-25T00:05:00Z
name: My Child Org 1
subdomain: my-child-org-1
id: 00o1n8sbwArJ7OQRw406
tokenType: SSWS
status: ACTIVE
properties:
admin:
$ref: '#/components/schemas/OrgCreationAdmin'
created:
description: Timestamp when the Org was created
example: 2022-08-25T00:05:00Z
format: date-time
readOnly: true
type: string
edition:
description: Edition for the Org. `SKU` is the only supported value.
enum:
- SKU
example: SKU
type: string
id:
description: Org ID
example: 00o1n8sbwArJ7OQRw406
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Org was last updated
example: 2022-08-25T00:05:00Z
format: date-time
readOnly: true
type: string
name:
description: |-
Unique name of the Org.
This name appears in the HTML `` tag of the new Org sign-in page.
Only less than 4-width UTF-8 encoded characters are allowed.
example: My Child Org 1
format: utf-8
maximum: 100
minimum: 1
type: string
settings:
additionalProperties: true
description: Settings associated with the created Org
readOnly: true
type: object
status:
description: Status of the Org. `ACTIVE` is returned after the Org is created.
enum:
- ACTIVE
readOnly: true
type: string
subdomain:
description: Subdomain of the Org. Must be unique and include no spaces.
example: my-child-org-1
maximum: 57
minimum: 1
type: string
token:
description: |-
API token associated with the child Org super admin account.
Use this API token to provision resources (such as policies, apps, and groups) on the newly created child Org.
This token is revoked if the super admin account is deactivated.
> **Note:** If this API token expires, sign in to the Admin Console as the super admin user and create a new API token. See [Create an API token](https://developer.okta.com/docs/guides/create-an-api-token/).
readOnly: true
type: string
tokenType:
description: "Type of returned `token`. See [Okta API tokens](https://developer.okta.com/docs/guides/create-an-api-token/main/#okta-api-tokens)."
enum:
- SSWS
example: SSWS
readOnly: true
type: string
website:
description: Default website for the Org
example: https://www.okta.com
type: string
_links:
additionalProperties: true
description: "Specifies available link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
readOnly: true
type: object
required:
- admin
- edition
- name
- subdomain
type: object
ChromeBrowserVersion:
description: Current version of the Chrome Browser
properties:
minimum:
type: string
type: object
Claim:
type: string
Client:
properties:
application_type:
$ref: '#/components/schemas/ApplicationType'
client_id:
description: "Unique key for the client application. The `client_id` is\
\ immutable. When you create a client Application, you can't specify the\
\ `client_id` because Okta uses the application ID for the `client_id`."
readOnly: true
type: string
client_id_issued_at:
description: Time at which the `client_id` was issued (measured in unix
seconds)
readOnly: true
type: integer
client_name:
description: Human-readable string name of the client application
type: string
client_secret:
description: "OAuth 2.0 client secret string (used for confidential clients).\
\ The `client_secret` is shown only on the response of the creation or\
\ update of a client Application (and only if the `token_endpoint_auth_method`\
\ is one that requires a client secret). You can't specify the `client_secret`.\
\ If the `token_endpoint_auth_method` requires one, Okta generates a random\
\ `client_secret` for the client Application."
nullable: true
readOnly: true
type: string
client_secret_expires_at:
description: Time at which the `client_secret` expires or 0 if it doesn't
expire (measured in unix seconds)
minimum: 0
nullable: true
readOnly: true
type: integer
frontchannel_logout_session_required:
description: Include user session details
type: boolean
frontchannel_logout_uri:
description: URL where Okta sends the logout request
nullable: true
type: string
grant_types:
description: "Array of OAuth 2.0 grant type strings. Default value: `[authorization_code]`"
items:
$ref: '#/components/schemas/GrantType'
type: array
initiate_login_uri:
description: URL that a third party can use to initiate a login by the client
type: string
jwks_uri:
description: "URL string that references a [JSON Web Key Set](https://tools.ietf.org/html/rfc7517#section-5)\
\ for validating JWTs presented to Okta"
type: string
logo_uri:
description: URL string that references a logo for the client consent dialog
(not the sign-in dialog)
nullable: true
type: string
policy_uri:
description: URL string of a web page providing the client's policy document
nullable: true
type: string
post_logout_redirect_uris:
description: Array of redirection URI strings for use for relying party
initiated logouts
items:
type: string
type: array
redirect_uris:
description: "Array of redirection URI strings for use in redirect-based\
\ flows. All redirect URIs must be absolute URIs and must not include\
\ a fragment component. At least one redirect URI and response type is\
\ required for all client types, with the following exceptions: If the\
\ client uses the Resource Owner Password flow (if `grant_type` contains\
\ the value password) or the Client Credentials flow (if `grant_type`\
\ contains the value `client_credentials`), then no redirect URI or response\
\ type is necessary. In these cases, you can pass either null or an empty\
\ array for these attributes."
items:
type: string
type: array
request_object_signing_alg:
description: "The type of [JSON Web Key Set](https://tools.ietf.org/html/rfc7517#section-5)\
\ algorithm that must be used for signing request objects"
items:
$ref: '#/components/schemas/SigningAlgorithm'
type: array
response_types:
description: "Array of OAuth 2.0 response type strings. Default value: `[code]`"
items:
$ref: '#/components/schemas/ResponseType'
type: array
token_endpoint_auth_method:
$ref: '#/components/schemas/EndpointAuthMethod'
tos_uri:
description: URL string of a web page providing the client's terms of service
document
nullable: true
type: string
type: object
ClientPolicyCondition:
description: Specifies which clients are included in the Policy
example:
include:
- include
- include
properties:
include:
description: Which clients are included in the Policy
items:
type: string
type: array
type: object
ClientPrivilegesSetting:
description: The org setting that assigns the super admin role by default to
a public client app
example:
clientPrivilegesSetting: true
properties:
clientPrivilegesSetting:
description: "If true, assigns the super admin role by default to new public\
\ client apps"
example: true
type: boolean
type: object
CodeChallengeMethod:
enum:
- S256
type: string
Compliance:
properties:
fips:
$ref: '#/components/schemas/FipsEnum'
type: object
Conditions:
example:
expression:
value: value
profileSourceId: profileSourceId
properties:
expression:
$ref: '#/components/schemas/Expression'
profileSourceId:
type: string
type: object
ContentSecurityPolicySetting:
example:
mode: enforced
reportUri: reportUri
srcList:
- srcList
- srcList
properties:
mode:
enum:
- enforced
- report_only
type: string
reportUri:
type: string
srcList:
items:
type: string
type: array
type: object
ContextPolicyRuleCondition:
allOf:
- $ref: '#/components/schemas/DevicePolicyRuleCondition'
- properties:
expression:
type: string
type: object
CreateBrandRequest:
example:
name: name
properties:
name:
description: The name of the Brand
type: string
required:
- name
title: CreateBrandRequest
type: object
CreateGroupRuleRequest:
example:
name: name
conditions:
expression:
type: type
value: user.role==\"Engineer\"
people:
groups:
exclude:
- exclude
- exclude
users:
exclude:
- exclude
- exclude
type: group_rule
actions:
assignUserToGroups:
groupIds:
- groupIds
- groupIds
properties:
actions:
$ref: '#/components/schemas/GroupRuleAction'
conditions:
$ref: '#/components/schemas/GroupRuleConditions'
name:
description: Name of the Group rule
maxLength: 50
minLength: 1
type: string
type:
enum:
- group_rule
type: string
type: object
CreateIamRoleRequest:
example:
permissions:
- okta.apps.assignment.manage
- okta.apps.assignment.manage
description: description
label: label
properties:
description:
description: Description of the role
type: string
label:
description: Unique label for the role
type: string
permissions:
description: "Array of permissions that the Role grants. See [Permissions](/openapi/okta-management/guides/roles/#permissions)."
items:
$ref: '#/components/schemas/RolePermissionType'
type: array
required:
- description
- label
- permissions
type: object
CreateRealmAssignmentRequest:
example:
name: name
conditions:
expression:
value: value
profileSourceId: profileSourceId
priority: 0
actions:
assignUserToRealm:
realmId: realmId
properties:
actions:
$ref: '#/components/schemas/Actions'
conditions:
$ref: '#/components/schemas/Conditions'
name:
type: string
priority:
type: integer
type: object
CreateRealmRequest:
example:
profile:
realmType: PARTNER
name: name
properties:
profile:
$ref: '#/components/schemas/RealmProfile'
type: object
CreateResourceSetRequest:
example:
description: description
resources:
- resources
- resources
label: label
properties:
description:
description: Description of the Resource Set
type: string
label:
description: Unique name for the Resource Set
type: string
resources:
description: "The endpoint (URL) that references all resource objects included\
\ in the Resource Set. Resources are identified by either an Okta Resource\
\ Name (ORN) or by a REST URL format. See [Okta Resource Name](/openapi/okta-management/guides/roles/#okta-resource-name-orn)."
items:
type: string
maximum: 1000
type: array
required:
- description
- label
- resources
type: object
CreateSessionRequest:
example:
sessionToken: sessionToken
properties:
sessionToken:
description: The session token obtained during authentication
type: string
type: object
CreateUISchema:
description: The request body properties for the new UI Schema
example:
uiSchema:
elements:
scope: scope
options:
format: text
label: label
type: type
label: Sign in
type: type
buttonLabel: Submit
properties:
uiSchema:
$ref: '#/components/schemas/UISchemaObject'
type: object
CreateUpdateIamRolePermissionRequest:
example:
conditions:
include:
key: "{}"
exclude:
key: "{}"
properties:
conditions:
$ref: '#/components/schemas/PermissionConditions'
type: object
CreateUserRequest:
example:
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
groupIds:
- groupIds
- groupIds
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
id: id
properties:
credentials:
$ref: '#/components/schemas/UserCredentials'
groupIds:
items:
type: string
type: array
profile:
$ref: '#/components/schemas/UserProfile'
realmId:
description: The
ID of the Realm in which the User is residing
example: guo1bfiNtSnZYILxO0g4
type: string
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
type:
$ref: '#/components/schemas/CreateUserRequest_type'
required:
- profile
type: object
CreateUserTypeRequest:
example:
displayName: displayName
name: name
description: description
properties:
name:
description: The updated human-readable name for the User Type
type: string
displayName:
description: The updated human-readable display name for the User Type
type: string
description:
description: The updated human-readable description of the User Type
type: string
type: object
Created:
description: Timestamp when the object was created
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
CredentialSyncInfo:
properties:
errorCode:
description: The error code for the type of error
readOnly: true
type: string
errorReason:
description: A short description of the error
readOnly: true
type: string
secretVersionId:
description: The version ID of the password secret from the OPA vault.
example: 9f8400-e29b-41d4-a716-926655440034
maxLength: 36
minLength: 1
type: string
syncState:
$ref: '#/components/schemas/CredentialSyncState'
syncTime:
description: Timestamp when the credential was changed
example: 2024-06-10T11:30:01Z
format: date-time
readOnly: true
type: string
type: object
CredentialSyncState:
description: Current credential sync status of the privileged resource
enum:
- NOT_SYNCED
- SYNCED
- SYNCING
- SYNC_FAILED
readOnly: true
type: string
x-enumDescriptions:
NOT_SYNCED: Credentials are not yet synced
SYNCING: Credentials are currently being synced
SYNCED: Credentials are successfully synced
SYNC_FAILED: Credential sync failed
Csr:
example:
kty: RSA
csr: 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
_links:
publish:
hints:
allow:
- POST
- POST
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
self:
hints:
allow:
- GET
- GET
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
created: 2017-03-28T01:11:10Z
id: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
properties:
created:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
csr:
example: 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
readOnly: true
type: string
id:
example: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
readOnly: true
type: string
kty:
example: RSA
readOnly: true
type: string
_links:
$ref: '#/components/schemas/CSRLinks'
type: object
CsrMetadata:
example:
subject:
commonName: SP Issuer
localityName: San Francisco
organizationName: "Okta, Inc."
organizationalUnitName: Dev
countryName: US
stateOrProvinceName: California
subjectAltNames:
dnsNames:
- dev.okta.com
- dev.okta.com
properties:
subject:
$ref: '#/components/schemas/CsrMetadataSubject'
subjectAltNames:
$ref: '#/components/schemas/CsrMetadataSubjectAltNames'
type: object
CsrMetadataSubject:
example:
commonName: SP Issuer
localityName: San Francisco
organizationName: "Okta, Inc."
organizationalUnitName: Dev
countryName: US
stateOrProvinceName: California
properties:
commonName:
description: Common name of the subject
example: SP Issuer
type: string
countryName:
description: Country name or code
example: US
type: string
localityName:
description: Locality (city) name
example: San Francisco
type: string
organizationalUnitName:
description: "Name of the smaller organization, for example, the department\
\ or the division"
example: Dev
type: string
organizationName:
description: Large organization name
example: "Okta, Inc."
type: string
stateOrProvinceName:
description: State or province name
example: California
type: string
type: object
CsrMetadataSubjectAltNames:
example:
dnsNames:
- dev.okta.com
- dev.okta.com
properties:
dnsNames:
description: DNS names of the subject
items:
example: dev.okta.com
type: string
type: array
type: object
CsrPublishHrefHints:
description: Describes allowed HTTP verbs for the `href`
example:
allow:
- POST
- POST
properties:
allow:
items:
enum:
- POST
type: string
type: array
type: object
CsrSelfHrefHints:
description: Describes allowed HTTP verbs for the `href`
example:
allow:
- GET
- GET
properties:
allow:
items:
enum:
- GET
- DELETE
type: string
type: array
type: object
CustomAppUserVerificationEnum:
description: User verification setting
enum:
- PREFERRED
- REQUIRED
type: string
CustomRole:
properties:
assignmentType:
$ref: '#/components/schemas/RoleAssignmentType'
created:
description: Timestamp when the object was created
format: date-time
readOnly: true
type: string
id:
description: Binding Object ID
readOnly: true
type: string
label:
description: Label for the custom role assignment
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
resource-set:
description: Resource Set ID
readOnly: true
type: string
role:
description: Custom Role ID
readOnly: true
type: string
status:
allOf:
- $ref: '#/components/schemas/LifecycleStatus'
- description: Status of the Custom Role Assignment
type:
description: CUSTOM for a custom role
enum:
- CUSTOM
type: string
_links:
$ref: '#/components/schemas/LinksCustomRoleResponse'
title: Custom Role Assignment
type: object
CustomRoleAssignmentSchema:
properties:
resource-set:
description: Resource Set ID
type: string
role:
description: Custom Role ID
type: string
type:
description: The type of role. Specify `CUSTOM` for a custom role.
enum:
- CUSTOM
type: string
title: Custom Role
type: object
CustomizablePage:
example:
pageContent: pageContent
properties:
pageContent:
description: The HTML for the page
type: string
type: object
DNSRecord:
description: DNS TXT and CNAME records to be registered for the Domain
example:
fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
properties:
expiration:
description: DNS TXT record expiration
type: string
fqdn:
description: DNS record name
example: _oktaverification.login.example.com
type: string
recordType:
$ref: '#/components/schemas/DNSRecordType'
values:
description: DNS record value
example:
- 79496f234c814638b1cc44f51a782781
items:
type: string
type: array
type: object
DNSRecordType:
enum:
- CNAME
- TXT
example: TXT
type: string
DRStatusItem:
description: Provides the status whether a domain has been failed over or not
properties:
domain:
description: domain
type: string
isFailedOver:
description: Indicates if the domain has been failed over
nullable: false
type: boolean
type: object
DTCChromeOS:
description: Google Chrome Device Trust Connector provider
properties:
allowScreenLock:
description: Indicates whether the AllowScreenLock enterprise policy is
enabled
type: boolean
browserVersion:
$ref: '#/components/schemas/ChromeBrowserVersion'
builtInDnsClientEnabled:
description: Indicates if a software stack is used to communicate with the
DNS server
type: boolean
chromeRemoteDesktopAppBlocked:
description: Indicates whether access to the Chrome Remote Desktop application
is blocked through a policy
type: boolean
deviceEnrollmentDomain:
description: Enrollment domain of the customer that is currently managing
the device
type: string
diskEncrypted:
description: Indicates whether the main disk is encrypted
type: boolean
keyTrustLevel:
$ref: '#/components/schemas/KeyTrustLevelOSMode'
managedDevice:
description: Indicates whether the device is enrolled in ChromeOS device
management
type: boolean
osFirewall:
description: Indicates whether a firewall is enabled at the OS-level on
the device
type: boolean
osVersion:
$ref: '#/components/schemas/OSVersionFourComponents'
passwordProtectionWarningTrigger:
$ref: '#/components/schemas/PasswordProtectionWarningTrigger'
realtimeUrlCheckMode:
description: Indicates whether enterprise-grade (custom) unsafe URL scanning
is enabled
type: boolean
safeBrowsingProtectionLevel:
$ref: '#/components/schemas/SafeBrowsingProtectionLevel'
screenLockSecured:
description: Indicates whether the device is password-protected
type: boolean
siteIsolationEnabled:
description: Indicates whether the Site Isolation (also known as **Site
Per Process**) setting is enabled
type: boolean
type: object
DTCMacOS:
description: Google Chrome Device Trust Connector provider
properties:
browserVersion:
$ref: '#/components/schemas/ChromeBrowserVersion'
builtInDnsClientEnabled:
description: Indicates if a software stack is used to communicate with the
DNS server
type: boolean
chromeRemoteDesktopAppBlocked:
description: Indicates whether access to the Chrome Remote Desktop application
is blocked through a policy
type: boolean
deviceEnrollmentDomain:
description: Enrollment domain of the customer that is currently managing
the device
type: string
diskEncrypted:
description: Indicates whether the main disk is encrypted
type: boolean
keyTrustLevel:
$ref: '#/components/schemas/KeyTrustLevelBrowserKey'
osFirewall:
description: Indicates whether a firewall is enabled at the OS-level on
the device
type: boolean
osVersion:
$ref: '#/components/schemas/OSVersionThreeComponents'
passwordProtectionWarningTrigger:
$ref: '#/components/schemas/PasswordProtectionWarningTrigger'
realtimeUrlCheckMode:
description: Indicates whether enterprise-grade (custom) unsafe URL scanning
is enabled
type: boolean
safeBrowsingProtectionLevel:
$ref: '#/components/schemas/SafeBrowsingProtectionLevel'
screenLockSecured:
description: Indicates whether the device is password-protected
type: boolean
siteIsolationEnabled:
description: Indicates whether the Site Isolation (also known as **Site
Per Process**) setting is enabled
type: boolean
type: object
DTCWindows:
description: Google Chrome Device Trust Connector provider
properties:
browserVersion:
$ref: '#/components/schemas/ChromeBrowserVersion'
builtInDnsClientEnabled:
description: Indicates if a software stack is used to communicate with the
DNS server
type: boolean
chromeRemoteDesktopAppBlocked:
description: Indicates whether access to the Chrome Remote Desktop application
is blocked through a policy
type: boolean
crowdStrikeAgentId:
description: Agent ID of an installed CrowdStrike agent
type: string
crowdStrikeCustomerId:
description: Customer ID of an installed CrowdStrike agent
type: string
deviceEnrollmentDomain:
description: Enrollment domain of the customer that is currently managing
the device
type: string
diskEncrypted:
description: Indicates whether the main disk is encrypted
type: boolean
keyTrustLevel:
$ref: '#/components/schemas/KeyTrustLevelBrowserKey'
osFirewall:
description: Indicates whether a firewall is enabled at the OS-level on
the device
type: boolean
osVersion:
$ref: '#/components/schemas/OSVersionFourComponents'
passwordProtectionWarningTrigger:
$ref: '#/components/schemas/PasswordProtectionWarningTrigger'
realtimeUrlCheckMode:
description: Indicates whether enterprise-grade (custom) unsafe URL scanning
is enabled
type: boolean
safeBrowsingProtectionLevel:
$ref: '#/components/schemas/SafeBrowsingProtectionLevel'
screenLockSecured:
description: Indicates whether the device is password-protected
type: boolean
secureBootEnabled:
description: Indicates whether the device's startup software has its Secure
Boot feature enabled
type: boolean
siteIsolationEnabled:
description: Indicates whether the Site Isolation (also known as **Site
Per Process**) setting is enabled
type: boolean
thirdPartyBlockingEnabled:
description: Indicates whether Chrome is blocking third-party software injection
type: boolean
windowsMachineDomain:
description: Windows domain that the current machine has joined
type: string
windowsUserDomain:
description: Windows domain for the current OS user
type: string
type: object
DateTime:
description: "An [ISO-8601](https://en.wikipedia.org/wiki/ISO_8601#Combined_date_and_time_representations)\
\ formatted date and time."
example: 2024-12-01T00:00:00Z
format: date-time
type: string
DefaultApp:
example:
appInstanceId: appInstanceId
appLinkName: appLinkName
classicApplicationUri: classicApplicationUri
properties:
appInstanceId:
description: ID for the App instance
type: string
appLinkName:
description: Name for the app instance
type: string
classicApplicationUri:
description: Application URI for classic Orgs
type: string
type: object
DesktopMFAEnforceNumberMatchingChallengeOrgSetting:
properties:
desktopMFAEnforceNumberMatchingChallengeEnabled:
default: false
description: Indicates whether or not the Desktop MFA Enforce Number Matching
Challenge push notifications feature is enabled
type: boolean
type: object
DesktopMFARecoveryPinOrgSetting:
example:
desktopMFARecoveryPinEnabled: false
properties:
desktopMFARecoveryPinEnabled:
default: false
description: Indicates whether or not the Desktop MFA Recovery PIN feature
is enabled
type: boolean
type: object
DetailedHookKeyInstance:
description: A key object with public key details
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
kty: kty
e: e
use: use
kid: kid
alg: alg
"n": "n"
created: 2000-01-23T04:56:07.000+00:00
name: name
keyId: keyId
id: id
isUsed: isUsed
properties:
created:
description: Timestamp when the key was created
format: date-time
nullable: true
readOnly: true
type: string
id:
description: The unique Okta ID of this key record
nullable: false
readOnly: true
type: string
isUsed:
description: Whether this key is currently in use by other applications
format: boolean
nullable: false
readOnly: true
type: string
keyId:
description: The alias of the public key
nullable: false
readOnly: true
type: string
lastUpdated:
description: Timestamp when the key was updated
format: date-time
nullable: true
readOnly: true
type: string
name:
description: Display name of the key
maxLength: 255
minLength: 1
nullable: false
readOnly: false
type: string
_embedded:
$ref: '#/components/schemas/_embedded'
title: DetailedHookKeyInstance
type: object
DetectedRiskEvents:
enum:
- ADMIN_REPORTED_USER_RISK
- BRUTE_FORCE_ATTACK
- ENTITY_CRITICAL_ACTION_FROM_HIGH_THREAT_IP
- OKTA_THREAT_INTELLIGENCE
- SECURITY_EVENTS_PROVIDER_REPORTED_RISK
- SESSION_INFLUENCED_USER_RISK
- SUSPICIOUS_APP_ACCESS
- USER_REPORTED_SUSPICIOUS_ACTIVITY
type: string
Device:
example:
resourceAlternateId: resourceAlternateId
lastUpdated: 2000-01-23T04:56:07.000+00:00
resourceDisplayName:
sensitive: true
value: value
resourceId: resourceId
_links:
suspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
unsuspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users: ""
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
meid: meid
serialNumber: serialNumber
displayName: displayName
registered: true
integrityJailbreak: true
platform: ANDROID
manufacturer: manufacturer
sid: sid
osVersion: osVersion
imei: imei
diskEncryptionType: ALL_INTERNAL_VOLUMES
model: model
udid: udid
secureHardwarePresent: true
tpmPublicKeyHash: tpmPublicKeyHash
id: id
resourceType: UDDevice
status: ACTIVE
properties:
created:
description: Timestamp when the device was created
format: date-time
readOnly: true
type: string
id:
description: Unique key for the device
readOnly: true
type: string
lastUpdated:
description: "Timestamp when the device record was last updated. Updates\
\ occur when Okta collects and saves device signals during authentication,\
\ and when the lifecycle state of the device changes."
format: date-time
readOnly: true
type: string
profile:
$ref: '#/components/schemas/DeviceProfile'
resourceAlternateId:
readOnly: true
type: string
resourceDisplayName:
$ref: '#/components/schemas/DeviceDisplayName'
resourceId:
description: Alternate key for the `id`
readOnly: true
type: string
resourceType:
default: UDDevice
readOnly: true
type: string
status:
$ref: '#/components/schemas/DeviceStatus'
_links:
$ref: '#/components/schemas/LinksSelfAndFullUsersLifecycle'
type: object
DeviceAccessPolicyRuleCondition:
description: Specifies the device condition
to match on
properties:
assurance:
$ref: '#/components/schemas/DevicePolicyRuleConditionAssurance'
managed:
description: Indicates if the device is managed. A device is considered
managed if it's part of a device management system.
type: boolean
registered:
description: |
Indicates if the device is registered. A device is registered if the User enrolls with Okta Verify that's installed on the device.
When the `managed` property is passed, you must also include the `registered` property and set it to `true`.
type: boolean
type: object
DeviceAssurance:
discriminator:
mapping:
WINDOWS: '#/components/schemas/DeviceAssuranceWindowsPlatform'
MACOS: '#/components/schemas/DeviceAssuranceMacOSPlatform'
CHROMEOS: '#/components/schemas/DeviceAssuranceChromeOSPlatform'
IOS: '#/components/schemas/DeviceAssuranceIOSPlatform'
ANDROID: '#/components/schemas/DeviceAssuranceAndroidPlatform'
propertyName: platform
example:
lastUpdatedBy: lastUpdatedBy
createdDate: createdDate
createdBy: createdBy
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
lastUpdate: lastUpdate
name: name
id: id
platform: ANDROID
properties:
createdBy:
readOnly: true
type: string
createdDate:
readOnly: true
type: string
id:
readOnly: true
type: string
lastUpdate:
readOnly: true
type: string
lastUpdatedBy:
readOnly: true
type: string
name:
description: Display name of the Device Assurance Policy
type: string
platform:
$ref: '#/components/schemas/Platform'
_links:
$ref: '#/components/schemas/LinksSelf'
title: DeviceAssurance
type: object
DeviceAssuranceAndroidPlatform:
allOf:
- $ref: '#/components/schemas/DeviceAssurance'
- properties:
diskEncryptionType:
$ref: '#/components/schemas/DeviceAssuranceAndroidPlatform_allOf_diskEncryptionType'
jailbreak:
type: boolean
osVersion:
$ref: '#/components/schemas/OSVersion'
screenLockType:
$ref: '#/components/schemas/DeviceAssuranceAndroidPlatform_allOf_screenLockType'
secureHardwarePresent:
type: boolean
type: object
DeviceAssuranceChromeOSPlatform:
allOf:
- $ref: '#/components/schemas/DeviceAssurance'
- properties:
thirdPartySignalProviders:
$ref: '#/components/schemas/DeviceAssuranceChromeOSPlatform_allOf_thirdPartySignalProviders'
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceIOSPlatform:
allOf:
- $ref: '#/components/schemas/DeviceAssurance'
- properties:
jailbreak:
type: boolean
osVersion:
$ref: '#/components/schemas/OSVersion'
screenLockType:
$ref: '#/components/schemas/DeviceAssuranceAndroidPlatform_allOf_screenLockType'
type: object
DeviceAssuranceMacOSPlatform:
allOf:
- $ref: '#/components/schemas/DeviceAssurance'
- properties:
diskEncryptionType:
$ref: '#/components/schemas/DeviceAssuranceMacOSPlatform_allOf_diskEncryptionType'
osVersion:
$ref: '#/components/schemas/OSVersion'
screenLockType:
$ref: '#/components/schemas/DeviceAssuranceAndroidPlatform_allOf_screenLockType'
secureHardwarePresent:
type: boolean
thirdPartySignalProviders:
$ref: '#/components/schemas/DeviceAssuranceMacOSPlatform_allOf_thirdPartySignalProviders'
type: object
DeviceAssuranceWindowsPlatform:
allOf:
- $ref: '#/components/schemas/DeviceAssurance'
- properties:
diskEncryptionType:
$ref: '#/components/schemas/DeviceAssuranceMacOSPlatform_allOf_diskEncryptionType'
osVersion:
$ref: '#/components/schemas/OSVersionFourComponents'
osVersionConstraints:
description: |
Specifies the Windows version requirements for the assurance policy. Each requirement must correspond to a different major version (Windows 11 or Windows 10). If a requirement isn't specified for a major version, then devices on that major version satisfy the condition.
There are two types of OS requirements:
* **Static**: A specific Windows version requirement that doesn't change until you update the policy. A static OS Windows requirement is specified with `majorVersionConstraint` and `minimum`.
* **Dynamic**: A Windows version requirement that is relative to the latest major release and security patch. A dynamic OS Windows requirement is specified with `majorVersionConstraint` and `dynamicVersionRequirement`.
> **Note:** Dynamic OS requirements are available only if the **Dynamic OS version compliance** [self-service EA](/openapi/okta-management/guides/release-lifecycle/#early-access-ea) feature is enabled. The `osVersionConstraints` property is only supported for the Windows platform. You can't specify both `osVersion.minimum` and `osVersionConstraints` properties at the same time.
items:
$ref: '#/components/schemas/OSVersionConstraint'
maxItems: 2
minItems: 1
type: array
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
screenLockType:
$ref: '#/components/schemas/DeviceAssuranceAndroidPlatform_allOf_screenLockType'
secureHardwarePresent:
type: boolean
thirdPartySignalProviders:
$ref: '#/components/schemas/DeviceAssuranceWindowsPlatform_allOf_thirdPartySignalProviders'
type: object
DeviceCheck:
properties:
createdBy:
description: User who created the Device Check
example: 00u217pyf72CdUrBt1c5
readOnly: true
type: string
createdDate:
description: Time the Device Check was created
example: 2019-10-02T18:03:07.000Z
readOnly: true
type: string
description:
description: Description of the Device Check
example: Query macOS devices to check if firewall is enabled
type: string
id:
description: The ID of the Device Check
example: dch3m8o4rWhwReDeM1c5
readOnly: true
type: string
lastUpdate:
description: Time the Device Check was updated
example: 2019-10-02T18:03:07.000Z
readOnly: true
type: string
lastUpdatedBy:
description: User who updated the Device Check
example: 00u217pyf72CdUrBt1c5
readOnly: true
type: string
name:
description: Display name of the Device Check
example: Device Check macOS
type: string
platform:
$ref: '#/components/schemas/DeviceChecksPlatform'
query:
description: OSQuery for the Device Check
example: SELECT CASE WHEN global_state = 0 THEN 0 ELSE 1 END AS firewall_enabled
FROM alf;
type: string
variableName:
description: Unique name of the Device Check
example: macOSFirewall
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
title: DeviceCheck
type: object
DeviceChecksPlatform:
enum:
- MACOS
- WINDOWS
type: string
DeviceDisplayName:
description: Display name of the device
example:
sensitive: true
value: value
properties:
sensitive:
type: boolean
value:
type: string
type: object
DeviceList:
allOf:
- $ref: '#/components/schemas/Device'
- properties:
_embedded:
$ref: '#/components/schemas/DeviceList_allOf__embedded'
example:
resourceAlternateId: resourceAlternateId
lastUpdated: 2000-01-23T04:56:07.000+00:00
resourceDisplayName:
sensitive: true
value: value
resourceId: resourceId
_links:
suspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
unsuspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users: ""
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
_embedded:
users:
- managementStatus: MANAGED
created: created
screenLockType: NONE
user:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
- managementStatus: MANAGED
created: created
screenLockType: NONE
user:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
created: 2000-01-23T04:56:07.000+00:00
profile:
meid: meid
serialNumber: serialNumber
displayName: displayName
registered: true
integrityJailbreak: true
platform: ANDROID
manufacturer: manufacturer
sid: sid
osVersion: osVersion
imei: imei
diskEncryptionType: ALL_INTERNAL_VOLUMES
model: model
udid: udid
secureHardwarePresent: true
tpmPublicKeyHash: tpmPublicKeyHash
id: id
resourceType: UDDevice
status: ACTIVE
DevicePlatform:
description: OS platform of the device
enum:
- ANDROID
- IOS
- MACOS
- WINDOWS
type: string
DevicePolicyMDMFramework:
enum:
- AFW
- NATIVE
- SAFE
type: string
DevicePolicyPlatformType:
enum:
- ANDROID
- IOS
- OSX
- WINDOWS
type: string
DevicePolicyRuleCondition:
properties:
migrated:
type: boolean
platform:
$ref: '#/components/schemas/DevicePolicyRuleConditionPlatform'
rooted:
type: boolean
trustLevel:
$ref: '#/components/schemas/DevicePolicyTrustLevel'
type: object
DevicePolicyRuleConditionAssurance:
properties:
include:
items:
type: string
type: array
type: object
DevicePolicyRuleConditionPlatform:
properties:
supportedMDMFrameworks:
items:
$ref: '#/components/schemas/DevicePolicyMDMFramework'
type: array
types:
items:
$ref: '#/components/schemas/DevicePolicyPlatformType'
type: array
type: object
DevicePolicyTrustLevel:
enum:
- ANY
- TRUSTED
type: string
DeviceProfile:
example:
meid: meid
serialNumber: serialNumber
displayName: displayName
registered: true
integrityJailbreak: true
platform: ANDROID
manufacturer: manufacturer
sid: sid
osVersion: osVersion
imei: imei
diskEncryptionType: ALL_INTERNAL_VOLUMES
model: model
udid: udid
secureHardwarePresent: true
tpmPublicKeyHash: tpmPublicKeyHash
properties:
diskEncryptionType:
$ref: '#/components/schemas/DiskEncryptionTypeDef'
displayName:
description: Display name of the device
maxLength: 255
minLength: 1
type: string
imei:
description: International Mobile Equipment Identity (IMEI) of the device
maxLength: 17
minLength: 14
type: string
integrityJailbreak:
description: Indicates if the device is jailbroken or rooted. Only applicable
to `IOS` and `ANDROID` platforms
type: boolean
manufacturer:
description: Name of the manufacturer of the device
maxLength: 127
type: string
meid:
description: Mobile equipment identifier of the device
maxLength: 14
type: string
model:
description: Model of the device
maxLength: 127
type: string
osVersion:
description: Version of the device OS
maxLength: 127
type: string
platform:
$ref: '#/components/schemas/DevicePlatform'
registered:
description: Indicates if the device is registered at Okta
type: boolean
secureHardwarePresent:
description: Indicates if the device contains a secure hardware functionality
type: boolean
serialNumber:
description: Serial number of the device
maxLength: 127
type: string
sid:
description: Windows Security identifier of the device
maxLength: 256
type: string
tpmPublicKeyHash:
description: Windows Trusted Platform Module hash value
type: string
udid:
description: macOS Unique Device identifier of the device
maxLength: 47
type: string
required:
- displayName
- platform
- registered
type: object
DeviceStatus:
description: The state object of the device
enum:
- ACTIVE
- DEACTIVATED
- SUSPENDED
- UNSUSPENDED
type: string
x-enumDescriptions:
ACTIVE: Use activated devices to create and delete Device user links
DEACTIVATED: Deactivation causes a Device to lose all device user links. Set
the Device status to DEACTIVATED before deleting it.
SUSPENDED: Use suspended devices to create and delete device user links. You
can only unsuspend or deactivate suspended devices.
UNSUSPENDED: Returns a suspended Device to ACTIVE.
DeviceUser:
example:
managementStatus: MANAGED
created: created
screenLockType: NONE
user:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
properties:
created:
description: Timestamp when device was created
type: string
managementStatus:
description: The management status of the device
enum:
- MANAGED
- NOT_MANAGED
type: string
x-enumDescriptions:
MANAGED: The device has management software installed
NOT_MANAGED: The device doesn't have management software installed
screenLockType:
description: Screen lock type of the device
enum:
- NONE
- PASSCODE
- BIOMETRIC
type: string
user:
$ref: '#/components/schemas/User'
type: object
DigestAlgorithm:
description: Algorithm used to generate the key. Only required for the PBKDF2
algorithm.
enum:
- SHA256_HMAC
- SHA512_HMAC
type: string
DiskEncryptionTypeAndroid:
enum:
- FULL
- USER
type: string
DiskEncryptionTypeDef:
description: |-
Type of encryption used on the device
> **Note:** The following values map to Disk Encryption ON: `FULL`, `USER`, `ALL_INTERNAL_VOLUMES`. All other values map to Disk Encryption OFF.
enum:
- ALL_INTERNAL_VOLUMES
- FULL
- NONE
- SYSTEM_VOLUME
- USER
type: string
x-enumDescriptions:
NONE: No encryption has been set.
FULL: Disk is fully encrypted. Only applicable to `IOS` and `ANDROID` platforms.
USER: Encryption key is tied to the user or profile. Only applicable to `ANDROID`
platform.
ALL_INTERNAL_VOLUMES: All internal disks are encrypted. Only applicable to
`WINDOWS` and `MACOS` platforms.
SYSTEM_VOLUME: Only the system volume is encrypted. Only applicable to `WINDOWS`
and `MACOS` platforms.
DiskEncryptionTypeDesktop:
enum:
- ALL_INTERNAL_VOLUMES
type: string
DomainCertificate:
description: Defines the properties of the certificate
example:
privateKey: '"-----BEGIN PRIVATE KEY-----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\nnUFLNE8pXSnsqb0eOL74f3uQ\n-----END
PRIVATE KEY-----"'
certificateChain: '"-----BEGIN CERTIFICATE-----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\nTgM=\n-----END
CERTIFICATE-----\n-----BEGIN CERTIFICATE-----\nMIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw\nTzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh\ncmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw\nWhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg\nRW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK\nAoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP\nR5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx\nsxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm\nNHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg\nZ3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG\n/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC\nAYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB\nAf8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA\nFHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw\nAoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw\nOi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB\ngt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W\nPTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl\nikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz\nCkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm\nlJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4\navAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2\nyJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O\nyK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids\nhCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+\nHlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv\nMldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX\nnLRbwHOoq7hHwg==\n-----END
CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nDfvp7OOGAN6dEOM4+qR9sdjoSYKEBpsr6GtPAQw4dy753ec5\n-----END
CERTIFICATE-----"'
certificate: "\"-----BEGIN CERTIFICATE-----\\nMIIFNzCCBB+gAwIBAgHTAAXomJWRama3ypu8TIxdA9wzMA0GCSqGSIb3DQEBCwUA\\\
nMDIzCzAJCgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD\\nEwJSMzAeFw0yMTAyMTAwNTEzMDVaFw0yMTA1MTEwNTEzMDVaMCQxIjAgBgNVBAMT\\\
nGWFuaXRhdGVzdC5zaWdtYW5ldGNvcnAudXMwggEiMA0GCSqGSIb3DQEBAQUAA4IB\\nDwAwggEKAoIBAQC5cyk6x63iBJSWvtgsOBqIxfO8euPHcRnyWsL9dsvnbNyOnyvc\\\
nqFWxdiW3sh2cItzYtoN1Zfgj5lWGOVXbHxP0VaNG9fHVX3+NHP6LFHQz92BzAYQm\\npqi9zaP/aKJklk6LdPFbVLGhuZfm34+ijW9YsgLTKR2WTaZJK5QtamVVmP+VsSCl\\\
na2ifFzjz2FCkMMEc/Y0zUyP+en/mbL71K+VnpZdlEC1s38EvjRTFKFZTKVw5wpWg\\nCZQq/AZYj9RxR23IIuRcUJ8TQ2pyoc3kIXPWjiIarSgBlA8G9kCsxgzXP2RyLwKr\\\
nIBIo+qyHweifpPYW28ipdSbPjiypAMdpbGLDAgMBAAGjggJTMIICTzAOBgNVHQ8B\\nAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB\\\
n/wQCMAAwHQYDVR0OBBYEFPVZKiovtIK4Av/IBUQeLUs29pT6MB8GA1UdIwQYMBaA\\nFBQusxe3WFbLrlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcw\\\
nAYYVaHR0cDovL3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMu\\naS5sZW5jci5vcmcvMCQGA1UdEQQdMBuCGWFuaXRhdGVzdC5zaWdtYW5ldGNvcnAu\\\
ndXMwTAYDVR0gBEUwQzAIBgZngQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEF\\nBQcCARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcwggEDBgorBgEEAdZ5AgQC\\\
nBIH0BIHxAO8AdgBc3EOS/uarRUSxXprUVuYQN/vV+kfcoXOUsl7m9scOygAAAXeK\\nkmOsAAAEAwBHMEUCIQDSudPEWXk969BT8yz3ag6BJWCMRU5tefEw9nXEQMsh5gIg\\\
nUmfGIuUlcNNI5PydVIHj+zns+SR8P7zfd3FIxW4gK0QAdQD2XJQv0XcwIhRUGAgw\\nlFaO400TGTO/3wwvIAvMTvFk4wAAAXeKkmOlAAAEAwBGMEQCIHQkr2qOGuInvonv\\\
nW4vvdI61nraax5V6SC3E0D2JSO91AiBVhpX4BBafRAh36r7l8LrxAfxBM3CjBmAC\\nq8fUrWfIWDANBgkqhkiG9w0BAQsFAAOCAQEAgGDMKXofKpDdv5kkID3s5GrKdzaj\\\
njFmb/6kyqd1E6eGXZAewCP1EF5BVvR6lBP2aRXiZ6sJVZktoIfztZnbxBGgbPHfv\\nR3iXIG6fxkklzR9Y8puPMBFadANE/QV78tIRAlyaqeSNsoxHi7ssQjHTP111B2lf\\\
n3KmuTpsruut1UesEJcPReLk/1xTkRx262wAncach5Wp+6GWWduTZYJbsNFyrK1RP\\nYQ0qYpP9wt2qR+DGaRUBG8i1XLnZS8pkyxtKhVw/a5Fowt+NqCpEBjjJiWJRSGnG\\\
nNSgRtSXq11j8O4JONi8EXe7cEtvzUiLR5PL3itsK2svtrZ9jIwQ95wOPaA==\\n-----END\
\ CERTIFICATE-----\","
type: PEM
properties:
certificate:
description: Certificate content
example: "\"-----BEGIN CERTIFICATE-----\\nMIIFNzCCBB+gAwIBAgHTAAXomJWRama3ypu8TIxdA9wzMA0GCSqGSIb3DQEBCwUA\\\
nMDIzCzAJCgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD\\nEwJSMzAeFw0yMTAyMTAwNTEzMDVaFw0yMTA1MTEwNTEzMDVaMCQxIjAgBgNVBAMT\\\
nGWFuaXRhdGVzdC5zaWdtYW5ldGNvcnAudXMwggEiMA0GCSqGSIb3DQEBAQUAA4IB\\nDwAwggEKAoIBAQC5cyk6x63iBJSWvtgsOBqIxfO8euPHcRnyWsL9dsvnbNyOnyvc\\\
nqFWxdiW3sh2cItzYtoN1Zfgj5lWGOVXbHxP0VaNG9fHVX3+NHP6LFHQz92BzAYQm\\npqi9zaP/aKJklk6LdPFbVLGhuZfm34+ijW9YsgLTKR2WTaZJK5QtamVVmP+VsSCl\\\
na2ifFzjz2FCkMMEc/Y0zUyP+en/mbL71K+VnpZdlEC1s38EvjRTFKFZTKVw5wpWg\\nCZQq/AZYj9RxR23IIuRcUJ8TQ2pyoc3kIXPWjiIarSgBlA8G9kCsxgzXP2RyLwKr\\\
nIBIo+qyHweifpPYW28ipdSbPjiypAMdpbGLDAgMBAAGjggJTMIICTzAOBgNVHQ8B\\nAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB\\\
n/wQCMAAwHQYDVR0OBBYEFPVZKiovtIK4Av/IBUQeLUs29pT6MB8GA1UdIwQYMBaA\\nFBQusxe3WFbLrlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcw\\\
nAYYVaHR0cDovL3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMu\\naS5sZW5jci5vcmcvMCQGA1UdEQQdMBuCGWFuaXRhdGVzdC5zaWdtYW5ldGNvcnAu\\\
ndXMwTAYDVR0gBEUwQzAIBgZngQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEF\\nBQcCARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcwggEDBgorBgEEAdZ5AgQC\\\
nBIH0BIHxAO8AdgBc3EOS/uarRUSxXprUVuYQN/vV+kfcoXOUsl7m9scOygAAAXeK\\nkmOsAAAEAwBHMEUCIQDSudPEWXk969BT8yz3ag6BJWCMRU5tefEw9nXEQMsh5gIg\\\
nUmfGIuUlcNNI5PydVIHj+zns+SR8P7zfd3FIxW4gK0QAdQD2XJQv0XcwIhRUGAgw\\nlFaO400TGTO/3wwvIAvMTvFk4wAAAXeKkmOlAAAEAwBGMEQCIHQkr2qOGuInvonv\\\
nW4vvdI61nraax5V6SC3E0D2JSO91AiBVhpX4BBafRAh36r7l8LrxAfxBM3CjBmAC\\nq8fUrWfIWDANBgkqhkiG9w0BAQsFAAOCAQEAgGDMKXofKpDdv5kkID3s5GrKdzaj\\\
njFmb/6kyqd1E6eGXZAewCP1EF5BVvR6lBP2aRXiZ6sJVZktoIfztZnbxBGgbPHfv\\nR3iXIG6fxkklzR9Y8puPMBFadANE/QV78tIRAlyaqeSNsoxHi7ssQjHTP111B2lf\\\
n3KmuTpsruut1UesEJcPReLk/1xTkRx262wAncach5Wp+6GWWduTZYJbsNFyrK1RP\\nYQ0qYpP9wt2qR+DGaRUBG8i1XLnZS8pkyxtKhVw/a5Fowt+NqCpEBjjJiWJRSGnG\\\
nNSgRtSXq11j8O4JONi8EXe7cEtvzUiLR5PL3itsK2svtrZ9jIwQ95wOPaA==\\n-----END\
\ CERTIFICATE-----\","
type: string
certificateChain:
description: Certificate chain
example: '"-----BEGIN CERTIFICATE-----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\nTgM=\n-----END
CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nnLRbwHOoq7hHwg==\n-----END
CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nDfvp7OOGAN6dEOM4+qR9sdjoSYKEBpsr6GtPAQw4dy753ec5\n-----END
CERTIFICATE-----"'
type: string
privateKey:
description: Certificate private key
example: '"-----BEGIN PRIVATE KEY-----\nMIIEvgIBADANBgkqhkiG9w0AAQEFAASCBKgwghSkAgEAAoIBAQC5cyk6y63iBJSW\nstgsOBqIxfO8euPHcRnyWsL9dsvnbNyOnyvcqFWxdiW3sh2cItzYtoN1Zfgj5lWG\nOVXbHxP0VaNG9fHVX3+NHP6LFHQz92BzAYQmpqi9zaP/aKJklk6LdPFbVLGhuZfm\n34+ijW9YsgLTKR2WTaZJK5QtamVVmP+VsSCla2ifFzjz2FCkMMEc/Y0zUyP+en/m\nbL71K+VnpZdlEC1s38EvjRTFKFZTKVw5wpWgCZQq/AZYj9RxR23IIuRcUJ8TQ2py\noc3kIXPWjiIarSgBlA8G9kCsxgzXP2RyLwKrIBIo+qyHweifpPYW28ipdSbPjiyp\nAMdpbGLDAgMBAAECggEAUXVfT91z6IqghhKwO8QtC5T/+fN06B8rCYSKj/FFoZL0\n0oTiLFuYwImoCadoUDQUE/Efj0rKE2LSgFHg/44IItQXE01m+5WmHmL1ADxsyoLH\nz9yDosKj7jNM7RyV8F8Bg0pL1hU+rU4rhhL/MaS0mx4eFYjC4UmcWBmXTdelSVJa\nkvXvQLT5y86bqh7tqMjM/kALTWRz5CgNJFk/ONA1yo5RTX9S7SIXimBgAvuGqP8i\nMPEhJou7U3DfzXVfvP8byqNdsZs6ZNhG3wXspl61mRyrY+51SOaNLA7Bkji7x4bH\nNw6mJI0IJTAP9oc1Z8fYeMuxT1bfuD7VOupSP0mAMQKBgQDk+KuyQkmPymeP/Wwu\nII4DUpleVzxTK9obMQQoCEEElbQ6+jTb+8ixP0bWLvBXg/rX734j7OWfn/bljWLH\nXLrSoqQZF1+XMVeY4g4wx9UuTK/D2n791zdOgQivxbIPdWL3a4ap86ar8uyMgJu8\nBLXfFBAOc+9myqUkbeO7wt0e6QKBgQDPV04jPtIJoMrggpQDNreGrANKOmsXWxj4\nOHW13QNdJ2KGQpoTdoqQ8ZmlxuA8Bf2RjHsnB2kgGVTVQR74zRib4MByhvsdhvVm\nF2LNsJoIDfqtv3c+oj13VonRUGuzUeJpwT/snyaL+jQ/ZZcYz0jDgDhIODTcFYj8\nDMSD5SHgywKBgHH6MwWuJ44TNBAiF2qyu959jGjAxf+k0ZI9iRMgYLUWjDvbdtqW\ncCWDGRDfFraJtSEuTz003GzkJPPJuIUC7OCTI1p2HxhU8ITi6itwHfdJJyk4J4TW\nT+qdIqTUpTk6tsPw23zYE3x+lS+viVZDhgEArKl1HpOthh0nMnixnH6ZAoGBAKGn\nV+xy1h9bldFk/TFkP8Jn6ki9MzGKfPVKT7vzDORcCJzU4Hu8OFy5gSmW3Mzvfrsz\n4/CR/oxgM5vwoc0pWr5thJ3GT5K93iYypX3o6q7M91zvonDa3UFl3x2qrc2pUfVS\nDhzWGJ+Z+5JSCnP1aK3EEh18dPoCcELTUYPj6X3xAoGBALAllTb3RCIaqIqk+s3Y\n6KDzikgwGM6j9lmOI2MH4XmCVym4Z40YGK5nxulDh2Ihn/n9zm13Z7ul2DJwgQSO\n0zBc7/CMOsMEBaNXuKL8Qj4enJXMtub4waQ/ywqHIdc50YaPI5Ax8dD/10h9M6Qc\nnUFLNE8pXSnsqb0eOL74f3uQ\n-----END
PRIVATE KEY-----"'
type: string
type:
$ref: '#/components/schemas/DomainCertificateType'
required:
- certificate
- certificateChain
- privateKey
- type
type: object
DomainCertificateMetadata:
description: Certificate metadata for the domain
example:
subject: CN=login.example.com
fingerprint: 73:68:82:7B:83:2E:48:29:A5:5E:E8:40:41:80:B3:AA:03:C4:42:43:05:73:45:BC:AA:47:00:23:A3:70:E5:C4
expiration: 2021-05-11T05:13:05.000Z
properties:
expiration:
description: Certificate expiration
example: 2021-05-11T05:13:05.000Z
type: string
fingerprint:
description: Certificate fingerprint
example: 73:68:82:7B:83:2E:48:29:A5:5E:E8:40:41:80:B3:AA:03:C4:42:43:05:73:45:BC:AA:47:00:23:A3:70:E5:C4
type: string
subject:
description: Certificate subject
example: CN=login.example.com
type: string
type: object
DomainCertificateSourceType:
description: Certificate source type that indicates whether the certificate
is provided by the user or Okta.
enum:
- MANUAL
- OKTA_MANAGED
type: string
DomainCertificateType:
description: Certificate type
enum:
- PEM
type: string
DomainLinks:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
brand:
$ref: '#/components/schemas/DomainLinks_allOf_brand'
certificate:
$ref: '#/components/schemas/DomainLinks_allOf_certificate'
verify:
$ref: '#/components/schemas/DomainLinks_allOf_verify'
type: object
example:
certificate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
brand:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
DomainListResponse:
description: Defines a list of domains with a subset of the properties for each
domain.
example:
domains:
- _links:
certificate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
brand:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
certificateSourceType: MANUAL
brandId: bndul904tTZ6kWVhP0g3
dnsRecords:
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
domain: login.example.com
publicCertificate:
subject: CN=login.example.com
fingerprint: 73:68:82:7B:83:2E:48:29:A5:5E:E8:40:41:80:B3:AA:03:C4:42:43:05:73:45:BC:AA:47:00:23:A3:70:E5:C4
expiration: 2021-05-11T05:13:05.000Z
id: OcDz6iRyjkaCTXkdo0g3
validationStatus: VERIFIED
- _links:
certificate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
brand:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
certificateSourceType: MANUAL
brandId: bndul904tTZ6kWVhP0g3
dnsRecords:
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
domain: login.example.com
publicCertificate:
subject: CN=login.example.com
fingerprint: 73:68:82:7B:83:2E:48:29:A5:5E:E8:40:41:80:B3:AA:03:C4:42:43:05:73:45:BC:AA:47:00:23:A3:70:E5:C4
expiration: 2021-05-11T05:13:05.000Z
id: OcDz6iRyjkaCTXkdo0g3
validationStatus: VERIFIED
properties:
domains:
description: Each element of the array defines an individual domain.
items:
$ref: '#/components/schemas/DomainResponse'
type: array
type: object
DomainRequest:
example:
certificateSourceType: MANUAL
domain: login.example.com
properties:
certificateSourceType:
$ref: '#/components/schemas/DomainCertificateSourceType'
domain:
description: Custom domain name
example: login.example.com
type: string
required:
- certificateSourceType
- domain
type: object
DomainResponse:
description: The properties that define an individual domain.
example:
_links:
certificate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
brand:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
certificateSourceType: MANUAL
brandId: bndul904tTZ6kWVhP0g3
dnsRecords:
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
- fqdn: _oktaverification.login.example.com
recordType: TXT
values:
- 79496f234c814638b1cc44f51a782781
expiration: expiration
domain: login.example.com
publicCertificate:
subject: CN=login.example.com
fingerprint: 73:68:82:7B:83:2E:48:29:A5:5E:E8:40:41:80:B3:AA:03:C4:42:43:05:73:45:BC:AA:47:00:23:A3:70:E5:C4
expiration: 2021-05-11T05:13:05.000Z
id: OcDz6iRyjkaCTXkdo0g3
validationStatus: VERIFIED
properties:
brandId:
description: The ID number of the brand
example: bndul904tTZ6kWVhP0g3
type: string
certificateSourceType:
$ref: '#/components/schemas/DomainCertificateSourceType'
dnsRecords:
items:
$ref: '#/components/schemas/DNSRecord'
type: array
domain:
description: Custom domain name
example: login.example.com
type: string
id:
description: Unique ID of the domain
example: OcDz6iRyjkaCTXkdo0g3
type: string
publicCertificate:
$ref: '#/components/schemas/DomainCertificateMetadata'
validationStatus:
$ref: '#/components/schemas/DomainValidationStatus'
_links:
$ref: '#/components/schemas/DomainLinks'
type: object
DomainValidationStatus:
description: Status of the domain
enum:
- COMPLETED
- IN_PROGRESS
- NOT_STARTED
- VERIFIED
example: VERIFIED
type: string
Duration:
properties:
number:
type: integer
unit:
type: string
type: object
DynamicNetworkZone:
allOf:
- $ref: '#/components/schemas/NetworkZone'
- title: Dynamic Network Zone
- properties:
asns:
$ref: '#/components/schemas/DynamicNetworkZone_allOf_asns'
proxyType:
description: The proxy type used for a Dynamic Network Zone
enum:
- "null"
- Any
- Tor
- NotTorAnonymizer
type: string
x-enumDescriptions:
"null": (Or `""`) No proxy used
Any: Use any proxy type for the Dynamic Zone.
Tor: Use Tor Anonymizer proxy for the Dynamic Zone.
NotTorAnonymizer: Use a non Tor Anonymizer proxy for the Dynamic Zone.
locations:
$ref: '#/components/schemas/DynamicNetworkZone_allOf_locations'
type: object
ECKeyJWK:
description: "Elliptic Curve Key in JWK format, currently used during enrollment\
\ to encrypt fulfillment requests to Yubico, or during activation to verify\
\ Yubico's JWS objects in fulfillment responses. The currently agreed protocol\
\ uses P-384."
example:
kty: EC
crv: P-384
use: enc
kid: kid
x: x
"y": "y"
properties:
crv:
enum:
- P-384
type: string
kid:
description: The unique identifier of the key
type: string
kty:
description: The type of public key
enum:
- EC
type: string
use:
description: The intended use for the key. The ECKeyJWK is always `enc`
because Okta uses it to encrypt requests to Yubico.
enum:
- enc
type: string
x:
description: The public x coordinate for the elliptic curve point
type: string
"y":
description: The public y coordinate for the elliptic curve point
type: string
required:
- crv
- kid
- kty
- use
- x
- "y"
type: object
EmailContent:
properties:
body:
description: "The HTML body of the email. May contain [variable references](https://velocity.apache.org/engine/1.7/user-guide.html#references).\
\ \n\n Not required if Custom\
\ languages for Okta Email Templates is enabled. A `null` body is replaced\
\ with a default value from one of the following in priority order:\n\n\
1. An existing default email customization, if one exists\n2. Okta-provided\
\ translated content for the specified language, if one exists\n3. Okta-provided\
\ translated content for the brand locale, if it's set \n4. Okta-provided\
\ content in English\n"
type: string
subject:
description: |
The email subject. May contain [variable references](https://velocity.apache.org/engine/1.7/user-guide.html#references).
Not required if Custom languages for Okta Email Templates is enabled. A `null` subject is replaced with a default value from one of the following in priority order:
1. An existing default email customization, if one exists
2. Okta-provided translated content for the specified language, if one exists
3. Okta-provided translated content for the brand locale, if it's set
4. Okta-provided content in English
type: string
required:
- body
- subject
type: object
EmailCustomization:
allOf:
- $ref: '#/components/schemas/EmailContent'
- properties:
created:
description: The UTC time at which this email customization was created.
format: date-time
readOnly: true
type: string
id:
description: A unique identifier for this email customization
readOnly: true
type: string
isDefault:
description: Whether this is the default customization for the email template.
Each customized email template must have exactly one default customization.
Defaults to `true` for the first customization and `false` thereafter.
type: boolean
language:
$ref: '#/components/schemas/Language'
lastUpdated:
description: The UTC time at which this email customization was last updated.
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/EmailCustomization_allOf__links'
required:
- language
type: object
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
isDefault: true
_links:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
preview:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
subject: subject
created: 2000-01-23T04:56:07.000+00:00
language: null
id: id
body: body
EmailDefaultContent:
allOf:
- $ref: '#/components/schemas/EmailContent'
- properties:
_links:
$ref: '#/components/schemas/EmailDefaultContent_allOf__links'
type: object
example:
_links: null
subject: subject
body: body
EmailDomain:
allOf:
- $ref: '#/components/schemas/BaseEmailDomain'
example:
brandId: brandId
domain: domain
validationSubdomain: mail
properties:
brandId:
type: string
domain:
type: string
validationSubdomain:
default: mail
description: Subdomain for the email sender's custom mail domain. Specify
your subdomain when you configure a custom mail domain.
type: string
required:
- brandId
- domain
type: object
EmailDomainDNSRecord:
example:
fqdn: fqdn
recordType: CNAME
verificationValue: verificationValue
properties:
fqdn:
type: string
recordType:
$ref: '#/components/schemas/EmailDomainDNSRecordType'
verificationValue:
type: string
type: object
EmailDomainDNSRecordType:
enum:
- CNAME
- TXT
type: string
EmailDomainResponse:
allOf:
- $ref: '#/components/schemas/BaseEmailDomain'
example:
dnsValidationRecords:
- fqdn: fqdn
recordType: CNAME
verificationValue: verificationValue
- fqdn: fqdn
recordType: CNAME
verificationValue: verificationValue
domain: domain
id: id
validationSubdomain: mail
validationStatus: DELETED
properties:
dnsValidationRecords:
items:
$ref: '#/components/schemas/EmailDomainDNSRecord'
type: array
domain:
type: string
id:
type: string
validationStatus:
$ref: '#/components/schemas/EmailDomainStatus'
validationSubdomain:
default: mail
description: The subdomain for the email sender's custom mail domain
type: string
type: object
EmailDomainResponseWithEmbedded:
allOf:
- $ref: '#/components/schemas/EmailDomainResponse'
example:
_embedded: "{}"
properties:
_embedded:
properties:
brands:
items:
$ref: '#/components/schemas/Brand'
type: array
readOnly: true
type: object
type: object
EmailDomainStatus:
enum:
- DELETED
- ERROR
- NOT_STARTED
- POLLING
- VERIFIED
type: string
EmailPreview:
example:
_links:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
contentSource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
defaultContent:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
subject: subject
body: body
properties:
body:
description: The email's HTML body
readOnly: true
type: string
subject:
description: The email's subject
readOnly: true
type: string
_links:
$ref: '#/components/schemas/EmailPreview__links'
type: object
EmailServerListResponse:
example:
email-servers:
- port: 587
host: 192.168.160.1
alias: CustomServer1
id: id
enabled: true
username: aUser
- port: 587
host: 192.168.160.1
alias: CustomServer1
id: id
enabled: true
username: aUser
properties:
email-servers:
items:
$ref: '#/components/schemas/EmailServerResponse'
type: array
type: object
EmailServerPost:
allOf:
- $ref: '#/components/schemas/EmailServerRequest'
- required:
- alias
- host
- password
- port
- username
example:
password: password
port: 587
host: 192.168.160.1
alias: CustomServer1
enabled: true
username: aUser
EmailServerRequest:
allOf:
- $ref: '#/components/schemas/BaseEmailServer'
- properties:
password:
description: Password used to access your SMTP server
type: string
example:
password: password
port: 587
host: 192.168.160.1
alias: CustomServer1
enabled: true
username: aUser
EmailServerResponse:
allOf:
- $ref: '#/components/schemas/BaseEmailServer'
- properties:
id:
description: ID of your SMTP server
type: string
example:
port: 587
host: 192.168.160.1
alias: CustomServer1
id: id
enabled: true
username: aUser
EmailSettings:
example:
recipients: ALL_USERS
properties:
recipients:
enum:
- ALL_USERS
- ADMINS_ONLY
- NO_USERS
type: string
required:
- recipients
type: object
EmailSettingsResponse:
example:
_links:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
recipients: ALL_USERS
properties:
recipients:
enum:
- ALL_USERS
- ADMINS_ONLY
- NO_USERS
type: string
_links:
$ref: '#/components/schemas/EmailSettingsResponse__links'
type: object
EmailTemplateResponse:
example:
_embedded:
customizationCount: 0
settings:
_links:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
recipients: ALL_USERS
_links:
settings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
defaultContent:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
customizations:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
properties:
name:
description: The name of this email template
readOnly: true
type: string
_embedded:
$ref: '#/components/schemas/EmailTemplateResponse__embedded'
_links:
$ref: '#/components/schemas/EmailTemplateResponse__links'
type: object
EmailTemplateTouchPointVariant:
default: OKTA_DEFAULT
description: |
Variant for email templates. You can publish a theme for email templates with different combinations of assets. Variants are preset combinations of those assets.
enum:
- FULL_THEME
- OKTA_DEFAULT
type: string
x-enumDescriptions:
FULL_THEME: Uses the Okta logo and Okta colors in email templates
OKTA_DEFAULT: Uses the logo from the Theme. Uses `primaryColorHex` as the
background color for buttons.
EmailTestAddresses:
example:
from: sender@host.com
to: receiver@host.com
properties:
from:
description: Email address that sends test emails
example: sender@host.com
type: string
to:
description: Email address that receives test emails
example: receiver@host.com
type: string
required:
- from
- to
type: object
EnabledStatus:
description: Setting status
enum:
- DISABLED
- ENABLED
type: string
EndUserDashboardTouchPointVariant:
default: OKTA_DEFAULT
description: |
Variant for the Okta End-User Dashboard. You can publish a theme for end-user dashboard with different combinations of assets. Variants are preset combinations of those assets.
enum:
- FULL_THEME
- LOGO_ON_FULL_WHITE_BACKGROUND
- OKTA_DEFAULT
- WHITE_LOGO_BACKGROUND
type: string
x-enumDescriptions:
FULL_THEME: Uses the logo and favicon from the Theme. Uses `primaryColorHex`
for the logo and the side navigation bar background color.
LOGO_ON_FULL_WHITE_BACKGROUND: Uses the logo and favicon from the Theme. Uses
white background color for the logo and the side navigation bar background
color.
OKTA_DEFAULT: Uses the Okta logo and favicon. Uses a white background color
for the logo and the side navigation bar background color.
WHITE_LOGO_BACKGROUND: "Uses the logo and favicon from the Theme, with a white\
\ background color for the logo. Uses `primaryColorHex` for the side navigation\
\ bar background color."
EndpointAuthMethod:
description: Requested authentication method for OAuth 2.0 endpoints.
enum:
- client_secret_basic
- client_secret_jwt
- client_secret_post
- none
- private_key_jwt
type: string
EnhancedDynamicNetworkZone:
allOf:
- $ref: '#/components/schemas/NetworkZone'
- title: Enhanced Dynamic Network Zone
- properties:
asns:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_asns'
locations:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_locations'
ipServiceCategories:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_ipServiceCategories'
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
EnrollmentActivationRequest:
description: Enrollment Initialization Request
example:
pinResponseJwe: pinResponseJwe
fulfillmentProvider: yubico
serial: serial
yubicoSigningJwks:
- kty: EC
crv: P-384
use: enc
kid: kid
x: x
"y": "y"
- kty: EC
crv: P-384
use: enc
kid: kid
x: x
"y": "y"
credResponses:
- credResponseJWE: credResponseJWE
authenticatorEnrollmentId: authenticatorEnrollmentId
- credResponseJWE: credResponseJWE
authenticatorEnrollmentId: authenticatorEnrollmentId
userId: userId
version: version
properties:
credResponses:
description: List of credential responses from the fulfillment provider
items:
$ref: '#/components/schemas/WebAuthnCredResponse'
type: array
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
pinResponseJwe:
description: Encrypted JWE of PIN response from the fulfillment provider
type: string
serial:
description: Serial number of the YubiKey
type: string
userId:
description: ID of an existing Okta user
type: string
version:
description: Firmware version of the YubiKey
type: string
yubicoSigningJwks:
description: List of usable signing keys from Yubico (in JWKS format) used
to verify the JWS inside the JWE
items:
$ref: '#/components/schemas/ECKeyJWK'
type: array
type: object
EnrollmentActivationResponse:
description: Enrollment Initialization Response
example:
fulfillmentProvider: yubico
authenticatorEnrollmentIds:
- authenticatorEnrollmentIds
- authenticatorEnrollmentIds
userId: userId
properties:
authenticatorEnrollmentIds:
description: List of IDs for preregistered WebAuthn Factors in Okta
items:
type: string
type: array
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
userId:
description: ID of an existing Okta user
type: string
type: object
EnrollmentInitializationRequest:
description: Enrollment Initialization Request
example:
enrollmentRpIds:
- enrollmentRpIds
- enrollmentRpIds
fulfillmentProvider: yubico
yubicoTransportKeyJWK:
kty: EC
crv: P-384
use: enc
kid: kid
x: x
"y": "y"
userId: userId
properties:
enrollmentRpIds:
description: List of Relying Party hostnames to register on the YubiKey.
items:
type: string
type: array
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
userId:
description: ID of an existing Okta user
type: string
yubicoTransportKeyJWK:
$ref: '#/components/schemas/ECKeyJWK'
type: object
EnrollmentInitializationResponse:
description: "Yubico Transport Key in the form of a JWK, used to encrypt our\
\ fulfillment request to Yubico. The currently agreed protocol uses P-384."
example:
pinRequestJwe: pinRequestJwe
fulfillmentProvider: yubico
credRequests:
- credRequestJwe: credRequestJwe
keyId: keyId
authenticatorEnrollmentId: authenticatorEnrollmentId
- credRequestJwe: credRequestJwe
keyId: keyId
authenticatorEnrollmentId: authenticatorEnrollmentId
userId: userId
properties:
credRequests:
description: List of credential requests for the fulfillment provider
items:
$ref: '#/components/schemas/WebAuthnCredRequest'
type: array
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
pinRequestJwe:
description: Encrypted JWE of PIN request for the fulfillment provider
type: string
userId:
description: ID of an existing Okta user
type: string
type: object
EntitlementValue:
properties:
id:
type: string
name:
type: string
value:
type: string
_links:
$ref: '#/components/schemas/EntitlementValue__links'
type: object
EntitlementValuesResponse:
properties:
entitlementValues:
items:
$ref: '#/components/schemas/EntitlementValue'
type: array
_links:
$ref: '#/components/schemas/EntitlementValuesResponse__links'
type: object
EntityRiskPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- type: object
properties:
conditions:
description: Policy conditions aren't supported for this policy type.
nullable: true
type: string
EntityRiskPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/EntityRiskPolicyRule_allOf_actions'
conditions:
$ref: '#/components/schemas/EntityRiskPolicyRuleConditions'
type: object
EntityRiskPolicyRuleActionRunWorkflow:
properties:
action:
enum:
- RUN_WORKFLOW
type: string
workflow:
$ref: '#/components/schemas/EntityRiskPolicyRuleActionRunWorkflow_workflow'
type: object
EntityRiskPolicyRuleActionTerminateAllSessions:
properties:
action:
description: This action revokes or terminates all of the user's active
sessions.
enum:
- TERMINATE_ALL_SESSIONS
type: string
type: object
EntityRiskPolicyRuleActionsObject:
discriminator:
mapping:
RUN_WORKFLOW: '#/components/schemas/EntityRiskPolicyRuleActionRunWorkflow'
TERMINATE_ALL_SESSIONS: '#/components/schemas/EntityRiskPolicyRuleActionTerminateAllSessions'
propertyName: action
properties:
action:
enum:
- RUN_WORKFLOW
- TERMINATE_ALL_SESSIONS
type: string
type: object
EntityRiskPolicyRuleConditions:
allOf:
- properties:
entityRisk:
$ref: '#/components/schemas/EntityRiskScorePolicyRuleCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
riskDetectionTypes:
$ref: '#/components/schemas/RiskDetectionTypesPolicyRuleCondition'
type: object
EntityRiskScorePolicyRuleCondition:
description: The risk score level of
the entity risk policy rule
properties:
level:
enum:
- ANY
- LOW
- MEDIUM
- HIGH
type: string
required:
- level
type: object
Error:
example:
errorCauses:
- errorSummary: errorSummary
- errorSummary: errorSummary
errorLink: errorLink
errorCode: errorCode
errorId: errorId
errorSummary: errorSummary
properties:
errorCauses:
items:
$ref: '#/components/schemas/ErrorCause'
type: array
errorCode:
description: An Okta code for this type of error
type: string
errorId:
description: A unique identifier for this error. This can be used by Okta
Support to help with troubleshooting.
type: string
errorLink:
description: An Okta code for this type of error
type: string
errorSummary:
description: A short description of what caused this error. Sometimes this
contains dynamically-generated information about your specific error.
type: string
title: Error
type: object
ErrorCause:
example:
errorSummary: errorSummary
properties:
errorSummary:
type: string
type: object
ErrorPage:
allOf:
- $ref: '#/components/schemas/CustomizablePage'
- properties:
contentSecurityPolicySetting:
$ref: '#/components/schemas/ContentSecurityPolicySetting'
type: object
example:
contentSecurityPolicySetting:
mode: enforced
reportUri: reportUri
srcList:
- srcList
- srcList
pageContent: pageContent
ErrorPageTouchPointVariant:
default: OKTA_DEFAULT
description: |
Variant for the error page. You can publish a theme for error page with different combinations of assets. Variants are preset combinations of those assets.
enum:
- BACKGROUND_IMAGE
- BACKGROUND_SECONDARY_COLOR
- OKTA_DEFAULT
type: string
x-enumDescriptions:
BACKGROUND_IMAGE: "Uses the logo, favicon, and background image from the Theme"
BACKGROUND_SECONDARY_COLOR: Uses the logo and favicon from the Theme. Uses
`secondaryColorHex` as the background color for the error page.
OKTA_DEFAULT: "Uses the Okta logo, favicon, and background color"
ErrorResponse:
properties:
errorCause:
description: The reason or cause for the error in the org domain for the
dr operation
nullable: true
type: string
errorCode:
description: An error code unique to the error
type: string
errorId:
description: The unique identifier of this error
nullable: true
type: string
errorLink:
description: An indicator where to look out to troubleshoot the error
nullable: true
type: string
errorSummary:
description: "An error code description, detailing the error"
type: string
required:
- errorCode
- errorSummary
type: object
EventHook:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
createdBy: createdBy
verificationStatus: UNVERIFIED
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
channel:
type: HTTP
config:
headers:
- value: value
key: key
- value: value
key: key
method: method
authScheme:
type: HEADER
value: value
key: key
uri: uri
version: version
name: name
description: description
id: id
events:
filter:
eventFilterMap:
- condition:
expression: expression
version: version
event: event
- condition:
expression: expression
version: version
event: event
type: type
type: EVENT_TYPE
items:
- items
- items
status: ACTIVE
properties:
channel:
$ref: '#/components/schemas/EventHookChannel'
created:
description: Timestamp of the event hook creation
format: date-time
readOnly: true
type: string
createdBy:
description: The ID of the user who created the event hook
readOnly: true
type: string
description:
description: Description of the event hook
nullable: true
type: string
events:
$ref: '#/components/schemas/EventSubscriptions'
id:
description: Unique key for the event hook
readOnly: true
type: string
lastUpdated:
description: Date of the last event hook update
format: date-time
readOnly: true
type: string
name:
description: Display name for the event hook
type: string
status:
description: Status of the event hook
enum:
- ACTIVE
- INACTIVE
readOnly: true
type: string
verificationStatus:
$ref: '#/components/schemas/EventHookVerificationStatus'
_links:
$ref: '#/components/schemas/EventHook__links'
required:
- channel
- events
- name
type: object
EventHookChannel:
example:
type: HTTP
config:
headers:
- value: value
key: key
- value: value
key: key
method: method
authScheme:
type: HEADER
value: value
key: key
uri: uri
version: version
properties:
config:
$ref: '#/components/schemas/EventHookChannelConfig'
type:
$ref: '#/components/schemas/EventHookChannelType'
version:
description: Version of the channel. Currently the only supported version
is `1.0.0``.
type: string
required:
- config
- type
- version
type: object
EventHookChannelConfig:
example:
headers:
- value: value
key: key
- value: value
key: key
method: method
authScheme:
type: HEADER
value: value
key: key
uri: uri
properties:
authScheme:
$ref: '#/components/schemas/EventHookChannelConfigAuthScheme'
headers:
description: |-
Optional list of key/value pairs for headers that can be sent with the request to the external service. For example,
`X-Other-Header` is an example of an optional header, with a value of `my-header-value`, that you want Okta to pass to your
external service.
items:
$ref: '#/components/schemas/EventHookChannelConfigHeader'
type: array
method:
description: The method of the Okta event hook request
readOnly: true
type: string
uri:
description: The external service endpoint called to execute the event hook
handler
type: string
required:
- uri
type: object
EventHookChannelConfigAuthScheme:
description: |-
The authentication scheme used for this request.
To use Basic Auth for authentication, set `type` to `HEADER`,
`key` to `Authorization`, and `value` to the Base64-encoded string of "username:password". Ensure that you include
the scheme (including space) as part of the `value` parameter. For example, `Basic YWRtaW46c3VwZXJzZWNyZXQ=`.
example:
type: HEADER
value: value
key: key
properties:
key:
description: The name for the authorization header
type: string
type:
$ref: '#/components/schemas/EventHookChannelConfigAuthSchemeType'
value:
description: |-
The header value. This secret key is passed to your external service endpoint for security verification.
This property is not returned in the response.
type: string
writeOnly: true
type: object
EventHookChannelConfigAuthSchemeType:
description: The authentication scheme type. Currently only supports `HEADER`.
enum:
- HEADER
type: string
EventHookChannelConfigHeader:
example:
value: value
key: key
nullable: true
properties:
key:
description: The optional field or header name
type: string
value:
description: The value for the key
type: string
type: object
EventHookChannelType:
description: The channel type. Currently supports `HTTP`.
enum:
- HTTP
type: string
EventHookFilterMap:
description: The object that maps the filter to the event type
items:
$ref: '#/components/schemas/EventHookFilterMapObject'
type: array
EventHookFilterMapObject:
example:
condition:
expression: expression
version: version
event: event
properties:
condition:
$ref: '#/components/schemas/EventHookFilterMapObjectCondition'
event:
description: The filtered event type
type: string
type: object
EventHookFilterMapObjectCondition:
example:
expression: expression
version: version
properties:
expression:
description: The Okta Expression language statement that filters the event
type
type: string
version:
description: Internal field
nullable: true
readOnly: true
type: string
type: object
EventHookFilters:
description: |-
The optional filter defined on a specific event type
> **Note:** Event hook filters is a [self-service Early Access (EA)](/openapi/okta-management/guides/release-lifecycle/#early-access-ea) to enable.
If you want to disable this feature, it's recommended to first remove all event filters.
example:
eventFilterMap:
- condition:
expression: expression
version: version
event: event
- condition:
expression: expression
version: version
event: event
type: type
nullable: true
properties:
eventFilterMap:
description: The object that maps the filter to the event type
items:
$ref: '#/components/schemas/EventHookFilterMapObject'
type: array
type:
description: The type of filter. Currently only supports `EXPRESSION_LANGUAGE`
readOnly: true
type: string
type: object
EventHookSubscribedEventTypes:
description: |-
The subscribed event types that trigger the event hook. When you register an event hook
you need to specify which events you want to subscribe to. To see the list of event types
currently eligible for use in event hooks, use the [Event Types catalog](https://developer.okta.com/docs/reference/api/event-types/#catalog)
and search with the parameter `event-hook-eligible`.
items:
type: string
type: array
EventHookVerificationStatus:
description: Verification status of the event hook. `UNVERIFIED` event hooks
won't receive any events.
enum:
- UNVERIFIED
- VERIFIED
readOnly: true
type: string
EventSubscriptionType:
description: The events object type. Currently supports `EVENT_TYPE`.
enum:
- EVENT_TYPE
type: string
EventSubscriptions:
example:
filter:
eventFilterMap:
- condition:
expression: expression
version: version
event: event
- condition:
expression: expression
version: version
event: event
type: type
type: EVENT_TYPE
items:
- items
- items
properties:
filter:
$ref: '#/components/schemas/EventHookFilters'
items:
description: |-
The subscribed event types that trigger the event hook. When you register an event hook
you need to specify which events you want to subscribe to. To see the list of event types
currently eligible for use in event hooks, use the [Event Types catalog](https://developer.okta.com/docs/reference/api/event-types/#catalog)
and search with the parameter `event-hook-eligible`.
items:
type: string
type: array
type:
$ref: '#/components/schemas/EventSubscriptionType'
required:
- items
- type
type: object
ExpiresAt:
description: Timestamp when the object expires
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
Expression:
example:
value: value
properties:
value:
type: string
type: object
FCMConfiguration:
properties:
fileName:
description: (Optional) File name for Admin Console display
type: string
projectId:
description: Project ID of FCM configuration
readOnly: true
type: string
serviceAccountJson:
description: "JSON containing the private service account key and service\
\ account details. See [Creating and managing service account keys](https://cloud.google.com/iam/docs/creating-managing-service-account-keys)\
\ for more information on creating service account keys in JSON."
type: object
writeOnly: true
FCMPushProvider:
allOf:
- $ref: '#/components/schemas/PushProvider'
- properties:
configuration:
$ref: '#/components/schemas/FCMConfiguration'
type: object
FailbackRequestSchema:
description: List of domains to failback
items:
description: Okta or custom domain to failback
example: yourOktaDomain.okta.com
type: string
type: array
FailbackResponseSchema:
description: successful failback message
type: string
FailoverRequestSchema:
description: List of domains to failover
items:
description: Okta or custom domain to failover
example: yourOktaDomain.okta.com
type: string
type: array
FailoverResponseSchema:
description: successful failover message
type: string
Feature:
description: Specifies feature release cycle information
example:
stage:
state: CLOSED
value: BETA
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
dependents:
href: href
dependencies:
href: href
name: name
description: description
id: id
type: self-service
status: DISABLED
properties:
description:
description: Brief description of the feature and what it provides
type: string
id:
description: Unique identifier for this feature
readOnly: true
type: string
name:
description: Name of the feature
type: string
stage:
$ref: '#/components/schemas/FeatureStage'
status:
$ref: '#/components/schemas/EnabledStatus'
type:
$ref: '#/components/schemas/FeatureType'
_links:
$ref: '#/components/schemas/Feature__links'
type: object
FeatureLifecycle:
enum:
- DISABLE
- ENABLE
example: ENABLE
type: string
FeatureStage:
description: |-
Current release cycle stage of a feature
If a feature's stage value is `EA`, the state is `null` and not returned. If the value is `BETA`, the state is `OPEN` or `CLOSED` depending on whether the `BETA` feature is manageable.
> **Note:** If a feature's stage is `OPEN BETA`, you can update it only in Preview cells. If a feature's stage is `CLOSED BETA`, you can disable it only in Preview cells.
example:
state: CLOSED
value: BETA
properties:
state:
$ref: '#/components/schemas/FeatureStageState'
value:
$ref: '#/components/schemas/FeatureStageValue'
type: object
FeatureStageState:
description: Indicates the release state of the feature
enum:
- CLOSED
- OPEN
type: string
FeatureStageValue:
description: Current release stage of the feature
enum:
- BETA
- EA
type: string
FeatureType:
description: Type of feature
enum:
- self-service
type: string
FipsEnum:
enum:
- OPTIONAL
- REQUIRED
type: string
ForgotPasswordResponse:
example:
resetPasswordUrl: resetPasswordUrl
properties:
resetPasswordUrl:
readOnly: true
type: string
type: object
FulfillmentData:
description: Fulfillment provider details
example:
customizationId: customizationId
productId: productId
inventoryProductId: inventoryProductId
properties:
customizationId:
description: ID for the set of custom configurations of the requested Factor
type: string
inventoryProductId:
description: ID for the specific inventory bucket of the requested Factor
type: string
productId:
description: ID for the make and model of the requested Factor
type: string
type: object
FulfillmentRequest:
description: Fulfillment Request
example:
fulfillmentData:
customizationId: customizationId
productId: productId
inventoryProductId: inventoryProductId
fulfillmentProvider: yubico
userId: userId
properties:
fulfillmentData:
$ref: '#/components/schemas/FulfillmentData'
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
userId:
description: ID of an existing Okta user
type: string
type: object
GoogleApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- google
example: google
type: string
signOnMode:
enum:
- BROWSER_PLUGIN
- SAML_2_0
example: BROWSER_PLUGIN
type: string
settings:
$ref: '#/components/schemas/GoogleApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Google Workspace app (key name: `google`)
To create a Google Workspace app, use the [Create an Application](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Google Workspace app only supports `BROWSER_PLUGIN` and `SAML_2_0` sign-on modes.
example:
name: google
label: Sample Google App
signOnMode: SAML_2_0
settings:
app:
domain: my-company-domain
title: Google Workspace
x-tags:
- Application
x-okta-defined-as:
name: google
GoogleApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/GoogleApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
GoogleApplicationSettingsApplication:
description: Google app instance properties
properties:
domain:
description: Your Google company domain
type: string
rpId:
description: RPID
type: string
required:
- domain
type: object
GovernanceBundle:
properties:
description:
type: string
id:
type: string
name:
type: string
orn:
type: string
status:
type: string
_links:
$ref: '#/components/schemas/GovernanceBundle__links'
type: object
GovernanceBundleCreateRequest:
properties:
description:
type: string
entitlements:
items:
$ref: '#/components/schemas/IAMBundleEntitlement'
type: array
name:
type: string
type: object
GovernanceBundleUpdateRequest:
properties:
description:
type: string
entitlements:
items:
$ref: '#/components/schemas/IAMBundleEntitlement'
type: array
name:
type: string
type: object
GovernanceBundlesResponse:
properties:
bundles:
items:
$ref: '#/components/schemas/GovernanceBundle'
type: array
_links:
$ref: '#/components/schemas/GovernanceBundlesResponse__links'
type: object
GovernanceSourceType:
description: The grant type
enum:
- CUSTOM
- ENTITLEMENT-BUNDLE
type: string
GrantOrTokenStatus:
description: Status
enum:
- ACTIVE
- REVOKED
example: ACTIVE
readOnly: true
type: string
GrantResourcesHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/grants"
type: string
type: object
GrantType:
description: Determines the mechanism Okta uses to authorize the creation of
the tokens.
enum:
- authorization_code
- client_credentials
- implicit
- interaction_code
- password
- refresh_token
- urn:ietf:params:oauth:grant-type:device_code
- urn:ietf:params:oauth:grant-type:jwt-bearer
- urn:ietf:params:oauth:grant-type:saml2-bearer
- urn:ietf:params:oauth:grant-type:token-exchange
- urn:openid:params:grant-type:ciba
- urn:okta:params:oauth:grant-type:otp
- urn:okta:params:oauth:grant-type:oob
- http://auth0.com/oauth/grant-type/mfa-otp
- http://auth0.com/oauth/grant-type/mfa-oob
type: string
GrantTypePolicyRuleCondition:
description: Array of grant types that this condition includes. Determines the
mechanism that Okta uses to authorize the creation of the tokens.
example:
include:
- include
- include
properties:
include:
description: Array of grant types that this condition includes.
items:
type: string
type: array
type: object
Group:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
properties:
created:
description: Timestamp when the Group was created
format: date-time
readOnly: true
type: string
id:
description: Unique ID for the Group
example: 0gabcd1234
readOnly: true
type: string
lastMembershipUpdated:
description: Timestamp when the Groups memberships were last updated
format: date-time
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Group's Profile was last updated
format: date-time
readOnly: true
type: string
objectClass:
description: Determines the Group's `profile`
items:
type: string
readOnly: true
type: array
profile:
$ref: '#/components/schemas/GroupProfile'
type:
$ref: '#/components/schemas/GroupType'
_embedded:
additionalProperties:
properties: {}
type: object
description: Embedded resources related to the Group
readOnly: true
type: object
_links:
$ref: '#/components/schemas/Group__links'
type: object
GroupAssignmentProfile:
additionalProperties: true
description: "Specifies the profile properties applied to [Application Users](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/ApplicationUsers/)\
\ that are assigned to the app through group membership. \nSome reference\
\ properties are imported from the target app and can't be configured. See\
\ [profile](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response)."
type: object
GroupCondition:
description: Specifies a set of Groups whose Users are to be included or excluded
properties:
exclude:
description: Groups to be excluded
items:
type: string
type: array
include:
description: Groups to be included
items:
type: string
type: array
required:
- exclude
- include
type: object
GroupOwner:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
originType: APPLICATION
originId: originId
displayName: displayName
id: id
type: GROUP
resolved: true
properties:
displayName:
description: The display name of the group owner
readOnly: true
type: string
id:
description: The `id` of the group owner
type: string
lastUpdated:
description: Timestamp when the group owner was last updated
format: date-time
readOnly: true
type: string
originId:
description: The ID of the app instance if the `originType` is `APPLICATION`.
This value is `NULL` if `originType` is `OKTA_DIRECTORY`.
type: string
originType:
$ref: '#/components/schemas/GroupOwnerOriginType'
resolved:
description: "If `originType`is APPLICATION, this parameter is set to `FALSE`\
\ until the owner’s `originId` is reconciled with an associated Okta ID."
type: boolean
type:
$ref: '#/components/schemas/GroupOwnerType'
type: object
GroupOwnerOriginType:
description: The source where group ownership is managed
enum:
- APPLICATION
- OKTA_DIRECTORY
type: string
GroupOwnerType:
description: The entity type of the owner
enum:
- GROUP
- USER
type: string
GroupPolicyRuleCondition:
description: Specifies a set of Groups whose Users are to be included or excluded
properties:
exclude:
description: Groups to be excluded
items:
type: string
type: array
include:
description: Groups to be included
items:
type: string
type: array
type: object
GroupProfile:
anyOf:
- $ref: '#/components/schemas/OktaUserGroupProfile'
- $ref: '#/components/schemas/OktaActiveDirectoryGroupProfile'
description: |-
Specifies required and optional properties for a Group. The `objectClass` of a Group determines which additional properties are available.
You can extend Group Profiles with custom properties, but you must first add the properties to the Group Profile schema before you can reference them. Use the Profile Editor in the Admin Console or the [Schemas API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/)to manage schema extensions.
Custom properties can contain HTML tags. It is the client's responsibility to escape or encode this data before displaying it. Use [best-practices](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html) to prevent cross-site scripting.
GroupRule:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
conditions:
expression:
type: type
value: user.role==\"Engineer\"
people:
groups:
exclude:
- exclude
- exclude
users:
exclude:
- exclude
- exclude
type: type
actions:
assignUserToGroups:
groupIds:
- groupIds
- groupIds
status: ACTIVE
properties:
actions:
$ref: '#/components/schemas/GroupRuleAction'
conditions:
$ref: '#/components/schemas/GroupRuleConditions'
created:
description: Creation date for group rule
format: date-time
readOnly: true
type: string
id:
description: ID of the group rule
readOnly: true
type: string
lastUpdated:
description: Date group rule was last updated
format: date-time
readOnly: true
type: string
name:
description: Name of the Group rule
maxLength: 50
minLength: 1
type: string
status:
$ref: '#/components/schemas/GroupRuleStatus'
type:
description: Type to indicate a Group rule operation. Only `group_rule`
is allowed.
type: string
type: object
GroupRuleAction:
description: Defines which users and groups to assign
example:
assignUserToGroups:
groupIds:
- groupIds
- groupIds
properties:
assignUserToGroups:
$ref: '#/components/schemas/GroupRuleGroupAssignment'
type: object
GroupRuleConditions:
description: Defines group rule conditions
example:
expression:
type: type
value: user.role==\"Engineer\"
people:
groups:
exclude:
- exclude
- exclude
users:
exclude:
- exclude
- exclude
properties:
expression:
$ref: '#/components/schemas/GroupRuleExpression'
people:
$ref: '#/components/schemas/GroupRulePeopleCondition'
type: object
GroupRuleExpression:
description: "Defines Okta specific [group-rules expression](https://developer.okta.com/docs/reference/okta-expression-language/#expressions-in-group-rules)"
example:
type: type
value: user.role==\"Engineer\"
properties:
type:
description: Expression type. Only valid value is '`urn:okta:expression:1.0`'.
type: string
value:
description: Okta expression that would result in a Boolean value
example: user.role==\"Engineer\"
type: string
type: object
GroupRuleGroupAssignment:
description: Contains the `groupIds` array
example:
groupIds:
- groupIds
- groupIds
properties:
groupIds:
description: Array of `groupIds` to which Users are added
items:
type: string
type: array
type: object
GroupRuleGroupCondition:
description: Currently not supported
example:
exclude:
- exclude
- exclude
properties:
exclude:
description: Currently not supported
items:
type: string
type: array
type: object
GroupRulePeopleCondition:
description: Defines conditions for `people` in a group rule
example:
groups:
exclude:
- exclude
- exclude
users:
exclude:
- exclude
- exclude
properties:
groups:
$ref: '#/components/schemas/GroupRuleGroupCondition'
users:
$ref: '#/components/schemas/GroupRuleUserCondition'
type: object
GroupRuleStatus:
description: Status of group rule
enum:
- ACTIVE
- INACTIVE
- INVALID
type: string
GroupRuleUserCondition:
description: Defines conditions specific to user exclusion
example:
exclude:
- exclude
- exclude
properties:
exclude:
description: Excluded `userIds` when processing rules
items:
type: string
type: array
type: object
GroupSchema:
example:
lastUpdated: lastUpdated
$schema: $schema
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: created
name: name
description: description
id: id
title: title
type: type
definitions:
custom:
id: id
type: type
properties:
key:
minLength: 6
externalNamespace: externalNamespace
format: ""
description: description
title: title
type: ""
enum:
- GroupSchemaAttribute_enum_inner
- GroupSchemaAttribute_enum_inner
required: true
master: ""
oneOf:
- const: const
title: title
- const: const
title: title
permissions:
- principal: principal
action: action
- principal: principal
action: action
externalName: externalName
scope: ""
unique: unique
mutability: ""
items:
oneOf:
- const: const
title: title
- const: const
title: title
type: type
enum:
- enum
- enum
maxLength: 0
required:
- required
- required
base:
id: id
type: type
properties: ""
required:
- required
- required
properties:
profile:
allOf:
- $ref: $ref
- $ref: $ref
properties:
$schema:
description: JSON Schema version identifier
readOnly: true
type: string
created:
description: Timestamp when the Schema was created
readOnly: true
type: string
definitions:
$ref: '#/components/schemas/GroupSchemaDefinitions'
description:
description: Description for the Schema
type: string
id:
description: URI of Group Schema
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Schema was last updated
readOnly: true
type: string
name:
description: Name of the Schema
readOnly: true
type: string
properties:
$ref: '#/components/schemas/UserSchemaProperties'
title:
description: User-defined display name for the Schema
type: string
type:
description: "Type of [root Schema](https://tools.ietf.org/html/draft-zyp-json-schema-04#section-3.4)"
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
x-okta-allow-null-property-value-for-updates: true
GroupSchemaAttribute:
example:
minLength: 6
externalNamespace: externalNamespace
format: ""
description: description
title: title
type: ""
enum:
- GroupSchemaAttribute_enum_inner
- GroupSchemaAttribute_enum_inner
required: true
master: ""
oneOf:
- const: const
title: title
- const: const
title: title
permissions:
- principal: principal
action: action
- principal: principal
action: action
externalName: externalName
scope: ""
unique: unique
mutability: ""
items:
oneOf:
- const: const
title: title
- const: const
title: title
type: type
enum:
- enum
- enum
maxLength: 0
properties:
description:
description: Description of the property
type: string
enum:
description: |-
Enumerated value of the property.
The value of the property is limited to one of the values specified in the enum definition. The list of values for the enum must consist of unique elements.
items:
$ref: '#/components/schemas/GroupSchemaAttribute_enum_inner'
nullable: true
type: array
externalName:
description: Name of the property as it exists in an external application
type: string
externalNamespace:
description: Namespace from the external application
type: string
format:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeFormat'
description: Identifies the type of data represented by the string
items:
$ref: '#/components/schemas/UserSchemaAttributeItems'
master:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeMaster'
description: Identifies where the property is mastered
maxLength:
description: Maximum character length of a string property
nullable: true
type: integer
minLength:
description: Minimum character length of a string property
nullable: true
type: integer
mutability:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeMutabilityString'
description: Defines the mutability of the property
oneOf:
description: "Non-empty array of valid JSON schemas.\n\nOkta only supports\
\ `oneOf` for specifying display names for an `enum`. Each schema has\
\ the following format:\n\n ```\n {\n \"const\": \"enumValue\"\
,\n \"title\": \"display name\"\n }\n ```json\n\nWhen `enum`\
\ is used in conjunction with `oneOf`, you must keep the set of enumerated\
\ values and their order.\n\n ```\n {\"enum\": [\"S\",\"M\",\"L\"\
,\"XL\"],\n \"oneOf\": [\n {\"const\": \"S\", \"title\": \"\
Small\"},\n {\"const\": \"M\", \"title\": \"Medium\"},\n \
\ {\"const\": \"L\", \"title\": \"Large\"},\n {\"const\": \"XL\"\
, \"title\": \"Extra Large\"}\n ]\n }\n ```json\n\nThe `oneOf`\
\ key is only supported in conjunction with `enum` and provides a mechanism\
\ to return a display name for the `enum` value. "
items:
$ref: '#/components/schemas/UserSchemaAttributeEnum'
nullable: true
type: array
permissions:
description: Access control permissions for the property
items:
$ref: '#/components/schemas/UserSchemaAttributePermission'
nullable: true
type: array
required:
description: Determines whether the property is required
nullable: true
type: boolean
scope:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeScope'
description: Determines whether a group attribute can be set at the individual
or group level
title:
description: User-defined display name for the property
minLength: 1
type: string
type:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeType'
description: Type of property
unique:
type: string
type: object
GroupSchemaBase:
example:
id: id
type: type
properties: ""
required:
- required
- required
properties:
id:
description: The subschema name
readOnly: true
type: string
properties:
allOf:
- $ref: '#/components/schemas/GroupSchemaBaseProperties'
description: The `#base` object properties
required:
description: A collection indicating required property names
items:
type: string
readOnly: true
type: array
type:
description: The object type
readOnly: true
type: string
type: object
GroupSchemaBaseProperties:
description: "All Okta-defined Profile properties are defined in a Profile subschema\
\ with the resolution scope `#base`. These properties can't be removed or\
\ edited, regardless of any attempt to do so."
properties:
description:
allOf:
- $ref: '#/components/schemas/GroupSchemaAttribute'
description: Human readable description of the Group
name:
allOf:
- $ref: '#/components/schemas/GroupSchemaAttribute'
description: Unique identifier for the Group
type: object
GroupSchemaCustom:
description: All custom Profile properties are defined in a Profile subschema
with the resolution scope `#custom`
example:
id: id
type: type
properties:
key:
minLength: 6
externalNamespace: externalNamespace
format: ""
description: description
title: title
type: ""
enum:
- GroupSchemaAttribute_enum_inner
- GroupSchemaAttribute_enum_inner
required: true
master: ""
oneOf:
- const: const
title: title
- const: const
title: title
permissions:
- principal: principal
action: action
- principal: principal
action: action
externalName: externalName
scope: ""
unique: unique
mutability: ""
items:
oneOf:
- const: const
title: title
- const: const
title: title
type: type
enum:
- enum
- enum
maxLength: 0
required:
- required
- required
properties:
id:
description: The subschema name
readOnly: true
type: string
properties:
additionalProperties:
$ref: '#/components/schemas/GroupSchemaAttribute'
description: The `#custom` object properties
type: object
required:
description: A collection indicating required property names
items:
type: string
readOnly: true
type: array
type:
description: The object type
readOnly: true
type: string
type: object
GroupSchemaDefinitions:
example:
custom:
id: id
type: type
properties:
key:
minLength: 6
externalNamespace: externalNamespace
format: ""
description: description
title: title
type: ""
enum:
- GroupSchemaAttribute_enum_inner
- GroupSchemaAttribute_enum_inner
required: true
master: ""
oneOf:
- const: const
title: title
- const: const
title: title
permissions:
- principal: principal
action: action
- principal: principal
action: action
externalName: externalName
scope: ""
unique: unique
mutability: ""
items:
oneOf:
- const: const
title: title
- const: const
title: title
type: type
enum:
- enum
- enum
maxLength: 0
required:
- required
- required
base:
id: id
type: type
properties: ""
required:
- required
- required
properties:
base:
$ref: '#/components/schemas/GroupSchemaBase'
custom:
$ref: '#/components/schemas/GroupSchemaCustom'
type: object
GroupType:
description: Determines how a Group's Profile and memberships are managed
enum:
- APP_GROUP
- BUILT_IN
- OKTA_GROUP
type: string
x-enumDescriptions:
APP_GROUP: Group Profile and memberships are imported and must be managed
within the app (such as Active Directory or LDAP) that imported the Group
BUILT_IN: Group Profile and memberships are managed by Okta and can't be modified
OKTA_GROUP: Group Profile and memberships are directly managed in Okta via
static assignments or indirectly through Group rules
GroupsLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Application Groups](/openapi/okta-management/management/tag/ApplicationGroups/#tag/ApplicationGroups/operation/listApplicationGroupAssignments)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HelpLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the app help resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HookKey:
description: "The `id` property in the response as `id` serves as the unique\
\ ID for the key, which you can specify when invoking other CRUD operations.\
\ \n\nThe `keyId` provided in the response is the alias of the public key\
\ that you can use to get details of the public key data in a separate call."
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
created: 2000-01-23T04:56:07.000+00:00
name: name
keyId: keyId
id: id
isUsed: isUsed
properties:
created:
description: Timestamp when the key was created
format: date-time
nullable: true
readOnly: true
type: string
id:
description: The unique identifier for the key
nullable: false
readOnly: true
type: string
isUsed:
description: Whether this key is currently in use by other applications
format: boolean
nullable: false
readOnly: true
type: string
keyId:
description: The alias of the public key
nullable: false
readOnly: true
type: string
lastUpdated:
description: Timestamp when the key was updated
format: date-time
nullable: true
readOnly: true
type: string
name:
description: Display name of the key
maxLength: 255
minLength: 1
nullable: false
readOnly: false
type: string
title: HookKeyInstance
type: object
HostedPage:
example:
type: EXTERNALLY_HOSTED
url: url
properties:
type:
$ref: '#/components/schemas/HostedPageType'
url:
type: string
required:
- type
type: object
HostedPageType:
enum:
- EXTERNALLY_HOSTED
- OKTA_DEFAULT
type: string
HrefCsrPublishLink:
description: Link to publish CSR
example:
hints:
allow:
- POST
- POST
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
properties:
hints:
$ref: '#/components/schemas/CsrPublishHrefHints'
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50/lifecycle/publish"
type: string
readOnly: true
required:
- href
title: Link Object
type: object
HrefCsrSelfLink:
description: Link to the resource (self)
example:
hints:
allow:
- GET
- GET
href: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
properties:
hints:
$ref: '#/components/schemas/CsrSelfHrefHints'
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/apps/0oad5lTSBOMUBOBVVQSC/credentials/csrs/h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50"
type: string
readOnly: true
required:
- href
title: Link Object
type: object
HrefHints:
description: Describes allowed HTTP verbs for the `href`
example:
allow:
- DELETE
- DELETE
properties:
allow:
items:
$ref: '#/components/schemas/HttpMethod'
type: array
type: object
HrefHintsGuidanceObject:
allOf:
- $ref: '#/components/schemas/HrefHints'
- description: Describes allowed HTTP verbs and guidance for the `href`
- properties:
guidance:
description: |
Specifies the URI to invoke for granting scope consent required to complete the OAuth 2.0 connection
items:
type: string
type: array
type: object
example:
allow:
- DELETE
- DELETE
guidance:
- guidance
- guidance
HrefObject:
additionalProperties: true
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
hints:
$ref: '#/components/schemas/HrefHints'
href:
description: Link URI
type: string
name:
description: Link name
type: string
templated:
description: Indicates whether the Link Object's `href` property is a URI
template.
type: boolean
type:
description: "The media type of the link. If omitted, it is implicitly `application/json`."
type: string
readOnly: true
required:
- href
title: Link Object
type: object
HrefObjectActivateLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to activate the resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectAppLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the app resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectAssigneeLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the assignee resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectAuthorizeLink:
description: Link to authorize scopes
example:
hints:
allow:
- DELETE
- DELETE
guidance:
- guidance
- guidance
href: href
properties:
hints:
$ref: '#/components/schemas/HrefHintsGuidanceObject'
href:
description: Link URI
type: string
readOnly: true
required:
- href
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
HrefObjectClientLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the client resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectDeactivateLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to deactivate the resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectDeleteLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to delete the resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectGovernanceResourcesLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the resources
HrefObjectGrantAerialConsent:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to grant Okta Aerial access to your Org
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectGroupLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the group resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectLogoLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the logo resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectMappingsLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the mappings resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectMemberLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the member resource
HrefObjectPermissionsLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the permissions resource
HrefObjectResourceSetLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the resource-set resource
HrefObjectRetrieveAerialConsent:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to retrieve Okta Aerial consent for your Org
HrefObjectRevokeAerialConsent:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to revoke Okta Aerial consent for your Org
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectRoleLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the role resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectRulesLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the rules resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectSelfLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the resource (self)
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectSuspendLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to suspend the resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectUnsuspendLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to unsuspend the resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HrefObjectUserLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the user resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
HttpMethod:
enum:
- DELETE
- GET
- POST
- PUT
type: string
IAMBundleEntitlement:
properties:
resourceSets:
items:
type: string
type: array
role:
type: string
targets:
items:
type: string
type: array
type: object
IPNetworkZone:
allOf:
- $ref: '#/components/schemas/NetworkZone'
- title: IP Network Zone
- properties:
gateways:
description: |-
The IP addresses (range or CIDR form) for an IP Network Zone.
The maximum array length is 150 entries for admin-created IP zones, 1000 entries for IP blocklist zones, and 5000 entries for the default system IP Zone.
items:
$ref: '#/components/schemas/NetworkZoneAddress'
type: array
proxies:
description: |-
The IP addresses (range or CIDR form) that are allowed to forward a request from gateway addresses for an IP Network Zone.
These proxies are automatically trusted by Threat Insights and used to identify the client IP of a request.
The maximum array length is 150 entries for admin-created zones and 5000 entries for the default system IP Zone.
items:
$ref: '#/components/schemas/NetworkZoneAddress'
nullable: true
type: array
type: object
IPServiceCategory:
description: "An IP service offered by a provider, such as a proxy or VPN"
enum:
- ALL_ANONYMIZERS
- ALL_ANONYMIZERS_EXCEPT_TOR
- ALL_IP_SERVICES
- ALL_PROXIES_VPNS
- ANONYMIZER_TOR
- APPLE_ICLOUD_RELAY_PROXY
- AVAST_VPN
- GLOBALPROTECT_VPN
- GOOGLE_VPN
- MULLVAD_VPN
- NORD_VPN
- OXYLABS_PROXY
- SAMSUNG_VPN
- SURFSHARK_VPN
- SYMANTEC_VPN
- TRENDMICRO_VPN
- ULTRASURF_VPN
type: string
IamRole:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
permissions:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
properties:
created:
description: Timestamp when the role was created
format: date-time
readOnly: true
type: string
description:
description: Description of the role
type: string
id:
description: Unique key for the role
readOnly: true
type: string
label:
description: Unique label for the role
type: string
lastUpdated:
description: Timestamp when the role was last updated
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/IamRole__links'
required:
- description
- label
type: object
IamRoles:
example:
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
roles:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
permissions:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
permissions:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
properties:
roles:
items:
$ref: '#/components/schemas/IamRole'
type: array
_links:
$ref: '#/components/schemas/LinksNext'
type: object
IdPCertificateCredential:
example:
x5c:
- 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
- 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
properties:
x5c:
description: Base64-encoded X.509 certificate chain with DER encoding
items:
example: MIIDnjCCAoagAwIBAgIGAVG3MN+PMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEUMBIGA1UECwwLU1NPUHJvdmlkZXIxEDAOBgNVBAMMB2V4YW1wbGUxHDAaBgkqhkiG9w0BCQEWDWluZm9Ab2t0YS5jb20wHhcNMTUxMjE4MjIyMjMyWhcNMjUxMjE4MjIyMzMyWjCBjzELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNVBAoMBE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRAwDgYDVQQDDAdleGFtcGxlMRwwGgYJKoZIhvcNAQkBFg1pbmZvQG9rdGEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtcnyvuVCrsFEKCwHDenS3Ocjed8eWDv3zLtD2K/iZfE8BMj2wpTfn6Ry8zCYey3mWlKdxIybnV9amrujGRnE0ab6Q16v9D6RlFQLOG6dwqoRKuZy33Uyg8PGdEudZjGbWuKCqqXEp+UKALJHV+k4wWeVH8g5d1n3KyR2TVajVJpCrPhLFmq1Il4G/IUnPe4MvjXqB6CpKkog1+ThWsItPRJPAM+RweFHXq7KfChXsYE7Mmfuly8sDQlvBmQyxZnFHVuiPfCvGHJjpvHy11YlHdOjfgqHRvZbmo30+y0X/oY/yV4YEJ00LL6eJWU4wi7ViY3HP6/VCdRjHoRdr5L/DwIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQCzzhOFkvyYLNFj2WDcq1YqD4sBy1iCia9QpRH3rjQvMKDwQDYWbi6EdOX0TQ/IYR7UWGj+2pXd6v0t33lYtoKocp/4lUvT3tfBnWZ5KnObi+J2uY2teUqoYkASN7F+GRPVOuMVoVgm05ss8tuMb2dLc9vsx93sDt+XlMTv/2qi5VPwaDtqduKkzwW9lUfn4xIMkTiVvCpe0X2HneD2Bpuao3/U8Rk0uiPfq6TooWaoW3kjsmErhEAs9bA7xuqo1KKY9CdHcFhkSsMhoeaZylZHtzbnoipUlQKSLMdJQiiYZQ0bYL83/Ta9fulr1EERICMFt3GUmtYaZZKHpWSfdJp9
type: string
type: array
required:
- x5c
type: object
IdPCsr:
description: Defines a CSR for a signature or decryption credential for an IdP
example:
kty: RSA
csr: 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
_links:
publish: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2016-01-03T18:15:47Z
id: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
properties:
created:
description: Timestamp when the object was created
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
csr:
description: Base64-encoded CSR in DER format
example: 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
readOnly: true
type: string
id:
description: Unique identifier for the CSR
example: h9zkutaSe7fZX0SwN1GqDApofgD1OW8g2B5l2azha50
readOnly: true
type: string
kty:
description: Cryptographic algorithm family for the CSR's keypair
example: RSA
type: string
_links:
$ref: '#/components/schemas/IdPCsr__links'
type: object
IdPCsrPkcs10:
description: Base64URL-encoded CSR in DER format
format: base64
type: string
IdPKeyCredential:
additionalProperties: true
description: "A [JSON Web Key](https://tools.ietf.org/html/rfc7517) for a signature\
\ or encryption credential for an IdP"
example:
kty: RSA
lastUpdated: 2016-01-03T18:15:47Z
x5t#S256: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
e: AQAB
created: 2016-01-03T18:15:47Z
use: sig
kid: your-key-id
x5c:
- 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
- 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
expiresAt: 2016-01-03T18:15:47Z
"n": "101438407598598116085679865987760095721749307901605456708912786847324207000576780508113360584555007890315805735307890113536927352312915634368993759211767770602174860126854831344273970871509573365292777620005537635317282520456901584213746937262823585533063042033441296629204165064680610660631365266976782082747"
properties:
created:
description: Timestamp when the object was created
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
e:
description: The exponent value for the RSA public key
example: AQAB
type: string
expiresAt:
description: Timestamp when the object expires
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
kid:
description: Unique identifier for the key
example: your-key-id
type: string
kty:
description: "Identifies the cryptographic algorithm family used with the\
\ key (Supported value: `RSA`)"
example: RSA
type: string
lastUpdated:
description: Timestamp when the object was last updated
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
"n":
description: The modulus value for the RSA public key
example: "101438407598598116085679865987760095721749307901605456708912786847324207000576780508113360584555007890315805735307890113536927352312915634368993759211767770602174860126854831344273970871509573365292777620005537635317282520456901584213746937262823585533063042033441296629204165064680610660631365266976782082747"
type: string
use:
description: "Intended use of the public key (Supported value: `sig`)"
example: sig
type: string
x5c:
description: Base64-encoded X.509 certificate chain with DER encoding
items:
example: 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
type: string
type: array
x5t#S256:
description: Base64url-encoded SHA-256 thumbprint of the DER encoding of
an X.509 certificate
example: wzPVobIrveR1x-PCbjsFGNV-6zn7Rm9KuOWOG4Rk6jE
type: string
type: object
IdentityProvider:
example:
lastUpdated: 2016-01-03T18:15:47Z
protocol:
algorithms:
request:
signature:
scope: ANY
algorithm: algorithm
response:
signature:
scope: ANY
algorithm: algorithm
relayState:
format: FROM_URL
settings:
nameFormat: nameFormat
endpoints:
acs:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
authorization:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
userInfo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
metadata:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
jwks:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
slo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
sso:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
token:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
credentials:
trust:
revocation: CRL
audience: audience
revocationCacheLifetime: 0
kid: kid
issuer: issuer
client:
pkce_required: true
client_secret: client_secret
client_id: client_id
signing:
kid: kid
scopes:
- scopes
- scopes
type: MTLS
issuer:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
_links:
acs: ""
metadata: ""
keys: ""
activate: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
clientRedirectUri: ""
authorize: ""
users: ""
deactivate: ""
created: 2016-01-03T18:15:47Z
name: Sample Identity Provider
id: 0oaWma58liwx40w6boYD
type: AMAZON
issuerMode: DYNAMIC
properties:
additionalAmr:
- sc
- sc
ialValue: ialValue
aalValue: aalValue
policy:
subject:
filter: (\S+@example\.com)
matchAttribute: login
matchType: CUSTOM_ATTRIBUTE
userNameTemplate:
template: idpuser.subjectNameId
maxClockSkew: 120000
provisioning:
action: AUTO
groups:
filter:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
assignments:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
sourceAttributeName: Groups
action: APPEND
profileMaster: true
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter:
groups:
include:
- 00gjg5lzfBpn62wuF0g3
- 00gjg5lzfBpn62wuF0g3
action: AUTO
status: ACTIVE
properties:
created:
description: Timestamp when the object was created
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
id:
description: Unique key for the IdP
example: 0oaWma58liwx40w6boYD
readOnly: true
type: string
issuerMode:
$ref: '#/components/schemas/IdentityProviderIssuerMode'
lastUpdated:
description: Timestamp when the object was last updated
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
name:
description: Unique name for the IdP
example: Sample Identity Provider
maxLength: 100
type: string
policy:
$ref: '#/components/schemas/IdentityProviderPolicy'
properties:
$ref: '#/components/schemas/IdentityProviderProperties'
protocol:
$ref: '#/components/schemas/Protocol'
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
$ref: '#/components/schemas/IdentityProviderType'
_links:
$ref: '#/components/schemas/IdentityProvider__links'
type: object
IdentityProviderApplicationUser:
example:
lastUpdated: 2016-01-03T18:15:47Z
_embedded:
key: "{}"
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
idp:
href: "https://{yourOktaDomain}/api/v1/idps/0oa1k5d68qR2954hb0g4"
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
href: "https://{yourOktaDomain}/api/v1/users/00ulwodIu7wCfdiVR0g3"
created: 2016-01-03T18:15:47Z
profile:
lastName: Jackson
subjectNameQualifier: example.com
subjectSpNameQualifier: urn:federation:example
authnContextClassRef: null
subjectNameId: saml.jackson@example.com
subjectConfirmationAddress: null
displayName: Saml Jackson
mobilePhone: +1-415-555-5141
email: saml.jackson@example.com
subjectNameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
firstName: Saml
subjectSpProvidedId: null
subjectConfirmationMethod: null
externalId: saml.jackson@example.com
id: id
properties:
created:
description: Timestamp when the object was created
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
externalId:
description: Unique IdP-specific identifier for the User
example: saml.jackson@example.com
maxLength: 512
readOnly: true
type: string
id:
description: Unique key of the User
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last updated
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
profile:
additionalProperties:
properties: {}
type: object
description: "IdP-specific profile for the User. \n\nIdentity Provider User\
\ profiles are IdP-specific but may be customized by the Profile Editor\
\ in the Admin Console.\n\n> **Note:** Okta variable names have reserved\
\ characters that may conflict with the name of an IdP assertion attribute.\
\ You can use the **External name** to define the attribute name as defined\
\ in an IdP assertion such as a SAML attribute name."
example:
lastName: Jackson
subjectNameQualifier: example.com
subjectSpNameQualifier: urn:federation:example
authnContextClassRef: null
subjectNameId: saml.jackson@example.com
subjectConfirmationAddress: null
displayName: Saml Jackson
mobilePhone: +1-415-555-5141
email: saml.jackson@example.com
subjectNameFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
firstName: Saml
subjectSpProvidedId: null
subjectConfirmationMethod: null
type: object
_embedded:
additionalProperties:
properties: {}
type: object
description: Embedded resources related to the IdP User
readOnly: true
type: object
_links:
$ref: '#/components/schemas/IdentityProviderApplicationUser__links'
type: object
IdentityProviderCredentials:
example:
trust:
revocation: CRL
audience: audience
revocationCacheLifetime: 0
kid: kid
issuer: issuer
client:
pkce_required: true
client_secret: client_secret
client_id: client_id
signing:
kid: kid
properties:
client:
$ref: '#/components/schemas/IdentityProviderCredentialsClient'
signing:
$ref: '#/components/schemas/IdentityProviderCredentialsSigning'
trust:
$ref: '#/components/schemas/IdentityProviderCredentialsTrust'
type: object
IdentityProviderCredentialsClient:
example:
pkce_required: true
client_secret: client_secret
client_id: client_id
properties:
client_id:
type: string
client_secret:
type: string
pkce_required:
description: Require Proof Key for Code Exchange (PKCE) for additional verification
type: boolean
type: object
IdentityProviderCredentialsSigning:
example:
kid: kid
properties:
kid:
type: string
type: object
IdentityProviderCredentialsTrust:
example:
revocation: CRL
audience: audience
revocationCacheLifetime: 0
kid: kid
issuer: issuer
properties:
audience:
type: string
issuer:
type: string
kid:
type: string
revocation:
$ref: '#/components/schemas/IdentityProviderCredentialsTrustRevocation'
revocationCacheLifetime:
type: integer
type: object
IdentityProviderCredentialsTrustRevocation:
enum:
- CRL
- DELTA_CRL
- OCSP
type: string
IdentityProviderIssuerMode:
default: DYNAMIC
description: Indicates whether Okta uses the original Okta org domain URL or
a custom domain URL in the request to the social IdP
enum:
- CUSTOM_URL
- DYNAMIC
- ORG_URL
type: string
x-enumDescriptions:
ORG_URL: "In the authorize request to the social IdP, Okta uses the Okta org's\
\ original domain URL (`https://${yourOktaDomain}`) as the domain in the\
\ `redirect_uri`."
CUSTOM_URL: "In the authorize request to the social IdP, Okta uses the custom\
\ domain URL as the domain in the `redirect_uri`. You can set `issuerMode`\
\ to `CUSTOM_URL` only if you have a custom URL domain configured."
DYNAMIC: "In the authorize request to the social IdP, Okta uses the custom\
\ domain URL as the domain in the `redirect_uri` if the request was made\
\ from the custom domain URL. Otherwise, Okta uses the Okta org's original\
\ domain URL if the request was made from the Okta org domain."
IdentityProviderPolicy:
allOf:
- properties:
accountLink:
$ref: '#/components/schemas/PolicyAccountLink'
maxClockSkew:
description: Maximum allowable clock skew when processing messages from
the IdP
example: 120000
type: integer
provisioning:
$ref: '#/components/schemas/Provisioning'
subject:
$ref: '#/components/schemas/PolicySubject'
type: object
description: "Policy settings for the IdP. \nThe following provisioning and\
\ account linking actions are supported by each IdP provider:\n| IdP type\
\ | User provisioning\
\ actions | Group provisioning actions | Account link actions |\
\ Account link filters |\n| -----------------------------------------------------------------\
\ | ------------------------- | ------------------------------------- | --------------------\
\ | -------------------- |\n| `SAML2` \
\ | `AUTO` or `DISABLED` | `NONE`, `ASSIGN`, `APPEND`,\
\ or `SYNC` | `AUTO`, `DISABLED` | `groups` |\n| `X509` \
\ | `DISABLED` \
\ | No support for JIT provisioning | \
\ | |\n| All social IdP types (any IdP type that isn't\
\ `SAML2` or `X509`) | `AUTO`, `DISABLED` | `NONE` or `ASSIGN` \
\ | `AUTO`, `DISABLED` | `groups` |"
example:
subject:
filter: (\S+@example\.com)
matchAttribute: login
matchType: CUSTOM_ATTRIBUTE
userNameTemplate:
template: idpuser.subjectNameId
maxClockSkew: 120000
provisioning:
action: AUTO
groups:
filter:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
assignments:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
sourceAttributeName: Groups
action: APPEND
profileMaster: true
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
accountLink:
filter:
groups:
include:
- 00gjg5lzfBpn62wuF0g3
- 00gjg5lzfBpn62wuF0g3
action: AUTO
IdentityProviderPolicyProvider:
enum:
- ANY
- OKTA
- SPECIFIC_IDP
type: string
IdentityProviderPolicyRuleCondition:
properties:
idpIds:
items:
type: string
type: array
provider:
$ref: '#/components/schemas/IdentityProviderPolicyProvider'
type: object
IdentityProviderProperties:
description: The properties in the Identity Provider Properties object vary
depending on the IdP type
example:
additionalAmr:
- sc
- sc
ialValue: ialValue
aalValue: aalValue
nullable: true
properties:
aalValue:
description: "The [authentication assurance level](https://developers.login.gov/oidc/#aal-values)\
\ (AAL) value for the Login.gov IdP. \nSee [Add a Login.gov IdP](https://developer.okta.com/docs/guides/add-logingov-idp/).\
\ Applies to `LOGINGOV` and `LOGINGOV_SANDBOX` IdP types."
nullable: true
type: string
additionalAmr:
description: The additional Assurance Methods References (AMR) values for
Smart Card IdPs. Applies to `X509` IdP type.
items:
enum:
- sc
- hwk
- pin
- mfa
type: string
x-enumDescriptions:
sc: Smart card
hwk: Hardware-secured key
pin: Personal identification number
mfa: Multifactor authentication
nullable: true
type: array
ialValue:
description: "The [type of identity verification](https://developers.login.gov/oidc/#ial-values)\
\ (IAL) value for the Login.gov IdP. \nSee [Add a Login.gov IdP](https://developer.okta.com/docs/guides/add-logingov-idp/).\
\ Applies to `LOGINGOV` and `LOGINGOV_SANDBOX` IdP types."
nullable: true
type: string
type: object
IdentityProviderType:
description: "The Identity Provider object's `type` property identifies the\
\ social or enterprise Identity Provider used for authentication. \nEach Identity\
\ Provider uses a specific protocol, therefore the `protocol` property must\
\ correspond with the IdP `type`. \nIf the protocol is OAuth 2.0-based, the\
\ Protocol object's `scopes` property must also correspond with the scopes\
\ supported by the IdP `type`. \nFor policy actions supported by each IdP\
\ type, see [IdP type policy actions](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=policy&t=request).\n\
\n| Type | Description \
\ \
\ | Corresponding protocol | Corresponding protocol\
\ scopes |\n| ------------------ |\
\ -----------------------------------------------------------------------------------------------------------------------------------------------------\
\ | ---------------------- | --------------------------------------------------------------------\
\ |\n| `AMAZON` | [Amazon](https://developer.amazon.com/settings/console/registration?return_to=/) as\
\ the Identity Provider | OpenID Connect\
\ | `profile`, `profile:user_id` \
\ |\n| `APPLE` | [Apple](https://developer.apple.com/sign-in-with-apple/) as\
\ the Identity Provider \
\ | OpenID Connect | `names`, `email`, `openid` \
\ |\n| `DISCORD` | [Discord](https://discord.com/login) as\
\ the Identity Provider \
\ | OAuth 2.0 | `identify`,\
\ `email` |\n| `FACEBOOK`\
\ | [Facebook](https://developers.facebook.com) as the Identity\
\ Provider \
\ | OAuth 2.0 | `public_profile`, `email` \
\ |\n| `GITHUB` | [GitHub](https://github.com/join) as\
\ the Identity Provider \
\ | OAuth 2.0 | `user` \
\ |\n| `GITLAB`\
\ | [GitLab](https://gitlab.com/users/sign_in) as the Identity\
\ Provider \
\ | OpenID Connect | `openid`, `read_user`, `profile`,\
\ `email` |\n| `GOOGLE` | [Google](https://accounts.google.com/signup) as\
\ the Identity Provider \
\ | OpenID Connect | `openid`, `email`, `profile`\
\ |\n| `LINKEDIN` | [LinkedIn](https://developer.linkedin.com/) as\
\ the Identity Provider \
\ | OAuth 2.0 | `r_emailaddress`, `r_liteprofile`\
\ |\n| `LOGINGOV` | [Login.gov](https://developers.login.gov/) as\
\ the Identity Provider \
\ | OpenID Connect | `email`, `profile`,\
\ `profile:name` |\n| `LOGINGOV_SANDBOX`\
\ | [Login.gov's identity sandbox](https://developers.login.gov/testing/) as\
\ the Identity Provider \
\ | OpenID Connect | `email`, `profile`, `profile:name` \
\ |\n| `MICROSOFT` | [Microsoft Enterprise\
\ SSO](https://azure.microsoft.com/) as the Identity Provider \
\ | OpenID Connect\
\ | `openid`, `email`, `profile`, `https://graph.microsoft.com/User.Read`\
\ |\n| `OIDC` | IdP provider that supports [OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html)\
\ | OpenID Connect \
\ | `openid`, `email`, `profile` \
\ |\n| `PAYPAL` | [Paypal](https://www.paypal.com/signin) as\
\ the Identity Provider \
\ | OpenID Connect | `openid`, `email`,\
\ `profile` |\n| `PAYPAL_SANDBOX`\
\ | [Paypal Sandbox](https://developer.paypal.com/tools/sandbox/) as\
\ the Identity Provider \
\ | OpenID Connect | `openid`, `email`, `profile` \
\ |\n| `SALESFORCE` | [SalesForce](https://login.salesforce.com/) as\
\ the Identity Provider \
\ | OAuth 2.0 | `id`, `email`, `profile`\
\ |\n| `SAML2` | Enterprise\
\ IdP provider that supports the [SAML 2.0 Web Browser SSO Profile](https://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf)\
\ | SAML 2.0 | \
\ |\n| `SPOTIFY` | [Spotify](https://developer.spotify.com/) as\
\ the Identity Provider \
\ | OpenID Connect | `user-read-email`,\
\ `user-read-private` |\n| `X509` \
\ | [Smart Card IdP](https://tools.ietf.org/html/rfc5280) \
\ \
\ | Mutual TLS | \
\ |\n| `XERO` | [Xero](https://www.xero.com/us/signup/api/) as\
\ the Identity Provider \
\ | OpenID Connect | `openid`, `profile`,\
\ `email` |\n| `YAHOO` \
\ | [Yahoo](https://login.yahoo.com/) as the Identity Provider \
\ \
\ | OpenID Connect | `openid`, `profile`, `email` \
\ |\n| `YAHOOJP` | [Yahoo Japan](https://login.yahoo.co.jp/config/login) as\
\ the Identity Provider \
\ | OpenID Connect | `openid`, `profile`, `email`\
\ |"
enum:
- AMAZON
- APPLE
- DISCORD
- FACEBOOK
- GITHUB
- GITLAB
- GOOGLE
- LINKEDIN
- LOGINGOV
- LOGINGOV_SANDBOX
- MICROSOFT
- OIDC
- PAYPAL
- PAYPAL_SANDBOX
- SALESFORCE
- SAML2
- SPOTIFY
- X509
- XERO
- YAHOO
- YAHOOJP
type: string
IdentitySourceSession:
example:
identitySourceId: identitySourceId
lastUpdated: 2000-01-23T04:56:07.000+00:00
importType: importType
created: 2000-01-23T04:56:07.000+00:00
id: id
status: CLOSED
properties:
created:
description: The timestamp when the Identity Source Session was created
format: date-time
readOnly: true
type: string
id:
description: The ID of the Identity Source Session
readOnly: true
type: string
identitySourceId:
description: The ID of the custom Identity Source for which the session
is created
readOnly: true
type: string
importType:
description: The type of import. All imports are `INCREMENTAL` imports.
readOnly: true
type: string
lastUpdated:
description: The timestamp when the Identity Source Session was created
format: date-time
readOnly: true
type: string
status:
$ref: '#/components/schemas/IdentitySourceSessionStatus'
type: object
IdentitySourceSessionStatus:
enum:
- CLOSED
- COMPLETED
- CREATED
- ERROR
- EXPIRED
- IN_PROGRESS
- TRIGGERED
type: string
x-enumDescriptions:
CREATED: This is a new Identity Source Session that hasn't been processed.
You can upload bulk data in this stage.
IN_PROGRESS: The bulk data is being uploaded to Okta.
TRIGGERED: Okta is processing the import data in this session. You can't load
bulk data in this stage.
COMPLETED: The bulk data was processed and imported into Okta.
CLOSED: The Identity Source Session was canceled and isn't available for further
activity.
EXPIRED: This Identity Source Session had the `CREATED` status and timed-out
after 24 hours of inactivity.
ERROR: The processing of import data in the session encountered an error.
You need to open a new session to upload the data again.
IdentitySourceUserProfileForDelete:
example:
externalId: externalId
properties:
externalId:
description: The external ID of the entity that needs to be deleted in Okta
maxLength: 512
type: string
type: object
IdentitySourceUserProfileForUpsert:
example:
firstName: firstName
lastName: lastName
mobilePhone: mobilePhone
secondEmail: secondEmail
userName: userName
email: email
homeAddress: homeAddress
properties:
email:
description: Email address of the user
format: email
maxLength: 100
minLength: 5
type: string
firstName:
description: First name of the user
maxLength: 50
minLength: 1
nullable: true
type: string
homeAddress:
description: Home address of the user
maxLength: 4096
nullable: true
type: string
lastName:
description: Last name of the user
maxLength: 50
minLength: 1
nullable: true
type: string
mobilePhone:
description: Mobile phone number of the user
maxLength: 100
nullable: true
type: string
secondEmail:
description: Alternative email address of the user
format: email
maxLength: 100
minLength: 5
type: string
userName:
description: Username of the user
maxLength: 100
type: string
type: object
IdpDiscoveryPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
description: Policy conditions aren't supported for this policy type.
nullable: true
type: string
type: object
IdpDiscoveryPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/IdpPolicyRuleAction'
conditions:
$ref: '#/components/schemas/IdpDiscoveryPolicyRuleCondition'
type: object
IdpDiscoveryPolicyRuleCondition:
allOf:
- properties:
app:
$ref: '#/components/schemas/AppAndInstancePolicyRuleCondition'
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
userIdentifier:
$ref: '#/components/schemas/UserIdentifierPolicyRuleCondition'
platform:
$ref: '#/components/schemas/PlatformPolicyRuleCondition'
type: object
IdpPolicyRuleAction:
properties:
idp:
$ref: '#/components/schemas/IdpPolicyRuleAction_idp'
type: object
IdpPolicyRuleActionMatchCriteria:
properties:
propertyName:
description: The IdP property that the evaluated string should match to
type: string
providerExpression:
description: |
You can provide an Okta Expression Language expression with the Login Context that's evaluated with the IdP. For example, the value `login.identifier` refers to the user's username. If the user is signing in with the username `john.doe@mycompany.com`, the expression `login.identifier.substringAfter(@))` is evaluated to the domain name of the user, for example: `mycompany.com`.
type: string
type: object
IdpPolicyRuleActionProvider:
properties:
id:
description: "IdP types of `OKTA`, `AgentlessDSSO`, and `IWA` don't require\
\ an ID."
type: string
name:
description: Provider `name` in Okta. Optional. Supported in `IDENTITY ENGINE`.
type: string
type:
$ref: '#/components/schemas/IdentityProviderType'
type: object
IdpSelectionType:
description: Determines whether the rule should use expression language or a
specific IdP
enum:
- DYNAMIC
- SPECIFIC
type: string
IframeEmbedScopeAllowedApps:
enum:
- OKTA_ENDUSER
type: string
ImageUploadResponse:
example:
url: url
properties:
url:
readOnly: true
type: string
type: object
ImportScheduleObject:
description: Import schedule configuration
properties:
fullImport:
$ref: '#/components/schemas/ImportScheduleObject_fullImport'
incrementalImport:
$ref: '#/components/schemas/ImportScheduleObject_incrementalImport'
status:
$ref: '#/components/schemas/EnabledStatus'
type: object
ImportScheduleSettings:
properties:
expression:
description: The import schedule in UNIX cron format
example: "00 21 * * Mon,Thu,Fri,Sat"
type: string
timezone:
description: The import schedule time zone in Internet Assigned Numbers
Authority (IANA) time zone name format
example: America/Los_Angeles
maxLength: 64
minLength: 1
type: string
required:
- expression
type: object
ImportUsernameObject:
description: Determines the Okta username for the imported user
properties:
userNameExpression:
description: "For `usernameFormat=CUSTOM`, specifies the Okta Expression\
\ Language statement for a username format that imported users use to\
\ sign in to Okta"
type: string
usernameFormat:
default: EMAIL
description: Determines the username format when users sign in to Okta
enum:
- EMAIL
- CUSTOM
type: string
required:
- usernameFormat
type: object
InactivityPolicyRuleCondition:
properties:
number:
type: integer
unit:
type: string
type: object
InboundProvisioningApplicationFeature:
allOf:
- $ref: '#/components/schemas/ApplicationFeature'
- type: object
- properties:
capabilities:
$ref: '#/components/schemas/CapabilitiesInboundProvisioningObject'
InlineHook:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
metadata:
key: metadata
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
channel:
type: HTTP
version: version
name: name
id: id
type: com.okta.import.transform
version: version
status: ACTIVE
properties:
channel:
$ref: '#/components/schemas/InlineHookChannel'
created:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
metadata:
additionalProperties:
type: string
description: "Specific properties for the inline hook configuration, for\
\ example, `optOutServiceProtectionRateLimit` to opt-out of Telephony\
\ Service Protection Rate Limits when using the Telephony inline hook."
type: object
name:
type: string
status:
$ref: '#/components/schemas/InlineHookStatus'
type:
$ref: '#/components/schemas/InlineHookType'
version:
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
InlineHookBasePayload:
properties:
cloudEventVersion:
description: The inline hook cloud version
example: "0.1"
type: string
contentType:
description: The inline hook request header content
example: application/JSON
type: string
eventId:
description: The individual inline hook request ID
example: 3o9jBzq1SmOGmmsDsqyyeQ
type: string
eventTime:
description: The time the inline hook request was sent
example: 2020-01-17T21:23:56.000Z
type: string
eventTypeVersion:
description: The inline hook version
example: "1"
type: string
type: object
InlineHookChannel:
discriminator:
mapping:
HTTP: '#/components/schemas/InlineHookChannelHttp'
OAUTH: '#/components/schemas/InlineHookChannelOAuth'
propertyName: type
example:
type: HTTP
version: version
properties:
type:
$ref: '#/components/schemas/InlineHookChannelType'
version:
type: string
type: object
InlineHookChannelConfig:
properties:
authScheme:
$ref: '#/components/schemas/InlineHookChannelConfigAuthScheme'
headers:
items:
$ref: '#/components/schemas/InlineHookChannelConfigHeaders'
type: array
method:
type: string
uri:
type: string
type: object
InlineHookChannelConfigAuthScheme:
properties:
key:
type: string
type:
type: string
value:
type: string
type: object
InlineHookChannelConfigHeaders:
properties:
key:
type: string
value:
type: string
type: object
InlineHookChannelHttp:
allOf:
- $ref: '#/components/schemas/InlineHookChannel'
- properties:
config:
$ref: '#/components/schemas/InlineHookChannelConfig'
type: object
InlineHookChannelOAuth:
allOf:
- $ref: '#/components/schemas/InlineHookChannel'
- properties:
config:
$ref: '#/components/schemas/InlineHookOAuthChannelConfig'
type: object
InlineHookChannelType:
enum:
- HTTP
- OAUTH
type: string
InlineHookOAuthBasicConfig:
allOf:
- $ref: '#/components/schemas/InlineHookChannelConfig'
properties:
authType:
type: string
clientId:
type: string
scope:
type: string
tokenUrl:
type: string
type: object
InlineHookOAuthChannelConfig:
discriminator:
mapping:
client_secret_post: '#/components/schemas/InlineHookOAuthClientSecretConfig'
private_key_jwt: '#/components/schemas/InlineHookOAuthPrivateKeyJwtConfig'
propertyName: authType
properties:
authType:
type: string
type: object
InlineHookOAuthClientSecretConfig:
allOf:
- $ref: '#/components/schemas/InlineHookOAuthBasicConfig'
properties:
clientSecret:
type: string
type: object
InlineHookOAuthPrivateKeyJwtConfig:
allOf:
- $ref: '#/components/schemas/InlineHookOAuthBasicConfig'
properties:
hookKeyId:
type: string
type: object
InlineHookPayload:
type: object
x-okta-extensible: true
InlineHookRequestObject:
description: The API request that triggered the inline hook
properties:
id:
description: The unique identifier that Okta assigned to the API request
type: string
ipAddress:
description: The IP address of the client that made the API request
type: string
method:
description: The HTTP request method of the API request
type: string
url:
$ref: '#/components/schemas/InlineHookRequestObject_url'
type: object
InlineHookResponse:
example:
commands:
- type: type
value:
- op: op
path: path
value: value
- op: op
path: path
value: value
- type: type
value:
- op: op
path: path
value: value
- op: op
path: path
value: value
properties:
commands:
items:
$ref: '#/components/schemas/InlineHookResponseCommands'
type: array
type: object
InlineHookResponseCommandValue:
example:
op: op
path: path
value: value
properties:
op:
type: string
path:
type: string
value:
type: string
type: object
InlineHookResponseCommands:
example:
type: type
value:
- op: op
path: path
value: value
- op: op
path: path
value: value
properties:
type:
type: string
value:
items:
$ref: '#/components/schemas/InlineHookResponseCommandValue'
type: array
type: object
InlineHookStatus:
enum:
- ACTIVE
- INACTIVE
type: string
InlineHookType:
enum:
- com.okta.import.transform
- com.okta.oauth2.tokens.transform
- com.okta.saml.tokens.transform
- com.okta.telephony.provider
- com.okta.user.credential.password.import
- com.okta.user.pre-registration
type: string
IssuerMode:
enum:
- CUSTOM_URL
- DYNAMIC
- ORG_URL
type: string
JsonPatchOperation:
description: The update action
example:
op: remove
path: path
value: "{}"
properties:
op:
$ref: '#/components/schemas/PatchAction'
path:
description: The resource path of the attribute to update
type: string
value:
description: The update operation value
type: object
type: object
JsonWebKey:
example:
kty: kty
lastUpdated: 2000-01-23T04:56:07.000+00:00
x5t#S256: x5t#S256
e: e
created: 2017-03-28T01:11:10Z
use: use
kid: kid
x5c:
- x5c
- x5c
expiresAt: 2000-01-23T04:56:07.000+00:00
"n": "n"
properties:
created:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
e:
description: RSA key value (public exponent) for Key binding
readOnly: true
type: string
expiresAt:
description: Timestamp when the certificate expires
format: date-time
readOnly: true
type: string
kid:
description: Unique identifier for the certificate
readOnly: true
type: string
kty:
description: "Cryptographic algorithm family for the certificate's keypair.\
\ Valid value: `RSA`"
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
"n":
description: RSA modulus value that is used by both the public and private
keys and provides a link between them
type: string
use:
description: "Acceptable use of the certificate. Valid value: `sig`"
readOnly: true
type: string
x5c:
description: X.509 certificate chain that contains a chain of one or more
certificates
items:
type: string
readOnly: true
type: array
x5t#S256:
description: "X.509 certificate SHA-256 thumbprint, which is the base64url-encoded\
\ SHA-256 thumbprint (digest) of the DER encoding of an X.509 certificate"
readOnly: true
type: string
type: object
JwkUse:
example:
use: sig
properties:
use:
$ref: '#/components/schemas/JwkUseType'
type: object
JwkUseType:
description: Purpose of the certificate. The only supported value is `sig`.
enum:
- sig
type: string
KeepCurrent:
example:
keepCurrent: true
properties:
keepCurrent:
default: true
description: Skip deleting the user's current session when set to `true`
type: boolean
type: object
KeepMeSignedIn:
properties:
postAuth:
description: Whether the post-authentication Keep Me Signed In flow is allowed
enum:
- ALLOWED
- NOT_ALLOWED
type: string
postAuthPromptFrequency:
description: "A time duration specified as an [ISO-8601 duration](https://en.wikipedia.org/wiki/ISO_8601#Durations)."
pattern: ^P(?:$)(\d+Y)?(\d+M)?(\d+W)?(\d+D)?(T(?:\d)(\d+H)?(\d+M)?(\d+S)?)?$
type: string
type: object
KeyRequest:
example:
name: name
properties:
name:
description: Display name for the key
maxLength: 255
minLength: 1
nullable: false
readOnly: false
type: string
uniqueItems: true
type: object
KeyTrustLevelBrowserKey:
description: Represents the attestation strength used by the Chrome Verified
Access API
enum:
- CHROME_BROWSER_HW_KEY
- CHROME_BROWSER_OS_KEY
example: CHROME_BROWSER_HW_KEY
type: string
x-enumDescriptions:
CHROME_BROWSER_HW_KEY: Identity of the device was attested using a key pair
that is OS encapsulated by a hardware layer
CHROME_BROWSER_OS_KEY: Identity of the device was attested using a key pair
that is simply stored on the device but not in any specific hardware layer
KeyTrustLevelOSMode:
description: Represents the attestation strength used by the Chrome Verified
Access API
enum:
- CHROME_OS_DEVELOPER_MODE
- CHROME_OS_VERIFIED_MODE
example: CHROME_OS_VERIFIED_MODE
type: string
x-enumDescriptions:
CHROME_OS_VERIFIED_MODE: "Identity of the device was attested using an enterprise-emitted\
\ certificate, and the device is in Verified mode"
CHROME_OS_DEVELOPER_MODE: "Identity of the device was attested using an enterprise-emitted\
\ certificate, and the device is in Developer mode"
KnowledgeConstraint:
allOf:
- $ref: '#/components/schemas/AccessPolicyConstraint'
Language:
description: "The language specified as an [IETF BCP 47 language tag](https://datatracker.ietf.org/doc/html/rfc5646)"
type: string
LastUpdated:
description: Timestamp when the object was last updated
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
LifecycleCreateSettingObject:
description: Determines whether to update a user in the app when a user in Okta
is updated
properties:
status:
allOf:
- $ref: '#/components/schemas/EnabledStatus'
- default: DISABLED
type: object
LifecycleDeactivateSettingObject:
description: Determines whether deprovisioning occurs when the app is unassigned
properties:
status:
allOf:
- $ref: '#/components/schemas/EnabledStatus'
- default: DISABLED
type: object
LifecycleExpirationPolicyRuleCondition:
properties:
lifecycleStatus:
type: string
number:
type: integer
unit:
type: string
type: object
LifecycleStatus:
enum:
- ACTIVE
- INACTIVE
type: string
LinkedHrefObject:
additionalProperties: true
example:
href: href
properties:
href:
description: Link URI
type: string
readOnly: true
required:
- href
title: Link Object
type: object
LinkedObject:
example:
_links:
self:
href: href
associated:
name: name
description: description
title: title
type: USER
primary:
name: name
description: description
title: title
type: USER
properties:
associated:
$ref: '#/components/schemas/LinkedObjectDetails'
primary:
$ref: '#/components/schemas/LinkedObjectDetails'
_links:
$ref: '#/components/schemas/LinkedObjectLinksSelf'
title: LinkedObject
type: object
LinkedObjectDetails:
example:
name: name
description: description
title: title
type: USER
properties:
description:
description: Description of the `primary` or the `associated` relationship
type: string
name:
description: "API name of the `primary` or the `associated` link. The `name`\
\ parameter can't start with a number and can only contain the following\
\ characters: `a-z`, `A-Z`,` 0-9`, and `_`."
type: string
title:
description: Display name of the `primary` or the `associated` link
type: string
type:
$ref: '#/components/schemas/LinkedObjectDetailsType'
required:
- name
- title
- type
title: LinkedObjectDetails
type: object
LinkedObjectDetailsType:
description: The object type for this relationship
enum:
- USER
type: string
x-enumDescriptions:
USER: Specifies the type of object
LinkedObjectLinksSelf:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
self:
href: href
properties:
self:
$ref: '#/components/schemas/LinkedHrefObject'
type: object
LinksActivate:
properties:
activate:
$ref: '#/components/schemas/LinksActivate_activate'
readOnly: true
type: object
LinksAerialConsentGranted:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
revoke:
$ref: '#/components/schemas/HrefObjectRevokeAerialConsent'
type: object
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksAerialConsentRevoked:
allOf:
- properties:
grant:
$ref: '#/components/schemas/HrefObjectGrantAerialConsent'
type: object
example:
grant:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksAppAndUser:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of resources related\
\ to the Application User."
example:
app:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
group:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
app:
$ref: '#/components/schemas/HrefObjectAppLink'
group:
$ref: '#/components/schemas/HrefObjectGroupLink'
user:
$ref: '#/components/schemas/HrefObjectUserLink'
readOnly: true
type: object
LinksAssignee:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification."
example:
assignee:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
assignee:
$ref: '#/components/schemas/HrefObjectAssigneeLink'
type: object
LinksCancel:
properties:
cancel:
$ref: '#/components/schemas/LinksCancel_cancel'
readOnly: true
type: object
LinksCustomRoleResponse:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources."
properties:
assignee:
$ref: '#/components/schemas/HrefObjectAssigneeLink'
member:
$ref: '#/components/schemas/HrefObjectMemberLink'
permissions:
$ref: '#/components/schemas/HrefObjectPermissionsLink'
resource-set:
$ref: '#/components/schemas/HrefObjectResourceSetLink'
role:
$ref: '#/components/schemas/HrefObjectRoleLink'
type: object
LinksDeactivate:
properties:
deactivate:
$ref: '#/components/schemas/LinksDeactivate_deactivate'
readOnly: true
type: object
LinksEnroll:
properties:
enroll:
$ref: '#/components/schemas/LinksEnroll_enroll'
readOnly: true
type: object
LinksFactor:
properties:
factor:
$ref: '#/components/schemas/LinksFactor_factor'
readOnly: true
type: object
LinksGovernanceResources:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the resources using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification."
properties:
resources:
$ref: '#/components/schemas/HrefObjectGovernanceResourcesLink'
readOnly: true
type: object
LinksGovernanceSources:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the sources using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification."
properties:
assignee:
$ref: '#/components/schemas/HrefObjectUserLink'
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
readOnly: true
type: object
LinksNext:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. Use the `LinksNext` object for dynamic discovery of related\
\ resources and lifecycle operations."
example:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
next:
$ref: '#/components/schemas/HrefObject'
readOnly: true
type: object
LinksNextForRoleAssignments:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification."
example:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
next:
$ref: '#/components/schemas/LinksNextForRoleAssignments_next'
readOnly: true
type: object
LinksPoll:
properties:
poll:
$ref: '#/components/schemas/LinksPoll_poll'
readOnly: true
type: object
LinksQrcode:
properties:
qrcode:
$ref: '#/components/schemas/LinksQrcode_qrcode'
readOnly: true
type: object
LinksQuestions:
properties:
question:
$ref: '#/components/schemas/LinksQuestions_question'
readOnly: true
type: object
LinksResend:
properties:
resend:
$ref: '#/components/schemas/LinksResend_resend'
readOnly: true
type: object
LinksSelf:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
readOnly: true
type: object
LinksSelfAndFullUsersLifecycle:
allOf:
- $ref: '#/components/schemas/LinksSelfAndLifecycle'
- properties:
suspend:
$ref: '#/components/schemas/HrefObjectSuspendLink'
unsuspend:
$ref: '#/components/schemas/HrefObjectUnsuspendLink'
users:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Link to Device users
type: object
example:
suspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
unsuspend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users: ""
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksSelfAndLifecycle:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
activate:
$ref: '#/components/schemas/HrefObjectActivateLink'
deactivate:
$ref: '#/components/schemas/HrefObjectDeactivateLink'
type: object
example:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksSelfAndRoles:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
roles:
$ref: '#/components/schemas/HrefObjectRoleLink'
type: object
example:
roles:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksSelfForRoleAssignment:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources."
properties:
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
type: object
LinksSelfLifecycleAndAuthorize:
allOf:
- $ref: '#/components/schemas/LinksSelfAndLifecycle'
- properties:
authorize:
$ref: '#/components/schemas/HrefObjectAuthorizeLink'
type: object
example:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
authorize:
hints:
allow:
- DELETE
- DELETE
guidance:
- guidance
- guidance
href: href
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksSend:
properties:
send:
$ref: '#/components/schemas/LinksSend_send'
readOnly: true
type: object
LinksUser:
properties:
user:
$ref: '#/components/schemas/LinksUser_user'
readOnly: true
type: object
LinksUserRef:
properties:
user:
$ref: '#/components/schemas/HrefObjectUserLink'
type: object
LinksVerify:
properties:
verify:
$ref: '#/components/schemas/LinksVerify_verify'
readOnly: true
type: object
ListProfileMappings:
description: |-
A collection of the profile mappings that include a subset of the profile mapping object's properties. The Profile Mapping object describes a mapping between an Okta User's and an App User's properties using [JSON Schema Draft 4](https://datatracker.ietf.org/doc/html/draft-zyp-json-schema-04).
> **Note:** Same type source/target mappings aren't supported by this API. Profile mappings must either be Okta->App or App->Okta.
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
source:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
target:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
properties:
id:
description: Unique identifier for profile mapping
readOnly: true
type: string
source:
$ref: '#/components/schemas/ProfileMappingSource'
target:
$ref: '#/components/schemas/ProfileMappingTarget'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
LoadingPageTouchPointVariant:
default: OKTA_DEFAULT
description: |
Variant for the Okta loading page. You can publish a theme for Okta loading page with different combinations of assets. Variants are preset combinations of those assets.
enum:
- NONE
- OKTA_DEFAULT
type: string
x-enumDescriptions:
NONE: Uses no loading page animation during the redirect
OKTA_DEFAULT: Uses the default Okta loading page animation during the redirect
LocationGranularity:
enum:
- CITY
- COUNTRY
- LAT_LONG
- SUBDIVISION
type: string
LogActor:
description: "Describes the user, app, client, or other entity (actor) who performs\
\ an action on a target. The actor is dependent on the action that is performed.\
\ All events have actors."
example:
alternateId: alternateId
displayName: displayName
id: id
detailEntry:
key: ""
type: type
properties:
alternateId:
description: Alternative ID of the actor
readOnly: true
type: string
detailEntry:
additionalProperties: true
description: Further details about the actor
readOnly: true
type: object
displayName:
description: Display name of the actor
readOnly: true
type: string
id:
description: ID of the actor
readOnly: true
type: string
type:
description: Type of actor
readOnly: true
type: string
type: object
LogAuthenticationContext:
description: |-
All authentication relies on validating one or more credentials that prove the authenticity of the actor's identity. Credentials are sometimes provided by the actor, as is the case with passwords, and at other times provided by a third party, and validated by the authentication provider.
The authenticationContext contains metadata about how the actor is authenticated. For example, an authenticationContext for an event, where a user authenticates with Integrated Windows Authentication (IWA), looks like the following:
```
{
"authenticationProvider": "ACTIVE_DIRECTORY",
"authenticationStep": 0,
"credentialProvider": null,
"credentialType": "IWA",
"externalSessionId": "102N1EKyPFERROGvK9wizMAPQ",
"interface": null,
"issuer": null
}
```
In this case, the user enters an IWA credential to authenticate against an Active Directory instance. All of the user's future-generated events in this sign-in session are going to share the same `externalSessionId`.
Among other operations, this response object can be used to scan for suspicious sign-in activity or perform analytics on user authentication habits (for example, how often authentication scheme X is used versus authentication scheme Y).
example:
credentialType: ASSERTION
authenticationProvider: ACTIVE_DIRECTORY
credentialProvider: DUO
externalSessionId: externalSessionId
interface: interface
authenticationStep: 0
issuer:
id: id
type: type
properties:
authenticationProvider:
$ref: '#/components/schemas/LogAuthenticationProvider'
authenticationStep:
description: The zero-based step number in the authentication pipeline.
Currently unused and always set to `0`.
readOnly: true
type: integer
credentialProvider:
$ref: '#/components/schemas/LogCredentialProvider'
credentialType:
$ref: '#/components/schemas/LogCredentialType'
externalSessionId:
description: "A proxy for the actor's [session ID](https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html)"
readOnly: true
type: string
interface:
description: "The third-party user interface that the actor authenticates\
\ through, if any."
readOnly: true
type: string
issuer:
$ref: '#/components/schemas/LogIssuer'
type: object
LogAuthenticationProvider:
description: The system that proves the identity of an actor using the credentials
provided to it
enum:
- ACTIVE_DIRECTORY
- FACTOR_PROVIDER
- FEDERATION
- LDAP
- OKTA_AUTHENTICATION_PROVIDER
- SOCIAL
type: string
LogClient:
description: "When an event is triggered by an HTTP request, the `client` object\
\ describes the [client](https://datatracker.ietf.org/doc/html/rfc2616) that\
\ issues the HTTP request. For instance, the web browser is the client when\
\ a user accesses Okta. When this request is received and processed, a sign-in\
\ event is fired. When the event isn't sourced to an HTTP request, such as\
\ an automatic update, the `client` object field is blank."
example:
zone: zone
ipAddress: ipAddress
userAgent:
os: os
browser: browser
rawUserAgent: rawUserAgent
id: id
device: device
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
properties:
device:
description: "Type of device that the client operates from (for example,\
\ computer)"
readOnly: true
type: string
geographicalContext:
$ref: '#/components/schemas/LogGeographicalContext'
id:
description: "For OAuth requests, this is the ID of the OAuth [client](https://datatracker.ietf.org/doc/html/rfc6749#section-1.1)\
\ making the request. For SSWS token requests, this is the ID of the agent\
\ making the request."
readOnly: true
type: string
ipAddress:
description: IP address that the client is making its request from
readOnly: true
type: string
userAgent:
$ref: '#/components/schemas/LogUserAgent'
zone:
description: "The `name` of the [Zone](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/NetworkZone/#tag/NetworkZone/operation/getNetworkZone)\
\ that the client's location is mapped to"
readOnly: true
type: string
type: object
LogCredentialProvider:
description: "A credential provider is a software service that manages identities\
\ and their associated credentials. When authentication occurs through credentials\
\ provided by a credential provider, the credential provider is recorded here."
enum:
- DUO
- GOOGLE
- OKTA_AUTHENTICATION_PROVIDER
- OKTA_CREDENTIAL_PROVIDER
- RSA
- SYMANTEC
- YUBIKEY
type: string
LogCredentialType:
description: The underlying technology/scheme used in the credential
enum:
- ASSERTION
- CERTIFICATE
- DEVICE_UDID
- EMAIL
- IWA
- JWT
- OAuth 2.0
- OKTA_CLIENT_SESSION
- OTP
- PASSWORD
- PRE_SHARED_SYMMETRIC_KEY
- SMS
type: string
LogDebugContext:
description: |-
For some kinds of events (for example, OLM provisioning, sign-in request, second factor SMS, and so on), the fields that are provided in other response objects aren't sufficient to adequately describe the operations that the event has performed. In such cases, the `debugContext` object provides a way to store additional information.
For example, an event where a second factor SMS token is sent to a user may have a `debugContext` that looks like the following:
```
{
"debugData": {
"requestUri": "/api/v1/users/00u3gjksoiRGRAZHLSYV/factors/smsf8luacpZJAva10x45/verify",
"smsProvider": "TELESIGN",
"transactionId": "268632458E3C100F5F5F594C6DC689D4"
}
}
```
By inspecting the debugData field, you can find the URI that is used to trigger the second factor SMS (`/api/v1/users/00u3gjksoiRGRAZHLSYV/factors/smsf8luacpZJAva10x45/verify`), the SMS provider (`TELESIGN`), and the ID used by Telesign to identify this transaction (`268632458E3C100F5F5F594C6DC689D4`).
If for some reason the information that is needed to implement a feature isn't provided in other response objects, you should scan the `debugContext.debugData` field for potentially useful fields.
> **Important:** The information contained in `debugContext.debugData` is intended to add context when troubleshooting customer platform issues. Both key names and values may change from release to release and aren't guaranteed to be stable. Therefore, they shouldn't be viewed as a data contract but as a debugging aid instead.
example:
debugData:
key: ""
properties:
debugData:
additionalProperties: true
description: A dynamic field that contains miscellaneous information that
is dependent on the event type.
readOnly: true
type: object
type: object
LogDevice:
description: The entity that describes a device enrolled with passwordless authentication
using Okta Verify.
example:
LogDeviceObject:
$ref: '#/components/examples/LogDeviceObject'
properties:
device_integrator:
description: The integration platform or software used with the device
readOnly: true
type: object
disk_encryption_type:
$ref: '#/components/schemas/LogDiskEncryptionType'
id:
description: ID of the device
readOnly: true
type: string
jailbreak:
description: If the device has removed software restrictions
readOnly: true
type: boolean
managed:
description: Indicates if the device is configured for device management
and is registered with Okta
readOnly: true
type: boolean
name:
readOnly: true
type: string
os_platform:
readOnly: true
type: string
os_version:
readOnly: true
type: string
registered:
description: Indicates if the device is registered with an Okta org and
is bound to an Okta Verify instance on the device
readOnly: true
type: boolean
screen_lock_type:
$ref: '#/components/schemas/LogScreenLockType'
secure_hardware_present:
description: The availability of hardware security on the device
readOnly: true
type: boolean
type: object
LogDiskEncryptionType:
enum:
- ALL_INTERNAL_VALUES
- FULL
- NONE
- SYSTEM_VOLUME
- USER
type: string
LogEvent:
example:
severity: DEBUG
request:
ipChain:
- ip: ip
source: source
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
version: version
- ip: ip
source: source
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
version: version
authenticationContext:
credentialType: ASSERTION
authenticationProvider: ACTIVE_DIRECTORY
credentialProvider: DUO
externalSessionId: externalSessionId
interface: interface
authenticationStep: 0
issuer:
id: id
type: type
eventType: eventType
published: 2000-01-23T04:56:07.000+00:00
securityContext:
asNumber: 5
domain: domain
isp: isp
isProxy: true
asOrg: asOrg
uuid: uuid
version: version
target:
- alternateId: alternateId
displayName: displayName
id: id
detailEntry:
key: ""
type: type
changeDetails:
LogTargetChangeDetails:
$ref: '#/components/examples/LogTargetChangeDetails'
- alternateId: alternateId
displayName: displayName
id: id
detailEntry:
key: ""
type: type
changeDetails:
LogTargetChangeDetails:
$ref: '#/components/examples/LogTargetChangeDetails'
actor:
alternateId: alternateId
displayName: displayName
id: id
detailEntry:
key: ""
type: type
debugContext:
debugData:
key: ""
displayMessage: displayMessage
client:
zone: zone
ipAddress: ipAddress
userAgent:
os: os
browser: browser
rawUserAgent: rawUserAgent
id: id
device: device
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
legacyEventType: legacyEventType
outcome:
result: SUCCESS
reason: reason
transaction:
detail:
key: ""
id: id
type: type
properties:
actor:
$ref: '#/components/schemas/LogActor'
authenticationContext:
$ref: '#/components/schemas/LogAuthenticationContext'
client:
$ref: '#/components/schemas/LogClient'
debugContext:
$ref: '#/components/schemas/LogDebugContext'
displayMessage:
description: The display message for an event
readOnly: true
type: string
eventType:
description: Type of event that is published
readOnly: true
type: string
legacyEventType:
description: Associated Events API Action `objectType` attribute value
readOnly: true
type: string
outcome:
$ref: '#/components/schemas/LogOutcome'
published:
description: Timestamp when the event is published
format: date-time
readOnly: true
type: string
request:
$ref: '#/components/schemas/LogRequest'
securityContext:
$ref: '#/components/schemas/LogSecurityContext'
severity:
$ref: '#/components/schemas/LogSeverity'
target:
items:
$ref: '#/components/schemas/LogTarget'
readOnly: true
type: array
transaction:
$ref: '#/components/schemas/LogTransaction'
uuid:
description: Unique identifier for an individual event
readOnly: true
type: string
version:
description: Versioning indicator
readOnly: true
type: string
type: object
LogGeographicalContext:
description: "Geographical context describes a set of geographic coordinates.\
\ In addition to containing latitude and longitude data, the `GeographicalContext`\
\ object also contains address data of postal code-level granularity. Within\
\ the `Client` object, the geographical context refers to the physical location\
\ of the client when it sends the request that triggers this event. All `Transaction`\
\ events with `type` equal to `WEB` have a geographical context set. `Transaction`\
\ events with `type` equal to `JOB` don't have a geographical context set.\
\ The geographical context data can be missing if the geographical data for\
\ a request can't be resolved."
example:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
properties:
city:
description: "The city that encompasses the area that contains the geolocation\
\ coordinates, if available (for example, Seattle, San Francisco)"
readOnly: true
type: string
country:
description: "Full name of the country that encompasses the area that contains\
\ the geolocation coordinates (for example, France, Uganda)"
readOnly: true
type: string
geolocation:
$ref: '#/components/schemas/LogGeolocation'
postalCode:
description: Postal code of the area that encompasses the geolocation coordinates
readOnly: true
type: string
state:
description: "Full name of the state or province that encompasses the area\
\ that contains the geolocation coordinates (for example, Montana, Ontario)"
readOnly: true
type: string
type: object
LogGeolocation:
description: "The latitude and longitude of the geolocation where an action\
\ was performed. The object is formatted according to the [ISO-6709](https://www.iso.org/obp/ui/fr/#iso:std:iso:6709:ed-3:v1:en)\
\ standard."
example:
lon: 1.4658129805029452
lat: 6.027456183070403
properties:
lat:
description: "Latitude which uses two digits for the [integer part](https://www.iso.org/obp/ui/fr/#iso:std:iso:6709:ed-3:v1:en#Latitude)"
format: double
readOnly: true
type: number
lon:
description: "Longitude which uses three digits for the [integer part](https://www.iso.org/obp/ui/fr/#iso:std:iso:6709:ed-3:v1:en#Longitude)"
format: double
readOnly: true
type: number
type: object
LogIpAddress:
example:
ip: ip
source: source
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
version: version
properties:
geographicalContext:
$ref: '#/components/schemas/LogGeographicalContext'
ip:
description: IP address
readOnly: true
type: string
source:
description: Details regarding the source
readOnly: true
type: string
version:
description: IP address version
readOnly: true
type: string
type: object
LogIssuer:
description: Describes the issuer of the authorization server when the authentication
is performed through OAuth. This is the location where well-known resources
regarding the details of the authorization servers are published.
example:
id: id
type: type
properties:
id:
description: "Varies depending on the type of authentication. If authentication\
\ is SAML 2.0, `id` is the issuer in the SAML assertion. For social login,\
\ `id` is the issuer of the token."
readOnly: true
type: string
type:
description: Information on the `issuer` and source of the SAML assertion
or token
readOnly: true
type: string
type: object
LogOutcome:
example:
result: SUCCESS
reason: reason
properties:
reason:
description: "Reason for the result, for example, `INVALID_CREDENTIALS`"
maxLength: 255
minLength: 1
readOnly: true
type: string
result:
description: Result of the action
enum:
- SUCCESS
- FAILURE
- SKIPPED
- ALLOW
- DENY
- CHALLENGE
- UNKNOWN
readOnly: true
type: string
type: object
LogRequest:
description: "The `Request` object describes details that are related to the\
\ HTTP request that triggers this event, if available. When the event isn't\
\ sourced to an HTTP request, such as an automatic update on the Okta servers,\
\ the `Request` object still exists, but the `ipChain` field is empty."
example:
ipChain:
- ip: ip
source: source
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
version: version
- ip: ip
source: source
geographicalContext:
country: country
city: city
postalCode: postalCode
state: state
geolocation:
lon: 1.4658129805029452
lat: 6.027456183070403
version: version
properties:
ipChain:
description: "If the incoming request passes through any proxies, the IP\
\ addresses of those proxies are stored here in the format of clientIp,\
\ proxy1, proxy2, and so on. This field is useful when working with trusted\
\ proxies."
items:
$ref: '#/components/schemas/LogIpAddress'
readOnly: true
type: array
type: object
LogScreenLockType:
enum:
- BIOMETRIC
- NONE
- PASSCODE
type: string
LogSecurityContext:
description: "The `securityContext` object provides security information that\
\ is directly related to the evaluation of the event's IP reputation. IP reputation\
\ is a trustworthiness rating that evaluates how likely a sender is to be\
\ malicious and is based on the sender's IP address. As the name implies,\
\ the `securityContext` object is useful for security applications-flagging\
\ and inspecting suspicious events."
example:
asNumber: 5
domain: domain
isp: isp
isProxy: true
asOrg: asOrg
properties:
asNumber:
description: "The [Autonomous system](https://docs.telemetry.mozilla.org/datasets/other/asn_aggregates/reference)\
\ number that's associated with the autonomous system the event request\
\ was sourced to"
readOnly: true
type: integer
asOrg:
description: The organization that is associated with the autonomous system
that the event request is sourced to
readOnly: true
type: string
domain:
description: The domain name that's associated with the IP address of the
inbound event request
readOnly: true
type: string
isp:
description: The Internet service provider that's used to send the event's
request
readOnly: true
type: string
isProxy:
description: Specifies whether an event's request is from a known proxy
readOnly: true
type: boolean
type: object
LogSeverity:
description: Indicates how severe the event is
enum:
- DEBUG
- ERROR
- INFO
- WARN
type: string
LogStream:
discriminator:
mapping:
aws_eventbridge: '#/components/schemas/LogStreamAws'
splunk_cloud_logstreaming: '#/components/schemas/LogStreamSplunk'
propertyName: type
example:
lastUpdated: 2022-10-21T17:15:10Z
_links:
activate:
method: GET
href: href
self:
method: GET
href: href
deactivate:
method: GET
href: href
created: 2022-10-21T16:59:59Z
name: My AWS EventBridge log stream
id: 0oa1orzg0CHSgPcjZ0g4
type: aws_eventbridge
status: ACTIVE
properties:
created:
description: Timestamp when the Log Stream object was created
example: 2022-10-21T16:59:59Z
format: date-time
readOnly: true
type: string
id:
description: Unique identifier for the Log Stream
example: 0oa1orzg0CHSgPcjZ0g4
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Log Stream object was last updated
example: 2022-10-21T17:15:10Z
format: date-time
readOnly: true
type: string
name:
description: Unique name for the Log Stream object
example: My AWS EventBridge log stream
type: string
status:
description: Lifecycle status of the Log Stream object
enum:
- ACTIVE
- INACTIVE
readOnly: true
type: string
type:
$ref: '#/components/schemas/LogStreamType'
_links:
$ref: '#/components/schemas/LogStreamLinksSelfAndLifecycle'
required:
- _links
- created
- id
- lastUpdated
- name
- status
- type
type: object
LogStreamActivateLink:
allOf:
- $ref: '#/components/schemas/LogStreamLinkObject'
- description: Link to activate the resource
example:
method: GET
href: href
LogStreamAws:
allOf:
- $ref: '#/components/schemas/LogStream'
- properties:
settings:
$ref: '#/components/schemas/LogStreamSettingsAws'
required:
- settings
type: object
LogStreamAwsPutSchema:
allOf:
- $ref: '#/components/schemas/LogStreamPutSchema'
- properties:
settings:
$ref: '#/components/schemas/LogStreamSettingsAws'
required:
- settings
type: object
LogStreamDeactivateLink:
allOf:
- $ref: '#/components/schemas/LogStreamLinkObject'
- description: Link to deactivate the resource
example:
method: GET
href: href
LogStreamLinkObject:
properties:
href:
description: The URI of the resource
type: string
method:
description: HTTP method allowed for the resource
enum:
- GET
- POST
type: string
readOnly: true
required:
- href
title: Log Stream Link object
type: object
LogStreamLinksSelfAndLifecycle:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
activate:
method: GET
href: href
self:
method: GET
href: href
deactivate:
method: GET
href: href
properties:
activate:
$ref: '#/components/schemas/LogStreamActivateLink'
deactivate:
$ref: '#/components/schemas/LogStreamDeactivateLink'
self:
$ref: '#/components/schemas/LogStreamSelfLink'
readOnly: true
required:
- self
type: object
LogStreamName:
description: Unique name for the Log Stream object
example: My AWS EventBridge log stream
type: string
LogStreamPutSchema:
discriminator:
mapping:
aws_eventbridge: '#/components/schemas/LogStreamAwsPutSchema'
splunk_cloud_logstreaming: '#/components/schemas/LogStreamSplunkPutSchema'
propertyName: type
example:
name: My AWS EventBridge log stream
type: aws_eventbridge
properties:
name:
description: Unique name for the Log Stream object
example: My AWS EventBridge log stream
type: string
type:
$ref: '#/components/schemas/LogStreamType'
required:
- name
- type
type: object
LogStreamSchema:
example:
oneOf:
- const: const
title: title
- const: const
title: title
$schema: $schema
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
errorMessage: "{}"
pattern: pattern
id: id
title: title
type: type
properties: "{}"
required:
- required
- required
properties:
$schema:
description: JSON Schema version identifier
readOnly: true
type: string
errorMessage:
description: "A collection of error messages for individual properties in\
\ the schema. Okta implements a subset of [ajv-errors](https://github.com/ajv-validator/ajv-errors)."
type: object
id:
description: URI of Log Stream Schema
readOnly: true
type: string
oneOf:
description: |-
Non-empty array of valid JSON schemas.
Okta only supports `oneOf` for specifying display names for an `enum`. Each schema has the following format:
```
{
"const": "enumValue",
"title": "display name"
}
```json
items:
$ref: '#/components/schemas/UserSchemaAttributeEnum'
nullable: true
type: array
pattern:
description: "For `string` Log Stream Schema property type, specifies the\
\ regular expression used to validate the property"
type: string
properties:
description: Log Stream Schema properties object
type: object
required:
description: Required properties for this Log Stream Schema object
items:
type: string
type: array
title:
description: Name of the Log Streaming integration
type: string
type:
description: Type of Log Stream Schema property
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
LogStreamSelfLink:
allOf:
- $ref: '#/components/schemas/LogStreamLinkObject'
- description: Link to the resource (self)
example:
method: GET
href: href
LogStreamSettingsAws:
description: Specifies the configuration for the `aws_eventbridge` Log Stream
type. This configuration can't be modified after creation.
properties:
accountId:
description: Your AWS account ID
example: "123456789012"
maxLength: 12
minLength: 12
type: string
eventSourceName:
description: An alphanumeric name (no spaces) to identify this event source
in AWS EventBridge
example: your-event-source-name
maxLength: 75
minLength: 1
pattern: "^[a-zA-Z0-9.\\-_]$"
type: string
region:
$ref: '#/components/schemas/AwsRegion'
required:
- accountId
- eventSourceName
- region
type: object
LogStreamSettingsSplunk:
description: Specifies the configuration for the `splunk_cloud_logstreaming`
Log Stream type.
properties:
edition:
$ref: '#/components/schemas/SplunkEdition'
host:
description: "The domain name for your Splunk Cloud instance. Don't include\
\ `http` or `https` in the string. For example: `acme.splunkcloud.com`"
example: acme.splunkcloud.com
maxLength: 116
minLength: 17
type: string
token:
description: "The HEC token for your Splunk Cloud HTTP Event Collector.\
\ The token value is set at object creation, but isn't returned."
example: 11111111-1111-2222-2222-222222222222
pattern: "(?i)^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$"
type: string
writeOnly: true
required:
- edition
- host
- token
type: object
LogStreamSettingsSplunkPut:
description: Specifies the configuration for the `splunk_cloud_logstreaming`
Log Stream type.
properties:
edition:
$ref: '#/components/schemas/SplunkEdition'
host:
description: "The domain name for your Splunk Cloud instance. Don't include\
\ `http` or `https` in the string. For example: `acme.splunkcloud.com`"
example: acme.splunkcloud.com
maxLength: 116
minLength: 17
type: string
required:
- edition
- host
type: object
LogStreamSplunk:
allOf:
- $ref: '#/components/schemas/LogStream'
- properties:
settings:
$ref: '#/components/schemas/LogStreamSettingsSplunk'
required:
- settings
type: object
LogStreamSplunkPutSchema:
allOf:
- $ref: '#/components/schemas/LogStreamPutSchema'
- properties:
settings:
$ref: '#/components/schemas/LogStreamSettingsSplunkPut'
required:
- settings
type: object
LogStreamType:
description: |-
Specifies the streaming provider used
Supported providers:
* `aws_eventbridge` ([AWS EventBridge](https://aws.amazon.com/eventbridge))
* `splunk_cloud_logstreaming` ([Splunk Cloud](https://www.splunk.com/en_us/software/splunk-cloud-platform.html))
Select the provider type to see provider-specific configurations in the `settings` property:
enum:
- aws_eventbridge
- splunk_cloud_logstreaming
type: string
LogTarget:
description: "The entity that an actor performs an action on. Targets can be\
\ anything, such as an app user, a sign-in token, or anything else."
example:
alternateId: alternateId
displayName: displayName
id: id
detailEntry:
key: ""
type: type
changeDetails:
LogTargetChangeDetails:
$ref: '#/components/examples/LogTargetChangeDetails'
properties:
alternateId:
description: The alternate ID of the target
readOnly: true
type: string
changeDetails:
$ref: '#/components/schemas/LogTarget_changeDetails'
detailEntry:
additionalProperties: true
description: Further details on the target
readOnly: true
type: object
displayName:
description: The display name of the target
readOnly: true
type: string
id:
description: The ID of the target
readOnly: true
type: string
type:
description: The type of target
readOnly: true
type: string
type: object
LogTransaction:
description: "A `transaction` object comprises contextual information associated\
\ with its respective event. \nThis information is useful for understanding\
\ sequences of correlated events.\nFor example, a `transaction` object such\
\ as the following:\n```\n{\n \"id\": \"Wn4f-0RQ8D8lTSLkAmkKdQAADqo\",\n\
\ \"type\": \"WEB\",\n \"detail\": null\n}\n```\nindicates that a `WEB`\
\ request with `id` `Wn4f-0RQ8D8lTSLkAmkKdQAADqo` has created this event.\n\
\nA `transaction` object with a `requestApiTokenId` in the `detail` object,\
\ for example :\n```\n{\n \"id\": \"YjSlblAAqnKY7CdyCkXNBgAAAIU\",\n \"\
type\": \"WEB\",\n \"detail\": {\n \"requestApiTokenId\": \"00T94e3cn9kSEO3c51s5\"\
\n }\n}\n```\nindicates that this event was the result of an action performed\
\ through an API using the token identified by 00T94e3cn9kSEO3c51s5. The token\
\ ID is visible in the Admin Console, **Security** > **API**. See [API token\
\ management](https://help.okta.com/okta_help.htm?id=Security_API). For more\
\ information on API tokens, see [Create an API token](https://developer.okta.com/docs/guides/create-an-api-token/)."
example:
detail:
key: ""
id: id
type: type
properties:
detail:
additionalProperties: true
description: Details for this transaction.
readOnly: true
type: object
id:
description: Unique identifier for this transaction.
readOnly: true
type: string
type:
description: Describes the kind of transaction. `WEB` indicates a web request.
`JOB` indicates an asynchronous task.
readOnly: true
type: string
type: object
LogUserAgent:
description: |
"A user agent is software (a software agent) that is acting on behalf of a user." ([Definition of User Agent](https://developer.mozilla.org/en-US/docs/Glossary/User_agent))
In the Okta event data object, the `UserAgent` object provides specifications about the client software that makes event-triggering HTTP requests. User agent identification is often useful for identifying interoperability problems between servers and clients, and also for browser and operating system usage analytics.
example:
os: os
browser: browser
rawUserAgent: rawUserAgent
properties:
browser:
description: "If the client is a web browser, this field identifies the\
\ type of web browser (for example, CHROME, FIREFOX)"
readOnly: true
type: string
os:
description: "The operating system that the client runs on (for example,\
\ Windows 10)"
readOnly: true
type: string
rawUserAgent:
description: "A raw string representation of the user agent that is formatted\
\ according to [section 5.5.3 of HTTP/1.1 Semantics and Content](https://datatracker.ietf.org/doc/html/rfc7231#section-5.5.3).\
\ Both the `browser` and the `OS` fields can be derived from this field."
readOnly: true
type: string
type: object
MDMEnrollmentPolicyEnrollment:
enum:
- ANY_OR_NONE
- OMM
type: string
MDMEnrollmentPolicyRuleCondition:
properties:
blockNonSafeAndroid:
type: boolean
enrollment:
$ref: '#/components/schemas/MDMEnrollmentPolicyEnrollment'
type: object
MetadataLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [SAML metadata](/openapi/okta-management/management/tag/ApplicationSSO/#tag/ApplicationSSO/operation/previewSAMLmetadataForApplication)\
\ for SSO"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
MtlsCredentials:
description: Certificate chain description for verifying assertions from the
Smart Card
properties:
trust:
$ref: '#/components/schemas/MtlsTrustCredentials'
type: object
MtlsEndpoints:
properties:
sso:
$ref: '#/components/schemas/MtlsSsoEndpoint'
type: object
MtlsSsoEndpoint:
description: The Single Sign-On (SSO) endpoint is the IdP's `SingleSignOnService`
endpoint
properties:
url:
example: "https://{yourOktaDomain}.okta.com/login/cert"
maxLength: 1014
type: string
type: object
MtlsTrustCredentials:
properties:
audience:
description: Not used
type: string
example: null
issuer:
description: Description of the certificate issuer
example: "CN=Test Smart Card, OU=Test OU, O=Test O, C=US"
maxLength: 1024
type: string
kid:
description: IdP Key Credential reference to the Okta X.509 signature certificate
example: your-key-id
type: string
revocation:
$ref: '#/components/schemas/MtlsTrustCredentialsRevocation'
revocationCacheLifetime:
description: Time in minutes to cache the certificate revocation information
example: 2880
maximum: 4320
type: number
type: object
MtlsTrustCredentialsRevocation:
description: Mechanism to validate the certificate
enum:
- CRL
- DELTA_CRL
- OCSP
example: CRL
type: string
NetworkZone:
discriminator:
mapping:
IP: '#/components/schemas/IPNetworkZone'
DYNAMIC: '#/components/schemas/DynamicNetworkZone'
DYNAMIC_V2: '#/components/schemas/EnhancedDynamicNetworkZone'
propertyName: type
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: true
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
usage: BLOCKLIST
name: name
id: id
type: DYNAMIC
status: ACTIVE
properties:
created:
description: Timestamp when the object was created
format: date-time
readOnly: true
type: string
id:
description: Unique identifier for the Network Zone
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last modified
format: date-time
readOnly: true
type: string
name:
description: Unique name for this Network Zone
maxLength: 128
type: string
status:
$ref: '#/components/schemas/NetworkZoneStatus'
system:
description: |
Indicates a system Network Zone:
* `true` for system Network Zones
* `false` for custom Network Zones
The Okta org provides the following default system Network Zones:
* `LegacyIpZone`
* `BlockedIpZone`
* `DefaultEnhancedDynamicZone`
Admins can modify the name of the default system Network Zone and add up to 5000 gateway or proxy IP entries.
readOnly: true
type: boolean
type:
$ref: '#/components/schemas/NetworkZoneType'
usage:
$ref: '#/components/schemas/NetworkZoneUsage'
_links:
$ref: '#/components/schemas/LinksSelfAndLifecycle'
required:
- name
- type
type: object
NetworkZoneAddress:
description: Specifies the value of an IP address expressed using either `range`
or `CIDR` form.
properties:
type:
$ref: '#/components/schemas/NetworkZoneAddressType'
value:
description: "Value in CIDR/range form, depending on the `type` specified"
type: string
type: object
NetworkZoneAddressType:
description: Format of the IP addresses
enum:
- CIDR
- RANGE
type: string
NetworkZoneAsns:
items:
type: string
maximum: 75
type: array
NetworkZoneLocation:
properties:
country:
description: |-
The two-character ISO-3166-1 country code.
Don't use continent codes since they are treated as generic codes for undesignated countries.
For example: `US`
maxLength: 2
minLength: 2
type: string
region:
description: |-
(Optional) The ISO-3166-2 region code appended to the country code (`countryCode-regionCode`), or `null` if empty.
Don't use continent codes since they are treated as generic codes for undesignated regions.
For example: `CA` (for `US-CA` country and region code)
type: string
type: object
NetworkZoneLocationArray:
items:
$ref: '#/components/schemas/NetworkZoneLocation'
maximum: 75
nullable: true
type: array
NetworkZoneStatus:
description: Network Zone status
enum:
- ACTIVE
- INACTIVE
type: string
NetworkZoneType:
description: The type of Network Zone
enum:
- DYNAMIC
- IP
- DYNAMIC_V2
type: string
NetworkZoneUsage:
description: The usage of the Network Zone
enum:
- BLOCKLIST
- POLICY
type: string
NotificationType:
description: The type of notification
enum:
- AD_AGENT
- AGENT_AUTO_UPDATE_NOTIFICATION
- AGENT_AUTO_UPDATE_NOTIFICATION_LDAP
- APP_IMPORT
- CONNECTOR_AGENT
- IWA_AGENT
- LDAP_AGENT
- OKTA_ANNOUNCEMENT
- OKTA_ISSUE
- OKTA_UPDATE
- RATELIMIT_NOTIFICATION
- REPORT_SUSPICIOUS_ACTIVITY
- USER_DEPROVISION
- USER_LOCKED_OUT
type: string
x-enumDescriptions:
AD_AGENT: System notification sent when an AD agent disconnects or reconnects
AGENT_AUTO_UPDATE_NOTIFICATION: System notification sent when an agent automatically
updates
APP_IMPORT: System notification sent with the status of an app user import
CONNECTOR_AGENT: System notification sent when an on-premises provisioning
or Okta on-prem MFA agent disconnects or reconnects
IWA_AGENT: System notification sent when an IGA agent disconnects or reconnects
LDAP_AGENT: System notification sent when an LDAP agent disconnects or reconnects
OKTA_ANNOUNCEMENT: Okta communication sent for announcements and release notes
OKTA_ISSUE: Okta communication sent for trust incident alerts and updates
OKTA_UPDATE: Okta communication sent for scheduled system updates
RATELIMIT_NOTIFICATION: System notification sent when an org reaches rate
limit warning or violation thresholds
REPORT_SUSPICIOUS_ACTIVITY: System notification sent when a user reports suspicious
activity
USER_DEPROVISION: System notification sent when a user is deprovisioned from
apps
USER_LOCKED_OUT: System notification sent when a user is locked out from logging
in to Okta
OAuth2Actor:
description: User that created the object
example:
id: 00u5t60iloOHN9pBi0h7
type: User
properties:
id:
description: User ID
example: 00u5t60iloOHN9pBi0h7
readOnly: true
type: string
type:
description: Type of user
example: User
type: string
readOnly: true
type: object
OAuth2Claim:
example:
group_filter_type: CONTAINS
claimType: IDENTITY
system: true
alwaysIncludeInToken: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
valueType: EXPRESSION
name: name
id: id
conditions:
scopes:
- scopes
- scopes
value: value
status: ACTIVE
properties:
alwaysIncludeInToken:
description: "Specifies whether to include Claims in the token. The value\
\ is always `TRUE` for access token Claims. If the value is set to `FALSE`\
\ for an ID token claim, the Claim isn't included in the ID token when\
\ the token is requested with the access token or with the `authorization_code`.\
\ The client instead uses the access token to get Claims from the `/userinfo`\
\ endpoint."
type: boolean
claimType:
$ref: '#/components/schemas/OAuth2ClaimType'
conditions:
$ref: '#/components/schemas/OAuth2ClaimConditions'
group_filter_type:
$ref: '#/components/schemas/OAuth2ClaimGroupFilterType'
id:
description: ID of the Claim
readOnly: true
type: string
name:
description: Name of the Claim
type: string
status:
$ref: '#/components/schemas/LifecycleStatus'
system:
description: "When `true`, indicates that Okta created the Claim"
type: boolean
value:
description: "Specifies the value of the Claim. This value must be a string\
\ literal if `valueType` is `GROUPS`, and the string literal is matched\
\ with the selected `group_filter_type`. The value must be an Okta EL\
\ expression if `valueType` is `EXPRESSION`."
type: string
valueType:
$ref: '#/components/schemas/OAuth2ClaimValueType'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
OAuth2ClaimConditions:
description: Specifies the scopes for the Claim
example:
scopes:
- scopes
- scopes
properties:
scopes:
items:
type: string
type: array
type: object
OAuth2ClaimGroupFilterType:
description: |-
Specifies the type of group filter if `valueType` is `GROUPS`
If `valueType` is `GROUPS`, then the groups returned are filtered according to the value of `group_filter_type`.
If you have complex filters for Groups, you can [create a Groups allowlist](https://developer.okta.com/docs/guides/customize-tokens-groups-claim/main/) to put them all in a Claim.
enum:
- CONTAINS
- EQUALS
- REGEX
- STARTS_WITH
type: string
x-enumDescriptions:
STARTS_WITH: "Group names start with `value` (not case-sensitive). For example,\
\ if `value` is `group1`, then `group123` and `Group123` are included."
EQUALS: "Group name is the same as `value` (not case-sensitive). For example,\
\ if `value` is `group1`, then `group1` and `Group1` are included, but `group123`\
\ isn't."
CONTAINS: "Group names contain `value` (not case-sensitive). For example,\
\ if `value` is `group1`, then `MyGroup123` and `group1` are included."
REGEX: "Group names match the regular expression in `value` (case-sensitive).\
\ For example if `value` is `/^[a-z0-9_-]{3,16}$/`, then any Group name\
\ that has at least three letters, no more than 16, and contains lowercase\
\ letters, a hyphen, or numbers is a match."
OAuth2ClaimType:
description: Specifies whether the Claim is for an access token (`RESOURCE`)
or an ID token (`IDENTITY`)
enum:
- IDENTITY
- RESOURCE
type: string
OAuth2ClaimValueType:
description: "Specifies whether the Claim is an Okta Expression Language (EL)\
\ expression (`EXPRESSION`), a set of groups (`GROUPS`), or a system claim\
\ (`SYSTEM`)"
enum:
- EXPRESSION
- GROUPS
- SYSTEM
type: string
OAuth2Client:
example:
client_uri: https://www.example.com
_links:
grants: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
tokens: ""
logo_uri: https://www.example.com/logo.png
client_name: My App
client_id: 0oabskvc6442nkvQO0h7
properties:
client_id:
description: Unique key for the client application. The `client_id` is immutable.
example: 0oabskvc6442nkvQO0h7
readOnly: true
type: string
client_name:
description: Human-readable string name of the client application
example: My App
readOnly: true
type: string
client_uri:
example: https://www.example.com
readOnly: true
type: string
logo_uri:
description: URL string that references a logo for the client consent dialog
(not the sign-in dialog)
example: https://www.example.com/logo.png
readOnly: true
type: string
_links:
$ref: '#/components/schemas/OAuth2Client__links'
type: object
OAuth2ClientJsonWebKey:
example:
kty: RSA
lastUpdated: 2023-02-21T20:08:24.000Z
e: AQAB
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
delete:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2023-02-21T20:08:24.000Z
use: sig
kid: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
id: pks2f4zrZbs8nUa7p0g4
alg: RS256
"n": mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
status: ACTIVE
properties:
alg:
description: Algorithm used in the key
example: RS256
nullable: false
type: string
created:
description: Timestamp when the OAuth Client 2.0 JSON Web Key was created
example: 2023-02-21T20:08:24.000Z
nullable: false
readOnly: true
type: string
e:
description: RSA key value (exponent) for key binding
example: AQAB
nullable: false
type: string
id:
description: The unique ID of the OAuth Client JSON Web Key
example: pks2f4zrZbs8nUa7p0g4
nullable: false
readOnly: true
type: string
kid:
description: Unique identifier of the JSON Web Key in the OAUth 2.0 Client's
JWKS
example: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
nullable: true
type: string
kty:
description: Cryptographic algorithm family for the certificate's key pair
example: RSA
nullable: false
type: string
lastUpdated:
description: Timestamp when the OAuth Client 2.0 JSON Web Key was updated
example: 2023-02-21T20:08:24.000Z
nullable: false
readOnly: true
type: string
"n":
description: RSA key value (modulus) for key binding
example: mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
nullable: false
type: string
status:
default: ACTIVE
description: Status of the OAuth 2.0 Client JSON Web Key
enum:
- ACTIVE
- INACTIVE
example: ACTIVE
nullable: false
type: string
use:
description: Acceptable use of the JSON Web Key
example: sig
nullable: false
type: string
_links:
$ref: '#/components/schemas/OAuthClientSecretLinks'
type: object
OAuth2ClientJsonWebKeyRequestBody:
example:
kty: RSA
e: AQAB
use: sig
kid: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
alg: RS256
"n": mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
status: ACTIVE
properties:
alg:
description: Algorithm used in the key
example: RS256
nullable: false
type: string
e:
description: RSA key value (exponent) for key binding
example: AQAB
nullable: false
type: string
kid:
description: Unique identifier of the JSON Web Key in the OAUth 2.0 Client's
JWKS
example: SIMcCQNY3uwXoW3y0vf6VxiBb5n9pf8L2fK8d-FIbm4
nullable: true
type: string
kty:
description: Cryptographic algorithm family for the certificate's key pair
example: RSA
nullable: false
type: string
"n":
description: RSA key value (modulus) for key binding
example: mkC6yAJVvFwUlmM9gKjb2d-YK5qHFt-mXSsbjWKKs4EfNm-BoQeeovBZtSACyaqLc8IYFTPEURFcbDQ9DkAL04uUIRD2gaHYY7uK0jsluEaXGq2RAIsmzAwNTzkiDw4q9pDL_q7n0f_SDt1TsMaMQayB6bU5jWsmqcWJ8MCRJ1aJMjZ16un5UVx51IIeCbe4QRDxEXGAvYNczsBoZxspDt28esSpq5W0dBFxcyGVudyl54Er3FzAguhgfMVjH-bUec9j2Tl40qDTktrYgYfxz9pfjm01Hl4WYP1YQxeETpSL7cQ5Ihz4jGDtHUEOcZ4GfJrPzrGpUrak8Qp5xcwCqQ
nullable: false
type: string
status:
description: Status of the OAuth 2.0 Client JSON Web Key
enum:
- ACTIVE
- INACTIVE
example: ACTIVE
type: string
use:
description: Acceptable use of the JSON Web Key
example: sig
nullable: false
type: string
type: object
OAuth2ClientSecret:
example:
lastUpdated: 2023-02-21T20:08:24.000Z
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
delete:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2023-02-21T20:08:24.000Z
secret_hash: yk4SVx4sUWVJVbHt6M-UPA
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
id: ocs2f4zrZbs8nUa7p0g4
status: ACTIVE
properties:
client_secret:
description: The OAuth 2.0 client secret string
example: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
nullable: false
readOnly: true
type: string
created:
description: Timestamp when the OAuth Client 2.0 Secret was created
example: 2023-02-21T20:08:24.000Z
nullable: false
readOnly: true
type: string
id:
description: The unique ID of the OAuth Client Secret
example: ocs2f4zrZbs8nUa7p0g4
nullable: false
readOnly: true
type: string
lastUpdated:
description: Timestamp when the OAuth Client 2.0 Secret was updated
example: 2023-02-21T20:08:24.000Z
nullable: false
readOnly: true
type: string
secret_hash:
description: OAuth 2.0 client secret string hash
example: yk4SVx4sUWVJVbHt6M-UPA
nullable: false
readOnly: true
type: string
status:
default: ACTIVE
description: Status of the OAuth 2.0 Client Secret
enum:
- ACTIVE
- INACTIVE
example: ACTIVE
nullable: false
type: string
_links:
$ref: '#/components/schemas/OAuthClientSecretLinks'
type: object
OAuth2ClientSecretRequestBody:
example:
client_secret: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
status: ACTIVE
properties:
client_secret:
description: The OAuth 2.0 client secret string
example: DRUFXGF9XbLn......a3x3POBiIxDreBCdZuFs5B
type: string
status:
description: Status of the OAuth 2.0 Client Secret
enum:
- ACTIVE
- INACTIVE
example: ACTIVE
type: string
type: object
OAuth2RefreshToken:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
clientId: clientId
_embedded:
scopes:
- _links:
scope: ""
displayName: displayName
name: offline_access
description: "Requests a refresh token by default, used to obtain more\
\ access tokens without re-prompting the user for authentication"
id: scppb56cIl4GvGxy70g3
- _links:
scope: ""
displayName: displayName
name: offline_access
description: "Requests a refresh token by default, used to obtain more\
\ access tokens without re-prompting the user for authentication"
id: scppb56cIl4GvGxy70g3
_links:
app: ""
authorizationServer: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
hints:
allow:
- DELETE
- DELETE
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
client: ""
user: ""
created: 2017-03-28T01:11:10Z
id: oar579Mcp7OUsNTlo0g3
scopes:
- offline_access
- offline_access
userId: 00u5t60iloOHN9pBi0h7
expiresAt: 2000-01-23T04:56:07.000+00:00
issuer: "https://{yourOktaDomain}/oauth2/ausain6z9zIedDCxB0h7"
status: ACTIVE
properties:
clientId:
description: Client ID
type: string
created:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
expiresAt:
description: Expiration time of the OAuth 2.0 Token
format: date-time
readOnly: true
type: string
id:
description: ID of the Token object
example: oar579Mcp7OUsNTlo0g3
readOnly: true
type: string
issuer:
description: The complete URL of the authorization server that issued the
Token
example: "https://{yourOktaDomain}/oauth2/ausain6z9zIedDCxB0h7"
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
scopes:
description: The scope names attached to the Token
items:
example: offline_access
type: string
type: array
status:
$ref: '#/components/schemas/GrantOrTokenStatus'
userId:
description: The ID of the user associated with the Token
example: 00u5t60iloOHN9pBi0h7
type: string
_embedded:
$ref: '#/components/schemas/OAuth2RefreshToken__embedded'
_links:
$ref: '#/components/schemas/OAuth2RefreshToken__links'
type: object
OAuth2RefreshTokenScope:
example:
_links:
scope: ""
displayName: displayName
name: offline_access
description: "Requests a refresh token by default, used to obtain more access\
\ tokens without re-prompting the user for authentication"
id: scppb56cIl4GvGxy70g3
properties:
description:
description: Description of the Scope
example: "Requests a refresh token by default, used to obtain more access\
\ tokens without re-prompting the user for authentication"
type: string
displayName:
description: Name of the end user displayed in a consent dialog
type: string
id:
description: Scope object ID
example: scppb56cIl4GvGxy70g3
readOnly: true
type: string
name:
description: Scope name
example: offline_access
type: string
_links:
$ref: '#/components/schemas/OAuth2RefreshTokenScope__links'
type: object
OAuth2Scope:
example:
default: false
system: false
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
metadataPublish: NO_CLIENTS
optional: false
id: id
consent: IMPLICIT
properties:
consent:
$ref: '#/components/schemas/OAuth2ScopeConsentType'
default:
default: false
description: Indicates if this Scope is a default scope
type: boolean
description:
description: Description of the Scope
type: string
displayName:
description: Name of the end user displayed in a consent dialog
type: string
id:
description: Scope object ID
readOnly: true
type: string
metadataPublish:
$ref: '#/components/schemas/OAuth2ScopeMetadataPublish'
name:
description: Scope name
type: string
optional:
default: false
description: "Indicates whether the Scope is optional. When set to `true`,\
\ the user can skip consent for the scope."
type: boolean
system:
default: false
description: Indicates if Okta created the Scope
type: boolean
_links:
$ref: '#/components/schemas/LinksSelf'
required:
- name
type: object
OAuth2ScopeConsentGrant:
description: Grant object that represents an app consent scope grant
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
scopeId: okta.users.read
clientId: oag3ih1zrm1cBFOiq0h6
createdBy:
id: 00u5t60iloOHN9pBi0h7
type: User
_embedded:
scope:
id: okta.users.read
_links:
app: ""
authorizationServer: ""
scope: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
client: ""
user: ""
created: 2017-03-28T01:11:10Z
id: oag3ih1zrm1cBFOiq0h6
source: ADMIN
userId: 00u5t60iloOHN9pBi0h7
issuer: https://my_test_okta_org.oktapreview.com
status: ACTIVE
properties:
clientId:
description: Client ID of the app integration
example: oag3ih1zrm1cBFOiq0h6
readOnly: true
type: string
created:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
createdBy:
$ref: '#/components/schemas/OAuth2Actor'
id:
description: ID of the Grant object
example: oag3ih1zrm1cBFOiq0h6
readOnly: true
type: string
issuer:
description: The issuer of your org authorization server. This is typically
your Okta domain.
example: https://my_test_okta_org.oktapreview.com
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
scopeId:
description: "The name of the [Okta scope](https://developer.okta.com/docs/api/oauth2/#oauth-20-scopes)\
\ for which consent is granted"
example: okta.users.read
type: string
source:
$ref: '#/components/schemas/OAuth2ScopeConsentGrantSource'
status:
$ref: '#/components/schemas/GrantOrTokenStatus'
userId:
description: User ID that granted consent (if `source` is `END_USER`)
example: 00u5t60iloOHN9pBi0h7
readOnly: true
type: string
_embedded:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant__embedded'
_links:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant__links'
required:
- issuer
- scopeId
type: object
OAuth2ScopeConsentGrantSource:
description: User type source that granted consent
enum:
- ADMIN
- END_USER
example: ADMIN
readOnly: true
type: string
OAuth2ScopeConsentType:
default: IMPLICIT
description: Indicates whether a consent dialog is needed for the Scope
enum:
- FLEXIBLE
- IMPLICIT
- REQUIRED
type: string
OAuth2ScopeMetadataPublish:
default: NO_CLIENTS
description: Indicates whether the Scope is included in the metadata
enum:
- ALL_CLIENTS
- NO_CLIENTS
type: string
OAuth2ScopesMediationPolicyRuleCondition:
description: Array of scopes that the condition includes
example:
include:
- include
- include
properties:
include:
items:
type: string
type: array
type: object
OAuth2Token:
properties:
clientId:
description: Client ID
example: 0oabskvc6442nkvQO0h7
readOnly: true
type: string
created:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
expiresAt:
description: Expiration time of the OAuth 2.0 Token
format: date-time
readOnly: true
type: string
id:
description: ID of the Token object
readOnly: true
type: string
issuer:
description: The complete URL of the authorization server that issued the
Token
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
scopes:
description: Name of scopes attached to the Token
items:
type: string
type: array
status:
$ref: '#/components/schemas/GrantOrTokenStatus'
userId:
type: string
_embedded:
additionalProperties:
properties: {}
type: object
description: Embedded resources related to the object if the `expand` query
parameter is specified
readOnly: true
type: object
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
OAuthApplicationCredentials:
allOf:
- $ref: '#/components/schemas/ApplicationCredentials'
- properties:
oauthClient:
$ref: '#/components/schemas/ApplicationCredentialsOAuthClient'
type: object
OAuthAuthorizationEndpoint:
description: "Endpoint for an [OAuth 2.0 Authorization Server (AS)](https://tools.ietf.org/html/rfc6749#page-18)"
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
url:
description: URL of the IdP Authorization Server (AS) authorization endpoint
example: https://idp.example.com/authorize
type: string
type: object
OAuthClientSecretLinks:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
delete:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
activate:
$ref: '#/components/schemas/HrefObjectActivateLink'
deactivate:
$ref: '#/components/schemas/HrefObjectDeactivateLink'
delete:
$ref: '#/components/schemas/HrefObjectDeleteLink'
readOnly: true
OAuthCredentials:
description: "Client authentication credentials for an [OAuth 2.0 Authorization\
\ Server](https://tools.ietf.org/html/rfc6749#section-2.3)"
properties:
client:
$ref: '#/components/schemas/OAuthCredentialsClient'
signing:
$ref: '#/components/schemas/AppleClientSigning'
type: object
OAuthCredentialsClient:
description: |-
OAuth 2.0 and OpenID Connect Client object
> **Note:** You must complete client registration with the IdP Authorization Server for your Okta IdP instance to obtain client credentials.
properties:
client_id:
description: "The [Unique identifier](https://tools.ietf.org/html/rfc6749#section-2.2)\
\ issued by the AS for the Okta IdP instance"
example: your-client-id
maxLength: 1024
type: string
client_secret:
description: "The [Client secret](https://tools.ietf.org/html/rfc6749#section-2.3.1)\
\ issued by the AS for the Okta IdP instance"
example: your-client-secret
maxLength: 1024
type: string
pkce_required:
description: Require Proof Key for Code Exchange (PKCE) for additional verification
type: boolean
token_endpoint_auth_method:
description: Client authentication methods supported by the token endpoint
enum:
- private_key_jwt
type: string
type: object
OAuthEndpointAuthenticationMethod:
default: client_secret_basic
description: Requested authentication method for the token endpoint
enum:
- client_secret_basic
- client_secret_jwt
- client_secret_post
- none
- private_key_jwt
type: string
OAuthEndpoints:
description: |-
The `OAUTH2` and `OIDC` protocols support the `authorization` and `token` endpoints. Also, the `OIDC` protocol supports the `userInfo` and `jwks` endpoints.
The IdP Authorization Server (AS) endpoints are currently defined as part of the [IdP provider]((https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=type&t=request)) and are read-only.
properties:
authorization:
$ref: '#/components/schemas/OAuthAuthorizationEndpoint'
jwks:
$ref: '#/components/schemas/OidcJwksEndpoint'
token:
$ref: '#/components/schemas/OAuthTokenEndpoint'
userInfo:
$ref: '#/components/schemas/OidcUserInfoEndpoint'
type: object
OAuthGrantType:
description: Array of OAuth 2.0 grant type strings
enum:
- authorization_code
- client_credentials
- implicit
- interaction_code
- password
- refresh_token
- urn:ietf:params:oauth:grant-type:device_code
- urn:ietf:params:oauth:grant-type:jwt-bearer
- urn:ietf:params:oauth:grant-type:saml2-bearer
- urn:ietf:params:oauth:grant-type:token-exchange
- urn:openid:params:grant-type:ciba
type: string
OAuthMetadata:
properties:
authorization_endpoint:
description: URL of the authorization server's authorization endpoint.
type: string
backchannel_authentication_request_signing_alg_values_supported:
description:
A list of signing algorithms
that this authorization server supports for signed requests.
items:
$ref: '#/components/schemas/SigningAlgorithm'
type: array
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
backchannel_token_delivery_modes_supported:
description:
The delivery modes that this
authorization server supports for Client-Initiated Backchannel Authentication.
items:
$ref: '#/components/schemas/TokenDeliveryMode'
type: array
x-okta-lifecycle:
lifecycle: LIMITED_GA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
claims_supported:
description: A list of the claims supported by this authorization server.
items:
$ref: '#/components/schemas/Claim'
type: array
code_challenge_methods_supported:
description: A list of PKCE code challenge methods supported by this authorization
server.
items:
$ref: '#/components/schemas/CodeChallengeMethod'
type: array
device_authorization_endpoint:
type: string
dpop_signing_alg_values_supported:
description: A list of signing algorithms supported by this authorization
server for Demonstrating Proof-of-Possession (DPoP) JWTs.
items:
enum:
- ES256
- ES384
- ES512
- RS256
- RS384
- RS512
type: string
type: array
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
end_session_endpoint:
description: URL of the authorization server's logout endpoint.
type: string
grant_types_supported:
description: A list of the grant type values that this authorization server
supports.
items:
$ref: '#/components/schemas/GrantType'
type: array
introspection_endpoint:
description: URL of the authorization server's introspection endpoint.
type: string
introspection_endpoint_auth_methods_supported:
description: A list of client authentication methods supported by this introspection
endpoint.
items:
$ref: '#/components/schemas/EndpointAuthMethod'
type: array
issuer:
description: "The authorization server's issuer identifier. In the context\
\ of this document, this is your authorization server's base URL. This\
\ becomes the `iss` claim in an access token."
type: string
jwks_uri:
description: URL of the authorization server's JSON Web Key Set document.
type: string
pushed_authorization_request_endpoint:
type: string
registration_endpoint:
description: URL of the authorization server's JSON Web Key Set document.
type: string
request_object_signing_alg_values_supported:
description: A list of signing algorithms that this authorization server
supports for signed requests.
items:
$ref: '#/components/schemas/SigningAlgorithm'
type: array
request_parameter_supported:
description: Indicates if Request Parameters are supported by this authorization
server.
type: boolean
response_modes_supported:
description: A list of the `response_mode` values that this authorization
server supports. More information here.
items:
$ref: '#/components/schemas/ResponseMode'
type: array
response_types_supported:
description: "A list of the `response_type` values that this authorization\
\ server supports. Can be a combination of `code`, `token`, and `id_token`."
items:
$ref: '#/components/schemas/ResponseTypesSupported'
type: array
revocation_endpoint:
description: URL of the authorization server's revocation endpoint.
type: string
revocation_endpoint_auth_methods_supported:
description: A list of client authentication methods supported by this revocation
endpoint.
items:
$ref: '#/components/schemas/EndpointAuthMethod'
type: array
scopes_supported:
description: A list of the scope values that this authorization server supports.
items:
$ref: '#/components/schemas/Scope'
type: array
subject_types_supported:
description: "A list of the Subject Identifier types that this authorization\
\ server supports. Valid types include `pairwise` and `public`, but only\
\ `public` is currently supported. See the [Subject Identifier Types](https://openid.net/specs/openid-connect-core-1_0.html#SubjectIDTypes)\
\ section in the OpenID Connect specification."
items:
$ref: '#/components/schemas/SubjectType'
type: array
token_endpoint:
description: URL of the authorization server's token endpoint.
type: string
token_endpoint_auth_methods_supported:
description: A list of client authentication methods supported by this token
endpoint.
items:
$ref: '#/components/schemas/EndpointAuthMethod'
type: array
type: object
OAuthProvisioningEnabledApp:
description: Application name for the provisioning connection
enum:
- google
- office365
- slack
- zoomus
type: string
OAuthResponseType:
description: Array of OAuth 2.0 response type strings
enum:
- code
- id_token
- token
type: string
OAuthTokenEndpoint:
description: "Endpoint for an [OAuth 2.0 Authorization Server (AS)](https://tools.ietf.org/html/rfc6749#page-18)"
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
url:
description: URL of the IdP Authorization Server (AS) token endpoint
example: https://idp.example.com/token
type: string
type: object
OINApplication:
properties:
accessibility:
$ref: '#/components/schemas/ApplicationAccessibility'
credentials:
$ref: '#/components/schemas/SchemeApplicationCredentials'
label:
description: User-defined display name for app
type: string
licensing:
$ref: '#/components/schemas/ApplicationLicensing'
name:
description: The key name for the OIN app definition
type: string
profile:
additionalProperties:
properties: {}
type: object
description: Contains any valid JSON schema for specifying properties that
can be referenced from a request (only available to OAuth 2.0 client apps)
type: object
signOnMode:
description: Authentication mode for the app
type: string
status:
$ref: '#/components/schemas/ApplicationLifecycleStatus'
visibility:
$ref: '#/components/schemas/ApplicationVisibility'
type: object
OINSaml11ApplicationSettingsSignOn:
description: Contains SAML 1.1 sign-on mode attributes
properties:
audienceOverride:
description: "Audience override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
defaultRelayState:
description: Identifies a specific application resource in an IdP-initiated
SSO scenario
type: string
recipientOverride:
description: "Recipient override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
ssoAcsUrlOverride:
description: "Assertion Consumer Service (ACS) URL override for CASB configuration.\
\ See [CASB config guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
title: SAML 1.1 settings
type: object
OINSaml20ApplicationSettingsSignOn:
description: |-
Contains SAML 2.0 sign-on mode attributes.
> **Note:** Set `destinationOverride` to configure any other SAML 2.0 attributes in this section.
properties:
audienceOverride:
description: "Audience override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
configuredAttributeStatements:
items:
$ref: '#/components/schemas/SamlAttributeStatement'
type: array
defaultRelayState:
description: Identifies a specific application resource in an IdP-initiated
SSO scenario
type: string
destinationOverride:
description: "Destination override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
recipientOverride:
description: "Recipient override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
samlAssertionLifetimeSeconds:
description: Determines the SAML app session lifetimes with Okta
example: 3600
type: integer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
ssoAcsUrlOverride:
description: "Assertion Consumer Service (ACS) URL override for CASB configuration.\
\ See [CASB config guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
title: SAML 2.0 settings
type: object
OSVersion:
description: |
Specifies the OS requirement for the policy.
There are two types of OS requirements:
* **Static**: A specific OS version requirement that doesn't change until you update the policy. A static OS requirement is specified with the `osVersion.minimum` property.
* **Dynamic**: An OS version requirement that is relative to the latest major OS release and security patch. A dynamic OS requirement is specified with the `osVersion.dynamicVersionRequirement` property.
> **Note:** Dynamic OS requirements are available only if the **Dynamic OS version compliance** [self-service EA](/openapi/okta-management/guides/release-lifecycle/#early-access-ea) feature is enabled. You can't specify both `osVersion.minimum` and `osVersion.dynamicVersionRequirement` properties at the same time.
properties:
dynamicVersionRequirement:
$ref: '#/components/schemas/OSVersion_dynamicVersionRequirement'
minimum:
description: "The device version must be equal to or newer than the specified\
\ version string (maximum of three components for iOS and macOS, and maximum\
\ of four components for Android)"
example: 12.4.5
type: string
type: object
OSVersionConstraint:
properties:
dynamicVersionRequirement:
$ref: '#/components/schemas/OSVersionConstraint_dynamicVersionRequirement'
majorVersionConstraint:
description: Indicates the Windows major version
enum:
- WINDOWS_11
- WINDOWS_10
type: string
x-enumDescriptions:
WINDOWS_11: The device is on Windows 11
WINDOWS_10: The device is on Windows 10 or an older Windows version
minimum:
description: The Windows device version must be equal to or newer than the
specified version
example: 12.4.5.9
type: string
required:
- majorVersionConstraint
type: object
OSVersionFourComponents:
description: Current version of the operating system (maximum of four components
in the versioning scheme)
properties:
minimum:
example: 12.4.5.9
type: string
type: object
OSVersionThreeComponents:
description: Current version of the operating system (maximum of three components
in the versioning scheme)
properties:
minimum:
example: 12.4.5
type: string
type: object
Office365Application:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- office365
example: office365
type: string
signOnMode:
enum:
- BROWSER_PLUGIN
- SAML_1_1
example: BROWSER_PLUGIN
type: string
settings:
$ref: '#/components/schemas/Office365ApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Microsoft Office 365 app (key name: `office365`)
To create a Microsoft Office 365 app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Office 365 app only supports `BROWSER_PLUGIN` and `SAML_1_1` sign-on modes.
example:
name: office365
label: Sample Office365 App
signOnMode: SAML_1_1
settings:
app:
domain: myintegration.okta365test.net
msftTenant: mycompanyinc
title: Microsoft Office 365
x-tags:
- Application
x-okta-defined-as:
name: office365
Office365ApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/Office365ApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml11ApplicationSettingsSignOn'
required:
- app
Office365ApplicationSettingsApplication:
description: Office365 app instance properties
properties:
domain:
description: The domain for your Office 365 account
type: string
msftTenant:
description: Microsoft tenant name
type: string
required:
- domain
- msftTenant
type: object
Office365ProvisioningSettings:
description: Settings required for the Microsoft Office 365 Provisioning Connection
properties:
adminPassword:
description: Microsoft Office 365 global administrator password
type: string
adminUsername:
description: Microsoft Office 365 global administrator username
type: string
required:
- adminPassword
- adminUsername
title: Microsoft Office 365 provisioning settings
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
OfflineAccessScopeResourceHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scppb56cIl4GvGxy70g3"
type: string
title:
description: Link name
example: offline_access
type: string
type: object
Oidc:
description: OIDC configuration details
properties:
doc:
description: "The URL to your customer-facing instructions for configuring\
\ your OIDC integration. See [Customer configuration document guidelines](https://developer.okta.com/docs/guides/submit-app-prereq/main/#customer-configuration-document-guidelines)."
example: https://example.com/strawberry/help/oidcSetup
format: uri
type: string
initiateLoginUri:
description: The URL to redirect users when they click on your app from
their Okta End-User Dashboard
example: "https://${org.subdomain}.example.com/strawberry/oidc/sp-init"
format: uri
type: string
postLogoutUris:
description: The sign-out redirect URIs for your app. You can send a request
to `/v1/logout` to sign the user out and redirect them to one of these
URIs.
items:
description: "A sign-out redirect URI. You can use the org properties\
\ you defined in the `config` array as variables in your URI. For example:\
\ `https://${org.subdomain}.example.com/strawberry/oidc/logged-out`"
example: "https://${org.subdomain}.example.com/strawberry/oidc/logged-out"
format: uri
type: string
type: array
redirectUris:
description: List of sign-in redirect URIs
items:
description: Sign-in redirect URI
example: "https://${org.subdomain}.example.com/strawberry/oidc/login"
format: uri
type: string
minItems: 1
type: array
required:
- doc
- redirectUris
type: object
OidcAlgorithms:
properties:
request:
$ref: '#/components/schemas/OidcRequestAlgorithm'
type: object
OidcJwksEndpoint:
description: "Endpoint for the JSON Web Key Set (JWKS) document. This document\
\ contains signing keys that are used to validate the signatures from the\
\ provider. For more information on JWKS, see [JSON Web Key](https://tools.ietf.org/html/rfc7517)."
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
url:
description: URL of the endpoint to the JWK Set
example: https://idp.example.com/keys
type: string
type: object
OidcRequestAlgorithm:
description: Algorithm settings used to sign an authorization request
properties:
signature:
$ref: '#/components/schemas/OidcRequestSignatureAlgorithm'
type: object
OidcRequestSignatureAlgorithm:
description: |-
Signature Algorithm settings for signing authorization requests sent to the IdP
> **Note:** The `algorithm` property is ignored when you disable request signatures (`scope` set as `NONE`).
properties:
algorithm:
$ref: '#/components/schemas/OidcSigningAlgorithm'
scope:
$ref: '#/components/schemas/ProtocolAlgorithmRequestScope'
type: object
OidcSigningAlgorithm:
enum:
- HS256
- HS384
- HS512
- RS256
- RS384
- RS512
type: string
OidcUserInfoEndpoint:
description: "Endpoint for getting identity information about the User. For\
\ more information on the `/userinfo` endpoint, see [OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html#UserInfo)."
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
url:
description: URL of the resource server's `/userinfo` endpoint
example: https://idp.example.com/userinfo
type: string
type: object
OktaActiveDirectoryGroupProfile:
description: |-
Profile for a Group that is imported from Active Directory.
The `objectClass` for such groups is `okta:windows_security_principal`.
properties:
description:
description: Description of the Windows Group
example: example.com/West Coast/West Coast Users
type: string
dn:
description: The distinguished name of the Windows Group
example: "CN=West Coast Users,OU=West Coast,DC=example,DC=com"
type: string
externalId:
description: Base-64 encoded GUID (`objectGUID`) of the Windows Group
example: VKzYZ1C+IkSZxIWlrW5ITg==
type: string
name:
description: Name of the Windows Group
example: West Coast Users
type: string
samAccountName:
description: Pre-Windows 2000 name of the Windows Group
example: West Coast Users
type: string
windowsDomainQualifiedName:
description: Fully qualified name of the Windows Group
example: EXAMPLE\\West Coast Users
type: string
type: object
OktaDeviceRiskChangeEvent:
description: The device risk level changed
properties:
current_level:
description: Current risk level of the device
enum:
- low
- medium
- high
- secure
- none
example: low
type: string
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
previous_level:
description: Previous risk level of the device
enum:
- low
- medium
- high
- secure
- none
example: medium
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- current_level
- event_timestamp
- previous_level
- subject
type: object
OktaIpChangeEvent:
description: IP changed for the subject's session
properties:
current_ip_address:
description: Current IP address of the subject
example: 123.4.5.6
type: string
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
previous_ip_address:
description: Previous IP address of the subject
example: 123.45.67.8
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- current_ip_address
- event_timestamp
- previous_ip_address
- subject
type: object
OktaPersonalAdminFeatureSettings:
description: Defines a list of Okta Personal settings that can be enabled or
disabled for the org
properties:
enableEnduserEntryPoints:
description: Allow entry points for an Okta Personal account in a Workforce
org
type: boolean
enableExportApps:
description: Allow users to migrate apps from a Workforce account to an
Okta Personal account
type: boolean
type: object
OktaSignOnPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
$ref: '#/components/schemas/OktaSignOnPolicyConditions'
type: object
OktaSignOnPolicyConditions:
allOf:
- $ref: '#/components/schemas/PolicyRuleConditions'
- properties:
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
type: object
OktaSignOnPolicyFactorPromptMode:
description: |
Indicates if the User should be challenged for a second factor (MFA) based on the device being used, a Factor session lifetime, or on every sign-in attempt
**Note:** Required only if `requireFactor` is set to `true`.
enum:
- ALWAYS
- DEVICE
- SESSION
type: string
OktaSignOnPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/OktaSignOnPolicyRuleActions'
conditions:
$ref: '#/components/schemas/OktaSignOnPolicyRuleConditions'
type: object
OktaSignOnPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
signon:
$ref: '#/components/schemas/OktaSignOnPolicyRuleSignonActions'
type: object
OktaSignOnPolicyRuleConditions:
allOf:
- properties:
authContext:
$ref: '#/components/schemas/PolicyRuleAuthContextCondition'
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
identityProvider:
$ref: '#/components/schemas/IdentityProviderPolicyRuleCondition'
type: object
OktaSignOnPolicyRuleSignonActions:
properties:
access:
enum:
- ALLOW
- DENY
type: string
factorLifetime:
description: |
Interval of time that must elapse before the User is challenged for MFA, if the Factor prompt mode is set to `SESSION`
**Note:** Required only if `requireFactor` is `true`.
type: integer
factorPromptMode:
$ref: '#/components/schemas/OktaSignOnPolicyFactorPromptMode'
primaryFactor:
$ref: '#/components/schemas/OktaSignOnPolicyRuleSignonPrimaryFactor'
rememberDeviceByDefault:
default: false
description: Indicates if Okta should automatically remember the device
type: boolean
requireFactor:
default: false
description: Indicates if multifactor authentication is required
type: boolean
session:
$ref: '#/components/schemas/OktaSignOnPolicyRuleSignonSessionActions'
type: object
OktaSignOnPolicyRuleSignonPrimaryFactor:
description: " Indicates the primary\
\ factor used to establish a session for the org. Supported values: `PASSWORD_IDP_ANY_FACTOR`\
\ (users can use any factor required by the app authentication policy to establish\
\ a session), `PASSWORD_IDP` (users must always use a password to establish\
\ a session). \n\n**Note:** Required only if `access` is set to `ALLOW`."
enum:
- PASSWORD_IDP
- PASSWORD_IDP_ANY_FACTOR
type: string
OktaSignOnPolicyRuleSignonSessionActions:
description: Properties governing the User's session lifetime
properties:
maxSessionIdleMinutes:
default: 120
description: Maximum number of minutes that a User session can be idle before
the session is ended
type: integer
maxSessionLifetimeMinutes:
default: 0
description: Maximum number of minutes from User sign in that a user's session
is active. Set this to force Users to sign in again after the number of
specified minutes. Disable by setting to `0`. This property is read-only
for the default rule of the default global session policy.
type: integer
usePersistentCookie:
default: false
description: "If set to `false`, user session cookies only last the length\
\ of a browser session. If set to `true`, user session cookies last across\
\ browser sessions. This setting doesn't impact administrators who can\
\ never have persistent session cookies. This property is read-only for\
\ the default rule of the default global session policy."
type: boolean
type: object
OktaUserGroupProfile:
description: |-
Profile for any Group that is not imported from Active Directory. Specifies the standard
and custom profile properties for a Group.
The `objectClass` for these groups is `okta:user_group`.
example:
name: West Coast Users
description: All Users West of The Rockies
properties:
description:
description: Description of the Group
example: All Users West of The Rockies
type: string
name:
description: Name of the Group
example: West Coast Users
type: string
type: object
x-okta-extensible: true
OktaUserRiskChangeEvent:
description: The user risk level changed
properties:
current_level:
description: Current risk level of the user
enum:
- low
- medium
- high
- secure
- none
example: low
type: string
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
initiating_entity:
description: The entity that initiated the event
enum:
- admin
- user
- policy
- system
type: string
previous_level:
description: Previous risk level of the user
enum:
- low
- medium
- high
- secure
- none
example: medium
type: string
reason_admin:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_admin'
reason_user:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent_reason_user'
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- current_level
- event_timestamp
- previous_level
- subject
type: object
OpenIdConnectApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/OAuthApplicationCredentials'
name:
description: '`oidc_client` is the key name for an OAuth 2.0 client app
instance'
type: string
settings:
$ref: '#/components/schemas/OpenIdConnectApplicationSettings'
required:
- credentials
- name
- settings
type: object
x-okta-defined-as:
name: oidc_client
OpenIdConnectApplicationConsentMethod:
default: TRUSTED
description: |
Indicates whether user consent is required or implicit.
A consent dialog appears for the end user depending on the values of three elements:
* [prompt](/openapi/okta-oauth/oauth/tag/OrgAS/#tag/OrgAS/operation/authorize!in=query&path=prompt&t=request): A query parameter that is used in requests to `/authorize`
* `consent_method` (this property)
* [consent](/openapi/okta-management/management/tag/AuthorizationServerScopes/#tag/AuthorizationServerScopes/operation/createOAuth2Scope!path=consent&t=request): A [Scope](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/AuthorizationServerScopes/) property that allows you to enable or disable user consent for an individual scope
| `prompt` | `consent_method` | `consent` | Result
| ---------- | ----------- | ---------- | ----------- |
| CONSENT | TRUSTED or REQUIRED | REQUIRED | Prompted |
| CONSENT | TRUSTED or REQUIRED | FLEXIBLE | Prompted |
| CONSENT | TRUSTED | IMPLICIT | Not prompted |
| NONE | TRUSTED | FLEXIBLE, IMPLICIT, or REQUIRED | Not prompted |
| NONE | REQUIRED | FLEXIBLE or REQUIRED | Prompted |
| NONE | REQUIRED | IMPLICIT | Not prompted |
> **Notes:**
> * If you request a scope that requires consent while using the `client_credentials` flow, an error is returned because the flow doesn't support user consent.
> * If the `prompt` value is set to `NONE`, but the `consent_method` and the consent values are set to `REQUIRED`, then an error occurs.
> * When a scope is requested during a Client Credentials grant flow and `consent` is set to `FLEXIBLE`, the scope is granted in the access token with no consent prompt. This occurs because there is no user involved in a two-legged OAuth 2.0 [Client Credentials](https://developer.okta.com/docs/guides/implement-grant-type/clientcreds/main/) grant flow.
enum:
- REQUIRED
- TRUSTED
type: string
x-enumDescriptions:
TRUSTED: "The client is fully trusted (for example, a first-party app). The\
\ default consent method for app instances created with a [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication)\
\ request"
REQUIRED: "The client requires consent (for example, a third-party app). The\
\ default consent method for app instances created with a [Create a Client\
\ Application](/openapi/okta-oauth/oauth/tag/Client/#tag/Client/operation/createClient)\
\ request"
OpenIdConnectApplicationIdpInitiatedLogin:
description: The type of IdP-initiated sign-in flow that the client supports
properties:
default_scope:
description: The scopes to use for the request when `mode` is `OKTA`
items:
type: string
type: array
mode:
description: |
The mode to use for the IdP-initiated sign-in flow. For `OKTA` or `SPEC` modes, the client must have an `initiate_login_uri` registered.
> **Note:** For web and SPA apps, if the mode is `SPEC` or `OKTA`, you must set `grant_types` to `authorization_code`, `implicit`, or `interaction_code`.
enum:
- DISABLED
- SPEC
- OKTA
type: string
x-enumDescriptions:
DISABLED: The client doesn't support the IdP-initiated sign-in flow.
SPEC: The client is redirected to the Relying Party's `initiate_login_uri`.
OKTA: Tokens are directly sent to the Relying Party. This corresponds
to the **Okta Simplified** option in the Admin Console.
required:
- mode
type: object
OpenIdConnectApplicationIssuerMode:
description: Indicates whether the Okta authorization server uses the original
Okta org domain URL or a custom domain URL as the issuer of the ID token for
this client
enum:
- CUSTOM_URL
- DYNAMIC
- ORG_URL
type: string
x-enumDescriptions:
CUSTOM_URL: The issuer is returned in the appropriate OIDC token response.
This is the default `issuer_mode` when you configured a custom domain for
your org.
DYNAMIC: A request for the ID token made from the custom domain has the custom
URL as the issuer. A request for the ID token made from an Okta org has
the Org URL as the issuer. You can only set `issuer_mode` as DYNAMIC if
the Dynamic Issuer Mode feature is enabled. Contact Okta Support to enable
this feature.
ORG_URL: The issuer is returned based on the URL of your Okta organization.
This is useful when you are using Okta’s default domain and do not have
a custom domain configured.
OpenIdConnectApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
oauthClient:
$ref: '#/components/schemas/OpenIdConnectApplicationSettingsClient'
type: object
OpenIdConnectApplicationSettingsClient:
properties:
application_type:
$ref: '#/components/schemas/OpenIdConnectApplicationType'
backchannel_authentication_request_signing_alg:
description: |
The signing algorithm for Client-Initiated Backchannel Authentication (CIBA) signed requests using JWT. If this value isn't set and a JWT-signed request is sent, the request fails.
> **Note:** This property appears for clients with `urn:openid:params:grant-type:ciba` defined as one of the `grant_types`.
enum:
- HS256
- HS384
- HS512
- RS256
- RS384
- RS512
- ES256
- ES384
- ES512
type: string
backchannel_custom_authenticator_id:
description: |
The ID of the custom authenticator that authenticates the user
> **Note:** This property appears for clients with `urn:openid:params:grant-type:ciba` defined as one of the `grant_types`.
maxLength: 20
minLength: 20
type: string
backchannel_token_delivery_mode:
description: |
The delivery mode for Client-Initiated Backchannel Authentication (CIBA). Currently, only `poll` is supported.
> **Note:** This property appears for clients with `urn:openid:params:grant-type:ciba` defined as one of the `grant_types`.
enum:
- poll
- ping
- push
type: string
client_uri:
description: URL string of a web page providing information about the client
maxLength: 1024
type: string
consent_method:
$ref: '#/components/schemas/OpenIdConnectApplicationConsentMethod'
dpop_bound_access_tokens:
default: false
description: |
Indicates that the client application uses Demonstrating Proof-of-Possession (DPoP) for token requests. If `true`, the authorization server rejects token requests from this client that don't contain the DPoP header.
> **Note:** If `dpop_bound_access_tokens` is true, then `client_credentials` and `implicit` aren't allowed in `grant_types`.
type: boolean
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
frontchannel_logout_session_required:
description:
Determines whether Okta sends
`sid` and `iss` in the logout request
type: boolean
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
frontchannel_logout_uri:
description:
URL where Okta sends the
logout request
maxLength: 1024
type: string
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
grant_types:
items:
$ref: '#/components/schemas/OAuthGrantType'
type: array
idp_initiated_login:
$ref: '#/components/schemas/OpenIdConnectApplicationIdpInitiatedLogin'
initiate_login_uri:
description: URL string that a third party can use to initiate the sign-in
flow by the client
type: string
issuer_mode:
$ref: '#/components/schemas/OpenIdConnectApplicationIssuerMode'
jwks:
$ref: '#/components/schemas/OpenIdConnectApplicationSettingsClientKeys'
jwks_uri:
description: URL string that references a JSON Web Key Set for validating
JWTs presented to Okta
type: string
logo_uri:
description: The URL string that references a logo for the client. This
logo appears on the client tile in the End-User Dashboard. It also appears
on the client consent dialog during the client consent flow.
maxLength: 1024
type: string
participate_slo:
description: |
Allows the app to participate in front-channel Single Logout
> **Note:** You can only enable `participate_slo` for `web` and `browser` application types (`application_type`).
type: boolean
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs:
- Okta Identity Engine
policy_uri:
description: URL string of a web page providing the client's policy document
type: string
post_logout_redirect_uris:
description: Array of redirection URI strings for relying party-initiated
logouts
items:
type: string
type: array
redirect_uris:
description: |-
Array of redirection URI strings for use in redirect-based flows.
> **Note:** At least one `redirect_uris` and `response_types` are required for all client types, with exceptions: if the client uses the [Resource Owner Password ](https://tools.ietf.org/html/rfc6749#section-4.3)flow (`grant_types` contains `password`) or [Client Credentials](https://tools.ietf.org/html/rfc6749#section-4.4)flow (`grant_types` contains `client_credentials`), then no `redirect_uris` or `response_types` is necessary. In these cases, you can pass either null or an empty array for these attributes.
items:
type: string
type: array
refresh_token:
$ref: '#/components/schemas/OpenIdConnectApplicationSettingsRefreshToken'
request_object_signing_alg:
description: The type of JSON Web Key Set (JWKS) algorithm that must be
used for signing request objects
enum:
- HS256
- HS384
- HS512
- RS256
- RS384
- RS512
- ES256
- ES384
- ES512
type: string
response_types:
description: Array of OAuth 2.0 response type strings
items:
$ref: '#/components/schemas/OAuthResponseType'
type: array
sector_identifier_uri:
description: "The sector identifier used for pairwise `subject_type`. See\
\ [OIDC Pairwise Identifier Algorithm](https://openid.net/specs/openid-connect-messages-1_0-20.html#idtype.pairwise.alg)"
maxLength: 1024
type: string
subject_type:
description: Type of the subject
enum:
- public
- pairwise
type: string
tos_uri:
description: URL string of a web page providing the client's terms of service
document
type: string
wildcard_redirect:
description: Indicates if the client is allowed to use wildcard matching
of `redirect_uris`
enum:
- DISABLED
- SUBDOMAIN
type: string
x-enumDescriptions:
DISABLED: All redirect URIs must be absolute URIs and not include a fragment
component.
SUBDOMAIN: |
Any configured redirect URIs may contain a single `*` character in the lowest-level domain (for example, `https://redirect-*-domain.example.com/oidc/redirect`) to act as a wildcard.
The wildcard subdomain must have at least one subdomain between it and the top level domain.
The wildcard can match any valid hostname characters, but can't span more than one domain.
For example, if `https://redirect-*-domain.example.com/oidc/redirect` is configured as a redirect URI, then `https://redirect-1-domain.example.com/oidc/redirect` and `https://redirect-sub-domain.example.com/oidc/redirect` match, but `https://redirect-1.sub-domain.example.com/oidc/redirect` doesn't match.
Only the `https` URI scheme can use wildcard redirect URIs.
> **Note:** The use of wildcard subdomains is discouraged as an insecure practice, since it may allow malicious actors to have tokens or authorization codes sent to unexpected or attacker-controlled pages. Exercise caution if you decide to include a wildcard redirect URI in your configuration.
required:
- grant_types
type: object
OpenIdConnectApplicationSettingsClientKeys:
description: "A [JSON Web Key Set](https://tools.ietf.org/html/rfc7517#section-5)\
\ for validating JWTs presented to Okta"
properties:
keys:
items:
$ref: '#/components/schemas/schemas-JsonWebKey'
type: array
type: object
OpenIdConnectApplicationSettingsRefreshToken:
description: |
Refresh token configuration for an OAuth 2.0 client
When you create or update an OAuth 2.0 client, you can configure refresh token rotation by setting the `rotation_type` and `leeway` properties. If you don't set these properties when you create an app integration, the default values are used.
When you update an app integration, your previously configured values are used.
properties:
leeway:
default: 30
description: |
The leeway, in seconds, allowed for the OAuth 2.0 client.
After the refresh token is rotated, the previous token remains valid for the specified period of time so clients can get the new token.
> **Note:** A leeway of 0 doesn't necessarily mean that the previous token is immediately invalidated. The previous token is invalidated after the new token is generated and returned in the response.
example: 20
maximum: 60
minimum: 0
type: integer
rotation_type:
$ref: '#/components/schemas/OpenIdConnectRefreshTokenRotationType'
required:
- rotation_type
type: object
OpenIdConnectApplicationType:
description: "The type of client app \nSpecific `grant_types` are valid\
\ for each `application_type`. See [Create a Client Application](/openapi/okta-oauth/oauth/tag/Client/#tag/Client/operation/createClient)."
enum:
- browser
- native
- service
- web
type: string
x-enumDescriptions:
browser: Single-Page app (SPA)
native: Native app
service: API service app
web: Web app
OpenIdConnectRefreshTokenRotationType:
description: The refresh token rotation mode for the OAuth 2.0 client
enum:
- ROTATE
- STATIC
example: STATIC
type: string
x-enumDescriptions:
ROTATE: The default rotation type for single-page apps (SPAs)
STATIC: "The default rotation type for all clients, except SPAs"
OperationRequest:
example:
assignmentId: assignmentId
properties:
assignmentId:
type: string
type: object
OperationResponse:
example:
realmId: realmId
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
realmName: realmName
started: 2000-01-23T04:56:07.000+00:00
completed: 2000-01-23T04:56:07.000+00:00
id: id
type: type
assignmentOperation:
configuration:
name: name
id: id
conditions:
expression:
value: value
profileSourceId: profileSourceId
actions:
assignUserToRealm:
realmId: realmId
numUserMoved: 0.8008281904610115
status: COMPLETED
properties:
assignmentOperation:
$ref: '#/components/schemas/OperationResponse_assignmentOperation'
completed:
format: date-time
readOnly: true
type: string
created:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
numUserMoved:
readOnly: true
type: number
realmId:
readOnly: true
type: string
realmName:
readOnly: true
type: string
started:
format: date-time
readOnly: true
type: string
status:
enum:
- COMPLETED
- SCHEDULED
- IN_PROGRESS
- FAILED
readOnly: true
type: string
type:
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
OperationalStatus:
description: Operational status of a given agent
enum:
- DEGRADED
- DISRUPTED
- INACTIVE
- OPERATIONAL
type: string
OptInStatusResponse:
properties:
optInStatus:
enum:
- OPTING_IN
- OPTED_IN
- OPTING_OUT
- OPTED_OUT
type: string
_links:
$ref: '#/components/schemas/OptInStatusResponse__links'
type: object
Org2OrgApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- okta_org2org
example: okta_org2org
type: string
signOnMode:
default: SAML_2_0
enum:
- SAML_2_0
- AUTO_LOGIN
type: string
x-enumDescriptions:
SAML_2_0: Federated Authentication with SAML 2.0 WebSSO
AUTO_LOGIN: Secure Web Authentication (SWA)
settings:
$ref: '#/components/schemas/Org2OrgApplicationSettings'
required:
- label
- name
- settings
description: "Schema for the Okta Org2Org app (key name: `okta_org2org`)\n\n\
To create an Org2Org app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication)\
\ request with the following parameters in the request body.\n> **Notes:**\
\ \n> * The Okta Org2Org (`okta_org2org`) app isn't available in Okta Developer\
\ Edition orgs. If you need to test this feature in your Developer Edition\
\ org, contact your Okta account team.\n> * The Okta Org2Org app supports\
\ `SAML_2_0` and `AUTO_LOGIN` sign-on modes.\n"
example:
name: okta_org2org
label: Okta Org2Org
signOnMode: SAML_2_0
settings:
app:
acsUrl: https://example.okta.com/sso/saml2/exampleid
audRestriction: https://www.okta.com/saml2/service-provider/exampleid
baseUrl: https://example.okta.com
title: Org2Org
x-tags:
- Application
x-okta-defined-as:
name: okta_org2org
Org2OrgApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/Org2OrgApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
Org2OrgApplicationSettingsApplication:
description: Org2Org app instance properties
properties:
acsUrl:
description: The Assertion Consumer Service (ACS) URL of the source org
(for `SAML_2_0` sign-on mode)
type: string
audRestriction:
description: The entity ID of the SP (for `SAML_2_0` sign-on mode)
example: https://www.okta.com/saml2/service-provider/exampleid
type: string
baseUrl:
description: The base URL of the target Okta org (for `SAML_2_0` sign-on
mode)
type: string
creationState:
description: Used to track and manage the state of the app's creation or
the provisioning process between two Okta orgs
type: string
preferUsernameOverEmail:
description: Indicates that you don't want to use an email address as the
username
type: boolean
token:
description: An API token from the target org that's used to secure the
connection between the orgs
type: string
tokenEncrypted:
description: Encrypted token to enhance security
type: string
required:
- baseUrl
type: object
OrgAerialConsent:
example:
accountId: accountId
properties:
accountId:
description: The unique ID of the Aerial account
type: string
required:
- accountId
type: object
OrgAerialConsentDetails:
example:
grantedBy: 00u23ej02I2RLFxS5406
accountId: accountId
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
grantedDate: 2024-07-24T16:01:13.000Z
properties:
accountId:
description: The unique ID of the Aerial account
type: string
grantedBy:
description: Principal ID of the user who granted the permission
example: 00u23ej02I2RLFxS5406
type: string
grantedDate:
description: Date when grant was created
example: 2024-07-24T16:01:13.000Z
type: string
_links:
$ref: '#/components/schemas/LinksAerialConsentGranted'
required:
- accountId
type: object
OrgAerialConsentRevoked:
example:
_links:
grant:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
_links:
$ref: '#/components/schemas/LinksAerialConsentRevoked'
type: object
OrgAerialGrantNotFound:
properties:
accountId:
description: The unique ID of the Aerial account
type: string
grantedBy:
description: Principal ID of the user who granted the permission
example: 00u23ej02I2RLFxS5406
type: string
grantedDate:
description: Date when grant was created
example: 2024-07-24T16:01:13.000Z
type: string
_links:
$ref: '#/components/schemas/LinksAerialConsentGranted'
type: object
OrgCAPTCHASettings:
description: ""
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enabledPages:
- SIGN_IN
- SIGN_IN
captchaId: captchaId
properties:
captchaId:
description: The unique key of the associated CAPTCHA instance
type: string
enabledPages:
description: An array of pages that have CAPTCHA enabled
items:
$ref: '#/components/schemas/enabledPagesType'
type: array
_links:
$ref: '#/components/schemas/OrgCAPTCHASettings__links'
title: OrgCAPTCHASettings
type: object
OrgContactType:
description: Type of contact
enum:
- BILLING
- TECHNICAL
type: string
OrgContactTypeObj:
anyOf:
- $ref: '#/components/schemas/orgBillingContactType'
- $ref: '#/components/schemas/orgTechnicalContactType'
discriminator:
mapping:
BILLING: '#/components/schemas/orgBillingContactType'
TECHNICAL: '#/components/schemas/orgTechnicalContactType'
propertyName: contactType
example:
contactType: BILLING
properties:
contactType:
$ref: '#/components/schemas/OrgContactType'
type: object
OrgContactUser:
example:
_links:
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
userId: userId
properties:
userId:
description: Contact user ID
type: string
_links:
$ref: '#/components/schemas/OrgContactUser__links'
type: object
OrgCreationAdmin:
description: |-
Profile and credential information for the first super admin user of the child Org.
If you plan to configure and manage the Org programmatically, create a system user with a dedicated email address and a strong password.
> **Note:** If you don't provide `credentials`, the super admin user is prompted to set up their credentials when they sign in to the Org for the first time.
example:
credentials:
password:
value: pa$$word
recovery_question:
answer: se7en
question: what is your favourite movie?
profile:
firstName: firstName
lastName: lastName
login: login
email: email
properties:
credentials:
$ref: '#/components/schemas/OrgCreationAdmin_credentials'
profile:
$ref: '#/components/schemas/OrgCreationAdmin_profile'
required:
- profile
type: object
writeOnly: true
OrgOktaCommunicationSetting:
example:
_links:
optOut:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
optIn:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
optOutEmailUsers: true
properties:
optOutEmailUsers:
description: Indicates whether org users receive Okta communication emails
readOnly: true
type: boolean
_links:
$ref: '#/components/schemas/OrgOktaCommunicationSetting__links'
type: object
OrgOktaSupportSetting:
description: Status of Okta Support Settings
enum:
- DISABLED
- ENABLED
type: string
OrgOktaSupportSettingsObj:
example:
_links:
extend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
grant:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
expiration: 2000-01-23T04:56:07.000+00:00
support: DISABLED
properties:
expiration:
description: Expiration of Okta Support
format: date-time
nullable: true
readOnly: true
type: string
support:
$ref: '#/components/schemas/OrgOktaSupportSetting'
_links:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj__links'
type: object
OrgPreferences:
example:
_links:
hideEndUserFooter:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
showEndUserFooter:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
showEndUserFooter: true
properties:
showEndUserFooter:
description: Indicates if the footer is shown on the End-User Dashboard
readOnly: true
type: boolean
_links:
$ref: '#/components/schemas/OrgPreferences__links'
type: object
OrgSetting:
example:
country: country
website: website
supportPhoneNumber: supportPhoneNumber
address2: address2
city: city
_links:
preferences:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
oktaCommunication:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
uploadLogo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
oktaSupport:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
contacts:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
address1: address1
created: 2000-01-23T04:56:07.000+00:00
companyName: companyName
postalCode: postalCode
expiresAt: 2000-01-23T04:56:07.000+00:00
lastUpdated: 2000-01-23T04:56:07.000+00:00
phoneNumber: phoneNumber
endUserSupportHelpURL: endUserSupportHelpURL
subdomain: subdomain
id: id
state: state
status: ACTIVE
properties:
address1:
description: Primary address of the organization associated with the org
type: string
address2:
description: Secondary address of the organization associated with the org
type: string
city:
description: City of the organization associated with the org
type: string
companyName:
description: Name of org
type: string
country:
description: County of the organization associated with the org
type: string
created:
description: When org was created
format: date-time
readOnly: true
type: string
endUserSupportHelpURL:
description: Support link of org
type: string
expiresAt:
description: Expiration of org
format: date-time
readOnly: true
type: string
id:
description: Org ID
readOnly: true
type: string
lastUpdated:
description: When org was last updated
format: date-time
readOnly: true
type: string
phoneNumber:
description: Phone number of the organization associated with the org
type: string
postalCode:
description: Postal code of the organization associated with the org
type: string
state:
description: State of the organization associated with the org
type: string
status:
description: Status of org
enum:
- ACTIVE
- INACTIVE
readOnly: true
type: string
subdomain:
description: Subdomain of org
readOnly: true
type: string
supportPhoneNumber:
description: Support help phone of the organization associated with the
org
type: string
website:
description: Website of the organization associated with the org
type: string
_links:
$ref: '#/components/schemas/orgGeneralSettingLinks'
type: object
OtpProtocol:
description: The protocol used
enum:
- SYMANTEC
- TOTP
- YUBICO
type: string
OtpTotpAlgorithm:
description: HMAC algorithm
enum:
- HMacSHA1
- HMacSHA256
- HMacSHA512
type: string
OtpTotpEncoding:
description: The shared secret encoding
enum:
- base32
- base64
- hexadecimal
type: string
OtpTotpPassCodeLength:
description: Number of digits in an OTP value
maximum: 10
minimum: 6
multipleOf: 2
type: integer
OtpTotpTimeIntervalInSeconds:
description: Time interval for TOTP in seconds
type: integer
PageRoot:
example:
_embedded:
preview:
pageContent: pageContent
default:
pageContent: pageContent
customized:
pageContent: pageContent
previewUrl: https://openapi-generator.tech
customizedUrl: https://openapi-generator.tech
_links:
preview:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
default:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
customized:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
_embedded:
$ref: '#/components/schemas/PageRoot__embedded'
_links:
$ref: '#/components/schemas/PageRoot__links'
type: object
Parameters:
description: Attributes used for processing AD Group membership update
example:
values:
- values
- values
action: ADD
attribute: attribute
properties:
action:
description: The update action to take
enum:
- ADD
- REMOVE
type: string
x-enumDescriptions:
ADD: Add to the membership of the group
REMOVE: Remove from the membership of the group
attribute:
description: The attribute that tracks group memberships in AD. This should
be `member` for AD.
type: string
values:
description: List of user IDs whose group memberships to update
items:
description: ID of an existing user
type: string
type: array
type: object
PasswordCredential:
description: "Specifies a password for a user.\n\nWhen a User has a valid password,\
\ imported hashed password, or password hook, and a response object contains\n\
a password credential, then the password object is a bare object without the\
\ value property defined (for example, `password: {}`). This \nindicates that\
\ a password value exists. You can modify password policy requirements in\
\ the Admin Console by editing the Password\nauthenticator: **Security**\
\ > **Authenticators** > **Password** (or for Okta Classic orgs, use **Security**\
\ > **Authentication** > **Password**).\n\nFor information on defaults and\
\ configuring your password policies, see [Configure the password authenticator](https://help.okta.com/okta_help.htm?type=oie&id=ext-configure-password)\
\ in the help documentation."
example:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
properties:
hash:
$ref: '#/components/schemas/PasswordCredentialHash'
hook:
$ref: '#/components/schemas/PasswordCredentialHook'
value:
description: Specifies the password for a user. The Password Policy validates
this password.
example: pa$$word
format: password
type: string
writeOnly: true
type: object
PasswordCredentialHash:
description: |-
Specifies a hashed password to import into Okta. This allows an existing password to be imported into Okta directly
from some other store. Okta supports the BCRYPT, SHA-512, SHA-256, SHA-1, MD5, and PBKDF2 hash functions for password import.
A hashed password may be specified in a Password object when creating or updating a user, but not for other operations.
See [Create User with Imported Hashed Password](https://developer.okta.com/docs/reference/api/users/#create-user-with-imported-hashed-password)
for information on using this object when creating a user. When updating a User with a hashed password, the User must be in the `STAGED` status.
example:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
properties:
algorithm:
$ref: '#/components/schemas/PasswordCredentialHashAlgorithm'
digestAlgorithm:
$ref: '#/components/schemas/DigestAlgorithm'
iterationCount:
description: The number of iterations used when hashing passwords using
PBKDF2. Must be >= 4096. Only required for PBKDF2 algorithm.
type: integer
keySize:
description: Size of the derived key in bytes. Only required for PBKDF2
algorithm.
type: integer
salt:
description: |-
Only required for salted hashes. For BCRYPT, this specifies Radix-64 as the encoded salt used to generate the hash,
which must be 22 characters long. For other salted hashes, this specifies the Base64-encoded salt used to
generate the hash.
type: string
saltOrder:
description: Specifies whether salt was pre- or postfixed to the password
before hashing. Only required for salted algorithms.
type: string
value:
description: |-
For SHA-512, SHA-256, SHA-1, MD5, and PBKDF2, this is the actual base64-encoded hash of the password (and salt, if used).
This is the Base64-encoded `value` of the SHA-512/SHA-256/SHA-1/MD5/PBKDF2 digest that was computed by either pre-fixing or post-fixing
the `salt` to the `password`, depending on the `saltOrder`. If a `salt` was not used in the `source` system, then this should just be
the Base64-encoded `value` of the password's SHA-512/SHA-256/SHA-1/MD5/PBKDF2 digest. For BCRYPT, this is the actual Radix-64 encoded hashed password.
type: string
workFactor:
description: Governs the strength of the hash and the time required to compute
it. Only required for BCRYPT algorithm.
maximum: 20
minimum: 1
type: integer
type: object
PasswordCredentialHashAlgorithm:
description: "The algorithm used to generate the hash using the password (and\
\ salt, when applicable)."
enum:
- BCRYPT
- MD5
- PBKDF2
- SHA-1
- SHA-256
- SHA-512
type: string
PasswordCredentialHook:
description: "Specify a [password import inline hook](/openapi/okta-management/management/tag/InlineHook/#tag/InlineHook/operation/createPasswordImportInlineHook)\
\ to trigger verification of the User's password the first time the User signs\
\ in. This allows an existing password to be imported into Okta directly from\
\ some other store."
example:
type: type
properties:
type:
description: "The type of password inline hook. Currently, must be set to\
\ default."
type: string
type: object
PasswordDictionary:
description: Weak password dictionary lookup settings
properties:
common:
$ref: '#/components/schemas/PasswordDictionaryCommon'
type: object
PasswordDictionaryCommon:
description: Lookup settings for commonly used passwords
properties:
exclude:
default: false
description: Indicates whether to check passwords against the common password
dictionary
type: boolean
type: object
PasswordExpirationPolicyRuleCondition:
properties:
number:
type: integer
unit:
type: string
type: object
PasswordImportRequest:
properties:
data:
$ref: '#/components/schemas/PasswordImportRequestData'
eventType:
description: The type of inline hook. The password import inline hook type
is `com.okta.user.credential.password.import`.
type: string
source:
description: The ID and URL of the password import inline hook
type: string
type: object
PasswordImportRequestData:
properties:
action:
$ref: '#/components/schemas/PasswordImportRequestData_action'
context:
$ref: '#/components/schemas/PasswordImportRequestData_context'
type: object
PasswordImportResponse:
properties:
commands:
description: "The `commands` object specifies whether Okta accepts the end\
\ user's sign-in credentials as valid or not. For the password import\
\ inline hook, you typically only return one `commands` object with one\
\ array element in it."
items:
$ref: '#/components/schemas/PasswordImportResponse_commands_inner'
type: array
type: object
PasswordPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
$ref: '#/components/schemas/PasswordPolicyConditions'
settings:
$ref: '#/components/schemas/PasswordPolicySettings'
type: object
PasswordPolicyAuthenticationProviderCondition:
properties:
include:
items:
type: string
type: array
provider:
$ref: '#/components/schemas/PasswordPolicyAuthenticationProviderType'
type: object
PasswordPolicyAuthenticationProviderType:
enum:
- ACTIVE_DIRECTORY
- ANY
- LDAP
- OKTA
type: string
PasswordPolicyConditions:
allOf:
- $ref: '#/components/schemas/PolicyRuleConditions'
- properties:
authProvider:
$ref: '#/components/schemas/PasswordPolicyAuthenticationProviderCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
type: object
PasswordPolicyDelegationSettings:
properties:
options:
$ref: '#/components/schemas/PasswordPolicyDelegationSettingsOptions'
type: object
PasswordPolicyDelegationSettingsOptions:
properties:
skipUnlock:
default: false
description: "Indicates if, when performing an unlock operation on an Active\
\ Directory sourced User who is locked out of Okta, the system should\
\ also attempt to unlock the User's Windows account"
type: boolean
type: object
PasswordPolicyPasswordSettings:
properties:
age:
$ref: '#/components/schemas/PasswordPolicyPasswordSettingsAge'
complexity:
$ref: '#/components/schemas/PasswordPolicyPasswordSettingsComplexity'
lockout:
$ref: '#/components/schemas/PasswordPolicyPasswordSettingsLockout'
type: object
PasswordPolicyPasswordSettingsAge:
description: Age settings
properties:
expireWarnDays:
default: 0
description: "Specifies the number of days prior to password expiration\
\ when a User is warned to reset their password: `0` indicates no warning"
type: integer
historyCount:
default: 0
description: "Specifies the number of distinct passwords that a User must\
\ create before they can reuse a previous password: `0` indicates none"
type: integer
maxAgeDays:
default: 0
description: "Specifies how long (in days) a password remains valid before\
\ it expires: `0` indicates no limit"
type: integer
minAgeMinutes:
default: 0
description: "Specifies the minimum time interval (in minutes) between password\
\ changes: `0` indicates no limit"
type: integer
type: object
PasswordPolicyPasswordSettingsComplexity:
description: Complexity settings
properties:
dictionary:
$ref: '#/components/schemas/PasswordDictionary'
excludeAttributes:
default: []
description: "The User profile attributes whose values must be excluded\
\ from the password: currently only supports `firstName` and `lastName`"
items:
type: string
type: array
excludeUsername:
default: true
description: Indicates if the Username must be excluded from the password
type: boolean
minLength:
default: 8
description: Minimum password length
type: integer
minLowerCase:
default: 1
description: "Indicates if a password must contain at least one lower case\
\ letter: `0` indicates no, `1` indicates yes"
type: integer
minNumber:
default: 1
description: "Indicates if a password must contain at least one number:\
\ `0` indicates no, `1` indicates yes"
type: integer
minSymbol:
default: 1
description: "Indicates if a password must contain at least one symbol (For\
\ example: !@#$%^&*): `0` indicates no, `1` indicates yes"
type: integer
minUpperCase:
default: 1
description: "Indicates if a password must contain at least one upper case\
\ letter: `0` indicates no, `1` indicates yes"
type: integer
type: object
PasswordPolicyPasswordSettingsLockout:
description: Lockout settings
properties:
autoUnlockMinutes:
default: 0
description: "Specifies the time interval (in minutes) a locked account\
\ remains locked before it is automatically unlocked: `0` indicates no\
\ limit"
type: integer
maxAttempts:
default: 10
description: "Specifies the number of times Users can attempt to sign in\
\ to their accounts with an invalid password before their accounts are\
\ locked: `0` indicates no limit"
type: integer
showLockoutFailures:
default: false
description: Indicates if the User should be informed when their account
is locked
type: boolean
userLockoutNotificationChannels:
default: []
description: "How the user is notified when their account becomes locked.\
\ The only acceptable values are `[]` and `['EMAIL']`."
items:
type: string
type: array
type: object
PasswordPolicyRecoveryEmail:
properties:
properties:
$ref: '#/components/schemas/PasswordPolicyRecoveryEmailProperties'
status:
$ref: '#/components/schemas/LifecycleStatus'
type: object
PasswordPolicyRecoveryEmailProperties:
properties:
recoveryToken:
$ref: '#/components/schemas/PasswordPolicyRecoveryEmailRecoveryToken'
type: object
PasswordPolicyRecoveryEmailRecoveryToken:
properties:
tokenLifetimeMinutes:
default: 10080
description: Lifetime (in minutes) of the recovery token
type: integer
type: object
PasswordPolicyRecoveryFactorSettings:
properties:
status:
$ref: '#/components/schemas/LifecycleStatus'
type: object
PasswordPolicyRecoveryFactors:
description: Settings for the Factors that can be used for recovery
properties:
okta_call:
$ref: '#/components/schemas/PasswordPolicyRecoveryFactorSettings'
okta_email:
$ref: '#/components/schemas/PasswordPolicyRecoveryEmail'
okta_sms:
$ref: '#/components/schemas/PasswordPolicyRecoveryFactorSettings'
recovery_question:
$ref: '#/components/schemas/PasswordPolicyRecoveryQuestion'
type: object
PasswordPolicyRecoveryQuestion:
properties:
properties:
$ref: '#/components/schemas/PasswordPolicyRecoveryQuestionProperties'
status:
$ref: '#/components/schemas/LifecycleStatus'
type: object
PasswordPolicyRecoveryQuestionComplexity:
properties:
minLength:
default: 4
description: Minimum length of the password recovery question answer
readOnly: true
type: integer
type: object
PasswordPolicyRecoveryQuestionProperties:
properties:
complexity:
$ref: '#/components/schemas/PasswordPolicyRecoveryQuestionComplexity'
type: object
PasswordPolicyRecoverySettings:
properties:
factors:
$ref: '#/components/schemas/PasswordPolicyRecoveryFactors'
type: object
PasswordPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/PasswordPolicyRuleActions'
conditions:
$ref: '#/components/schemas/PasswordPolicyRuleConditions'
type: object
PasswordPolicyRuleAction:
properties:
access:
$ref: '#/components/schemas/PolicyAccess'
type: object
PasswordPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
passwordChange:
$ref: '#/components/schemas/PasswordPolicyRuleAction'
selfServicePasswordReset:
$ref: '#/components/schemas/SelfServicePasswordResetAction'
selfServiceUnlock:
$ref: '#/components/schemas/PasswordPolicyRuleAction'
type: object
PasswordPolicyRuleConditions:
properties:
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
type: object
PasswordPolicySettings:
properties:
delegation:
$ref: '#/components/schemas/PasswordPolicyDelegationSettings'
password:
$ref: '#/components/schemas/PasswordPolicyPasswordSettings'
recovery:
$ref: '#/components/schemas/PasswordPolicyRecoverySettings'
type: object
PasswordProtectionWarningTrigger:
description: Indicates whether the Password Protection Warning feature is enabled
enum:
- PASSWORD_PROTECTION_OFF
- PASSWORD_REUSE
- PHISHING_REUSE
example: PHISHING_REUSE
type: string
x-enumDescriptions:
PASSWORD_PROTECTION_OFF: Password protection warning is off
PASSWORD_REUSE: Password protection warning is triggered by password reuse
PHISHING_REUSE: Password protection warning is triggered by password reuse
on a phishing page
PasswordSettingObject:
description: Determines whether Okta creates and pushes a password in the app
for each assigned user
properties:
change:
$ref: '#/components/schemas/ChangeEnum'
seed:
$ref: '#/components/schemas/SeedEnum'
status:
allOf:
- $ref: '#/components/schemas/EnabledStatus'
- default: DISABLED
- example: ENABLED
type: object
PatchAction:
description: The operation (PATCH action)
enum:
- remove
- replace
type: string
x-enumDescriptions:
remove: Removes the attribute in `path`
replace: Replaces the attribute in content `path` with the content in `value`
PerClientRateLimitMode:
enum:
- DISABLE
- ENFORCE
- PREVIEW
type: string
PerClientRateLimitSettings:
description: ""
example:
defaultMode: DISABLE
useCaseModeOverrides:
LOGIN_PAGE: null
OIE_APP_INTENT: null
OAUTH2_AUTHORIZE: null
properties:
defaultMode:
$ref: '#/components/schemas/PerClientRateLimitMode'
useCaseModeOverrides:
$ref: '#/components/schemas/PerClientRateLimitSettings_useCaseModeOverrides'
required:
- defaultMode
title: PerClientRateLimitSettings
type: object
Permission:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
role:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
label: label
conditions:
include:
key: "{}"
exclude:
key: "{}"
properties:
conditions:
$ref: '#/components/schemas/PermissionConditions'
created:
description: Timestamp when the role was created
format: date-time
readOnly: true
type: string
label:
description: The permission type
readOnly: true
type: string
lastUpdated:
description: Timestamp when the role was last updated
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/Permission__links'
type: object
PermissionConditions:
description: Conditions for further restricting a permission
example:
include:
key: "{}"
exclude:
key: "{}"
nullable: true
properties:
exclude:
additionalProperties:
properties: {}
type: object
description: Exclude attributes with specific values for the permission
nullable: true
type: object
include:
additionalProperties:
properties: {}
type: object
description: Include attributes with specific values for the permission
nullable: true
type: object
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
Permissions:
example:
permissions:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
role:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
label: label
conditions:
include:
key: "{}"
exclude:
key: "{}"
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
role:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
label: label
conditions:
include:
key: "{}"
exclude:
key: "{}"
properties:
permissions:
items:
$ref: '#/components/schemas/Permission'
type: array
type: object
PersonalAppsBlockList:
description: Defines a list of email domains with a subset of the properties
for each domain
properties:
domains:
description: List of blocked email domains
items:
description: TODO default missing array inner type to string
type: string
type: array
type: object
PinRequest:
description: Pin Request
example:
fulfillmentProvider: yubico
userId: userId
authenticatorEnrollmentId: authenticatorEnrollmentId
properties:
authenticatorEnrollmentId:
description: ID for a WebAuthn Preregistration Factor in Okta
type: string
fulfillmentProvider:
description: Name of the fulfillment provider for the WebAuthn Preregistration
Factor
enum:
- yubico
type: string
userId:
description: ID of an existing Okta user
type: string
type: object
PipelineType:
description: The authentication pipeline of the org
enum:
- idx
- v1
type: string
x-enumDescriptions:
idx: Identity Engine
v1: Classic Engine
Platform:
enum:
- ANDROID
- CHROMEOS
- IOS
- MACOS
- WINDOWS
type: string
PlatformConditionEvaluatorPlatform:
properties:
os:
$ref: '#/components/schemas/PlatformConditionEvaluatorPlatformOperatingSystem'
type:
$ref: '#/components/schemas/PolicyPlatformType'
type: object
PlatformConditionEvaluatorPlatformOperatingSystem:
properties:
expression:
type: string
type:
$ref: '#/components/schemas/PolicyPlatformOperatingSystemType'
version:
$ref: '#/components/schemas/PlatformConditionEvaluatorPlatformOperatingSystemVersion'
type: object
PlatformConditionEvaluatorPlatformOperatingSystemVersion:
properties:
matchType:
$ref: '#/components/schemas/PlatformConditionOperatingSystemVersionMatchType'
value:
type: string
type: object
PlatformConditionOperatingSystemVersionMatchType:
enum:
- EXPRESSION
- SEMVER
type: string
PlatformPolicyRuleCondition:
properties:
exclude:
items:
$ref: '#/components/schemas/PlatformConditionEvaluatorPlatform'
type: array
include:
items:
$ref: '#/components/schemas/PlatformConditionEvaluatorPlatform'
type: array
type: object
Policy:
discriminator:
mapping:
ACCESS_POLICY: '#/components/schemas/AccessPolicy'
IDP_DISCOVERY: '#/components/schemas/IdpDiscoveryPolicy'
MFA_ENROLL: '#/components/schemas/AuthenticatorEnrollmentPolicy'
OKTA_SIGN_ON: '#/components/schemas/OktaSignOnPolicy'
PASSWORD: '#/components/schemas/PasswordPolicy'
PROFILE_ENROLLMENT: '#/components/schemas/ProfileEnrollmentPolicy'
POST_AUTH_SESSION: '#/components/schemas/PostAuthSessionPolicy'
ENTITY_RISK: '#/components/schemas/EntityRiskPolicy'
propertyName: type
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: false
_embedded:
key: "{}"
_links:
mappings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rules:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
description: description
id: Assigned
priority: 0
type: ACCESS_POLICY
status: ACTIVE
properties:
created:
description: Timestamp when the Policy was created
format: date-time
readOnly: true
type: string
description:
description: Description of the Policy
type: string
id:
default: Assigned
description: Identifier of the Policy
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Policy was last modified
format: date-time
readOnly: true
type: string
name:
description: Name of the Policy
type: string
priority:
description: Specifies the order in which this Policy is evaluated in relation
to the other policies
type: integer
status:
$ref: '#/components/schemas/LifecycleStatus'
system:
default: false
description: Specifies whether Okta created the Policy
type: boolean
type:
$ref: '#/components/schemas/PolicyType'
_embedded:
additionalProperties:
properties: {}
type: object
readOnly: true
type: object
_links:
$ref: '#/components/schemas/PolicyLinks'
required:
- name
- type
type: object
PolicyAccess:
enum:
- ALLOW
- DENY
type: string
PolicyAccountLink:
description: Specifies the behavior for linking an IdP User to an existing Okta
User
example:
filter:
groups:
include:
- 00gjg5lzfBpn62wuF0g3
- 00gjg5lzfBpn62wuF0g3
action: AUTO
properties:
action:
$ref: '#/components/schemas/PolicyAccountLinkAction'
filter:
$ref: '#/components/schemas/PolicyAccountLinkFilter'
type: object
PolicyAccountLinkAction:
description: Specifies the account linking action for an IdP User
enum:
- AUTO
- DISABLED
type: string
x-enumDescriptions:
AUTO: "The IdP User is automatically linked to an Okta User when the transformed\
\ IdP User matches an existing Okta User according to [subject match rules](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=policy/subject&t=request)."
DISABLED: "Okta never attempts to link the IdP User to an existing Okta User,\
\ but may still attempt to provision a new Okta User according to the [provisioning\
\ action type](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=policy/provisioning/action&t=request)."
PolicyAccountLinkFilter:
description: Specifies Group memberships to restrict which Users are available
for account linking by an IdP
example:
groups:
include:
- 00gjg5lzfBpn62wuF0g3
- 00gjg5lzfBpn62wuF0g3
properties:
groups:
$ref: '#/components/schemas/PolicyAccountLinkFilterGroups'
type: object
PolicyAccountLinkFilterGroups:
description: Group memberships used to determine link candidates
example:
include:
- 00gjg5lzfBpn62wuF0g3
- 00gjg5lzfBpn62wuF0g3
properties:
include:
description: Specifies the allowlist of Group identifiers to match against.
Group memberships are restricted to type `OKTA_GROUP`.
items:
example: 00gjg5lzfBpn62wuF0g3
type: string
type: array
type: object
PolicyContext:
example:
ip: ip
groups:
ids:
- ids
- ids
risk:
level: LOW
zones:
ids:
- ids
- ids
device:
managed: true
registered: true
platform: platform
assuranceId: assuranceId
user:
id: id
properties:
device:
$ref: '#/components/schemas/PolicyContext_device'
groups:
$ref: '#/components/schemas/PolicyContext_groups'
ip:
description: "The network rule condition, zone, or IP address"
type: string
risk:
$ref: '#/components/schemas/PolicyContext_risk'
user:
$ref: '#/components/schemas/PolicyContext_user'
zones:
$ref: '#/components/schemas/PolicyContext_zones'
required:
- groups
- user
type: object
PolicyLinks:
example:
mappings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rules:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
activate:
$ref: '#/components/schemas/HrefObjectActivateLink'
deactivate:
$ref: '#/components/schemas/HrefObjectDeactivateLink'
mappings:
$ref: '#/components/schemas/HrefObjectMappingsLink'
rules:
$ref: '#/components/schemas/HrefObjectRulesLink'
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
readOnly: true
type: object
PolicyMapping:
example:
_links:
application:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
policy:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
properties:
id:
type: string
_links:
$ref: '#/components/schemas/PolicyMapping__links'
type: object
PolicyMappingRequest:
example:
resourceId: resourceId
resourceType: APP
properties:
resourceId:
type: string
resourceType:
$ref: '#/components/schemas/PolicyMappingResourceType'
type: object
PolicyMappingResourceType:
enum:
- APP
type: string
PolicyNetworkCondition:
properties:
connection:
$ref: '#/components/schemas/PolicyNetworkConnection'
exclude:
description: The zones to exclude. Required only if connection data type
is `ZONE`
items:
type: string
type: array
include:
description: The zones to include. Required only if connection data type
is `ZONE`
items:
type: string
type: array
type: object
PolicyNetworkConnection:
description: Network selection mode
enum:
- ANYWHERE
- ZONE
type: string
PolicyPeopleCondition:
description: Identifies Users and Groups that are used together
properties:
groups:
$ref: '#/components/schemas/GroupCondition'
users:
$ref: '#/components/schemas/UserCondition'
required:
- groups
- users
type: object
PolicyPlatformOperatingSystemType:
enum:
- ANDROID
- ANY
- IOS
- OSX
- OTHER
- WINDOWS
type: string
PolicyPlatformType:
enum:
- ANY
- DESKTOP
- MOBILE
- OTHER
type: string
PolicyRule:
discriminator:
mapping:
ACCESS_POLICY: '#/components/schemas/AccessPolicyRule'
PASSWORD: '#/components/schemas/PasswordPolicyRule'
PROFILE_ENROLLMENT: '#/components/schemas/ProfileEnrollmentPolicyRule'
RESOURCE_ACCESS: '#/components/schemas/AuthorizationServerPolicyRule'
SIGN_ON: '#/components/schemas/OktaSignOnPolicyRule'
IDP_DISCOVERY: '#/components/schemas/IdpDiscoveryPolicyRule'
POST_AUTH_SESSION: '#/components/schemas/PostAuthSessionPolicyRule'
ENTITY_RISK: '#/components/schemas/EntityRiskPolicyRule'
MFA_ENROLL: '#/components/schemas/AuthenticatorEnrollmentPolicyRule'
propertyName: type
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
system: false
_links:
mappings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rules:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
priority: 0
type: ACCESS_POLICY
status: ACTIVE
properties:
created:
description: Timestamp when the rule was created
format: date-time
nullable: true
readOnly: true
type: string
id:
description: Identifier for the rule
type: string
lastUpdated:
description: Timestamp when the rule was last modified
format: date-time
nullable: true
readOnly: true
type: string
name:
description: Name of the rule
type: string
priority:
description: Priority of the rule
type: integer
status:
$ref: '#/components/schemas/LifecycleStatus'
system:
default: false
description: Specifies whether Okta created the Policy Rule (`system=true`).
You can't delete Policy Rules that have `system` set to `true`.
type: boolean
type:
$ref: '#/components/schemas/PolicyRuleType'
_links:
$ref: '#/components/schemas/PolicyLinks'
type: object
PolicyRuleActions:
type: object
PolicyRuleActionsEnroll:
properties:
self:
$ref: '#/components/schemas/PolicyRuleActionsEnrollSelf'
type: object
PolicyRuleActionsEnrollSelf:
enum:
- CHALLENGE
- LOGIN
- NEVER
type: string
PolicyRuleAuthContextCondition:
properties:
authType:
$ref: '#/components/schemas/PolicyRuleAuthContextType'
type: object
PolicyRuleAuthContextType:
enum:
- ANY
- LDAP_INTERFACE
- RADIUS
type: string
PolicyRuleConditions:
properties:
app:
$ref: '#/components/schemas/AppAndInstancePolicyRuleCondition'
apps:
$ref: '#/components/schemas/AppInstancePolicyRuleCondition'
authContext:
$ref: '#/components/schemas/PolicyRuleAuthContextCondition'
authProvider:
$ref: '#/components/schemas/PasswordPolicyAuthenticationProviderCondition'
beforeScheduledAction:
$ref: '#/components/schemas/BeforeScheduledActionPolicyRuleCondition'
clients:
$ref: '#/components/schemas/ClientPolicyCondition'
context:
$ref: '#/components/schemas/ContextPolicyRuleCondition'
device:
$ref: '#/components/schemas/DevicePolicyRuleCondition'
grantTypes:
$ref: '#/components/schemas/GrantTypePolicyRuleCondition'
groups:
$ref: '#/components/schemas/GroupPolicyRuleCondition'
identityProvider:
$ref: '#/components/schemas/IdentityProviderPolicyRuleCondition'
mdmEnrollment:
$ref: '#/components/schemas/MDMEnrollmentPolicyRuleCondition'
network:
$ref: '#/components/schemas/PolicyNetworkCondition'
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
platform:
$ref: '#/components/schemas/PlatformPolicyRuleCondition'
risk:
$ref: '#/components/schemas/RiskPolicyRuleCondition'
riskScore:
$ref: '#/components/schemas/RiskScorePolicyRuleCondition'
scopes:
$ref: '#/components/schemas/OAuth2ScopesMediationPolicyRuleCondition'
userIdentifier:
$ref: '#/components/schemas/UserIdentifierPolicyRuleCondition'
users:
$ref: '#/components/schemas/UserPolicyRuleCondition'
userStatus:
$ref: '#/components/schemas/UserStatusPolicyRuleCondition'
type: object
PolicyRuleType:
description: Rule type
enum:
- ACCESS_POLICY
- ENTITY_RISK
- IDP_DISCOVERY
- MFA_ENROLL
- PASSWORD
- POST_AUTH_SESSION
- PROFILE_ENROLLMENT
- RESOURCE_ACCESS
- SIGN_ON
type: string
PolicyRuleVerificationMethodType:
description: Verification method type
enum:
- ASSURANCE
- AUTH_METHOD_CHAIN
type: string
PolicySubject:
description: "Specifies the behavior for establishing, validating, and matching\
\ a username for an IdP User"
example:
filter: (\S+@example\.com)
matchAttribute: login
matchType: CUSTOM_ATTRIBUTE
userNameTemplate:
template: idpuser.subjectNameId
properties:
filter:
description: |-
Optional [regular expression pattern](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions) used to filter untrusted IdP usernames.
* As a best security practice, you should define a regular expression pattern to filter untrusted IdP usernames. This is especially important if multiple IdPs are connected to your org. The filter prevents an IdP from issuing an assertion for any User, including partners or directory Users in your Okta org.
* For example, the filter pattern `(\S+@example\.com)` allows only Users that have an `@example.com` username suffix. It rejects assertions that have any other suffix such as `@corp.example.com` or `@partner.com`.
* Only `SAML2` and `OIDC` IdP providers support the `filter` property.
example: (\S+@example\.com)
maxLength: 1024
type: string
matchAttribute:
description: |-
Okta User profile attribute for matching a transformed IdP username. Only for matchType `CUSTOM_ATTRIBUTE`.
The `matchAttribute` must be a valid Okta User profile attribute of one of the following types:
* String (with no format or 'email' format only)
* Integer
* Number
example: login
type: string
matchType:
$ref: '#/components/schemas/PolicySubjectMatchType'
userNameTemplate:
$ref: '#/components/schemas/PolicyUserNameTemplate'
type: object
PolicySubjectMatchType:
description: Determines the Okta User profile attribute match conditions for
account linking and authentication of the transformed IdP username
enum:
- CUSTOM_ATTRIBUTE
- EMAIL
- USERNAME
- USERNAME_OR_EMAIL
type: string
PolicyType:
description: "All Okta orgs contain only one IdP Discovery Policy with an immutable\
\ default Rule routing to your org's sign-in page. \nCreating or replacing\
\ a policy with the `IDP_DISCOVERY` type isn't supported. The following policy\
\ types are available with\nIdentity Engine: `ACCESS_POLICY`, `PROFILE_ENROLLMENT`,\
\ `POST_AUTH_SESSION`, and `ENTITY_RISK`. The `POST_AUTH_SESSION`, and `ENTITY_RISK`\
\ \npolicy types are in . Contact\
\ your Okta account team to enable these features."
enum:
- ACCESS_POLICY
- ENTITY_RISK
- IDP_DISCOVERY
- MFA_ENROLL
- OKTA_SIGN_ON
- PASSWORD
- POST_AUTH_SESSION
- PROFILE_ENROLLMENT
- RESOURCE_ACCESS
type: string
PolicyTypeSimulation:
enum:
- ACCESS_POLICY
- MFA_ENROLL
- OKTA_SIGN_ON
- PROFILE_ENROLLMENT
type: string
PolicyUserNameTemplate:
description: |-
[Okta Expression Language (EL) expression](https://developer.okta.com/docs/reference/okta-expression-language/) to generate or transform a unique username for the IdP User.
* IdP User profile attributes can be referenced with the `idpuser` prefix such as `idpuser.subjectNameId`.
* You must define an IdP User profile attribute before it can be referenced in an Okta EL expression. To define an IdP User attribute policy, you may need to create a new IdP instance without a base profile property. Then edit the IdP User profile to update the IdP instance with an expression that references the IdP User profile attribute that you just created.
example:
template: idpuser.subjectNameId
properties:
template:
example: idpuser.subjectNameId
maxLength: 1024
minLength: 9
type: string
type: object
PolicyUserStatus:
enum:
- ACTIVATING
- ACTIVE
- DELETED
- DELETING
- EXPIRED_PASSWORD
- INACTIVE
- PENDING
- SUSPENDED
type: string
PossessionConstraint:
allOf:
- $ref: '#/components/schemas/AccessPolicyConstraint'
- properties:
deviceBound:
default: OPTIONAL
description: Indicates if device-bound Factors are required. This property
is only set for `POSSESSION` constraints.
enum:
- OPTIONAL
- REQUIRED
type: string
hardwareProtection:
default: OPTIONAL
description: Indicates if any secrets or private keys used during authentication
must be hardware protected and not exportable. This property is only
set for `POSSESSION` constraints.
enum:
- OPTIONAL
- REQUIRED
type: string
phishingResistant:
default: OPTIONAL
description: Indicates if phishing-resistant Factors are required. This
property is only set for `POSSESSION` constraints.
enum:
- OPTIONAL
- REQUIRED
type: string
userPresence:
default: REQUIRED
description: Indicates if the user needs to approve an Okta Verify prompt
or provide biometrics (meets NIST AAL2 requirements). This property
is only set for `POSSESSION` constraints.
enum:
- OPTIONAL
- REQUIRED
type: string
userVerification:
default: OPTIONAL
description: Indicates the user interaction requirement (PIN or biometrics)
to ensure verification of a possession factor
enum:
- OPTIONAL
- REQUIRED
type: string
type: object
PostAuthKeepMeSignedInPrompt:
properties:
acceptButtonText:
description: The label on the accept button when prompting for Stay signed
in
type: string
rejectButtonText:
description: The label on the reject button when prompting for Stay signed
in
type: string
subtitle:
description: The subtitle on the Sign-In Widget when prompting for Stay
signed in
type: string
title:
description: The title on the Sign-In Widget when prompting for Stay signed
in
type: string
type: object
PostAuthSessionFailureActionsObject:
discriminator:
mapping:
RUN_WORKFLOW: '#/components/schemas/PostAuthSessionPolicyRuleRunWorkflow'
TERMINATE_SESSION: '#/components/schemas/PostAuthSessionPolicyRuleTerminateSession'
propertyName: action
properties:
action:
enum:
- RUN_WORKFLOW
- TERMINATE_SESSION
type: string
type: object
PostAuthSessionPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
description: Policy conditions aren't supported for this policy type.
nullable: true
type: string
type: object
PostAuthSessionPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/PostAuthSessionPolicyRule_allOf_actions'
conditions:
$ref: '#/components/schemas/PostAuthSessionPolicyRule_allOf_conditions'
type: object
PostAuthSessionPolicyRuleRunWorkflow:
properties:
action:
enum:
- RUN_WORKFLOW
type: string
workflow:
$ref: '#/components/schemas/EntityRiskPolicyRuleActionRunWorkflow_workflow'
type: object
PostAuthSessionPolicyRuleTerminateSession:
properties:
action:
description: The action to take when post auth session evaluation detects
a failure.
enum:
- TERMINATE_SESSION
type: string
type: object
PreRegistrationInlineHook:
properties:
inlineHookId:
type: string
type: object
PrincipalRateLimitEntity:
description: ""
example:
defaultConcurrencyPercentage: 0
lastUpdatedBy: lastUpdatedBy
createdDate: 2000-01-23T04:56:07.000+00:00
createdBy: createdBy
lastUpdate: 2000-01-23T04:56:07.000+00:00
defaultPercentage: 6
principalId: principalId
id: id
orgId: orgId
principalType: SSWS_TOKEN
properties:
createdBy:
readOnly: true
type: string
createdDate:
format: date-time
readOnly: true
type: string
defaultConcurrencyPercentage:
readOnly: true
type: integer
defaultPercentage:
readOnly: true
type: integer
id:
readOnly: true
type: string
lastUpdate:
format: date-time
readOnly: true
type: string
lastUpdatedBy:
readOnly: true
type: string
orgId:
readOnly: true
type: string
principalId:
type: string
principalType:
$ref: '#/components/schemas/PrincipalType'
required:
- principalId
- principalType
title: PrincipalRateLimitEntity
type: object
PrincipalType:
enum:
- SSWS_TOKEN
type: string
PrivilegedAccount:
discriminator:
mapping:
APP_ACCOUNT: '#/components/schemas/PrivilegedAccountDetailsAppAccount'
OKTA_USER_ACCOUNT: '#/components/schemas/PrivilegedAccountDetailsOktaUserAccount'
propertyName: accountType
properties:
accountType:
$ref: '#/components/schemas/PrivilegedAccountType'
created:
description: Timestamp when the Privileged Account was created
format: date-time
readOnly: true
type: string
description:
description: The description of the Privileged Account
example: This is for accessing AWS Prod-5
format: regex
maxLength: 255
minLength: 0
type: string
id:
description: The UUID of the Privileged Account
example: a747a818-a4c4-4446-8a87-704216495a08
format: regex
pattern: "(?i)^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$"
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Privileged Account was last updated
format: date-time
readOnly: true
type: string
name:
description: The human-readable name for the Privileged Account
example: AWS Prod-5 account
format: regex
maxLength: 50
minLength: 1
pattern: "^[\\w\\-_. ]+$"
type: string
ownerGroupIds:
description: A list of IDs of the Okta groups that own the Privileged Account
example:
- 00g57qp78yZT2XBA40g7
items:
type: string
maxItems: 10
minItems: 0
type: array
ownerUserIds:
description: A list of IDs of the Okta users that own the Privileged Account
example:
- 00u11s48P9zGW8yqm0g5
items:
type: string
maxItems: 10
minItems: 0
type: array
status:
$ref: '#/components/schemas/PrivilegedAccountStatus'
statusDetail:
$ref: '#/components/schemas/PrivilegedAccountStatusDetail'
required:
- accountType
- name
type: object
PrivilegedAccountCredentials:
description: Credentials for a Privileged Account
properties:
password:
description: The password associated with the Privileged Account
format: password
type: string
writeOnly: true
username:
description: The username associated with the Privileged Account
example: testuser@example.com
maxLength: 100
minLength: 1
type: string
required:
- username
type: object
PrivilegedAccountDetailsAppAccount:
allOf:
- $ref: '#/components/schemas/PrivilegedAccount'
- properties:
details:
$ref: '#/components/schemas/PrivilegedAccountDetailsAppAccountSub'
required:
- details
type: object
description: "Details for a SaaS Application Account, which will be managed\
\ as a Privileged Account"
PrivilegedAccountDetailsAppAccountSub:
description: "Details for a SaaS Application Account, which will be managed\
\ as a Privileged Account"
properties:
appGlobalName:
description: The name of the SaaS Application in the Okta Integration Network
catalog
example: Salesforce
type: string
appInstanceName:
description: The instance name of the SaaS Application
example: Salesforce Prod
type: string
credentials:
$ref: '#/components/schemas/PrivilegedAccountCredentials'
oktaApplicationId:
description: The Okta app instance ID of the SaaS Application
example: aln1aqcs055ZRoizW0g8
type: string
required:
- credentials
- oktaApplicationId
type: object
PrivilegedAccountDetailsOktaUserAccount:
allOf:
- $ref: '#/components/schemas/PrivilegedAccount'
- properties:
details:
$ref: '#/components/schemas/PrivilegedAccountDetailsOktaUserAccountSub'
required:
- details
type: object
description: Details for managing an Okta Universal Directory Account as a Privileged
Account
PrivilegedAccountDetailsOktaUserAccountSub:
description: Details for managing an Okta Universal Directory Account as a Privileged
Account
properties:
credentials:
$ref: '#/components/schemas/PrivilegedAccountCredentials'
email:
description: The email address for the Okta Universal Directory Account
example: foo@bar.com
maxLength: 100
minLength: 5
type: string
oktaUserId:
description: "An optional Okta user ID. If supplied, converts the matching\
\ Okta Universal Directory Account to a Privileged Account and updates\
\ the account with the provided details."
example: 00u11s48P9zGW8yqm0g5
type: string
required:
- credentials
- email
type: object
PrivilegedAccountForUpdate:
properties:
description:
description: The description of the Privileged Account
example: This is for accessing AWS Prod-5
format: regex
maxLength: 255
minLength: 0
type: string
email:
description: The email address for the Okta Universal Directory Account
example: foo@bar.com
maxLength: 100
minLength: 5
type: string
name:
description: The human-readable name for the Privileged Account
example: AWS Prod-5 account
format: regex
maxLength: 50
minLength: 1
pattern: "^[\\w\\-_. ]+$"
type: string
ownerGroupIds:
description: A list of IDs of the Okta groups who own the Privileged Account
example:
- 00g57qp78yZT2XBA40g7
items:
type: string
maxItems: 10
minItems: 0
type: array
ownerUserIds:
description: A list of IDs of the Okta users who own the Privileged Account
example:
- 00u11s48P9zGW8yqm0g5
items:
type: string
maxItems: 10
minItems: 0
type: array
username:
description: The username associated with the Privileged Account
example: testuser@example.com
maxLength: 100
minLength: 1
type: string
type: object
PrivilegedAccountStatus:
description: Describes the current status of a Privileged Account
enum:
- ALERT
- ERROR
- INFO
- NO_ISSUES
- UNSECURED
type: string
x-enumDescriptions:
NO_ISSUES: The Account is ready for use in Okta Privileged Access
UNSECURED: The Account needs to be assigned to a Resource Group and a Project
in Okta Privileged Access
INFO: An action involving the Account is currently in progress in Okta Privileged
Access
ALERT: The Account requires attention from an Administrator
ERROR: An error is preventing the Account from being used in Okta Privileged
Access
PrivilegedAccountStatusDetail:
description: Describes the detailed status of a Privileged Account
enum:
- CREATION_FAILED
- MISSING_PASSWORD
- PENDING
- ROTATED
- ROTATING
- ROTATION_FAILED
- STAGED
- VAULTED
type: string
x-enumDescriptions:
PENDING: The Account is in the process of being created
CREATION_FAILED: The Account could not be created
STAGED: The Account is in the Okta Privileged Access resource assignment area
ROTATING: The Account is assigned to a Project in Okta Privileged Access.
Credentials are currently being synced using Okta Lifecycle Management.
ROTATED: The Account is assigned to a Project in Okta Privileged Access. Password
rotations are fulfilled by Okta Lifecycle Management.
ROTATION_FAILED: The Account is assigned to a Project in Okta Privileged Access.
An error occurred while using Okta Lifecycle Management to rotate the password.
VAULTED: The Account is assigned to a Project in Okta Privileged Access. A
manually managed password is assigned to the Account.
MISSING_PASSWORD: The Account is assigned to a Project in Okta Privileged
Access. A password is not assigned to the Account.
PrivilegedAccountType:
description: The type of Privileged Account
enum:
- APP_ACCOUNT
- OKTA_USER_ACCOUNT
type: string
x-enumDescriptions:
APP_ACCOUNT: SaaS Application Account
OKTA_USER_ACCOUNT: Okta Universal Directory Account
PrivilegedResource:
default:
resourceType: OKTA_USER_ACCOUNT
discriminator:
mapping:
APP_ACCOUNT: '#/components/schemas/PrivilegedResourceAccountApp'
OKTA_USER_ACCOUNT: '#/components/schemas/PrivilegedResourceAccountOkta'
propertyName: resourceType
properties:
created:
description: Timestamp when the object was created
example: 2024-06-10T11:11:01Z
format: date-time
readOnly: true
type: string
credentialSyncInfo:
$ref: '#/components/schemas/CredentialSyncInfo'
id:
description: ID of the privileged resource
example: opa100xTfFs4MasRf0g4
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last updated
example: 2024-06-10T11:13:01Z
format: date-time
readOnly: true
type: string
resourceType:
$ref: '#/components/schemas/PrivilegedResourceType'
status:
$ref: '#/components/schemas/PrivilegedResourceStatus'
type: object
PrivilegedResourceAccountApp:
allOf:
- properties:
containerDetails:
$ref: '#/components/schemas/AppAccountContainerDetails'
credentials:
$ref: '#/components/schemas/PrivilegedResourceCredentials'
type: object
- $ref: '#/components/schemas/PrivilegedResource'
required:
- containerId
PrivilegedResourceAccountOkta:
allOf:
- properties:
resourceId:
description: The user ID associated with the Okta privileged resource
example: 00u100xTfFs4MasRf0g4
type: string
credentials:
$ref: '#/components/schemas/PrivilegedResourceCredentials'
profile:
$ref: '#/components/schemas/profile'
type: object
- $ref: '#/components/schemas/PrivilegedResource'
PrivilegedResourceCredentials:
description: Credentials for the privileged account
properties:
password:
description: The password associated with the privileged resource
example: xf1bs9am2
format: password
type: string
writeOnly: true
userName:
description: The username associated with the privileged resource
example: testuser@example.com
maxLength: 100
minLength: 1
type: string
required:
- userName
type: object
PrivilegedResourceStatus:
description: Current status of the privileged resource
enum:
- ACTIVE
- CREATED
- CREATION_FAILED
- INACTIVE
- PENDING
readOnly: true
type: string
x-enumDescriptions:
CREATED: The privileged resource is created but not yet managed by OPA
ACTIVE: The privileged resource is currently managed by OPA
INACTIVE: The privileged resource is `INACTIVE` and not currently managed
by OPA
PrivilegedResourceType:
description: The type of the resource
enum:
- APP_ACCOUNT
- OKTA_USER_ACCOUNT
type: string
PrivilegedResourceUpdateRequest:
description: Update request for a privileged resource
properties:
profile:
additionalProperties:
properties: {}
type: object
description: Specific profile properties for the privileged account
readOnly: true
type: object
userName:
description: The username associated with the privileged resource
example: testuser@example.com
maxLength: 100
minLength: 1
type: string
type: object
ProfileEnrollmentPolicy:
allOf:
- $ref: '#/components/schemas/Policy'
- properties:
conditions:
description: Policy conditions aren't supported for this policy type
nullable: true
type: string
type: object
ProfileEnrollmentPolicyRule:
allOf:
- $ref: '#/components/schemas/PolicyRule'
- properties:
actions:
$ref: '#/components/schemas/ProfileEnrollmentPolicyRuleActions'
conditions:
description: Policy Rule conditions aren't supported for this policy type
nullable: true
type: string
type: object
ProfileEnrollmentPolicyRuleAction:
properties:
access:
description: '**Note:** The Profile Enrollment Action object can''t be modified
to set the `access` property to `DENY` after the policy is created.'
enum:
- ALLOW
- DENY
type: string
activationRequirements:
$ref: '#/components/schemas/ProfileEnrollmentPolicyRuleActivationRequirement'
allowedIdentifiers:
default:
- login
description: " A list of attributes\
\ to identify an end user. Can be used across Okta sign-in, unlock, and\
\ recovery flows."
items:
type: string
type: array
enrollAuthenticatorTypes:
description: Additional authenticator fields that can be used on the first
page of user registration. Valid values only includes `'password'`.
items:
type: string
type: array
preRegistrationInlineHooks:
description: (Optional) The `id` of at most one registration inline hook
items:
$ref: '#/components/schemas/PreRegistrationInlineHook'
type: array
profileAttributes:
description: "A list of attributes to prompt the user during registration\
\ or progressive profiling. Where defined on the User schema, these attributes\
\ are persisted in the User profile. Non-schema attributes can also be\
\ added, which aren't persisted to the User's profile, but are included\
\ in requests to the registration inline hook. A maximum of 10 Profile\
\ properties is supported."
items:
$ref: '#/components/schemas/ProfileEnrollmentPolicyRuleProfileAttribute'
type: array
progressiveProfilingAction:
description: Progressive profile enrollment helps evaluate the profile enrollment
policy at every user login. Users can be prompted to provide input for
newly required attributes.
enum:
- ENABLED
- DISABLED
type: string
targetGroupIds:
description: "(Optional, max 1 entry) The `id` of a Group that this User\
\ should be added to"
items:
type: string
type: array
uiSchemaId:
description: "Value created by the backend. If present, all policy updates\
\ must include this attribute/value."
type: string
unknownUserAction:
description: Which action should be taken if this User is new
enum:
- DENY
- REGISTER
type: string
type: object
ProfileEnrollmentPolicyRuleActions:
allOf:
- $ref: '#/components/schemas/PolicyRuleActions'
- properties:
profileEnrollment:
$ref: '#/components/schemas/ProfileEnrollmentPolicyRuleAction'
type: object
ProfileEnrollmentPolicyRuleActivationRequirement:
description: "Contains a single Boolean property that indicates whether `emailVerification`\
\ should occur (`true`) or not (`false`, default)"
properties:
emailVerification:
type: boolean
type: object
ProfileEnrollmentPolicyRuleProfileAttribute:
properties:
label:
description: A display-friendly label for this property
type: string
name:
description: The name of a User Profile property. Can be an existing property.
type: string
required:
default: false
description: "(Optional, default `FALSE`) Indicates if this property is\
\ required for enrollment"
type: boolean
type: object
ProfileMapping:
description: |-
The Profile Mapping object describes a mapping between an Okta User's and an App User's properties using [JSON Schema Draft 4](https://datatracker.ietf.org/doc/html/draft-zyp-json-schema-04).
> **Note:** Same type source/target mappings aren't supported by this API. Profile mappings must either be Okta->App or App->Okta.
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
source:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
properties:
key:
expression: expression
pushStatus: DONT_PUSH
target:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
properties:
id:
description: Unique identifier for a profile mapping
readOnly: true
type: string
properties:
additionalProperties:
$ref: '#/components/schemas/ProfileMappingProperty'
readOnly: false
type: object
source:
$ref: '#/components/schemas/ProfileMappingSource'
target:
$ref: '#/components/schemas/ProfileMappingTarget'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
ProfileMappingProperty:
description: "A target property, in string form, that maps to a valid [JSON\
\ Schema Draft](https://tools.ietf.org/html/draft-zyp-json-schema-04) document."
example:
expression: expression
pushStatus: DONT_PUSH
properties:
expression:
description: Combination or single source properties that are mapped to
the target property
type: string
pushStatus:
$ref: '#/components/schemas/ProfileMappingPropertyPushStatus'
type: object
ProfileMappingPropertyPushStatus:
description: |-
Indicates whether to update target properties for user create and update or just for user create.
Having a pushStatus of `PUSH` causes properties in the target to be updated on create and update. Having a pushStatus of `DONT_PUSH` causes properties in the target to be updated only on create.
enum:
- DONT_PUSH
- PUSH
type: string
ProfileMappingRequest:
description: The updated request body properties
example:
properties:
key:
expression: expression
pushStatus: DONT_PUSH
properties:
properties:
additionalProperties:
$ref: '#/components/schemas/ProfileMappingProperty'
type: object
required:
- additionalProperties
- expression
- properties
- pushStatus
type: object
ProfileMappingSource:
description: |-
The parameter is the source of a profile mapping and is a valid [JSON Schema Draft 4](https://datatracker.ietf.org/doc/html/draft-zyp-json-schema-04) document with the following properties. The data type can be an app instance or an Okta object.
> **Note:** If the source is Okta and the UserTypes feature isn't enabled, then the source `_links` only has a link to the schema.
example:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
properties:
id:
description: Unique identifier for the application instance or userType
readOnly: true
type: string
name:
description: Variable name of the application instance or name of the referenced
UserType
readOnly: true
type: string
type:
description: Type of user referenced in the mapping
readOnly: true
type: string
_links:
$ref: '#/components/schemas/SourceLinks'
type: object
ProfileMappingTarget:
description: |-
The parameter is the target of a profile mapping and is a valid [JSON Schema Draft 4](https://datatracker.ietf.org/doc/html/draft-zyp-json-schema-04) document with the following properties. The data type can be an app instance or an Okta object.
> **Note:** If the target is Okta and the UserTypes feature isn't enabled, then the target `_links` only has a link to the schema.
example:
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
type: type
properties:
id:
description: Unique identifier for the application instance or UserType
readOnly: true
type: string
name:
description: Variable name of the application instance or name of the referenced
userType
readOnly: true
type: string
type:
description: Type of user referenced in the mapping
readOnly: true
type: string
_links:
$ref: '#/components/schemas/SourceLinks'
type: object
ProfileSettingObject:
description: |
This setting determines whether a user in the app gets updated when they're updated in Okta.
If enabled, Okta updates a user's attributes in the app when the app is assigned.
Future changes made to the Okta user's profile automatically overwrite the corresponding attribute value in the app.
properties:
status:
allOf:
- $ref: '#/components/schemas/EnabledStatus'
- example: DISABLED
- default: DISABLED
type: object
Protocol:
example:
algorithms:
request:
signature:
scope: ANY
algorithm: algorithm
response:
signature:
scope: ANY
algorithm: algorithm
relayState:
format: FROM_URL
settings:
nameFormat: nameFormat
endpoints:
acs:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
authorization:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
userInfo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
metadata:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
jwks:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
slo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
sso:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
token:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
credentials:
trust:
revocation: CRL
audience: audience
revocationCacheLifetime: 0
kid: kid
issuer: issuer
client:
pkce_required: true
client_secret: client_secret
client_id: client_id
signing:
kid: kid
scopes:
- scopes
- scopes
type: MTLS
issuer:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
properties:
algorithms:
$ref: '#/components/schemas/ProtocolAlgorithms'
credentials:
$ref: '#/components/schemas/IdentityProviderCredentials'
endpoints:
$ref: '#/components/schemas/ProtocolEndpoints'
issuer:
$ref: '#/components/schemas/ProtocolEndpoint'
relayState:
$ref: '#/components/schemas/ProtocolRelayState'
scopes:
items:
type: string
type: array
settings:
$ref: '#/components/schemas/ProtocolSettings'
type:
$ref: '#/components/schemas/ProtocolType'
type: object
ProtocolAlgorithmRequestScope:
description: Specifies whether to digitally sign authorization requests to the
IdP
enum:
- NONE
- REQUEST
example: REQUEST
type: string
ProtocolAlgorithmResponseScope:
description: Specifies whether to verify responses from the IdP
enum:
- ANY
- RESPONSE
- TOKEN
example: ANY
type: string
ProtocolCredentialsKeyId:
description: IdP Key Credential reference to the Okta X.509 signature certificate
example: your-key-id
type: string
ProtocolEndpointBinding:
enum:
- HTTP-POST
- HTTP-REDIRECT
type: string
ProtocolMtls:
description: "Protocol settings for the [MTLS Protocol](https://tools.ietf.org/html/rfc5246#section-7.4.4)"
properties:
credentials:
$ref: '#/components/schemas/MtlsCredentials'
endpoints:
$ref: '#/components/schemas/MtlsEndpoints'
type:
description: Mutual TLS
enum:
- MTLS
type: string
title: Mutual TLS Protocol
type: object
ProtocolOAuth:
description: "Protocol settings for authentication using the [OAuth 2.0 Authorization\
\ Code flow](https://tools.ietf.org/html/rfc6749#section-4.1)"
properties:
credentials:
$ref: '#/components/schemas/OAuthCredentials'
endpoints:
$ref: '#/components/schemas/OAuthEndpoints'
scopes:
description: |-
IdP-defined permission bundles to request delegated access from the User
> **Note:** The [Identity Provider type](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=type&t=request) table lists the scopes that are supported for each Identity Provider.
items:
example: public_profile
type: string
type: array
type:
description: OAuth 2.0 Authorization Code flow
enum:
- OAUTH2
type: string
title: OAuth 2.0 Protocol
type: object
ProtocolOidc:
description: "Protocol settings for authentication using the [OpenID Connect\
\ Protocol](http://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth)"
properties:
algorithms:
$ref: '#/components/schemas/OidcAlgorithms'
credentials:
$ref: '#/components/schemas/OAuthCredentials'
endpoints:
$ref: '#/components/schemas/OAuthEndpoints'
scopes:
description: |-
OpenID Connect and IdP-defined permission bundles to request delegated access from the User
> **Note:** The [Identity Provider type](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=type&t=request) table lists the scopes that are supported for each Identity Provider.
items:
example: openid
type: string
type: array
type:
description: OpenID Connect Authorization Code flow
enum:
- OIDC
type: string
title: OpenID Connect Protocol
type: object
ProtocolSaml:
description: "Protocol settings for the [SAML 2.0 Authentication Request Protocol](http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf)"
properties:
algorithms:
$ref: '#/components/schemas/SamlAlgorithms'
credentials:
$ref: '#/components/schemas/SamlCredentials'
endpoints:
$ref: '#/components/schemas/SamlEndpoints'
relayState:
$ref: '#/components/schemas/SamlRelayState'
settings:
$ref: '#/components/schemas/SamlSettings'
type:
description: SAML 2.0 protocol
enum:
- SAML2
type: string
title: SAML 2.0 Protocol
type: object
ProtocolAlgorithmType:
example:
signature:
scope: ANY
algorithm: algorithm
properties:
signature:
$ref: '#/components/schemas/ProtocolAlgorithmTypeSignature'
type: object
ProtocolAlgorithmTypeSignature:
example:
scope: ANY
algorithm: algorithm
properties:
algorithm:
type: string
scope:
$ref: '#/components/schemas/ProtocolAlgorithmTypeSignatureScope'
type: object
ProtocolAlgorithmTypeSignatureScope:
enum:
- ANY
- NONE
- REQUEST
- RESPONSE
- TOKEN
type: string
ProtocolAlgorithms:
example:
request:
signature:
scope: ANY
algorithm: algorithm
response:
signature:
scope: ANY
algorithm: algorithm
properties:
request:
$ref: '#/components/schemas/ProtocolAlgorithmType'
response:
$ref: '#/components/schemas/ProtocolAlgorithmType'
type: object
ProtocolEndpoint:
example:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
destination:
type: string
type:
$ref: '#/components/schemas/ProtocolEndpointType'
url:
type: string
type: object
ProtocolEndpointType:
enum:
- INSTANCE
- ORG
type: string
ProtocolEndpoints:
example:
acs:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
authorization:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
userInfo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
metadata:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
jwks:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
slo:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
sso:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
token:
destination: destination
binding: HTTP-POST
type: INSTANCE
url: url
properties:
acs:
$ref: '#/components/schemas/ProtocolEndpoint'
authorization:
$ref: '#/components/schemas/ProtocolEndpoint'
jwks:
$ref: '#/components/schemas/ProtocolEndpoint'
metadata:
$ref: '#/components/schemas/ProtocolEndpoint'
slo:
$ref: '#/components/schemas/ProtocolEndpoint'
sso:
$ref: '#/components/schemas/ProtocolEndpoint'
token:
$ref: '#/components/schemas/ProtocolEndpoint'
userInfo:
$ref: '#/components/schemas/ProtocolEndpoint'
type: object
ProtocolRelayState:
example:
format: FROM_URL
properties:
format:
$ref: '#/components/schemas/ProtocolRelayStateFormat'
type: object
ProtocolRelayStateFormat:
enum:
- FROM_URL
- OPAQUE
type: string
ProtocolSettings:
example:
nameFormat: nameFormat
properties:
nameFormat:
type: string
type: object
ProtocolType:
enum:
- MTLS
- OAUTH2
- OIDC
- SAML2
type: string
ProviderType:
enum:
- APNS
- FCM
type: string
Provisioning:
description: Specifies the behavior for just-in-time (JIT) provisioning of an
IdP User as a new Okta User and their Group memberships
example:
action: AUTO
groups:
filter:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
assignments:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
sourceAttributeName: Groups
action: APPEND
profileMaster: true
conditions:
deprovisioned:
action: NONE
suspended:
action: NONE
properties:
action:
$ref: '#/components/schemas/ProvisioningAction'
conditions:
$ref: '#/components/schemas/ProvisioningConditions'
groups:
$ref: '#/components/schemas/ProvisioningGroups'
profileMaster:
description: Determines if the IdP should act as a source of truth for User
profile attributes
type: boolean
type: object
ProvisioningAction:
description: |-
Specifies the User provisioning action during authentication when an IdP User isn't linked to an existing Okta User.
* To successfully provision a new Okta User, you must enable just-in-time (JIT) provisioning in your org security settings.
* If the target username isn't unique or the resulting Okta User profile is missing a required profile attribute, JIT provisioning may fail.
* New Okta Users are provisioned with either a `FEDERATION` or `SOCIAL` authentication provider depending on the IdP type.
enum:
- AUTO
- DISABLED
type: string
x-enumDescriptions:
AUTO: The IdP User profile is transformed through defined universal directory
profile mappings to an Okta User profile and automatically provisioned as
an Okta User.
DISABLED: Okta rejects the authentication request and skips provisioning of
a new Okta User if the IdP User isn't linked to an existing Okta User.
ProvisioningConditions:
description: Conditional behaviors for an IdP User during authentication
example:
deprovisioned:
action: NONE
suspended:
action: NONE
properties:
deprovisioned:
$ref: '#/components/schemas/ProvisioningDeprovisionedCondition'
suspended:
$ref: '#/components/schemas/ProvisioningSuspendedCondition'
type: object
ProvisioningConnectionAuthScheme:
description: Defines the method of authentication
enum:
- OAUTH2
- TOKEN
- UNKNOWN
type: string
x-enumDescriptions:
TOKEN: A token is used to authenticate with the app.
OAUTH2: OAuth 2.0 is used to authenticate with the app.
UNKNOWN: "The authentication scheme used by the app isn't supported, or the\
\ app doesn't support provisioning."
ProvisioningConnectionOauthAuthScheme:
description: OAuth 2.0 is used to authenticate with the app.
enum:
- OAUTH2
type: string
ProvisioningConnectionOauthRequest:
allOf:
- $ref: '#/components/schemas/ProvisioningConnectionRequest'
- description: OAuth 2.0-based Provisioning Connection request
properties:
profile:
$ref: '#/components/schemas/ProvisioningConnectionOauthRequestProfile'
required:
- profile
title: OAuth 2.0-based connection
ProvisioningConnectionOauthRequestProfile:
properties:
authScheme:
$ref: '#/components/schemas/ProvisioningConnectionOauthAuthScheme'
clientId:
description: Only used for the Okta Org2Org (`okta_org2org`) app. The unique
client identifier for the OAuth 2.0 service app from the target org.
type: string
settings:
$ref: '#/components/schemas/Office365ProvisioningSettings'
required:
- authScheme
ProvisioningConnectionProfileOauth:
description: |
The app provisioning connection profile used to configure the method of authentication and the credentials.
Currently, token-based and OAuth 2.0-based authentication are supported.
properties:
authScheme:
$ref: '#/components/schemas/ProvisioningConnectionOauthAuthScheme'
clientId:
type: string
required:
- authScheme
ProvisioningConnectionRequest:
type: object
ProvisioningConnectionRequestAuthScheme:
enum:
- OAUTH2
- TOKEN
type: string
ProvisioningConnectionResponse:
example:
baseUrl: baseUrl
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
authorize:
hints:
allow:
- DELETE
- DELETE
guidance:
- guidance
- guidance
href: href
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
profile:
authScheme: OAUTH2
authScheme: TOKEN
status: DISABLED
properties:
authScheme:
$ref: '#/components/schemas/ProvisioningConnectionTokenAuthScheme'
baseUrl:
description: Base URL
type: string
profile:
$ref: '#/components/schemas/ProvisioningConnectionResponseProfile'
status:
$ref: '#/components/schemas/ProvisioningConnectionStatus'
_links:
$ref: '#/components/schemas/LinksSelfLifecycleAndAuthorize'
required:
- profile
- status
type: object
ProvisioningConnectionResponseProfile:
example:
authScheme: OAUTH2
properties:
authScheme:
$ref: '#/components/schemas/ProvisioningConnectionAuthScheme'
required:
- authScheme
ProvisioningConnectionStatus:
default: DISABLED
description: Provisioning Connection status
enum:
- DISABLED
- ENABLED
- UNKNOWN
type: string
x-enumDescriptions:
DISABLED: The Provisioning Connection is disabled.
ENABLED: The Provisioning Connection is enabled.
UNKNOWN: "Provisioning isn't supported by the app, or the authentication method\
\ is unknown."
ProvisioningConnectionTokenAuthScheme:
description: A token is used to authenticate with the app. This property is
only returned for the `TOKEN` authentication scheme.
enum:
- TOKEN
type: string
ProvisioningConnectionTokenRequest:
allOf:
- $ref: '#/components/schemas/ProvisioningConnectionRequest'
- description: Token-based Provisioning Connection request
properties:
baseUrl:
description: "Only used for the Zscaler 2.0 (`zscalerbyz`) app. The base\
\ URL for the Zscaler 2.0 target app, which also contains the Zscaler\
\ ID."
type: string
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
profile:
$ref: '#/components/schemas/ProvisioningConnectionTokenRequestProfile'
required:
- profile
title: Token-based connection
ProvisioningConnectionTokenRequestProfile:
properties:
authScheme:
$ref: '#/components/schemas/ProvisioningConnectionTokenAuthScheme'
token:
description: Token used to authenticate with the app
type: string
required:
- authScheme
ProvisioningDeprovisionedAction:
description: Specifies the action during authentication when an IdP User is
linked to a previously deprovisioned Okta User
enum:
- NONE
- REACTIVATE
type: string
x-enumDescriptions:
NONE: "Take no action. If an IdP User that matches a previously deprovisioned\
\ Okta User attempts to authenticate, authentication fails."
REACTIVATE: "If an IdP User that matches a previously deprovisioned Okta User\
\ attempts to authenticate, reactivate the matching User in Okta and allow\
\ the authentication attempt to proceed."
ProvisioningDeprovisionedCondition:
description: Behavior for a previously deprovisioned IdP User during authentication.
Not supported with OIDC IdPs.
example:
action: NONE
properties:
action:
$ref: '#/components/schemas/ProvisioningDeprovisionedAction'
type: object
ProvisioningGroups:
description: Provisioning settings for a User's Group memberships
example:
filter:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
assignments:
- 00gak46y5hydV6NdM0g4
- 00gak46y5hydV6NdM0g4
sourceAttributeName: Groups
action: APPEND
properties:
action:
$ref: '#/components/schemas/ProvisioningGroupsAction'
assignments:
description: List of `OKTA_GROUP` Group identifiers to add an IdP User as
a member with the `ASSIGN` action
items:
example: 00gak46y5hydV6NdM0g4
type: string
type: array
filter:
description: Allowlist of `OKTA_GROUP` Group identifiers for the `APPEND`
or `SYNC` provisioning action
items:
example: 00gak46y5hydV6NdM0g4
type: string
type: array
sourceAttributeName:
description: IdP User profile attribute name (case-insensitive) for an array
value that contains Group memberships
example: Groups
maxLength: 1024
type: string
type: object
ProvisioningGroupsAction:
description: |-
Provisioning action for the IdP User's Group memberships
| Enum | Description | Existing OKTA_GROUP Memberships | Existing APP_GROUP Memberships | Existing BUILT_IN Memberships |
| -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------ | ----------------------------- |
| `APPEND` | Adds a User to any Group defined by the IdP as a value of the `sourceAttributeName` array that matches the name of the allow listed Group defined in the `filter` | Unchanged | Unchanged | Unchanged |
| `ASSIGN` | Assigns a User to Groups defined in the `assignments` array | Unchanged | Unchanged | Unchanged |
| `NONE` | Skips processing of Group memberships | Unchanged | Unchanged | Unchanged |
| `SYNC` | Group memberships are sourced by the IdP as a value of the `sourceAttributeName` array that matches the name of the Group defined in the `filter` | Removed if not defined by the IdP in `sourceAttributeName` and matching name of the Group in `filter` | Unchanged | Unchanged |
> **Note:** Group provisioning action is processed independently from profile sourcing. You can sync Group memberships through SAML with profile sourcing disabled.
enum:
- APPEND
- ASSIGN
- NONE
- SYNC
type: string
ProvisioningSuspendedAction:
description: Specifies the action during authentication when an IdP User is
linked to a previously suspended Okta User
enum:
- NONE
- UNSUSPEND
type: string
x-enumDescriptions:
NONE: "Take no action. If an IdP User that matches a previously suspended\
\ Okta User attempts to authenticate, authentication fails."
UNSUSPEND: "If an IdP User that matches a previously suspended Okta User attempts\
\ to authenticate, unsuspend the matching User in Okta and allow the authentication\
\ attempt to proceed."
ProvisioningSuspendedCondition:
description: Behavior for a previously suspended IdP User during authentication.
Not supported with OIDC IdPs.
example:
action: NONE
properties:
action:
$ref: '#/components/schemas/ProvisioningSuspendedAction'
type: object
PushMethodKeyProtection:
description: Indicates whether you must use a hardware key store
enum:
- ANY
- HARDWARE
type: string
PushProvider:
discriminator:
mapping:
APNS: '#/components/schemas/APNSPushProvider'
FCM: '#/components/schemas/FCMPushProvider'
propertyName: providerType
example:
lastUpdatedDate: lastUpdatedDate
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: name
id: id
providerType: APNS
properties:
id:
description: Unique key for the Push Provider
readOnly: true
type: string
lastUpdatedDate:
description: Timestamp when the Push Provider was last modified
readOnly: true
type: string
name:
description: Display name of the push provider
type: string
providerType:
$ref: '#/components/schemas/ProviderType'
_links:
$ref: '#/components/schemas/LinksSelf'
title: PushProvider
type: object
RateLimitAdminNotifications:
description: ""
example:
notificationsEnabled: true
properties:
notificationsEnabled:
type: boolean
required:
- notificationsEnabled
title: RateLimitAdminNotifications
type: object
RateLimitWarningThresholdRequest:
description: ""
example:
warningThreshold: 34
properties:
warningThreshold:
description: "The threshold value (percentage) of a rate limit that, when\
\ exceeded, triggers a warning notification. By default, this value is\
\ 90 for Workforce orgs and 60 for CIAM orgs."
maximum: 90
minimum: 30
type: integer
required:
- warningThreshold
title: RateLimitWarningThreshold
type: object
RateLimitWarningThresholdResponse:
description: ""
example:
warningThreshold: 34
properties:
warningThreshold:
description: "The threshold value (percentage) of a rate limit that, when\
\ exceeded, triggers a warning notification. By default, this value is\
\ 90 for Workforce orgs and 60 for CIAM orgs."
maximum: 90
minimum: 30
type: integer
title: RateLimitWarningThreshold
type: object
Realm:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
isDefault: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
realmType: PARTNER
name: name
id: id
properties:
created:
description: Timestamp when the Realm was created
format: date-time
readOnly: true
type: string
id:
description: Unique key for the Realm
readOnly: true
type: string
isDefault:
description: Conveys whether the Realm is the default
readOnly: true
type: boolean
lastUpdated:
description: Timestamp when the Realm was last updated
format: date-time
readOnly: true
type: string
profile:
$ref: '#/components/schemas/RealmProfile'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
RealmAssignment:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
isDefault: true
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: name
id: id
conditions:
expression:
value: value
profileSourceId: profileSourceId
priority: 0
actions:
assignUserToRealm:
realmId: realmId
status: ACTIVE
properties:
actions:
$ref: '#/components/schemas/Actions'
conditions:
$ref: '#/components/schemas/Conditions'
created:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
isDefault:
readOnly: true
type: boolean
lastUpdated:
format: date-time
readOnly: true
type: string
name:
type: string
priority:
type: integer
status:
$ref: '#/components/schemas/LifecycleStatus'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
RealmProfile:
example:
realmType: PARTNER
name: name
properties:
name:
description: Name of a Realm
type: string
realmType:
description: Used to store partner users. This must be set to Partner to
access Okta's external partner portal.
enum:
- PARTNER
- DEFAULT
type: string
x-enumDescriptions:
PARTNER: Realm with external partner portal
DEFAULT: Default
required:
- name
type: object
RecoveryQuestionCredential:
description: |-
Specifies a secret question and answer that's validated (case insensitive) when a User forgets their
password or unlocks their account. The answer property is write-only.
example:
answer: se7en
question: what is your favourite movie?
properties:
answer:
description: The answer to the recovery question
example: se7en
maximum: 100
minimum: 1
type: string
writeOnly: true
question:
description: The recovery question
example: what is your favourite movie?
maximum: 100
minimum: 1
type: string
type: object
RefreshToken:
description: The refresh token
properties:
jti:
description: The refresh token ID
type: string
type: object
RegistrationInlineHook:
allOf:
- $ref: '#/components/schemas/InlineHook'
- type: object
RegistrationInlineHookCommand:
properties:
type:
enum:
- com.okta.user.profile.update
- com.okta.action.update
- com.okta.user.progressive.profile.update
type: string
type: object
RegistrationInlineHookPPData:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/RegistrationInlineHookRequest'
- properties:
data:
$ref: '#/components/schemas/RegistrationInlineHookPPData_allOf_data'
type: object
RegistrationInlineHookRequest:
discriminator:
mapping:
self.service.registration: '#/components/schemas/RegistrationInlineHookSSRData'
progressive.profile: '#/components/schemas/RegistrationInlineHookPPData'
propertyName: requestType
properties:
eventType:
description: The type of inline hook. The registration inline hook type
is `com.okta.user.pre-registration`.
type: string
requestType:
$ref: '#/components/schemas/RegistrationInlineHookRequestType'
type: object
RegistrationInlineHookRequestType:
description: The type of registration hook. Use either `self.service.registration`
or `progressive.profile`.
enum:
- progressive.profile
- self.service.registration
type: string
RegistrationInlineHookResponse:
properties:
commands:
items:
description: TODO default missing array inner type to string
type: string
type: array
type: object
RegistrationInlineHookSSRData:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/RegistrationInlineHookRequest'
- properties:
data:
$ref: '#/components/schemas/RegistrationInlineHookSSRData_allOf_data'
type: object
RegistrationResponse:
properties:
commands:
description: |-
The `commands` object lets you invoke commands to modify or add values to the attributes in the Okta user profile that are created for this user. The object also lets you control whether or not the registration attempt is allowed to proceed.
This object is an array, allowing you to send multiple commands in your response. Each array element requires a `type` property and a `value` property. The `type` property is where you specify which of the supported commands you wish to execute, and `value` is where you supply parameters for that command.
The registration inline hook supports these three commands:
* `com.okta.user.profile.update`: Change attribute values in the user's Okta user profile. For SSR only. Invalid if used with a Progressive Profile response.
* `com.okta.action.update`: Allow or deny the user's registration.
* `com.okta.user.progressive.profile.update`: Change attribute values in the user's Okta Progressive Profile.
items:
$ref: '#/components/schemas/RegistrationResponse_commands_inner'
type: array
Error:
$ref: '#/components/schemas/RegistrationResponse_Error'
type: object
ReleaseChannel:
description: Release channel for auto-update
enum:
- BETA
- EA
- GA
- TEST
type: string
RequiredEnum:
enum:
- ALWAYS
- HIGH_RISK_ONLY
- NEVER
type: string
ResendUserFactor:
discriminator:
mapping:
call: '#/components/schemas/UserFactorCall'
email: '#/components/schemas/UserFactorEmail'
sms: '#/components/schemas/UserFactorSMS'
propertyName: factorType
example:
factorType: call
properties:
factorType:
description: Type of the Factor
enum:
- call
- email
- sms
type: string
type: object
ResetPasswordToken:
example:
resetPasswordUrl: "https://{yourOktaDomain}/signin/reset-password/XE6wE17zmphl3KqAPFxO"
properties:
resetPasswordUrl:
example: "https://{yourOktaDomain}/signin/reset-password/XE6wE17zmphl3KqAPFxO"
readOnly: true
type: string
type: object
ResourceSelectorCreateRequestSchema:
properties:
description:
description: Description of the Resource Selector
type: string
filter:
description: SCIM filter of the Resource Selector
type: string
name:
description: Name of the Resource Selector
type: string
schema:
description: Schema of the Resource Selector
type: string
type: object
ResourceSelectorPatchRequestSchema:
properties:
description:
description: Description of the Resource Selector
type: string
filter:
description: SCIM filter of the Resource Selector
type: string
name:
description: Name of the Resource Selector
type: string
type: object
ResourceSelectorResponseSchema:
properties:
description:
description: Description of the Resource Selector
type: string
id:
description: Unique key for the Resource Selector
type: string
name:
description: Name of the Resource Selector
type: string
orn:
description: An Okta resource name
type: string
_links:
$ref: '#/components/schemas/ResourceSelectorResponseSchema__links'
type: object
ResourceSelectorResponseWithoutSelfLinkSchema:
properties:
description:
description: Description of the Resource Selector
type: string
id:
description: Unique key for the Resource Selector
type: string
name:
description: Name of the Resource Selector
type: string
orn:
description: An Okta resource name
type: string
_links:
$ref: '#/components/schemas/ResourceSelectorResponseWithoutSelfLinkSchema__links'
type: object
ResourceSelectorsSchema:
properties:
resourceSelectors:
items:
$ref: '#/components/schemas/ResourceSelectorResponseWithoutSelfLinkSchema'
type: array
_links:
$ref: '#/components/schemas/LinksNext'
type: object
ResourceSet:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resources:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
properties:
created:
description: Timestamp when the role was created
format: date-time
readOnly: true
type: string
description:
description: Description of the Resource Set
type: string
id:
description: Unique ID for the Resource Set object
readOnly: true
type: string
label:
description: Unique label for the Resource Set
type: string
lastUpdated:
description: Timestamp when the role was last updated
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/ResourceSet__links'
type: object
ResourceSetBindingAddMembersRequest:
example:
additions:
- additions
- additions
properties:
additions:
items:
type: string
type: array
type: object
ResourceSetBindingCreateRequest:
example:
role: role
members:
- members
- members
properties:
members:
items:
type: string
type: array
role:
description: Unique key for the role
type: string
type: object
ResourceSetBindingMember:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
id: id
properties:
created:
description: Timestamp when the role was created
format: date-time
readOnly: true
type: string
id:
description: Unique key for the role
readOnly: true
type: string
lastUpdated:
description: Timestamp when the role was last updated
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
ResourceSetBindingMembers:
example:
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
binding:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
members:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
id: id
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
id: id
properties:
members:
items:
$ref: '#/components/schemas/ResourceSetBindingMember'
type: array
_links:
$ref: '#/components/schemas/ResourceSetBindingMembers__links'
type: object
ResourceSetBindingResponse:
example:
_links:
resource-set:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
properties:
id:
description: '`id` of the role'
type: string
_links:
$ref: '#/components/schemas/ResourceSetBindingResponse__links'
type: object
ResourceSetBindingRole:
example:
_links:
members:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
properties:
id:
type: string
_links:
$ref: '#/components/schemas/ResourceSetBindingRole__links'
type: object
ResourceSetBindings:
example:
_links:
resource-set:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
roles:
- _links:
members:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
- _links:
members:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
properties:
roles:
items:
$ref: '#/components/schemas/ResourceSetBindingRole'
type: array
_links:
$ref: '#/components/schemas/ResourceSetBindingResponse__links'
type: object
ResourceSetResource:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
resource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
orn: orn
id: id
properties:
created:
description: Timestamp when the Resource Set Resource object was created
format: date-time
readOnly: true
type: string
id:
description: Unique ID of the Resource Set Resource object
readOnly: true
type: string
lastUpdated:
description: Timestamp when this object was last updated
format: date-time
readOnly: true
type: string
orn:
description: The Okta Resource Name (ORN) of the resource
type: string
_links:
$ref: '#/components/schemas/ResourceSetResource__links'
type: object
ResourceSetResourcePatchRequest:
example:
additions:
- additions
- additions
properties:
additions:
description: A list of resources to add to the Resource Set
items:
description: Resource in ORN or REST API URL format
type: string
type: array
type: object
ResourceSetResourcePostRequest:
properties:
resourceOrnOrUrl:
description: Resource in ORN or REST API URL format
type: string
required:
- conditions
- resourceOrnOrUrl
type: object
ResourceSetResourcePutRequest:
type: object
ResourceSetResources:
example:
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resource-set:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resources:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
resource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
orn: orn
id: id
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
resource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
orn: orn
id: id
properties:
resources:
items:
$ref: '#/components/schemas/ResourceSetResource'
type: array
_links:
$ref: '#/components/schemas/ResourceSetResources__links'
type: object
ResourceSets:
example:
resource-sets:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resources:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
- lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resources:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
description: description
id: id
label: label
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
resource-sets:
items:
$ref: '#/components/schemas/ResourceSet'
type: array
_links:
$ref: '#/components/schemas/LinksNext'
type: object
ResponseLinks:
description: Link objects
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
ResponseMode:
enum:
- form_post
- fragment
- okta_post_message
- query
type: string
x-enumDescriptions:
fragment: Parameters are encoded in the URL fragment added to the `redirect_uri`
when redirecting back to the client.
query: Parameters are encoded in the query string added to the `redirect_uri`
when redirecting back to the client.
form_post: Parameters are encoded as HTML form values (`application/x-www-form-urlencoded`
format) and are transmitted through the HTTP POST method to the client.
okta_post_message: |-
Uses [HTML5 Web Messaging](https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage) (for example, `window.postMessage()`) instead of the redirect for the authorization response from the `/authorize` endpoint.
`okta_post_message` is an adaptation of the [Web Message Response Mode](https://tools.ietf.org/html/draft-sakimura-oauth-wmrm-00#section-4.1).
This value provides a secure way for a single-page application to perform a sign-in flow in a pop-up window or an iFrame and receive the ID token, access token, and/or authorization code back in the parent page without leaving the context of that page. The data object for the `postMessage` call is in the next section.
ResponseType:
enum:
- code
- id_token
- none
- token
type: string
ResponseTypesSupported:
enum:
- code
- code id_token
- code id_token token
- code token
- id_token
- id_token token
- token
type: string
RevokeRefreshTokenHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
type: string
type: object
RiscIdentifierChangedEvent:
description: "The subject's identifier has changed, which is either an email\
\ address or a phone number change"
properties:
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
new-value:
description: The new identifier value
example: new.email@okta.example.com
type: string
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- event_timestamp
- subject
type: object
RiskDetectionTypesPolicyRuleCondition:
description: " An object that references\
\ detected risk events. This object can have an `include` parameter or an\
\ `exclude` parameter, but not both."
properties:
exclude:
description: An array of detected risk events to exclude in the entity policy
rule
items:
$ref: '#/components/schemas/DetectedRiskEvents'
type: array
include:
description: An array of detected risk events to include in the entity policy
rule
items:
$ref: '#/components/schemas/DetectedRiskEvents'
type: array
required:
- exclude
- include
type: object
RiskEvent:
example:
subjects:
- riskLevel: HIGH
ip: ip
message: message
- riskLevel: HIGH
ip: ip
message: message
expiresAt: 2000-01-23T04:56:07.000+00:00
timestamp: 2000-01-23T04:56:07.000+00:00
properties:
expiresAt:
description: "Timestamp at which the event expires (expressed as a UTC time\
\ zone using ISO 8601 format: yyyy-MM-dd`T`HH:mm:ss.SSS`Z`). If this optional\
\ field is not included, Okta automatically expires the event 24 hours\
\ after the event is consumed."
format: date-time
type: string
subjects:
description: List of Risk Event Subjects
items:
$ref: '#/components/schemas/RiskEventSubject'
type: array
timestamp:
description: "Timestamp of when the event is produced (expressed as a UTC\
\ time zone using ISO 8601 format: yyyy-MM-dd`T`HH:mm:ss.SSS`Z`)"
format: date-time
type: string
required:
- subjects
type: object
RiskEventSubject:
example:
riskLevel: HIGH
ip: ip
message: message
properties:
ip:
description: The risk event subject IP address (either an IPv4 or IPv6 address)
type: string
message:
description: Additional reasons for the risk level of the IP
maxLength: 512
pattern: "^[a-zA-Z0-9 .\\-_]*$"
type: string
riskLevel:
$ref: '#/components/schemas/RiskEventSubjectRiskLevel'
required:
- ip
- riskLevel
type: object
RiskEventSubjectRiskLevel:
description: The risk level associated with the IP
enum:
- HIGH
- LOW
- MEDIUM
type: string
RiskPolicyRuleCondition:
properties:
behaviors:
items:
type: string
type: array
uniqueItems: true
type: object
RiskProvider:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
clientId: 00cjkjjkkgjkdkjdkkljjsd
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
name: Risk-Partner-X
action: log_only
id: 00rp12r4skkjkjgsn
properties:
action:
$ref: '#/components/schemas/RiskProviderAction'
clientId:
description: "The ID of the [OAuth service app](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#create-a-service-app-and-grant-scopes)\
\ that is used to send risk events to Okta"
example: 00cjkjjkkgjkdkjdkkljjsd
type: string
created:
description: Timestamp when the Risk Provider object was created
format: date-time
readOnly: true
type: string
id:
description: The ID of the Risk Provider object
example: 00rp12r4skkjkjgsn
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Risk Provider object was last updated
format: date-time
readOnly: true
type: string
name:
description: Name of the risk provider
example: Risk-Partner-X
maxLength: 50
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
required:
- _links
- action
- clientId
- id
- name
type: object
RiskProviderAction:
default: log_only
description: Action taken by Okta during authentication attempts based on the
risk events sent by this provider
enum:
- enforce_and_log
- log_only
- none
type: string
x-enumDescriptions:
log_only: Include risk event information in the System Log
none: No action
enforce_and_log: Use risk event information to evaluate risks during authentication
attempts and include risk event information in the System Log
RiskScorePolicyRuleCondition:
description: Specifies a particular level of risk to match on
properties:
level:
description: The level to match
enum:
- ANY
- LOW
- MEDIUM
- HIGH
type: string
required:
- level
type: object
Role:
properties:
assignmentType:
$ref: '#/components/schemas/RoleAssignmentType'
created:
format: date-time
readOnly: true
type: string
description:
type: string
id:
readOnly: true
type: string
label:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
$ref: '#/components/schemas/RoleType'
_embedded:
additionalProperties:
properties: {}
type: object
readOnly: true
type: object
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
RoleAssignedUser:
example:
_links:
roles:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orn: orn
id: id
properties:
id:
description: The ID of the User
readOnly: true
type: string
orn:
description: ORN representing the assignee
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelfAndRoles'
type: object
RoleAssignedUsers:
example:
_links:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
value:
- _links:
roles:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orn: orn
id: id
- _links:
roles:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orn: orn
id: id
properties:
value:
items:
$ref: '#/components/schemas/RoleAssignedUser'
type: array
_links:
$ref: '#/components/schemas/LinksNextForRoleAssignments'
type: object
RoleAssignmentType:
description: Role assignment type
enum:
- CLIENT
- GROUP
- USER
type: string
x-enumDescriptions:
USER: The Role is assigned to a User
GROUP: The Role is assigned to a Group
CLIENT: The Role is assigned to a Client Application
RoleGovernance:
description: List of all User Role Governance Sources
properties:
grants:
items:
$ref: '#/components/schemas/RoleGovernanceSource'
type: array
_links:
$ref: '#/components/schemas/LinksGovernanceSources'
type: object
RoleGovernanceResource:
description: The resource of a grant
properties:
label:
description: The resource name
type: string
resource:
description: The resources id
type: string
type: object
RoleGovernanceResources:
description: The resources of a grant
properties:
resources:
items:
$ref: '#/components/schemas/RoleGovernanceResource'
type: array
_links:
$ref: '#/components/schemas/RoleGovernanceResources__links'
type: object
RoleGovernanceSource:
description: User Role Governance Source
properties:
bundleId:
description: '`id` of the entitlement bundle'
readOnly: true
type: string
expirationDate:
description: The expiration date of the entitlement bundle
format: date-time
readOnly: true
type: string
grantId:
description: '`id` of the grant'
readOnly: true
type: string
type:
$ref: '#/components/schemas/GovernanceSourceType'
_links:
$ref: '#/components/schemas/RoleGovernanceSource__links'
required:
- grantId
- resources
- type
type: object
RolePermissionType:
description: Permission type
enum:
- okta.apps.assignment.manage
- okta.apps.manage
- okta.apps.manageFirstPartyApps
- okta.apps.read
- okta.authzServers.manage
- okta.authzServers.read
- okta.customizations.manage
- okta.customizations.read
- okta.devices.lifecycle.activate
- okta.devices.lifecycle.deactivate
- okta.devices.lifecycle.delete
- okta.devices.lifecycle.manage
- okta.devices.lifecycle.suspend
- okta.devices.lifecycle.unsuspend
- okta.devices.manage
- okta.devices.read
- okta.governance.accessCertifications.manage
- okta.governance.accessRequests.manage
- okta.groups.appAssignment.manage
- okta.groups.create
- okta.groups.manage
- okta.groups.members.manage
- okta.groups.read
- okta.identityProviders.manage
- okta.identityProviders.read
- okta.profilesources.import.run
- okta.support.cases.manage
- okta.users.appAssignment.manage
- okta.users.create
- okta.users.credentials.expirePassword
- okta.users.credentials.manage
- okta.users.credentials.resetFactors
- okta.users.credentials.resetPassword
- okta.users.groupMembership.manage
- okta.users.lifecycle.activate
- okta.users.lifecycle.clearSessions
- okta.users.lifecycle.deactivate
- okta.users.lifecycle.delete
- okta.users.lifecycle.manage
- okta.users.lifecycle.suspend
- okta.users.lifecycle.unlock
- okta.users.lifecycle.unsuspend
- okta.users.manage
- okta.users.read
- okta.users.userprofile.manage
type: string
RoleType:
description: Standard role type
enum:
- ACCESS_CERTIFICATIONS_ADMIN
- ACCESS_REQUESTS_ADMIN
- API_ACCESS_MANAGEMENT_ADMIN
- API_ADMIN
- APP_ADMIN
- CUSTOM
- GROUP_MEMBERSHIP_ADMIN
- HELP_DESK_ADMIN
- MOBILE_ADMIN
- ORG_ADMIN
- READ_ONLY_ADMIN
- REPORT_ADMIN
- SUPER_ADMIN
- USER_ADMIN
type: string
x-enumDescriptions:
API_ACCESS_MANAGEMENT_ADMIN: Access Management Administrator
API_ADMIN: Access Management Administrator
APP_ADMIN: Application Administrator
CUSTOM: Custom label specified by the client
GROUP_MEMBERSHIP_ADMIN: Group Membership Administrator
HELP_DESK_ADMIN: Help Desk Administrator
MOBILE_ADMIN: Mobile Administrator
ORG_ADMIN: Organizational Administrator
READ_ONLY_ADMIN: Read-Only Administrator
REPORT_ADMIN: Report Administrator
SUPER_ADMIN: Super Administrator
USER_ADMIN: Group Administrator
ACCESS_CERTIFICATIONS_ADMIN: Access Certifications Administrator (predefined
Resource Sets)
ACCESS_REQUESTS_ADMIN: Access Requests Administrator (predefined Resource
Sets)
RotatePasswordRequest:
description: Rotate password request for the privileged account
properties:
password:
description: The password associated with the privileged resource
example: xf1bs9am2
format: password
type: string
writeOnly: true
secretVersionId:
description: The version ID of the password secret from the OPA vault
example: 9f8400-e29b-41d4-a716-926655440034
maxLength: 36
minLength: 1
type: string
required:
- password
- secretVersionId
type: object
SAMLHookResponse:
properties:
commands:
description: "The `commands` object is where you tell Okta to add additional\
\ claims to the assertion or to modify the existing assertion statements.\n\
\n`commands` is an array, allowing you to send multiple commands. In each\
\ array element, include a `type` property and a `value` property. The\
\ `type` property is where you specify which of the supported commands\
\ you want to execute, and `value` is where you supply an operand for\
\ that command.\nIn the case of the SAML assertion inline hook, the `value`\
\ property is itself a nested object, in which you specify a particular\
\ operation, a path to act on, and a value. "
items:
$ref: '#/components/schemas/SAMLHookResponse_commands_inner'
type: array
error:
$ref: '#/components/schemas/SAMLHookResponse_error'
type: object
SAMLPayLoad:
properties:
data:
$ref: '#/components/schemas/SAMLPayLoad_data'
type: object
SafeBrowsingProtectionLevel:
description: Represents the current value of the Safe Browsing protection level
enum:
- ENHANCED_PROTECTION
- NO_SAFE_BROWSING
- STANDARD_PROTECTION
example: ENHANCED_PROTECTION
type: string
x-enumDescriptions:
NO_SAFE_BROWSING: Safe Browsing is never active
STANDARD_PROTECTION: Safe Browsing is active in the standard mode
ENHANCED_PROTECTION: Safe Browsing is active in the enhanced mode
SalesforceApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- salesforce
example: salesforce
type: string
signOnMode:
enum:
- BROWSER_PLUGIN
- BOOKMARK
- SAML_2_0
example: BROWSER_PLUGIN
type: string
settings:
$ref: '#/components/schemas/SalesforceApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Salesforce app (key name: `salesforce`)
To create a Salesforce app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Salesforce app only supports `BROWSER_PLUGIN`, `BOOKMARK`, and `SAML_2_0` sign-on modes.
example:
name: salesforce
label: Sample Salesforce App
signOnMode: SAML_2_0
settings:
app:
instanceType: SANDBOX
integrationType: STANDARD
title: Salesforce
x-tags:
- Application
x-okta-defined-as:
name: salesforce
SalesforceApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/SalesforceApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
SalesforceApplicationSettingsApplication:
description: Salesforce app instance properties
properties:
instanceType:
description: Salesforce instance that you want to connect to
enum:
- SANDBOX
- PRODUCTION
- GOVERNMENT
type: string
integrationType:
description: Salesforce integration type
enum:
- STANDARD
- PORTAL
- COMMUNITY
type: string
loginUrl:
description: The Login URL specified in your Salesforce Single Sign-On settings
type: string
logoutUrl:
description: Salesforce Logout URL
type: string
required:
- instanceType
- integrationType
type: object
Saml:
description: SAML configuration details
properties:
acs:
description: "List of Assertion Consumer Service (ACS) URLs. The default\
\ ACS URL is required and is indicated by a null `index` value. You can\
\ use the org-level variables you defined in the `config` array in the\
\ URL. For example: `https://${org.subdomain}.example.com/saml/login`"
items:
$ref: '#/components/schemas/Saml_acs_inner'
minItems: 1
type: array
claims:
description: Attribute statements to appear in the Okta SAML assertion
items:
$ref: '#/components/schemas/Saml_claims_inner'
type: array
doc:
description: "The URL to your customer-facing instructions for configuring\
\ your SAML integration. See [Customer configuration document guidelines](https://developer.okta.com/docs/guides/submit-app-prereq/main/#customer-configuration-document-guidelines)."
example: https://example.com/strawberry/help/samlSetup
format: uri
type: string
entityId:
description: "Globally unique name for your SAML entity. For instance, your\
\ Identity Provider (IdP) or Service Provider (SP) URL."
example: "https://${org.subdomain}.example.com"
type: string
groups:
description: Defines the group attribute names for the SAML assertion statement.
Okta inserts the list of Okta user groups into the attribute names in
the statement.
items:
description: A group attribute name in your SAML app
example: groups
type: string
type: array
required:
- acs
- doc
- entityId
type: object
Saml11Application:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/ApplicationCredentials'
name:
description: The key name for the SAML 1.1 app definition. You can't create
a custom SAML 1.1 app integration instance. Only existing OIN SAML 1.1
app integrations are supported.
type: string
settings:
$ref: '#/components/schemas/Saml11ApplicationSettings'
required:
- name
type: object
Saml11ApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
additionalProperties: true
type: object
signOn:
$ref: '#/components/schemas/Saml11ApplicationSettingsSignOn'
type: object
Saml11ApplicationSettingsSignOn:
description: SAML 1.1 sign-on mode attributes
properties:
audienceOverride:
description: The intended audience of the SAML assertion. This is usually
the Entity ID of your application.
type: string
defaultRelayState:
description: "The URL of the resource to direct users after they successfully\
\ sign in to the SP using SAML. See the SP documentation to check if you\
\ need to specify a RelayState. In most instances, you can leave this\
\ field blank."
type: string
recipientOverride:
description: The location where the application can present the SAML assertion.
This is usually the Single Sign-On (SSO) URL.
type: string
ssoAcsUrlOverride:
description: Assertion Consumer Services (ACS) URL value for the Service
Provider (SP). This URL is always used for Identity Provider (IdP) initiated
sign-on requests.
type: string
title: SAML 1.1 settings
type: object
SamlAcsEndpoint:
description: Okta's `SPSSODescriptor` endpoint where the IdP sends a ``
message
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
type:
$ref: '#/components/schemas/SamlEndpointType'
type: object
SamlAlgorithms:
description: Settings for signing and verifying SAML messages
properties:
request:
$ref: '#/components/schemas/SamlRequestAlgorithm'
response:
$ref: '#/components/schemas/SamlResponseAlgorithm'
type: object
SamlApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/ApplicationCredentials'
name:
description: A unique key is generated for the custom app instance when
you use SAML_2_0 `signOnMode`.
readOnly: true
type: string
settings:
$ref: '#/components/schemas/SamlApplicationSettings'
type: object
SamlApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
signOn:
$ref: '#/components/schemas/SamlApplicationSettingsSignOn'
type: object
SamlApplicationSettingsSignOn:
description: |-
SAML 2.0 sign-on attributes.
> **Note:** Set either `destinationOverride` or `ssoAcsUrl` to configure any other SAML 2.0 attributes in this section.
properties:
acsEndpoints:
description: An array of ACS endpoints. You can configure a maximum of 100
endpoints.
items:
$ref: '#/components/schemas/AcsEndpoint'
type: array
allowMultipleAcsEndpoints:
description: Determines whether the app allows you to configure multiple
ACS URIs
type: boolean
assertionSigned:
description: Determines whether the SAML assertion is digitally signed
type: boolean
attributeStatements:
description: |
A list of custom attribute statements for the app's SAML assertion. See [SAML 2.0 Technical Overview](https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0-cd-02.html).
There are two types of attribute statements:
| Type | Description |
| ---- | ----------- |
| EXPRESSION | Generic attribute statement that can be dynamic and supports [Okta Expression Language](https://developer.okta.com/docs/reference/okta-expression-language/) |
| GROUP | Group attribute statement |
items:
$ref: '#/components/schemas/SamlAttributeStatement'
type: array
audience:
description: The entity ID of the SP. Use the entity ID value exactly as
provided by the SP.
type: string
audienceOverride:
description: "Audience override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
authnContextClassRef:
description: Identifies the SAML authentication context class for the assertion's
authentication statement
type: string
configuredAttributeStatements:
description: |
The list of dynamic attribute statements for the SAML assertion inherited from app metadata (apps from the OIN) during app creation.
There are two types of attribute statements: `EXPRESSION` and `GROUP`.
items:
$ref: '#/components/schemas/SamlAttributeStatement'
type: array
defaultRelayState:
description: Identifies a specific application resource in an IdP-initiated
SSO scenario
type: string
destination:
description: Identifies the location inside the SAML assertion where the
SAML response should be sent
type: string
destinationOverride:
description: "Destination override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
digestAlgorithm:
description: Determines the digest algorithm used to digitally sign the
SAML assertion and response
type: string
honorForceAuthn:
description: Set to `true` to prompt users for their credentials when a
SAML request has the `ForceAuthn` attribute set to `true`
type: boolean
idpIssuer:
description: SAML Issuer ID
type: string
inlineHooks:
description: "Associates the app with SAML inline hooks. See [the SAML assertion\
\ inline hook reference](https://developer.okta.com/docs/reference/saml-hook/)."
items:
$ref: '#/components/schemas/SignOnInlineHook'
type: array
participateSlo:
$ref: '#/components/schemas/SloParticipate'
recipient:
description: The location where the app may present the SAML assertion
type: string
recipientOverride:
description: "Recipient override for CASB configuration. See [CASB config\
\ guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
requestCompressed:
description: Determines whether the SAML request is expected to be compressed
type: boolean
responseSigned:
description: |-
Determines whether the SAML authentication response message is digitally signed by the IdP
> **Note:** Either (or both) `responseSigned` or `assertionSigned` must be `TRUE`.
type: boolean
samlAssertionLifetimeSeconds:
description: Determines the SAML app session lifetimes with Okta
example: 3600
type: integer
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
signatureAlgorithm:
description: Determines the signing algorithm used to digitally sign the
SAML assertion and response
type: string
slo:
$ref: '#/components/schemas/SingleLogout'
spCertificate:
$ref: '#/components/schemas/SamlSpCertificate'
spIssuer:
description: The issuer ID for the Service Provider. This property appears
when SLO is enabled.
type: string
ssoAcsUrl:
description: Single Sign-On Assertion Consumer Service (ACS) URL
type: string
ssoAcsUrlOverride:
description: "Assertion Consumer Service (ACS) URL override for CASB configuration.\
\ See [CASB config guide](https://help.okta.com/en-us/Content/Topics/Apps/CASB-config-guide.htm)."
type: string
subjectNameIdFormat:
type: string
subjectNameIdTemplate:
description: Template for app user's username when a user is assigned to
the app
type: string
required:
- allowMultipleAcsEndpoints
- assertionSigned
- audience
- authnContextClassRef
- destination
- digestAlgorithm
- honorForceAuthn
- idpIssuer
- recipient
- requestCompressed
- responseSigned
- signatureAlgorithm
- ssoAcsUrl
- subjectNameIdFormat
- subjectNameIdTemplate
type: object
SamlAttributeStatement:
description: Define custom attribute statements for the integration. These statements
are inserted into the SAML assertions shared with your app
properties:
filterType:
type: string
filterValue:
type: string
name:
type: string
namespace:
type: string
type:
type: string
values:
items:
type: string
type: array
type: object
SamlCredentials:
description: Federation Trust Credentials for verifying assertions from the
IdP and signing requests to the IdP
properties:
signing:
$ref: '#/components/schemas/SamlSigningCredentials'
trust:
$ref: '#/components/schemas/SamlTrustCredentials'
type: object
SamlEndpointType:
default: INSTANCE
description: Determines whether to publish an instance-specific (trust) or organization
(shared) ACS endpoint in the SAML metadata
enum:
- INSTANCE
- ORG
type: string
SamlEndpoints:
description: SAML 2.0 HTTP binding settings for IdP and SP (Okta)
properties:
acs:
$ref: '#/components/schemas/SamlAcsEndpoint'
sso:
$ref: '#/components/schemas/SamlSsoEndpoint'
type: object
SamlNameIdFormat:
default: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
description: SAML 2.0 Name Identifier formats
enum:
- urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
- urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
- urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
- urn:oasis:names:tc:SAML:2.0:nameid-format:transient
type: string
SamlRelayState:
description: Relay state settings for IdP
properties:
format:
$ref: '#/components/schemas/SamlRelayStateFormat'
type: object
SamlRelayStateFormat:
description: The format used to generate the `relayState` in the SAML request.
The `FROM_URL` format is used if this value is null.
enum:
- FROM_URL
- OPAQUE
type: string
SamlRequestAlgorithm:
description: Algorithm settings used to secure an `` message
properties:
signature:
$ref: '#/components/schemas/SamlRequestSignatureAlgorithm'
type: object
SamlRequestSignatureAlgorithm:
description: |-
XML digital Signature Algorithm settings for signing `` messages sent to the IdP
> **Note:** The `algorithm` property is ignored when you disable request signatures (`scope` set as `NONE`).
properties:
algorithm:
$ref: '#/components/schemas/SamlSigningAlgorithm'
scope:
$ref: '#/components/schemas/ProtocolAlgorithmRequestScope'
type: object
SamlResponseAlgorithm:
description: Algorithm settings for verifying `` messages and
`` elements from the IdP
properties:
signature:
$ref: '#/components/schemas/SamlResponseSignatureAlgorithm'
type: object
SamlResponseSignatureAlgorithm:
description: XML digital Signature Algorithm settings for verifying ``
messages and `` elements from the IdP
properties:
algorithm:
$ref: '#/components/schemas/SamlSigningAlgorithm'
scope:
$ref: '#/components/schemas/ProtocolAlgorithmResponseScope'
type: object
SamlSettings:
description: Advanced settings for the SAML 2.0 protocol
properties:
honorPersistentNameId:
default: true
description: Determines if the IdP should persist account linking when the
incoming assertion NameID format is `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
type: boolean
nameFormat:
$ref: '#/components/schemas/SamlNameIdFormat'
type: object
SamlSigningAlgorithm:
enum:
- SHA-1
- SHA-256
example: SHA-256
type: string
SamlSigningCredentials:
description: Key used for signing requests to the IdP
properties:
kid:
description: IdP Key Credential reference to the Okta X.509 signature certificate
example: your-key-id
type: string
type: object
SamlSpCertificate:
description: The certificate that Okta uses to validate Single Logout (SLO)
requests and responses
properties:
x5c:
description: A list that contains exactly one x509 encoded certificate
items:
type: string
type: array
type: object
SamlSsoEndpoint:
description: IdP's `SingleSignOnService` endpoint where Okta sends an ``
message
properties:
binding:
$ref: '#/components/schemas/ProtocolEndpointBinding'
destination:
description: |-
URI reference that indicates the address to which the `` message is sent.
The `destination` property is required if request signatures are specified. See [SAML 2.0 Request Algorithm object](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/IdentityProvider/#tag/IdentityProvider/operation/createIdentityProvider!path=protocol/0/algorithms/request&t=request).
example: https://idp.example.com/saml2/sso
maxLength: 512
type: string
url:
description: |-
URL of the binding-specific endpoint to send an `` message to the IdP.
The value of `url` defaults to the same value as the `sso` endpoint if omitted during creation of a new IdP instance.
The `url` should be the same value as the `Location` attribute for a published binding in the IdP's SAML Metadata `IDPSSODescriptor`.
example: https://idp.example.com/saml2/sso
maxLength: 1014
type: string
type: object
SamlTrustCredentials:
description: Federation Trust Credentials for verifying assertions from the
IdP
properties:
audience:
description: URI that identifies the target Okta IdP instance (SP) for an
``
example: https://www.okta.com/saml2/service-provider/spgv32vOnpdyeGSaiUpL
maxLength: 1024
type: string
issuer:
description: URI that identifies the issuer (IdP) of a ``
message `` element
example: urn:example:idp
maxLength: 1024
type: string
kid:
description: IdP Key Credential reference to the Okta X.509 signature certificate
example: your-key-id
type: string
type: object
ScheduledUserLifecycleAction:
properties:
status:
$ref: '#/components/schemas/PolicyUserStatus'
type: object
SchemeApplicationCredentials:
allOf:
- $ref: '#/components/schemas/ApplicationCredentials'
- properties:
password:
$ref: '#/components/schemas/PasswordCredential'
revealPassword:
description: Allow users to securely see their password
type: boolean
scheme:
$ref: '#/components/schemas/ApplicationCredentialsScheme'
signing:
$ref: '#/components/schemas/ApplicationCredentialsSigning'
userName:
description: Shared username for the app
maxLength: 100
minLength: 1
type: string
type: object
Scope:
type: string
ScopeResourceHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/authorizationServers/ausain6z9zIedDCxB0h7/scopes/scpCmCCV1DpxVkCaye2X"
type: string
title:
description: Link name
example: My phone
type: string
type: object
ScreenLockType:
enum:
- BIOMETRIC
- NONE
- PASSCODE
type: string
SecurePasswordStoreApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/SchemeApplicationCredentials'
name:
description: '`template_sps` is the key name for a SWA app instance that
uses HTTP POST and doesn''t require a browser plugin'
enum:
- template_sps
type: string
settings:
$ref: '#/components/schemas/SecurePasswordStoreApplicationSettings'
required:
- name
- settings
type: object
x-okta-defined-as:
name: template_sps
SecurePasswordStoreApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
$ref: '#/components/schemas/SecurePasswordStoreApplicationSettingsApplication'
type: object
SecurePasswordStoreApplicationSettingsApplication:
properties:
optionalField1:
description: Name of the optional parameter in the sign-in form
type: string
optionalField1Value:
description: Name of the optional value in the sign-in form
type: string
optionalField2:
description: Name of the optional parameter in the sign-in form
type: string
optionalField2Value:
description: Name of the optional value in the sign-in form
type: string
optionalField3:
description: Name of the optional parameter in the sign-in form
type: string
optionalField3Value:
description: Name of the optional value in the sign-in form
type: string
passwordField:
description: CSS selector for the **Password** field in the sign-in form
type: string
url:
description: The URL of the sign-in page for this app
type: string
usernameField:
description: CSS selector for the **Username** field in the sign-in form
type: string
required:
- passwordField
- url
- usernameField
type: object
SecurityEvent:
properties:
event_timestamp:
description: The time of the event (UNIX timestamp)
example: 1702448550
format: int64
type: integer
subject:
$ref: '#/components/schemas/SecurityEventSubject'
required:
- event_timestamp
- subject
type: object
SecurityEventReason:
properties:
en:
description: The event reason in English
example: Event message example
type: string
required:
- en
type: object
SecurityEventSubject:
description: The event subjects
properties:
device:
description: The device involved with the event
type: object
tenant:
description: The tenant involved with the event
type: object
user:
description: The user involved with the event
type: object
SecurityEventTokenError:
description: Error object thrown when parsing the Security Event Token
example:
err: invalid_request
description: "Failed claim validation in security event token. 'events.mediationDeviceComplianceChangeEvent.previousStatus':\
\ The field cannot be left blank"
properties:
description:
description: |
Describes the error
> **Note:** SET claim fields with underscores (snake case) are presented in camelcase. For example, `previous_status` appears as `previousStatus`.
example: "Failed claim validation in security event token. 'events.mediationDeviceComplianceChangeEvent.previousStatus':\
\ The field cannot be left blank"
type: string
err:
description: A code that describes the category of the error
enum:
- authentication_failed
- invalid_audience
- invalid_issuer
- invalid_key
- invalid_request
example: invalid_request
type: string
title: Security Event Token Error
type: object
SecurityEventTokenRequestJwtBody:
description: JSON Web Token body payload for a Security Event Token
properties:
aud:
description: Audience
example: https://receiverexample.okta.com/
type: string
events:
$ref: '#/components/schemas/SecurityEventTokenRequestJwtEvents'
iat:
description: Token issue time (UNIX timestamp)
example: 1702448550
format: int64
type: integer
iss:
description: Token issuer
example: https://transmitter.example.com
type: string
jti:
description: Token ID
example: 24c63fb56f ... a9fa24
type: string
required:
- aud
- events
- iat
- iss
- jti
title: Security Event Token JWT body payload
type: object
x-tags:
- SSFSecurityEventToken
SecurityEventTokenRequestJwtEvents:
description: A non-empty collection of events
properties:
https://schemas.okta.com/secevent/okta/event-type/device-risk-change:
$ref: '#/components/schemas/OktaDeviceRiskChangeEvent'
https://schemas.okta.com/secevent/okta/event-type/ip-change:
$ref: '#/components/schemas/OktaIpChangeEvent'
https://schemas.okta.com/secevent/okta/event-type/user-risk-change:
$ref: '#/components/schemas/OktaUserRiskChangeEvent'
https://schemas.openid.net/secevent/caep/event-type/device-compliance-change:
$ref: '#/components/schemas/CaepDeviceComplianceChangeEvent'
https://schemas.openid.net/secevent/caep/event-type/session-revoked:
$ref: '#/components/schemas/CaepSessionRevokedEvent'
https://schemas.openid.net/secevent/risc/event-type/identifier-changed:
$ref: '#/components/schemas/RiscIdentifierChangedEvent'
type: object
SecurityEventTokenRequestJwtHeader:
description: JSON Web Token header for a Security Event Token
properties:
alg:
description: Algorithm used to sign or encrypt the JWT
example: RS256
type: string
kid:
description: Key ID used to sign or encrypt the JWT
type: string
typ:
description: The type of content being signed or encrypted
example: secevent+jwt
type: string
required:
- alg
- kid
- typ
title: Security Event Token JWT header
type: object
x-tags:
- SSFSecurityEventToken
SecurityEventsProviderRequest:
description: The request schema for creating or updating a Security Events Provider.
The `settings` must match one of the schemas.
example:
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
name: Target SSF Provider
type: okta
properties:
name:
description: The name of the Security Events Provider instance
example: Target SSF Provider
maxLength: 100
type: string
settings:
$ref: '#/components/schemas/SecurityEventsProviderRequest_settings'
type:
description: The application type of the Security Events Provider
example: okta
maxLength: 255
type: string
required:
- name
- settings
- type
title: Security Events Provider Request
type: object
SecurityEventsProviderResponse:
description: The Security Events Provider response
example:
settings:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
issuer: example.okta.com
jwks_url: https://example.okta.com/oauth2/v1/keys
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: Target SSF Provider
id: sse1qg25RpusjUP6m0g5
type: okta
status: ACTIVE
properties:
id:
description: The unique identifier of this instance
example: sse1qg25RpusjUP6m0g5
readOnly: true
type: string
name:
description: The name of the Security Events Provider instance
example: Target SSF Provider
maxLength: 100
type: string
settings:
$ref: '#/components/schemas/SecurityEventsProviderSettingsResponse'
status:
description: Indicates whether the Security Events Provider is active or
not
enum:
- ACTIVE
- INACTIVE
readOnly: true
type: string
type:
description: The application type of the Security Events Provider
example: okta
maxLength: 255
type: string
_links:
$ref: '#/components/schemas/LinksSelfAndLifecycle'
title: Security Events Provider Response
type: object
SecurityEventsProviderSettingsNonSSFCompliant:
description: Security Events Provider with issuer and JWKS settings for signal
ingestion
properties:
issuer:
description: Issuer URL
example: example.okta.com
maxLength: 700
type: string
jwks_url:
description: The public URL where the JWKS public key is uploaded
example: https://example.okta.com/oauth2/v1/keys
format: url
maxLength: 1000
type: string
required:
- issuer
- jwks_url
title: Provider with issuer and JWKS settings
type: object
SecurityEventsProviderSettingsResponse:
description: Security Events Provider settings
example:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
issuer: example.okta.com
jwks_url: https://example.okta.com/oauth2/v1/keys
properties:
issuer:
description: Issuer URL
example: example.okta.com
maxLength: 700
type: string
jwks_url:
description: The public URL where the JWKS public key is uploaded
example: https://example.okta.com/oauth2/v1/keys
format: url
maxLength: 1000
type: string
well_known_url:
description: The well-known URL of the Security Events Provider (the SSF
transmitter)
example: https://example.okta.com/.well-known/ssf-configuration
format: url
maxLength: 1000
nullable: true
type: string
title: Security Events Provider settings
type: object
SecurityEventsProviderSettingsSSFCompliant:
description: Security Events Provider with well-known URL setting
example:
well_known_url: https://example.okta.com/.well-known/ssf-configuration
properties:
well_known_url:
description: The published well-known URL of the Security Events Provider
(the SSF transmitter)
example: https://example.okta.com/.well-known/ssf-configuration
format: url
maxLength: 1000
type: string
required:
- well_known_url
title: Provider with well-known URL setting
type: object
SeedEnum:
default: RANDOM
description: Determines whether the generated password is the user's Okta password
or a randomly generated password
enum:
- OKTA
- RANDOM
example: OKTA
type: string
SelfServicePasswordResetAction:
description: Enables or disables users to reset their own password and defines
the authenticators and constraints needed to complete the reset
properties:
access:
$ref: '#/components/schemas/PolicyAccess'
requirement:
$ref: '#/components/schemas/SsprRequirement'
type:
description: The type of rule action
enum:
- selfServicePasswordReset
type: string
type: object
Session:
example:
createdAt: 2000-01-23T04:56:07.000+00:00
lastFactorVerification: 2000-01-23T04:56:07.000+00:00
idp:
id: id
type: ACTIVE_DIRECTORY
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
amr:
- fpt
- fpt
id: id
login: login
userId: userId
expiresAt: 2000-01-23T04:56:07.000+00:00
lastPasswordVerification: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
properties:
amr:
description: Authentication method reference
items:
$ref: '#/components/schemas/SessionAuthenticationMethod'
readOnly: true
type: array
createdAt:
format: date-time
readOnly: true
type: string
expiresAt:
description: A timestamp when the Session expires
format: date-time
readOnly: true
type: string
id:
description: A unique key for the Session
readOnly: true
type: string
idp:
$ref: '#/components/schemas/SessionIdentityProvider'
lastFactorVerification:
description: A timestamp when the user last performed multifactor authentication
format: date-time
readOnly: true
type: string
lastPasswordVerification:
description: A timestamp when the user last performed the primary or step-up
authentication with a password
format: date-time
readOnly: true
type: string
login:
description: A unique identifier for the user (username)
readOnly: true
type: string
status:
$ref: '#/components/schemas/SessionStatus'
userId:
description: A unique key for the user
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
SessionAuthenticationMethod:
enum:
- fpt
- geo
- hwk
- kba
- mca
- mfa
- otp
- pwd
- sc
- sms
- swk
- tel
type: string
x-enumDescriptions:
pwd: Password authentication. **Inline hook value:** `PASSWORD` **Example:**
Standard password-based sign-in
swk: Proof-of-possession (PoP) of a software key. **Inline hook value:** `POP_SOFTWARE_KEY`
**Example:** Okta Verify with Push
hwk: Proof-of-possession (PoP) of a hardware key. **Inline hook value:** `POP_HARDWARE_KEY`
**Example:** Yubikey factor
opt: "One-time password. **Inline hook value:** `ONE_TIME_PASSWORD`. **Example:**\
\ Okta Verify, Google Authenticator"
sms: SMS text message to the user at a registered number. **Inline hook value:**
`SMS_MESSAGE`. **Example:** SMS factor
tel: Telephone call to the user at a registered number. **Inline hook value:**
`TELEPHONE_CALL`. **Example:** Phone call factor
geo: Use of geo-location information. **Inline hook value:** `GEOLOCATION`.
**Example:** IP Trust and Network Zone policy conditions
fpt: Fingerprint biometric authentication. **Inline hook value:** `BIO_FINGERPRINT`.
**Example:** Okta Verify with Touch ID
kba: Knowledge-based authentication. **Inline hook value:** `KNOWLEDGE_BASED_AUTHENTICATION`.
**Example:** Security Question factor
mfa: Multifactor authentication. **Inline hook value:** `MULTIFACTOR_AUTHENTICATION`.
**Example:** This value is present whenever any MFA factor verification
is performed.
mca: "Multiple-channel authentication. **Inline hook value:** `MULTIPLE_CHANNEL_AUTHENTICATION`.\
\ **Example:** Authentication requires communication over more than one\
\ channel, such as Internet and mobile network"
sc: "Smart card authentication. **Inline hook value:** `SMART_CARD. **Example:**\
\ User authenticated using a smart card, such as a Personal Identity Verification\
\ (PIV) card or Common Access Card (CAC)"
SessionIdentityProvider:
example:
id: id
type: ACTIVE_DIRECTORY
properties:
id:
description: "Identity Provider ID. If the `type` is `OKTA`, then the `id`\
\ is the org ID."
readOnly: true
type: string
type:
$ref: '#/components/schemas/SessionIdentityProviderType'
type: object
SessionIdentityProviderType:
enum:
- ACTIVE_DIRECTORY
- FEDERATION
- LDAP
- OKTA
- SOCIAL
type: string
SessionStatus:
enum:
- ACTIVE
- MFA_ENROLL
- MFA_REQUIRED
type: string
x-enumDescriptions:
ACTIVE: The Session is established and fully validated.
MFA_REQUIRED: "The Session is established, but requires second factor verification."
MFA_ENROLL: "The Session is established, but the user needs to enroll a second\
\ factor."
ShowSignInWithOV:
description: Controls whether to show the Sign in with Okta Verify button on
the Sign-In Widget
enum:
- ALWAYS
- NEVER
type: string
SignInPage:
allOf:
- $ref: '#/components/schemas/CustomizablePage'
- properties:
contentSecurityPolicySetting:
$ref: '#/components/schemas/ContentSecurityPolicySetting'
widgetCustomizations:
$ref: '#/components/schemas/SignInPage_allOf_widgetCustomizations'
widgetVersion:
$ref: '#/components/schemas/Version'
type: object
example:
contentSecurityPolicySetting:
mode: enforced
reportUri: reportUri
srcList:
- srcList
- srcList
widgetVersion: null
pageContent: pageContent
widgetCustomizations:
usernameInfoTip: usernameInfoTip
showUserIdentifier: true
customLink1Url: customLink1Url
customLink2Url: customLink2Url
classicRecoveryFlowEmailOrUsernameLabel: classicRecoveryFlowEmailOrUsernameLabel
customLink1Label: customLink1Label
passwordInfoTip: passwordInfoTip
forgotPasswordLabel: forgotPasswordLabel
showPasswordVisibilityToggle: true
authenticatorPageCustomLinkLabel: authenticatorPageCustomLinkLabel
unlockAccountLabel: unlockAccountLabel
helpUrl: helpUrl
unlockAccountUrl: unlockAccountUrl
usernameLabel: usernameLabel
signInLabel: signInLabel
customLink2Label: customLink2Label
authenticatorPageCustomLinkUrl: authenticatorPageCustomLinkUrl
passwordLabel: passwordLabel
forgotPasswordUrl: forgotPasswordUrl
helpLabel: helpLabel
widgetGeneration: G2
SignInPageTouchPointVariant:
description: |
Variant for the Okta sign-in page. You can publish a theme for sign-in page with different combinations of assets. Variants are preset combinations of those assets.
> **Note:** For a non-`OKTA_DEFAULT` variant, `primaryColorHex` is used for button background color and `primaryColorContrastHex` is used to optimize the opacity for button text.
enum:
- BACKGROUND_IMAGE
- BACKGROUND_SECONDARY_COLOR
- OKTA_DEFAULT
type: string
x-enumDescriptions:
BACKGROUND_IMAGE: "Uses the logo, favicon, and background image from the Theme"
BACKGROUND_SECONDARY_COLOR: Uses the logo and favicon from the Theme. Uses
`secondaryColorHex` as the background color for the Okta sign-in page.
OKTA_DEFAULT: Uses the Okta logo and favicon with no background image. Uses
the Okta colors on the Okta sign-in page.
SignOnInlineHook:
properties:
id:
readOnly: false
type: string
SigningAlgorithm:
enum:
- ES256
- ES384
- ES512
- HS256
- HS384
- HS512
- RS256
- RS384
- RS512
type: string
SimulatePolicyBody:
description: The request body required for a simulate policy operation
example:
policyContext:
ip: ip
groups:
ids:
- ids
- ids
risk:
level: LOW
zones:
ids:
- ids
- ids
device:
managed: true
registered: true
platform: platform
assuranceId: assuranceId
user:
id: id
policyTypes:
- ACCESS_POLICY
- ACCESS_POLICY
appInstance: appInstance
properties:
appInstance:
description: The application instance ID for a simulate operation
type: string
policyContext:
$ref: '#/components/schemas/PolicyContext'
policyTypes:
description: "Supported policy types for a simulate operation. The default\
\ value, `null`, returns all types."
items:
$ref: '#/components/schemas/PolicyTypeSimulation'
type: array
required:
- appInstance
type: object
SimulatePolicyEvaluations:
example:
result:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
policyType:
- ACCESS_POLICY
- ACCESS_POLICY
evaluated:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
status: null
undefined:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
evaluated:
$ref: '#/components/schemas/SimulatePolicyEvaluations_evaluated'
policyType:
description: The policy type of the simulate operation
items:
$ref: '#/components/schemas/PolicyTypeSimulation'
type: array
result:
$ref: '#/components/schemas/SimulatePolicyResult'
status:
$ref: '#/components/schemas/SimulateResultStatus'
undefined:
$ref: '#/components/schemas/SimulatePolicyEvaluations_undefined'
type: object
SimulatePolicyResponse:
description: The response body returned for a simulate policy operation. An
array of `evaluations`.
items:
$ref: '#/components/schemas/SimulatePolicyEvaluations'
type: array
SimulatePolicyResult:
description: The result of the policy evaluation
example:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
policies:
items:
$ref: '#/components/schemas/SimulateResultPoliciesItems'
type: array
type: object
SimulateResultConditions:
example:
type: type
status: MATCH
properties:
status:
$ref: '#/components/schemas/SimulateResultStatus'
type:
description: The type of condition
type: string
type: object
SimulateResultPolicies:
items:
$ref: '#/components/schemas/SimulateResultPoliciesItems'
type: array
SimulateResultPoliciesItems:
example:
name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
conditions:
description: List of all conditions involved for this policy evaluation
items:
$ref: '#/components/schemas/SimulateResultConditions'
type: array
id:
description: ID of the specified policy type
type: string
name:
description: Policy name
type: string
rules:
items:
$ref: '#/components/schemas/SimulateResultRules'
type: array
status:
$ref: '#/components/schemas/SimulateResultStatus'
type: object
SimulateResultRules:
example:
name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
conditions:
description: List of all conditions involved for this rule evaluation
items:
$ref: '#/components/schemas/SimulateResultConditions'
type: array
id:
description: The unique ID number of the policy rule
type: string
name:
description: The name of the policy rule
type: string
status:
$ref: '#/components/schemas/SimulateResultStatus'
type: object
SimulateResultStatus:
description: The result of this entity evaluation
enum:
- MATCH
- NOT_MATCH
- UNDEFINED
type: string
SingleLogout:
description: Determines if the app supports Single Logout (SLO)
properties:
enabled:
description: Whether the application supports SLO
type: boolean
issuer:
description: The issuer of the Service Provider that generates the SLO request
type: string
logoutUrl:
description: The location where the logout response is sent
type: string
type: object
SlackApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- slack
example: slack
type: string
signOnMode:
enum:
- BROWSER_PLUGIN
- SAML_2_0
type: string
settings:
$ref: '#/components/schemas/SlackApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Slack app (key name: `slack`)
To create a Slack app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Slack app only supports `BROWSER_PLUGIN` and `SAML_2_0` sign-on modes.
example:
name: slack
label: Sample Slack App
signOnMode: SAML_2_0
settings:
app:
domain: my-company-domain
title: Slack
x-tags:
- Application
x-okta-defined-as:
name: slack
SlackApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/SlackApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
SlackApplicationSettingsApplication:
description: Slack app instance properties
properties:
domain:
description: The Slack app domain name
type: string
userEmailValue:
description: The `User.Email` attribute value
type: string
required:
- domain
type: object
SloParticipate:
description: Determines if the app participates in Single Logout (SLO)
properties:
bindingType:
description: Request binding type
enum:
- POST
- REDIRECT
type: string
enabled:
description: Indicates whether the app is allowed to participate in front-channel
SLO
type: boolean
logoutRequestUrl:
description: URL where Okta sends the logout request
type: string
sessionIndexRequired:
description: Determines whether Okta sends the `SessionIndex` elements in
the logout request
type: boolean
type: object
SmsTemplate:
example:
template: template
lastUpdated: 2000-01-23T04:56:07.000+00:00
created: 2000-01-23T04:56:07.000+00:00
translations: "{}"
name: name
id: id
type: SMS_VERIFY_CODE
properties:
created:
format: date-time
readOnly: true
type: string
id:
readOnly: true
type: string
lastUpdated:
format: date-time
readOnly: true
type: string
name:
description: Human-readable name of the Template
maxLength: 50
minLength: 1
type: string
template:
description: "Text of the Template, including any [macros](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Template/)"
maxLength: 161
minLength: 1
type: string
translations:
description: |
- Template translations are optionally provided when you want to localize the SMS messages. Translations are provided as an object that contains `key:value` pairs: the language and the translated Template text. The key portion is a two-letter country code that conforms to [ISO 639-1](https://www.loc.gov/standards/iso639-2/php/code_list.php). The value is the translated SMS Template.
- Just like with regular SMS Templates, the length of the SMS message can't exceed 160 characters.
type: object
x-okta-extensible: true
type:
$ref: '#/components/schemas/SmsTemplateType'
type: object
SmsTemplateTranslations:
description: |
- Template translations are optionally provided when you want to localize the SMS messages. Translations are provided as an object that contains `key:value` pairs: the language and the translated Template text. The key portion is a two-letter country code that conforms to [ISO 639-1](https://www.loc.gov/standards/iso639-2/php/code_list.php). The value is the translated SMS Template.
- Just like with regular SMS Templates, the length of the SMS message can't exceed 160 characters.
type: object
x-okta-extensible: true
SmsTemplateType:
description: Type of the Template
enum:
- SMS_VERIFY_CODE
maxLength: 50
minLength: 1
type: string
SocialAuthToken:
description: The Social Authentication Token object provides the tokens and
associated metadata provided by social providers during social authentication.
example:
id: NXp9GaX1eOA-XVF_H9fn2Q
scopes:
- openid
- foo
tokenType: urn:ietf:params:oauth:token-type:access_token
expiresAt: 2016-01-03T18:15:47Z
tokenAuthScheme: Bearer
token: JBTWGV22G4ZGKV3N
properties:
expiresAt:
description: Timestamp when the object expires
example: 2016-01-03T18:15:47Z
format: date-time
readOnly: true
type: string
id:
description: Unique identifier for the token
example: NXp9GaX1eOA-XVF_H9fn2Q
readOnly: true
type: string
scopes:
description: The scopes that the token is good for
example:
- openid
- foo
items:
type: string
readOnly: true
type: array
token:
description: The raw token
example: JBTWGV22G4ZGKV3N
readOnly: true
type: string
tokenAuthScheme:
description: The token authentication scheme as defined by the social provider
example: Bearer
readOnly: true
type: string
tokenType:
description: "The type of token defined by the [OAuth Token Exchange Spec](https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-07#section-3)"
example: urn:ietf:params:oauth:token-type:access_token
readOnly: true
type: string
type: object
SourceLinks:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
schema:
$ref: '#/components/schemas/SourceLinks_allOf_schema'
type: object
example:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
SplunkEdition:
description: Edition of the Splunk Cloud instance
enum:
- aws
- aws_govcloud
- gcp
example: aws
type: string
SplunkHost:
description: "The domain name for your Splunk Cloud instance. Don't include\
\ `http` or `https` in the string. For example: `acme.splunkcloud.com`"
example: acme.splunkcloud.com
maxLength: 116
minLength: 17
type: string
SplunkToken:
description: "The HEC token for your Splunk Cloud HTTP Event Collector. The\
\ token value is set at object creation, but isn't returned."
example: 11111111-1111-2222-2222-222222222222
pattern: "(?i)^[0-9a-f]{8}-[0-9a-f]{4}-[1-5][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$"
type: string
writeOnly: true
Sso:
description: "Supported SSO protocol configurations. You must configure at least\
\ one protocol: `oidc` or `saml`"
properties:
oidc:
$ref: '#/components/schemas/Oidc'
saml:
$ref: '#/components/schemas/Saml'
type: object
SsprPrimaryRequirement:
description: Defines the authenticators permitted for the initial authentication
step of password recovery
properties:
methodConstraints:
description: "Constraints on the values specified in the `methods` array.\
\ Specifying a constraint limits methods to specific authenticator(s).\
\ Currently, Google OTP is the only accepted constraint."
items:
$ref: '#/components/schemas/AuthenticatorMethodConstraint'
type: array
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: true
methods:
description: Authenticator methods allowed for the initial authentication
step of password recovery. Method `otp` requires a constraint limiting
it to a Google authenticator.
items:
enum:
- push
- sms
- voice
- email
- otp
type: string
type: array
type: object
SsprRequirement:
description: Describes the initial and
secondary authenticator requirements a user needs to reset their password
properties:
accessControl:
description: "Determines which authentication requirements a user needs\
\ to perform self-service operations. `AUTH_POLICY` defers conditions\
\ and authentication requirements to the [Okta account management policy](https://developer.okta.com/docs/guides/okta-account-management-policy/main/).\
\ `LEGACY` refers to the requirements described by this rule."
enum:
- AUTH_POLICY
- LEGACY
type: string
primary:
$ref: '#/components/schemas/SsprPrimaryRequirement'
stepUp:
$ref: '#/components/schemas/SsprStepUpRequirement'
type: object
SsprStepUpRequirement:
description: |-
Defines the secondary authenticators needed for password reset if `required` is true. The following are three valid configurations:
* `required`=false
* `required`=true with no methods to use any SSO authenticator
* `required`=true with `security_question` as the method
properties:
methods:
description: Authenticator methods required for secondary authentication
step of password recovery. Specify this value only when `required` is
true and `security_question` is permitted for the secondary authentication.
items:
enum:
- security_question
type: string
type: array
required:
type: boolean
type: object
StandardRole:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
targets:
catalog:
apps:
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
groups:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
_links:
assignee:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
id: id
label: label
type: ACCESS_CERTIFICATIONS_ADMIN
assignmentType: CLIENT
status: ""
properties:
assignmentType:
$ref: '#/components/schemas/RoleAssignmentType'
created:
description: Timestamp when the object was created
format: date-time
readOnly: true
type: string
id:
description: Role Assignment ID
readOnly: true
type: string
label:
description: Label for the Role Assignment
readOnly: true
type: string
lastUpdated:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
status:
allOf:
- $ref: '#/components/schemas/LifecycleStatus'
- description: Status of the Role Assignment
type:
$ref: '#/components/schemas/RoleType'
_embedded:
$ref: '#/components/schemas/StandardRole__embedded'
_links:
$ref: '#/components/schemas/LinksAssignee'
title: Standard Role Assignment
type: object
StandardRoleAssignmentSchema:
properties:
type:
description: "Specify the standard or IAM-based role type. See [standard\
\ roles](/openapi/okta-management/guides/roles/#standard-roles)."
type: string
title: Standard Role
type: object
StreamConfiguration:
example:
aud: https://example.com
delivery:
endpoint_url: https://example.com/
method: https://schemas.openid.net/secevent/risc/delivery-method/push
authorization_header: "{authorizationHeaderValue}"
events_supported:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
stream_id: esc1k235GIIztAuGK0g5
format: iss_sub
iss: "https://{yourOktaDomain}"
events_delivered:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
events_requested:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
min_verification_interval: 60
properties:
aud:
$ref: '#/components/schemas/StreamConfiguration_aud'
delivery:
$ref: '#/components/schemas/StreamConfigurationDelivery'
events_delivered:
description: |-
The events (mapped by the array of event type URIs) that the transmitter actually delivers to the SSF Stream.
A read-only parameter that is set by the transmitter. If this parameter is included in the request, the value must match the expected value from the transmitter.
example:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
items:
format: uri
type: string
type: array
events_requested:
description: The events (mapped by the array of event type URIs) that the
receiver wants to receive
example:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
items:
format: uri
maxLength: 256
type: string
maxItems: 50
type: array
events_supported:
description: |-
An array of event type URIs that the transmitter supports.
A read-only parameter that is set by the transmitter. If this parameter is included in the request, the value must match the expected value from the transmitter.
example:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
items:
format: uri
type: string
type: array
format:
description: The Subject Identifier format expected for any SET transmitted.
enum:
- iss_sub
type: string
iss:
description: |-
The issuer used in Security Event Tokens (SETs). This value is set as `iss` in the claim.
A read-only parameter that is set by the transmitter. If this parameter is included in the request, the value must match the expected value from the transmitter.
example: "https://{yourOktaDomain}"
type: string
min_verification_interval:
description: |-
The minimum amount of time, in seconds, between two verification requests.
A read-only parameter that is set by the transmitter. If this parameter is included in the request, the value must match the expected value from the transmitter.
example: 60
nullable: true
type: integer
stream_id:
description: The ID of the SSF Stream configuration
example: esc1k235GIIztAuGK0g5
type: string
required:
- delivery
- events_requested
title: Stream Configuration
type: object
StreamConfigurationCreateRequest:
example:
delivery:
endpoint_url: https://example.com/
method: https://schemas.openid.net/secevent/risc/delivery-method/push
authorization_header: "{authorizationHeaderValue}"
format: iss_sub
events_requested:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
properties:
delivery:
$ref: '#/components/schemas/StreamConfigurationDelivery'
events_requested:
description: The events (mapped by the array of event type URIs) that the
receiver wants to receive
example:
- https://schemas.openid.net/secevent/caep/event-type/session-revoked
- https://schemas.openid.net/secevent/caep/event-type/credential-change
items:
format: uri
maxLength: 256
type: string
maxItems: 50
type: array
format:
description: The Subject Identifier format expected for any SET transmitted.
enum:
- iss_sub
type: string
required:
- delivery
- events_requested
title: Stream Configuration Create Request
type: object
StreamConfigurationDelivery:
description: Contains information about the intended SET delivery method by
the receiver
example:
endpoint_url: https://example.com/
method: https://schemas.openid.net/secevent/risc/delivery-method/push
authorization_header: "{authorizationHeaderValue}"
properties:
authorization_header:
description: The HTTP Authorization header that is included for each HTTP
POST request
example: "{authorizationHeaderValue}"
maxLength: 8192
nullable: true
type: string
endpoint_url:
description: The target endpoint URL where the transmitter delivers the
SET using HTTP POST requests
example: https://example.com/
format: uri
maxLength: 2048
type: string
method:
description: The delivery method that the transmitter uses for delivering
a SET
enum:
- https://schemas.openid.net/secevent/risc/delivery-method/push
- urn:ietf:rfc:8935
type: string
required:
- endpoint_url
- method
title: Stream Configuration Delivery
type: object
SubjectType:
enum:
- pairwise
- public
type: string
SubmissionRequest:
allOf:
- $ref: '#/components/schemas/SubmissionResponse'
required:
- description
- logo
- name
SubmissionResponse:
properties:
config:
description: "List of org-level variables for the customer per-tenant configuration.\
\ For example, a `subdomain` variable can be used in the ACS URL: `https://${org.subdomain}.example.com/saml/login`"
items:
$ref: '#/components/schemas/SubmissionResponse_config_inner'
type: array
description:
description: A general description of your application and the benefits
provided to your customers
example: Your one source for in-season strawberry deals. Okta's Strawberry
Central integration allow users to securely access those sweet deals.
maxLength: 1024
minLength: 1
type: string
id:
description: OIN Integration ID
example: acme_submissionapp_1
readOnly: true
type: string
lastPublished:
description: Timestamp when the OIN Integration was last published
example: 2023-08-24T14:15:22.000Z
readOnly: true
type: string
lastUpdated:
description: Timestamp when the OIN Integration instance was last updated
example: 2023-08-24T14:15:22.000Z
readOnly: true
type: string
lastUpdatedBy:
description: ID of the user who made the last update
example: 00ub0oNGTSWTBKOLGLNR
readOnly: true
type: string
logo:
description: "URL to an uploaded application logo. This logo appears next\
\ to your app integration name in the OIN catalog. You must first [Upload\
\ an OIN Integration logo](/openapi/okta-management/management/tag/YourOinIntegrations/#tag/YourOinIntegrations/operation/uploadSubmissionLogo)\
\ to obtain the logo URL before you can specify this value."
example: https://acme.okta.com/bc/image/fileStoreRecord?id=fs03xxd3KmkDBwJU80g4
format: uri
type: string
name:
description: The app integration name. This is the main title used for your
integration in the OIN catalog.
example: Strawberry Central
maxLength: 64
minLength: 1
type: string
sso:
$ref: '#/components/schemas/Sso'
status:
description: Status of the OIN Integration submission
example: New
readOnly: true
type: string
type: object
Subscription:
example:
channels:
- channels
- channels
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
notificationType: AD_AGENT
status: subscribed
properties:
channels:
description: |-
An array of sources send notifications to users.
> **Note**: Currently, Okta only allows `email` channels.
items:
type: string
type: array
notificationType:
$ref: '#/components/schemas/NotificationType'
status:
$ref: '#/components/schemas/SubscriptionStatus'
_links:
$ref: '#/components/schemas/Subscription__links'
type: object
SubscriptionStatus:
description: The status of the subscription
enum:
- subscribed
- unsubscribed
type: string
SupportedMethods:
description: The supported methods of an Authenticator
example:
settings:
algorithms:
- ES256
- ES256
transactionTypes:
- CIBA
- CIBA
keyProtection: ANY
type: push
status: ACTIVE
properties:
settings:
$ref: '#/components/schemas/SupportedMethods_settings'
status:
$ref: '#/components/schemas/LifecycleStatus'
type:
description: The type of authenticator method
enum:
- push
type: string
type: object
SwaApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
$ref: '#/components/schemas/SwaApplicationSettingsApplication'
type: object
SwaApplicationSettingsApplication:
properties:
buttonField:
description: CSS selector for the **Sign-In** button in the sign-in form
(for SWA apps with the `template_swa` app name definition)
type: string
buttonSelector:
description: CSS selector for the **Sign-In** button in the sign-in form
(for three-field SWA apps with the `template_swa3field` app name definition)
type: string
extraFieldSelector:
description: Enter the CSS selector for the extra field (for three-field
SWA apps with the `template_swa3field` app name definition).
type: string
extraFieldValue:
description: Enter the value for the extra field in the form (for three-field
SWA apps with the `template_swa3field` app name definition).
type: string
loginUrlRegex:
description: A regular expression that further restricts targetURL to the
specified regular expression
type: string
passwordField:
description: CSS selector for the **Password** field in the sign-in form
(for SWA apps with the `template_swa` app name definition)
type: string
passwordSelector:
description: CSS selector for the **Password** field in the sign-in form
(for three-field SWA apps with the `template_swa3field` app name definition)
type: string
targetURL:
description: The URL of the sign-in page for this app (for three-field SWA
apps with the `template_swa3field` app name definition)
type: string
url:
description: The URL of the sign-in page for this app (for SWA apps with
the `template_swa` app name definition)
type: string
usernameField:
description: CSS selector for the **Username** field in the sign-in form
(for SWA apps with the `template_swa` app name definition)
type: string
userNameSelector:
description: CSS selector for the **Username** field in the sign-in form
(for three-field SWA apps with the `template_swa3field` app name definition)
type: string
required:
- buttonField
- passwordField
- url
- usernameField
type: object
TelephonyRequest:
properties:
data:
$ref: '#/components/schemas/TelephonyRequestData'
eventType:
description: The type of inline hook. The Telephony inline hook type is
`com.okta.telephony.provider`.
type: string
requestType:
description: "The type of inline hook request. For example, `com.okta.user.telephony.pre-enrollment`."
type: string
source:
description: The ID and URL of the Telephony inline hook
type: string
type: object
TelephonyRequestData:
properties:
context:
$ref: '#/components/schemas/RegistrationInlineHookSSRData_allOf_data_context'
messageProfile:
$ref: '#/components/schemas/TelephonyRequestData_messageProfile'
userProfile:
$ref: '#/components/schemas/TelephonyRequestData_userProfile'
type: object
TelephonyResponse:
properties:
commands:
description: "The `commands` object specifies whether Okta accepts the end\
\ user's sign-in credentials as valid or not. For the Telephony inline\
\ hook, you typically only return one `commands` object with one array\
\ element in it."
items:
$ref: '#/components/schemas/TelephonyResponse_commands_inner'
type: array
type: object
TempPassword:
properties:
tempPassword:
readOnly: true
type: string
type: object
TestInfo:
description: Integration Testing Information
properties:
escalationSupportContact:
description: An email for Okta to contact your company about your integration.
This email isn't shared with customers.
example: strawberry.support@example.com
maxLength: 255
type: string
oidcTestConfiguration:
$ref: '#/components/schemas/TestInfo_oidcTestConfiguration'
samlTestConfiguration:
$ref: '#/components/schemas/TestInfo_samlTestConfiguration'
testAccount:
$ref: '#/components/schemas/TestInfo_testAccount'
required:
- escalationSupportContact
type: object
ThemeResponse:
example:
primaryColorContrastHex: primaryColorContrastHex
favicon: favicon
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
backgroundImage: backgroundImage
secondaryColorHex: secondaryColorHex
secondaryColorContrastHex: secondaryColorContrastHex
primaryColorHex: primaryColorHex
errorPageTouchPointVariant: OKTA_DEFAULT
emailTemplateTouchPointVariant: OKTA_DEFAULT
signInPageTouchPointVariant: BACKGROUND_IMAGE
loadingPageTouchPointVariant: OKTA_DEFAULT
logo: logo
id: id
endUserDashboardTouchPointVariant: OKTA_DEFAULT
properties:
backgroundImage:
readOnly: true
type: string
emailTemplateTouchPointVariant:
$ref: '#/components/schemas/EmailTemplateTouchPointVariant'
endUserDashboardTouchPointVariant:
$ref: '#/components/schemas/EndUserDashboardTouchPointVariant'
errorPageTouchPointVariant:
$ref: '#/components/schemas/ErrorPageTouchPointVariant'
favicon:
readOnly: true
type: string
id:
readOnly: true
type: string
loadingPageTouchPointVariant:
$ref: '#/components/schemas/LoadingPageTouchPointVariant'
logo:
readOnly: true
type: string
primaryColorContrastHex:
description: Primary color contrast hex code
type: string
primaryColorHex:
description: Primary color hex code
type: string
secondaryColorContrastHex:
description: Secondary color contrast hex code
type: string
secondaryColorHex:
description: Secondary color hex code
type: string
signInPageTouchPointVariant:
$ref: '#/components/schemas/SignInPageTouchPointVariant'
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
ThirdPartyAdminSetting:
description: The third-party admin setting
example:
thirdPartyAdmin: false
properties:
thirdPartyAdmin:
description: Indicates if third-party admin is enabled
example: false
type: boolean
type: object
ThreatInsightConfiguration:
example:
lastUpdated: 2020-09-08T20:53:20.882Z
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2020-08-05T22:18:30.629Z
excludeZones: []
action: none
properties:
action:
description: Specifies how Okta responds to authentication requests from
suspicious IP addresses
enum:
- none
- audit
- block
example: none
type: string
x-enumDescriptions:
none: Indicates that ThreatInsight is disabled
audit: Indicates that Okta logs suspicious requests to the System Log
block: Indicates that Okta logs suspicious requests to the System Log
and blocks the requests
created:
description: Timestamp when the ThreatInsight Configuration object was created
example: 2020-08-05T22:18:30.629Z
format: date-time
readOnly: true
type: string
excludeZones:
description: |-
Accepts a list of [Network Zone](/openapi/okta-management/management/tag/NetworkZone/) IDs.
IPs in the excluded network zones aren't logged or blocked.
This ensures that traffic from known, trusted IPs isn't accidentally logged or blocked.
example: []
items:
type: string
type: array
lastUpdated:
description: Timestamp when the ThreatInsight Configuration object was last
updated
example: 2020-09-08T20:53:20.882Z
format: date-time
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
required:
- action
type: object
TimeDuration:
description: "A time duration specified as an [ISO-8601 duration](https://en.wikipedia.org/wiki/ISO_8601#Durations)."
pattern: ^P(?:$)(\d+Y)?(\d+M)?(\d+W)?(\d+D)?(T(?:\d)(\d+H)?(\d+M)?(\d+S)?)?$
type: string
TokenAuthorizationServerPolicyRuleAction:
example:
refreshTokenWindowMinutes: 1
accessTokenLifetimeMinutes: 0
inlineHook:
id: id
refreshTokenLifetimeMinutes: 6
properties:
accessTokenLifetimeMinutes:
description: Lifetime of the access token in minutes. The minimum is five
minutes. The maximum is one day.
type: integer
inlineHook:
$ref: '#/components/schemas/TokenAuthorizationServerPolicyRuleActionInlineHook'
refreshTokenLifetimeMinutes:
description: Lifetime of the refresh token is the minimum access token lifetime.
type: integer
refreshTokenWindowMinutes:
description: "Timeframe when the refresh token is valid. The minimum is\
\ 10 minutes. The maximum is five years (2,628,000 minutes)."
type: integer
type: object
TokenAuthorizationServerPolicyRuleActionInlineHook:
example:
id: id
properties:
id:
readOnly: false
type: string
type: object
TokenDeliveryMode:
enum:
- poll
type: string
TokenHookResponse:
description: |-
For the token inline hook, the `commands` and `error` objects that you can return in the JSON payload of your response are defined in the following sections.
> **Note:** The size of your response payload must be less than 256 KB.
properties:
commands:
description: |-
You can use the `commands` object to provide commands to Okta. It's where you can tell Okta to add more claims to the token.
The `commands` object is an array, allowing you to send multiple commands. In each array element, there needs to be a `type` property and `value` property. The `type` property is where you specify which of the supported commands you want to execute, and `value` is where you supply an operand for that command.
In the case of the token hook type, the `value` property is itself a nested object in which you specify a particular operation, a path to act on, and a value.
items:
$ref: '#/components/schemas/TokenHookResponse_commands_inner'
type: array
error:
$ref: '#/components/schemas/TokenHookResponse_error'
type: object
TokenPayLoad:
properties:
data:
$ref: '#/components/schemas/TokenPayLoad_data'
type: object
TokenProtocolRequest:
description: Details of the token request
properties:
client_id:
description: The ID of the client associated with the token
type: string
grant_type:
$ref: '#/components/schemas/GrantType'
redirect_uri:
description: Specifies the callback location where the authorization was
sent
format: uri
type: string
response_mode:
description: The authorization response mode
enum:
- form_post
- fragment
- okta_post_message
- query
type: string
response_type:
description: The authorization response type
enum:
- code
- id_token
- token
- none
type: string
scope:
description: The scopes requested
type: string
state:
type: string
type: object
TokenRequest:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/TokenPayLoad'
TokenResourcesHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens"
type: string
type: object
TokenResponse:
properties:
access_token:
description: An access token.
type: string
device_secret:
description: An opaque device secret. This is returned if the `device_sso`
scope is granted.
type: string
expires_in:
description: The expiration time of the access token in seconds.
type: integer
id_token:
description: An ID token. This is returned if the `openid` scope is granted.
type: string
issued_token_type:
$ref: '#/components/schemas/TokenType'
refresh_token:
description: An opaque refresh token. This is returned if the `offline_access`
scope is granted.
type: string
scope:
description: The scopes contained in the access token.
type: string
token_type:
$ref: '#/components/schemas/TokenResponseTokenType'
type: object
TokenResponseTokenType:
description: The token type in a `/token` response. The value is generally `Bearer`
except for a few instances of token exchange.
enum:
- Bearer
- N_A
type: string
TokenType:
description: The type of token for token exchange.
enum:
- urn:ietf:params:oauth:token-type:access_token
- urn:ietf:params:oauth:token-type:id_token
- urn:ietf:params:oauth:token-type:jwt
- urn:ietf:params:oauth:token-type:refresh_token
- urn:ietf:params:oauth:token-type:saml1
- urn:ietf:params:oauth:token-type:saml2
- urn:okta:oauth:token-type:web_sso_token
- urn:x-oath:params:oauth:token-type:device-secret
type: string
TrendMicroApexOneServiceApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- trendmicroapexoneservice
example: trendmicroapexoneservice
type: string
signOnMode:
enum:
- SAML_2_0
type: string
settings:
$ref: '#/components/schemas/TrendMicroApexOneServiceApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for Trend Micro Apex One as a Service app (key name: `trendmicroapexoneservice`)
To create a Trend Micro Apex One as a Service app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Trend Micro Apex One as a Service app only supports `SAML_2_0` sign-on mode.
example:
name: trendmicroapexoneservice
label: Sample Trend Micro Apex One as a Service App
signOnMode: SAML_2_0
settings:
app:
baseURL: https://acme.trendmicro.com
title: Trend Micro Apex One Service
x-tags:
- Application
x-okta-defined-as:
name: trendmicroapexoneservice
TrendMicroApexOneServiceApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/TrendMicroApexOneServiceApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
TrendMicroApexOneServiceApplicationSettingsApplication:
description: Trend Micro Apex One as a Service app instance properties
properties:
baseURL:
description: Base Trend Micro Apex One Service URL
type: string
required:
- baseURL
type: object
TrustedOrigin:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
createdBy: createdBy
_links:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
origin: origin
name: name
id: id
scopes:
- allowedOktaApps:
- OKTA_ENDUSER
- OKTA_ENDUSER
type: CORS
- allowedOktaApps:
- OKTA_ENDUSER
- OKTA_ENDUSER
type: CORS
status: ACTIVE
properties:
created:
description: Timestamp when the Trusted Origin was created
format: date-time
readOnly: true
type: string
createdBy:
description: The ID of the user who created the Trusted Origin
type: string
id:
description: Unique identifier for the Trusted Origin
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Trusted Origin was last updated
format: date-time
readOnly: true
type: string
lastUpdatedBy:
description: The ID of the user who last updated the Trusted Origin
type: string
name:
description: Unique name for the Trusted Origin
maximum: 255
type: string
origin:
description: "Unique origin URL for the Trusted Origin. The supported schemes\
\ for this attribute are HTTP, HTTPS, FTP, Ionic 2, and Capacitor."
maximum: 255
type: string
scopes:
description: Array of Scope types that this Trusted Origin is used for
items:
$ref: '#/components/schemas/TrustedOriginScope'
maximum: 3
type: array
status:
$ref: '#/components/schemas/LifecycleStatus'
_links:
$ref: '#/components/schemas/LinksSelfAndLifecycle'
type: object
TrustedOriginName:
description: Unique name for the Trusted Origin
maximum: 255
type: string
TrustedOriginOrigin:
description: "Unique origin URL for the Trusted Origin. The supported schemes\
\ for this attribute are HTTP, HTTPS, FTP, Ionic 2, and Capacitor."
maximum: 255
type: string
TrustedOriginScope:
example:
allowedOktaApps:
- OKTA_ENDUSER
- OKTA_ENDUSER
type: CORS
properties:
allowedOktaApps:
description: The allowed Okta apps for the Trusted Origin scope
items:
$ref: '#/components/schemas/IframeEmbedScopeAllowedApps'
type: array
type:
$ref: '#/components/schemas/TrustedOriginScopeType'
type: object
TrustedOriginScopeType:
description: "The scope type. Supported values: When you use `IFRAME_EMBED`\
\ as the scope type, leave the allowedOktaApps property \nempty to allow iFrame\
\ embedding of only Okta sign-in pages. Include `OKTA_ENDUSER` as a value\
\ for the allowedOktaApps \nproperty to allow iFrame embedding of both Okta\
\ sign-in pages and the Okta End-User Dashboard.\n"
enum:
- CORS
- IFRAME_EMBED
- REDIRECT
type: string
TrustedOriginScopes:
description: Array of Scope types that this Trusted Origin is used for
items:
$ref: '#/components/schemas/TrustedOriginScope'
maximum: 3
type: array
TrustedOriginWrite:
example:
origin: origin
name: name
scopes:
- allowedOktaApps:
- OKTA_ENDUSER
- OKTA_ENDUSER
type: CORS
- allowedOktaApps:
- OKTA_ENDUSER
- OKTA_ENDUSER
type: CORS
properties:
name:
description: Unique name for the Trusted Origin
maximum: 255
type: string
origin:
description: "Unique origin URL for the Trusted Origin. The supported schemes\
\ for this attribute are HTTP, HTTPS, FTP, Ionic 2, and Capacitor."
maximum: 255
type: string
scopes:
description: Array of Scope types that this Trusted Origin is used for
items:
$ref: '#/components/schemas/TrustedOriginScope'
maximum: 3
type: array
type: object
UIElement:
description: Specifies the configuration of an input field on an enrollment
form
example:
scope: scope
options:
format: text
label: label
type: type
properties:
label:
description: Label name for the UI element
type: string
options:
$ref: '#/components/schemas/UIElement_options'
scope:
description: Specifies the property bound to the input field. It must follow
the format `#/properties/PROPERTY_NAME` where `PROPERTY_NAME` is a variable
name for an attribute in `profile editor`.
type: string
type:
description: Specifies the relationship between this input element and `scope`.
The `Control` value specifies that this input controls the value represented
by `scope`.
type: string
type: object
UISchemaObject:
description: Properties of the UI schema
example:
elements:
scope: scope
options:
format: text
label: label
type: type
label: Sign in
type: type
buttonLabel: Submit
properties:
buttonLabel:
default: Submit
description: Specifies the button label for the `Submit` button at the bottom
of the enrollment form
type: string
elements:
$ref: '#/components/schemas/UIElement'
label:
default: Sign in
description: Specifies the label at the top of the enrollment form under
the logo
type: string
type:
description: Specifies the type of layout
type: string
type: object
UISchemasResponseObject:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
uiSchema:
elements:
scope: scope
options:
format: text
label: label
type: type
label: Sign in
type: type
buttonLabel: Submit
id: id
properties:
created:
description: Timestamp when the UI Schema was created (ISO-86001)
format: date-time
readOnly: true
type: string
id:
description: Unique identifier for the UI Schema
readOnly: true
type: string
lastUpdated:
description: Timestamp when the UI Schema was last modified (ISO-86001)
format: date-time
readOnly: true
type: string
uiSchema:
$ref: '#/components/schemas/UISchemaObject'
_links:
$ref: '#/components/schemas/LinksSelf'
required:
- _links
- created
- id
- lastUpdated
- uiSchema
type: object
UpdateDomain:
example:
brandId: bndul904tTZ6kWVhP0g3
properties:
brandId:
description: The `id` of the brand used to replace the existing brand.
example: bndul904tTZ6kWVhP0g3
type: string
required:
- brandId
type: object
UpdateEmailDomain:
allOf:
- $ref: '#/components/schemas/BaseEmailDomain'
example:
displayName: displayName
userName: userName
UpdateIamRoleRequest:
example:
description: description
label: label
properties:
description:
description: Description of the role
type: string
label:
description: Unique label for the role
type: string
required:
- description
- label
type: object
UpdateRealmAssignmentRequest:
example:
name: name
conditions:
expression:
value: value
profileSourceId: profileSourceId
priority: 0
actions:
assignUserToRealm:
realmId: realmId
properties:
actions:
$ref: '#/components/schemas/Actions'
conditions:
$ref: '#/components/schemas/Conditions'
name:
type: string
priority:
type: integer
type: object
UpdateRealmRequest:
example:
profile:
realmType: PARTNER
name: name
properties:
profile:
$ref: '#/components/schemas/RealmProfile'
type: object
UpdateThemeRequest:
example:
emailTemplateTouchPointVariant: OKTA_DEFAULT
signInPageTouchPointVariant: BACKGROUND_IMAGE
primaryColorContrastHex: primaryColorContrastHex
loadingPageTouchPointVariant: OKTA_DEFAULT
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
secondaryColorHex: secondaryColorHex
secondaryColorContrastHex: secondaryColorContrastHex
primaryColorHex: primaryColorHex
errorPageTouchPointVariant: OKTA_DEFAULT
endUserDashboardTouchPointVariant: OKTA_DEFAULT
properties:
emailTemplateTouchPointVariant:
$ref: '#/components/schemas/EmailTemplateTouchPointVariant'
endUserDashboardTouchPointVariant:
$ref: '#/components/schemas/EndUserDashboardTouchPointVariant'
errorPageTouchPointVariant:
$ref: '#/components/schemas/ErrorPageTouchPointVariant'
loadingPageTouchPointVariant:
$ref: '#/components/schemas/LoadingPageTouchPointVariant'
primaryColorContrastHex:
description: Primary color contrast hex code
type: string
primaryColorHex:
description: Primary color hex code
type: string
secondaryColorContrastHex:
description: Secondary color contrast hex code
type: string
secondaryColorHex:
description: Secondary color hex code
type: string
signInPageTouchPointVariant:
$ref: '#/components/schemas/SignInPageTouchPointVariant'
_links:
$ref: '#/components/schemas/LinksSelf'
required:
- emailTemplateTouchPointVariant
- endUserDashboardTouchPointVariant
- errorPageTouchPointVariant
- primaryColorHex
- secondaryColorHex
- signInPageTouchPointVariant
type: object
UpdateUISchema:
description: The updated request body properties
example:
uiSchema:
elements:
scope: scope
options:
format: text
label: label
type: type
label: Sign in
type: type
buttonLabel: Submit
properties:
uiSchema:
$ref: '#/components/schemas/UISchemaObject'
type: object
UpdateUserRequest:
example:
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
properties:
credentials:
$ref: '#/components/schemas/UserCredentials'
profile:
$ref: '#/components/schemas/UserProfile'
realmId:
description: The
ID of the Realm in which the User is residing
example: guo1bfiNtSnZYILxO0g4
type: string
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
type: object
User:
example:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
properties:
activated:
description: The timestamp when the User status transitioned to `ACTIVE`
format: date-time
nullable: true
readOnly: true
type: string
created:
description: The timestamp when the User was created
format: date-time
readOnly: true
type: string
credentials:
$ref: '#/components/schemas/UserCredentials'
id:
description: The unique key for the user
readOnly: true
type: string
lastLogin:
description: The timestamp of the last login
format: date-time
nullable: true
readOnly: true
type: string
lastUpdated:
description: The timestamp when the User was last updated
format: date-time
readOnly: true
type: string
passwordChanged:
description: The timestamp when the User's password was last updated
format: date-time
nullable: true
readOnly: true
type: string
profile:
$ref: '#/components/schemas/UserProfile'
realmId:
description: The
ID of the Realm in which the User is residing
example: guo1bfiNtSnZYILxO0g4
readOnly: true
type: string
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
status:
$ref: '#/components/schemas/UserStatus'
statusChanged:
description: The timestamp when the status of the User last changed
format: date-time
nullable: true
readOnly: true
type: string
transitioningToStatus:
$ref: '#/components/schemas/UserStatus'
type:
$ref: '#/components/schemas/UserType'
_embedded:
additionalProperties:
properties: {}
type: object
description: "Embedded resources related to the User using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
readOnly: true
type: object
_links:
$ref: '#/components/schemas/User__links'
type: object
UserActivationToken:
example:
activationUrl: "https://{yourOktaDomain}/welcome/XE6wE17zmphl3KqAPFxO"
activationToken: XE6wE17zmphl3KqAPFxO
properties:
activationToken:
description: |-
Token received as part of an activation user request. If a password was set before the user was activated, then user must sign in with their password or the `activationToken` and not the activation link. More information about using the `activationToken`
to login can be found in the [Authentication API](https://developer.okta.com/docs/reference/api/authn/#primary-authentication-with-activation-token).
example: XE6wE17zmphl3KqAPFxO
readOnly: true
type: string
activationUrl:
description: "If `sendEmail` is `false`, returns an activation link for\
\ the user to set up their account. The activation token can be used to\
\ create a custom activation link."
example: "https://{yourOktaDomain}/welcome/XE6wE17zmphl3KqAPFxO"
readOnly: true
type: string
type: object
UserBlock:
description: "Describes how the account is blocked from access. If `appliesTo`\
\ is `ANY_DEVICES`, then the account is blocked for all devices. If `appliesTo`\
\ is `UNKNOWN_DEVICES`, then the account is only blocked for unknown devices."
example:
appliesTo: ANY_DEVICES
type: DEVICE_BASED
properties:
appliesTo:
description: The devices that the block applies to
enum:
- ANY_DEVICES
- UNKNOWN_DEVICES
readOnly: true
type: string
x-enumDescriptions:
ANY_DEVICES: The account is blocked for all devices
UNKNOWN_DEVICES: The account is only blocked for unknown devices
type:
description: Type of access block
enum:
- DEVICE_BASED
readOnly: true
type: string
type: object
UserCondition:
description: Specifies a set of Users to be included or excluded
properties:
exclude:
description: Users to be excluded
items:
type: string
type: array
include:
description: Users to be included
items:
type: string
type: array
required:
- exclude
- include
type: object
UserCredentials:
description: Specifies primary authentication and recovery credentials for a
User. Credential types and requirements vary depending on the provider and
security policy of the org.
example:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
properties:
password:
$ref: '#/components/schemas/PasswordCredential'
provider:
$ref: '#/components/schemas/AuthenticationProvider'
recovery_question:
$ref: '#/components/schemas/RecoveryQuestionCredential'
type: object
UserFactor:
discriminator:
mapping:
call: '#/components/schemas/UserFactorCall'
email: '#/components/schemas/UserFactorEmail'
push: '#/components/schemas/UserFactorPush'
question: '#/components/schemas/UserFactorSecurityQuestion'
sms: '#/components/schemas/UserFactorSMS'
token: '#/components/schemas/UserFactorToken'
token:hardware: '#/components/schemas/UserFactorTokenHardware'
token:hotp: '#/components/schemas/UserFactorTokenHOTP'
token:software:totp: '#/components/schemas/UserFactorTokenSoftwareTOTP'
u2f: '#/components/schemas/UserFactorU2F'
web: '#/components/schemas/UserFactorWeb'
webauthn: '#/components/schemas/UserFactorWebAuthn'
hotp: '#/components/schemas/UserFactorTokenHOTP'
propertyName: factorType
example:
lastUpdated: 2022-08-25T00:31:00Z
provider: CUSTOM
_embedded:
key: "{}"
_links:
cancel:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
question:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
qrcode:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
poll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enroll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factor:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
send:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2022-08-25T00:31:00Z
profile: "{}"
factorType: call
id: caf8m6jbcvUH8mAep1d7
vendorName: OKTA
status: ACTIVE
properties:
created:
description: Timestamp when the Factor was enrolled
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
factorType:
$ref: '#/components/schemas/UserFactorType'
id:
description: ID of the Factor
example: caf8m6jbcvUH8mAep1d7
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Factor was last updated
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
profile:
description: Specific attributes related to the Factor
type: object
provider:
$ref: '#/components/schemas/UserFactorProvider'
status:
$ref: '#/components/schemas/UserFactorStatus'
vendorName:
description: Name of the Factor vendor. This is usually the same as the
provider except for On-Prem MFA where it depends on administrator settings.
example: OKTA
readOnly: true
type: string
_embedded:
additionalProperties:
properties: {}
type: object
readOnly: true
type: object
_links:
$ref: '#/components/schemas/UserFactorLinks'
type: object
UserFactorActivatePush:
description: "Activation requests have a short lifetime and expire if the activation\
\ isn't completed before the indicated timestamp. If the activation expires,\
\ use the returned `activate` link to restart the process."
properties:
expiresAt:
description: Timestamp when the Factor verification attempt expires
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
factorResult:
$ref: '#/components/schemas/UserFactorActivatePushResult'
type: object
UserFactorActivatePushResult:
description: Result of a Factor activation
enum:
- CANCELLED
- ERROR
- TIMEOUT
- WAITING
type: string
UserFactorActivateRequest:
example:
attestation: o2NmbXRmcGFja2VkZ2F0dFN0bXSiY2FsZyZjc2lnWEgwRgIhAMvf2+dzXlHZN1um38Y8aFzrKvX0k5dt/hnDu9lahbR4AiEAuwtMg3IoaElWMp00QrP/+3Po/6LwXfmYQVfsnsQ+da1oYXV0aERhdGFYxkgb9OHGifjS2dG03qLRqvXrDIRyfGAuc+GzF1z20/eVRV2wvl6tzgACNbzGCmSLCyXx8FUDAEIBvWNHOcE3QDUkDP/HB1kRbrIOoZ1dR874ZaGbMuvaSVHVWN2kfNiO4D+HlAzUEFaqlNi5FPqKw+mF8f0XwdpEBlClAQIDJiABIVgg0a6oo3W0JdYPu6+eBrbr0WyB3uJLI3ODVgDfQnpgafgiWCB4fFo/5iiVrFhB8pNH2tbBtKewyAHuDkRolcCnVaCcmQ==
clientData: eyJjaGFsbGVuZ2UiOiJVSk5wYW9sVWt0dF9vcEZPNXJMYyIsIm9yaWdpbiI6Imh0dHBzOi8vcmFpbi5va3RhMS5jb20iLCJ0eXBlIjoid2ViYXV0aG4uY3JlYXRlIn0
passCode: "1234567890"
registrationData: registrationData
properties:
passCode:
description: OTP for the current time window
example: "1234567890"
type: string
registrationData:
type: string
attestation:
description: Base64-encoded attestation from the WebAuthn authenticator
example: o2NmbXRmcGFja2VkZ2F0dFN0bXSiY2FsZyZjc2lnWEgwRgIhAMvf2+dzXlHZN1um38Y8aFzrKvX0k5dt/hnDu9lahbR4AiEAuwtMg3IoaElWMp00QrP/+3Po/6LwXfmYQVfsnsQ+da1oYXV0aERhdGFYxkgb9OHGifjS2dG03qLRqvXrDIRyfGAuc+GzF1z20/eVRV2wvl6tzgACNbzGCmSLCyXx8FUDAEIBvWNHOcE3QDUkDP/HB1kRbrIOoZ1dR874ZaGbMuvaSVHVWN2kfNiO4D+HlAzUEFaqlNi5FPqKw+mF8f0XwdpEBlClAQIDJiABIVgg0a6oo3W0JdYPu6+eBrbr0WyB3uJLI3ODVgDfQnpgafgiWCB4fFo/5iiVrFhB8pNH2tbBtKewyAHuDkRolcCnVaCcmQ==
type: string
clientData:
description: Base64-encoded client data from the WebAuthn authenticator
example: eyJjaGFsbGVuZ2UiOiJVSk5wYW9sVWt0dF9vcEZPNXJMYyIsIm9yaWdpbiI6Imh0dHBzOi8vcmFpbi5va3RhMS5jb20iLCJ0eXBlIjoid2ViYXV0aG4uY3JlYXRlIn0
type: string
type: object
UserFactorActivateResponse:
discriminator:
mapping:
call: '#/components/schemas/UserFactorCall'
email: '#/components/schemas/UserFactorEmail'
sms: '#/components/schemas/UserFactorSMS'
push: '#/components/schemas/UserFactorPush'
token:software:totp: '#/components/schemas/UserFactorTokenSoftwareTOTP'
u2f: '#/components/schemas/UserFactorU2F'
webauthn: '#/components/schemas/UserFactorWebAuthn'
propertyName: factorType
example:
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factorType: call
properties:
factorType:
description: Type of the Factor
enum:
- call
- email
- sms
- push
- token:software:totp
- u2f
- webauthn
type: string
_links:
$ref: '#/components/schemas/UserFactorActivateResponse__links'
type: object
UserFactorCall:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorCallProfile'
type: object
title: call
UserFactorCallProfile:
properties:
phoneExtension:
description: Extension of the associated `phoneNumber`
example: "1234"
maxLength: 15
nullable: true
type: string
phoneNumber:
description: "Phone number of the Factor. Format phone numbers to use the\
\ [E.164 standard](https://www.itu.int/rec/T-REC-E.164/)."
example: "+15554151337"
maxLength: 15
pattern: "^\\+[1-9]\\d{1,14}$"
type: string
type: object
UserFactorEmail:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorEmailProfile'
type: object
title: email
UserFactorEmailProfile:
properties:
email:
description: Email address of the user. This must be either the primary
or secondary email address associated with the Okta user account.
example: z.cool@example.com
maxLength: 100
type: string
type: object
UserFactorLinks:
allOf:
- $ref: '#/components/schemas/LinksActivate'
- $ref: '#/components/schemas/LinksCancel'
- $ref: '#/components/schemas/LinksDeactivate'
- $ref: '#/components/schemas/LinksEnroll'
- $ref: '#/components/schemas/LinksFactor'
- $ref: '#/components/schemas/LinksPoll'
- $ref: '#/components/schemas/LinksQrcode'
- $ref: '#/components/schemas/LinksQuestions'
- $ref: '#/components/schemas/LinksResend'
- $ref: '#/components/schemas/LinksSend'
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksUser'
- $ref: '#/components/schemas/LinksVerify'
example:
cancel:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
question:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
qrcode:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
poll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enroll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factor:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
send:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
readOnly: true
UserFactorPassCode:
description: OTP for the current time window
example: "1234567890"
type: string
UserFactorProvider:
description: Provider for the Factor
enum:
- CUSTOM
- DUO
- FIDO
- GOOGLE
- OKTA
- RSA
- SYMANTEC
- YUBICO
type: string
UserFactorPush:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorPushProfile'
type: object
title: push
UserFactorPushProfile:
properties:
credentialId:
description: ID for the Factor credential
example: dade.murphy@example.com
type: string
deviceToken:
description: Token used to identify the device
example: fwf7ku6bsiSCieh6y1d7
type: string
deviceType:
description: Type of device
example: SmartPhone_IPhone
type: string
name:
description: Name of the device
example: My Phone
type: string
platform:
description: OS version of the associated device
example: IOS
type: string
version:
description: Installed version of Okta Verify
example: "9.0"
type: string
type: object
UserFactorPushTransaction:
discriminator:
mapping:
WAITING: '#/components/schemas/UserFactorPushTransactionWaiting'
SUCCESS: '#/components/schemas/UserFactorPushTransaction'
REJECTED: '#/components/schemas/UserFactorPushTransactionRejected'
TIMEOUT: '#/components/schemas/UserFactorPushTransactionTimeout'
propertyName: factorResult
example:
factorResult: WAITING
properties:
factorResult:
description: Result of the verification transaction
enum:
- WAITING
- SUCCESS
- REJECTED
- TIMEOUT
type: string
type: object
UserFactorPushTransactionRejected:
allOf:
- $ref: '#/components/schemas/UserFactorPushTransaction'
- properties:
profile:
$ref: '#/components/schemas/UserFactorPushTransactionRejected_allOf_profile'
_links:
$ref: '#/components/schemas/UserFactorPushTransactionRejected_allOf__links'
type: object
UserFactorPushTransactionSuccess:
$ref: '#/components/schemas/UserFactorPushTransaction'
UserFactorPushTransactionTimeout:
allOf:
- $ref: '#/components/schemas/UserFactorPushTransaction'
- properties:
profile:
$ref: '#/components/schemas/UserFactorPushTransactionRejected_allOf_profile'
_links:
$ref: '#/components/schemas/UserFactorPushTransactionTimeout_allOf__links'
type: object
UserFactorPushTransactionWaiting:
allOf:
- $ref: '#/components/schemas/UserFactorPushTransaction'
- properties:
profile:
$ref: '#/components/schemas/UserFactorPushTransactionRejected_allOf_profile'
_links:
$ref: '#/components/schemas/UserFactorPushTransactionWaiting_allOf__links'
type: object
UserFactorResultType:
description: Result of a Factor verification attempt
enum:
- CANCELLED
- CHALLENGE
- ERROR
- FAILED
- PASSCODE_REPLAYED
- REJECTED
- SUCCESS
- TIMEOUT
- TIME_WINDOW_EXCEEDED
- WAITING
readOnly: true
type: string
UserFactorSMS:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorSMSProfile'
type: object
title: sms
UserFactorSMSProfile:
properties:
phoneNumber:
description: "Phone number of the Factor. You should format phone numbers\
\ to use the [E.164 standard](https://www.itu.int/rec/T-REC-E.164/)."
example: "+15554151337"
maxLength: 15
pattern: "^\\+[1-9]\\d{1,14}$"
type: string
type: object
UserFactorSecurityQuestion:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorSecurityQuestionProfile'
type: object
title: question
UserFactorSecurityQuestionProfile:
example:
answer: answer
question: disliked_food
questionText: What is the food you least liked as a child?
properties:
answer:
description: Answer to the question
minLength: 4
type: string
writeOnly: true
question:
description: Unique key for the question
enum:
- disliked_food
- name_of_first_plush_toy
- first_award
- favorite_security_question
- favorite_toy
- first_computer_game
- favorite_movie_quote
- first_sports_team_mascot
- first_music_purchase
- favorite_art_piece
- grandmother_favorite_desert
- first_thing_cooked
- childhood_dream_job
- first_kiss_location
- place_where_significant_other_was_met
- favorite_vacation_location
- new_years_two_thousand
- favorite_speaker_actor
- favorite_book_movie_character
- favorite_sports_player
example: disliked_food
type: string
questionText:
description: Human-readable text that's displayed to the user
example: What is the food you least liked as a child?
readOnly: true
type: string
type: object
UserFactorSignatureData:
description: Base64-encoded signature data from the WebAuthn authenticator
type: string
UserFactorStatus:
description: Status of the Factor
enum:
- ACTIVE
- DISABLED
- ENROLLED
- EXPIRED
- INACTIVE
- NOT_SETUP
- PENDING_ACTIVATION
example: ACTIVE
readOnly: true
type: string
UserFactorSupported:
example:
provider: CUSTOM
_embedded:
key: "{}"
_links:
cancel:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
question:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
qrcode:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
poll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enroll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factor:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
send:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factorType: call
vendorName: OKTA
enrollment: OPTIONAL
status: ACTIVE
properties:
enrollment:
description: Indicates if the Factor is required for the specified user
enum:
- OPTIONAL
- REQUIRED
example: OPTIONAL
type: string
factorType:
$ref: '#/components/schemas/UserFactorType'
provider:
$ref: '#/components/schemas/UserFactorProvider'
status:
$ref: '#/components/schemas/UserFactorStatus'
vendorName:
description: Name of the Factor vendor. This is usually the same as the
provider except for On-Prem MFA where it depends on administrator settings.
example: OKTA
readOnly: true
type: string
_embedded:
additionalProperties:
properties: {}
type: object
description: Embedded resources related to the Factor
readOnly: true
type: object
_links:
$ref: '#/components/schemas/UserFactorLinks'
type: object
UserFactorToken:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorTokenProfile'
verify:
$ref: '#/components/schemas/UserFactorToken_allOf_verify'
type: object
title: token
UserFactorTokenFactorVerificationObject:
properties:
nextPassCode:
description: OTP for the next time window
example: "678195"
type: string
passCode:
description: OTP for the current time window
example: "875498"
type: string
type: object
UserFactorTokenHOTP:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
factorProfileId:
description: "ID of an existing Custom TOTP Factor profile. To create\
\ this, see [Custom TOTP Factor](https://help.okta.com/okta_help.htm?id=ext-mfa-totp)."
type: string
profile:
$ref: '#/components/schemas/UserFactorTokenHOTPProfile'
type: object
title: token:hotp
UserFactorTokenHOTPProfile:
properties:
sharedSecret:
description: Unique secret key used to generate the OTP
example: 484f97be3213b117e3a20438e291540a
type: string
type: object
UserFactorTokenHardware:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorTokenProfile'
verify:
$ref: '#/components/schemas/UserFactorTokenHardware_allOf_verify'
type: object
title: token:hardware
UserFactorTokenProfile:
properties:
credentialId:
description: ID for the Factor credential
example: dade.murphy@example.com
type: string
type: object
UserFactorTokenSoftwareTOTP:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorTokenProfile'
type: object
title: token:software:totp
UserFactorTokenVerifyRSA:
properties:
passCode:
description: OTP for the current time window
example: "5275875498"
type: string
title: RSA SecurID
type: object
UserFactorTokenVerifySymantec:
properties:
nextPassCode:
description: OTP for the next time window
example: 3956685498
type: integer
passCode:
description: OTP for the current time window
example: "5275875498"
type: string
title: Symantec VIP
type: object
UserFactorType:
description: Type of Factor
enum:
- call
- email
- push
- question
- signed_nonce
- sms
- token
- token:hardware
- token:hotp
- token:software:totp
- u2f
- web
- webauthn
type: string
UserFactorU2F:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorU2FProfile'
type: object
title: u2f
UserFactorU2FProfile:
properties:
credentialId:
description: ID for the Factor credential
example: dade.murphy@example.com
type: string
type: object
UserFactorVerifyRequest:
example:
signatureData: signatureData
answer: answer
nextPassCode: nextPassCode
clientData: eyJ0eXAiOiJuYXZpZ2F0b3IuaWQuZmluaXNoRW5yb2xsbWVudCIsImNoYWxsZW5nZSI6IlhxR0h0RTBoUkxuVEoxYUF5U1oyIiwib3JpZ2luIjoiaHR0cHM6Ly9sb2NhbGhvc3Q6MzAwMCIsImNpZF9wdWJrZXkiOiJ1bnVzZWQifQ
passCode: "1234567890"
authenticatorData: authenticatorData
properties:
passCode:
description: OTP for the current time window
example: "1234567890"
type: string
answer:
description: Answer to the question
minLength: 4
type: string
writeOnly: true
clientData:
description: Base64-encoded client data from the U2F token
example: eyJ0eXAiOiJuYXZpZ2F0b3IuaWQuZmluaXNoRW5yb2xsbWVudCIsImNoYWxsZW5nZSI6IlhxR0h0RTBoUkxuVEoxYUF5U1oyIiwib3JpZ2luIjoiaHR0cHM6Ly9sb2NhbGhvc3Q6MzAwMCIsImNpZF9wdWJrZXkiOiJ1bnVzZWQifQ
type: string
signatureData:
description: Base64-encoded signature data from the U2F token
type: string
authenticatorData:
description: Base64-encoded authenticator data from the WebAuthn authenticator
type: string
nextPassCode:
type: string
type: object
UserFactorVerifyResponse:
example:
_embedded:
key: "{}"
_links:
cancel:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
question:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
qrcode:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
poll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enroll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factor:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
send:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factorResult: CHALLENGE
factorMessage: factorMessage
expiresAt: 2022-08-25T00:31:00Z
properties:
expiresAt:
description: Timestamp when the verification expires
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
factorMessage:
description: Optional display message for Factor verification
nullable: true
readOnly: true
type: string
factorResult:
$ref: '#/components/schemas/UserFactorVerifyResult'
_embedded:
additionalProperties:
properties: {}
type: object
readOnly: true
type: object
_links:
$ref: '#/components/schemas/UserFactorLinks'
type: object
UserFactorVerifyResult:
description: Result of a Factor verification
enum:
- CHALLENGE
- ERROR
- EXPIRED
- FAILED
- PASSCODE_REPLAYED
- REJECTED
- SUCCESS
- TIMEOUT
- TIME_WINDOW_EXCEEDED
- WAITING
type: string
x-enumDescriptions:
CANCELED: User cancelled the verification
CHALLENGE: Okta issued a verification challenge
ERROR: Verification encountered an unexpected server error
EXPIRED: User didn't complete the verification within the allowed time window
FAILED: Verification failed
PASSCODE_REPLAYED: User previously verified the Factor within the same time
window. Another verification is required during another time window.
REJECTED: User rejected the verification
SUCCESS: User completed the verification
TIMEOUT: Okta didn't complete the verification within the allowed time window
TIME_WINDOW_EXCEEDED: User completed the verification outside of the allowed
time window. Another verification is required.
WAITING: Verification is in progress
UserFactorWeb:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorWebProfile'
type: object
title: web
UserFactorWebAuthn:
allOf:
- $ref: '#/components/schemas/UserFactor'
- properties:
profile:
$ref: '#/components/schemas/UserFactorWebAuthnProfile'
type: object
title: webauthn
UserFactorWebAuthnProfile:
properties:
authenticatorName:
description: Human-readable name of the authenticator
example: MacBook Touch ID
type: string
credentialId:
description: ID for the Factor credential
example: AHoOEhwvYiMv6SSwLp7KYRNttXtg_kYgQoQiEIWPFH_T3Ztp5Vj3bQ5H0LypIFR8ka8kfiCJ3I5qVpxrsd6JTMWKcE3xNh_U2QVF0Kwlan8Fiw
type: string
type: object
UserFactorWebProfile:
properties:
credentialId:
description: ID for the Factor credential
example: dade.murphy@example.com
type: string
type: object
UserFactorYubikeyOtpToken:
example:
lastUpdated: 2022-08-25T00:31:00Z
_embedded:
key: "{}"
_links:
cancel:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
question:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
qrcode:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
poll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
enroll:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
factor:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
send:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2022-08-25T00:31:00Z
profile:
key: "{}"
lastVerified: 2022-08-25T00:31:00Z
id: ykkwcx13nrDq8g4oy0g3
status: BLOCKED
properties:
created:
description: Timestamp when the Token was created
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
id:
description: ID of the Token
example: ykkwcx13nrDq8g4oy0g3
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Token was last updated
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
lastVerified:
description: Timestamp when the Token was last verified
example: 2022-08-25T00:31:00Z
format: date-time
readOnly: true
type: string
profile:
additionalProperties:
properties: {}
type: object
description: Specified profile information for token
type: object
status:
description: Token status
enum:
- BLOCKED
- UNASSIGNED
- ACTIVE
- REVOKED
- DELETED
- INACTIVE
type: string
_embedded:
additionalProperties:
properties: {}
type: object
type: object
_links:
$ref: '#/components/schemas/UserFactorLinks'
type: object
UserGetSingleton:
allOf:
- $ref: '#/components/schemas/User'
- properties:
_embedded:
$ref: '#/components/schemas/UserGetSingleton_allOf__embedded'
type: object
example:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
blocks:
- appliesTo: ANY_DEVICES
type: DEVICE_BASED
- appliesTo: ANY_DEVICES
type: DEVICE_BASED
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
UserIdentifierConditionEvaluatorPattern:
description: Used in the User Identifier Condition object. Specifies the details
of the patterns to match against.
properties:
matchType:
$ref: '#/components/schemas/UserIdentifierMatchType'
value:
description: The regular expression or simple match string
type: string
required:
- matchType
- value
type: object
UserIdentifierMatchType:
description: "The type of pattern. For regex, use `EXPRESSION`."
enum:
- CONTAINS
- EQUALS
- EXPRESSION
- STARTS_WITH
- SUFFIX
type: string
UserIdentifierPolicyRuleCondition:
description: Specifies a user identifier condition to match on
properties:
attribute:
description: The name of the profile attribute to match against. Only used
when type is `ATTRIBUTE`.
type: string
patterns:
items:
$ref: '#/components/schemas/UserIdentifierConditionEvaluatorPattern'
type: array
type:
$ref: '#/components/schemas/UserIdentifierType'
required:
- patterns
- type
type: object
UserIdentifierType:
description: "What to match against, either user ID or an attribute in the user's\
\ Okta profile."
enum:
- ATTRIBUTE
- IDENTIFIER
type: string
UserIdentityProviderLinkRequest:
example:
externalId: "121749775026145"
properties:
externalId:
description: Unique IdP-specific identifier for a User
example: "121749775026145"
type: string
type: object
UserImportRequest:
properties:
data:
$ref: '#/components/schemas/UserImportRequestData'
eventType:
description: The type of inline hook. The user import inline hook type is
`com.okta.import.transform`.
type: string
source:
description: The ID of the user import inline hook
type: string
type: object
UserImportRequestData:
properties:
action:
$ref: '#/components/schemas/UserImportRequestData_action'
appUser:
$ref: '#/components/schemas/UserImportRequestData_appUser'
context:
$ref: '#/components/schemas/UserImportRequestData_context'
user:
$ref: '#/components/schemas/UserImportRequestData_user'
type: object
UserImportResponse:
properties:
commands:
description: |-
The `commands` object is where you can provide commands to Okta. It is an array that allows you to send multiple commands.
Each array element needs to consist of a type-value pair.
items:
$ref: '#/components/schemas/UserImportResponse_commands_inner'
type: array
error:
$ref: '#/components/schemas/UserImportResponse_error'
type: object
UserLifecycleAttributePolicyRuleCondition:
properties:
attributeName:
type: string
matchingValue:
type: string
type: object
UserLockoutSettings:
example:
preventBruteForceLockoutFromUnknownDevices: false
properties:
preventBruteForceLockoutFromUnknownDevices:
default: false
description: Prevents brute-force lockout from unknown devices for the password
authenticator.
type: boolean
type: object
UserNextLogin:
enum:
- changePassword
type: string
UserPolicyRuleCondition:
description: Specifies a set of Users to be included or excluded
properties:
exclude:
description: Users to be excluded
items:
type: string
type: array
inactivity:
$ref: '#/components/schemas/InactivityPolicyRuleCondition'
include:
description: Users to be included
items:
type: string
type: array
lifecycleExpiration:
$ref: '#/components/schemas/LifecycleExpirationPolicyRuleCondition'
passwordExpiration:
$ref: '#/components/schemas/PasswordExpirationPolicyRuleCondition'
userLifecycleAttribute:
$ref: '#/components/schemas/UserLifecycleAttributePolicyRuleCondition'
type: object
UserProfile:
additionalProperties: true
description: |-
Specifies the default and custom profile properties for a user.
The default user profile is based on the [System for Cross-domain Identity Management: Core Schema](https://datatracker.ietf.org/doc/html/rfc7643).
The only permitted customizations of the default profile are to update permissions, change whether the `firstName` and `lastName` properties are nullable, and specify a [pattern](https://developer.okta.com/docs/reference/api/schemas/#login-pattern-validation) for `login`. You can use the Profile Editor in the Admin Console or the [Schemas API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UISchema/#tag/UISchema) to make schema modifications.
You can extend user profiles with custom properties. You must first add the custom property to the user profile schema before you reference it.
You can use the Profile Editor in the Admin console or the [Schemas API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UISchema/#tag/UISchema) to manage schema extensions.
Custom attributes can contain HTML tags. It's the client's responsibility to escape or encode this data before displaying it. Use [best-practices](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html) to prevent cross-site scripting.
example:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
properties:
city:
description: The city or locality of the User's address (`locality`)
maxLength: 128
nullable: true
type: string
costCenter:
description: Name of the cost center assigned to a user
nullable: true
type: string
countryCode:
description: "The country name component of the User's address (`country`).\
\ For validation, see [ISO 3166-1 alpha 2 \"short\" code format](https://datatracker.ietf.org/doc/html/draft-ietf-scim-core-schema-22#ref-ISO3166)."
maxLength: 2
nullable: true
type: string
department:
description: Name of the User's department
type: string
displayName:
description: Name of the User suitable for display to end users
nullable: true
type: string
division:
description: Name of the User's division
nullable: true
type: string
email:
description: "The primary email address of the user. For validation, see\
\ [RFC 5322 Section 3.2.3](https://datatracker.ietf.org/doc/html/rfc5322#section-3.2.3)."
format: email
maxLength: 100
minLength: 5
type: string
employeeNumber:
description: The organization or company assigned unique identifier for
the user
type: string
firstName:
description: Given name of the User (`givenName`)
maxLength: 50
minLength: 1
nullable: true
type: string
honorificPrefix:
description: "Honorific prefix(es) of the user, or title in most Western\
\ languages"
nullable: true
type: string
honorificSuffix:
description: Honorific suffix(es) of the User
nullable: true
type: string
lastName:
description: The family name of the User (`familyName`)
maxLength: 50
minLength: 1
nullable: true
type: string
locale:
description: |-
The User's default location for purposes of localizing items such as currency, date time format, numerical representations, and so on.
A locale value is a concatenation of the ISO 639-1 two-letter language code, an underscore, and the ISO 3166-1 two-letter country code. For example, en_US specifies the language English and country US. This value is `en_US` by default.
type: string
login:
description: |-
The unique identifier for the User (`username`). For validation, see [Login pattern validation](https://developer.okta.com/docs/reference/api/schemas/#login-pattern-validation).
Every user within your Okta org must have a unique identifier for a login. This constraint applies to all users you import from other systems or applications such as Active Directory. Your organization is the top-level namespace to mix and match logins from all your connected applications or directories. Careful consideration of naming conventions for your login identifier will make it easier to onboard new applications in the future.
Logins are not considered unique if they differ only in case and/or diacritical marks. If one of your users has a login of Isaac.Brock@example.com, there cannot be another user whose login is isaac.brock@example.com, nor isáàc.bröck@example.com.
Okta has a default ambiguous name resolution policy for usernames that include @-signs. (By default, usernames must be formatted as email addresses and thus always include @-signs. You can remove that restriction using either the Admin Console or the Schemas API (opens new window).) Users can sign in with their non-qualified short name (for example: isaac.brock with username isaac.brock@example.com) as long as the short name is still unique within the organization.
maxLength: 100
minLength: 5
type: string
manager:
description: The `displayName` of the User's manager
nullable: true
type: string
managerId:
description: The `id` of the User's manager
nullable: true
type: string
middleName:
description: The middle name of the user
nullable: true
type: string
mobilePhone:
description: The mobile phone number of the user
maxLength: 100
minLength: 0
nullable: true
type: string
nickName:
description: The casual way to address the User in real life
nullable: true
type: string
organization:
description: Name of the the User's organization
nullable: true
type: string
postalAddress:
description: Mailing address component of the User's address
maxLength: 4096
nullable: true
type: string
preferredLanguage:
description: "The User's preferred written or spoken language. For validation,\
\ see [RFC 7231 Section 5.3.5](https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.5)."
nullable: true
type: string
primaryPhone:
description: The primary phone number of the User such as a home number
maxLength: 100
minLength: 0
nullable: true
type: string
profileUrl:
description: "The URL of the User's online profile. For example, a web page.\
\ See [URL](https://datatracker.ietf.org/doc/html/rfc1808)."
nullable: true
type: string
secondEmail:
description: "The secondary email address of the User typically used for\
\ account recovery. For validation, see [RFC 5322 Section 3.2.3](https://datatracker.ietf.org/doc/html/rfc5322#section-3.2.3)."
format: email
maxLength: 100
minLength: 5
nullable: true
type: string
state:
description: The state or region component of the User's address (`region`)
maxLength: 128
nullable: true
type: string
streetAddress:
description: The full street address component of the User's address
maxLength: 1024
nullable: true
type: string
timezone:
description: The User's time zone
nullable: true
type: string
title:
description: "The User's title, such as Vice President"
nullable: true
type: string
userType:
description: "The property used to describe the organization-to-user relationship,\
\ such as employee or contractor"
nullable: true
type: string
zipCode:
description: The ZIP code or postal code component of the User's address
(`postalCode`)
maxLength: 50
nullable: true
type: string
type: object
UserProvisioningApplicationFeature:
allOf:
- $ref: '#/components/schemas/ApplicationFeature'
- type: object
- properties:
capabilities:
$ref: '#/components/schemas/CapabilitiesObject'
UserResourceHrefObject:
properties:
href:
description: Link URI
example: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7"
type: string
title:
description: Link name
example: SAML Jackson
type: string
type: object
UserRiskGetResponse:
discriminator:
mapping:
HIGH: '#/components/schemas/UserRiskLevelExists'
MEDIUM: '#/components/schemas/UserRiskLevelExists'
LOW: '#/components/schemas/UserRiskLevelExists'
NONE: '#/components/schemas/UserRiskLevelNone'
propertyName: riskLevel
properties:
riskLevel:
$ref: '#/components/schemas/UserRiskLevelAll'
_links:
$ref: '#/components/schemas/UserRiskGetResponse__links'
type: object
UserRiskLevelAll:
description: The risk level associated with the user
enum:
- HIGH
- LOW
- MEDIUM
- NONE
type: string
UserRiskLevelExists:
allOf:
- $ref: '#/components/schemas/UserRiskGetResponse'
- properties:
reason:
$ref: '#/components/schemas/UserRiskReason'
type: object
UserRiskLevelNone:
allOf:
- $ref: '#/components/schemas/UserRiskGetResponse'
UserRiskLevelPut:
description: The risk level associated with the user
enum:
- HIGH
- LOW
type: string
UserRiskPutResponse:
properties:
reason:
description: Describes the risk level for the user
example: Admin override risk
type: string
riskLevel:
$ref: '#/components/schemas/UserRiskLevelPut'
_links:
$ref: '#/components/schemas/UserRiskGetResponse__links'
type: object
UserRiskReason:
description: Describes the risk level for the user
example: Admin override risk
type: string
UserRiskRequest:
properties:
riskLevel:
description: The risk level associated with the user
enum:
- HIGH
- LOW
type: string
type: object
UserSchema:
example:
lastUpdated: lastUpdated
$schema: $schema
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: created
name: name
id: id
title: title
type: type
definitions: ""
properties: ""
properties:
$schema:
description: JSON Schema version identifier
readOnly: true
type: string
created:
description: Timestamp when the Schema was created
readOnly: true
type: string
definitions:
allOf:
- $ref: '#/components/schemas/UserSchemaDefinitions'
description: |-
User Profile subschemas
The Profile object for a User is defined by a composite Schema of base and custom properties using a JSON path to reference subschemas. The `#base` properties are defined and versioned by Okta, while `#custom` properties are extensible. Custom property names for the Profile object must be unique and can't conflict with a property name defined in the `#base` subschema.
id:
description: URI of User Schema
readOnly: true
type: string
lastUpdated:
description: Timestamp when the Schema was last updated
readOnly: true
type: string
name:
description: Name of the Schema
readOnly: true
type: string
properties:
allOf:
- $ref: '#/components/schemas/UserSchemaProperties'
description: User Object Properties
title:
description: User-defined display name for the Schema
type: string
type:
description: "Type of [root Schema](https://tools.ietf.org/html/draft-zyp-json-schema-04#section-3.4)"
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
UserSchemaAttribute:
properties:
description:
description: Description of the property
type: string
enum:
description: |-
Enumerated value of the property.
The value of the property is limited to one of the values specified in the enum definition. The list of values for the enum must consist of unique elements.
items:
description: TODO default missing array inner type to string
type: string
nullable: true
type: array
items:
$ref: '#/components/schemas/UserSchemaAttributeItems'
externalName:
description: |-
Name of the property as it exists in an external application
**NOTE**: When you add a custom property, only Identity Provider app user schemas require `externalName` to be
included in the request body. If an existing custom Identity Provider app user schema property has an empty
`externalName`, requests aren't allowed to update other properties until the `externalName` is defined.
type: string
externalNamespace:
description: Namespace from the external application
type: string
format:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeFormat'
description: Identifies the type of data represented by the string
master:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeMaster'
description: Identifies where the property is mastered
maxLength:
description: Maximum character length of a string property
nullable: true
type: integer
minLength:
description: Minimum character length of a string property
nullable: true
type: integer
mutability:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeMutabilityString'
description: Defines the mutability of the property
oneOf:
description: |-
Non-empty array of valid JSON schemas.
Okta only supports `oneOf` for specifying display names for an `enum`. Each schema has the following format:
```
{
"const": "enumValue",
"title": "display name"
}
```json
When `enum` is used in conjunction with `oneOf`, you must keep the set of enumerated values and their order.
```
{"enum": ["S","M","L","XL"],
"oneOf": [
{"const": "S", "title": "Small"},
{"const": "M", "title": "Medium"},
{"const": "L", "title": "Large"},
{"const": "XL", "title": "Extra Large"}
]
}
```json
The `oneOf` key is only supported in conjunction with `enum` and provides a mechanism to return a display name for the `enum` value.
items:
$ref: '#/components/schemas/UserSchemaAttributeEnum'
nullable: true
type: array
pattern:
description: "For `string` property types, specifies the regular expression\
\ used to validate the property"
type: string
permissions:
description: Access control permissions for the property
items:
$ref: '#/components/schemas/UserSchemaAttributePermission'
nullable: true
type: array
required:
description: Determines whether the property is required
nullable: true
type: boolean
scope:
$ref: '#/components/schemas/UserSchemaAttributeScope'
title:
description: User-defined display name for the property
minLength: 1
type: string
type:
allOf:
- $ref: '#/components/schemas/UserSchemaAttributeType'
description: Type of property
unique:
type: string
type: object
x-okta-allow-null-property-value-for-updates: true
UserSchemaAttributeEnum:
example:
const: const
title: title
properties:
const:
type: string
title:
type: string
type: object
UserSchemaAttributeFormat:
enum:
- country-code
- date-time
- email
- encrypted
- hashed
- language-code
- locale
- ref-id
- timezone
- uri
type: string
UserSchemaAttributeItems:
example:
oneOf:
- const: const
title: title
- const: const
title: title
type: type
enum:
- enum
- enum
properties:
enum:
items:
type: string
type: array
oneOf:
items:
$ref: '#/components/schemas/UserSchemaAttributeEnum'
type: array
type:
type: string
type: object
UserSchemaAttributeMaster:
nullable: true
properties:
priority:
items:
$ref: '#/components/schemas/UserSchemaAttributeMasterPriority'
type: array
type:
$ref: '#/components/schemas/UserSchemaAttributeMasterType'
type: object
UserSchemaAttributeMasterPriority:
properties:
type:
type: string
value:
type: string
type: object
UserSchemaAttributeMasterType:
enum:
- OKTA
- OVERRIDE
- PROFILE_MASTER
type: string
UserSchemaAttributeMutabilityString:
enum:
- IMMUTABLE
- READ_ONLY
- READ_WRITE
- WRITE_ONLY
type: string
UserSchemaAttributePermission:
example:
principal: principal
action: action
properties:
action:
description: Determines whether the principal can view or modify the property
type: string
principal:
description: Security principal
type: string
type: object
UserSchemaAttributeScope:
enum:
- NONE
- SELF
type: string
UserSchemaAttributeType:
enum:
- array
- boolean
- integer
- number
- string
type: string
UserSchemaBase:
description: |-
All Okta-defined Profile properties are defined in a Profile subschema with the resolution scope `#base`. You can't modify these properties, except to update permissions, to change the nullability of `firstName` and `lastName`, or to specify a pattern for `login`. They can't be removed.
The base User Profile is based on the [System for Cross-domain Identity Management: Core Schema](https://tools.ietf.org/html/draft-ietf-scim-core-schema-22#section-4.1.1) and has the standard properties detailed below.
properties:
id:
description: The subschema name
readOnly: true
type: string
properties:
allOf:
- $ref: '#/components/schemas/UserSchemaBaseProperties'
description: The `#base` object properties
required:
description: A collection indicating required property names
items:
type: string
readOnly: true
type: array
type:
description: The object type
readOnly: true
type: string
type: object
UserSchemaBaseProperties:
properties:
city:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: City or locality component of the User's address (`locality`)
costCenter:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Name of a cost center assigned to the User
countryCode:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "Country name component of the User's address (`country`.)\
\ This property uses [ISO 3166-1 alpha 2 \"short\" code format](https://tools.ietf.org/html/draft-ietf-scim-core-schema-22#ref-ISO3166)."
department:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Name of the User's department
displayName:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "Name of the User, suitable for display to end Users"
division:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Name of the User's division
email:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "Primary email address of the User. This property is formatted\
\ according to [RFC 5322 Section 3.2.3](https://datatracker.ietf.org/doc/html/rfc5322#section-3.2.3)."
employeeNumber:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Organization or company assigned unique identifier for the
User
firstName:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Given name of the User (`givenName`)
honorificPrefix:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Honorific prefix(es) of the User or title in most Western languages
honorificSuffix:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Honorific suffix(es) of the User
lastName:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Family name of the User (`familyName`)
locale:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: |-
User's default location for purposes of localizing items such as currency, date time format, numerical representations, and so on.
A locale value is a concatenation of the ISO 639-1 two-letter language code, an underscore, and the ISO 3166-1 two-letter country code. For example: `en_US` specifies the language English and country US. This value is `en_US` by default.
login:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: |-
Unique identifier for the User (`username`)
The login property is validated according to its pattern attribute, which is a string. By default, the attribute is null. When the attribute is null, the username is required to be formatted as an email address as defined by [RFC 6531 Section 3.3](http://tools.ietf.org/html/rfc6531#section-3.3). The pattern can be set through the API to one of the following forms. (The Admin Console provides access to the same forms.)
* A login pattern of `".+"` indicates that there is no restriction on usernames. Any non-empty, unique value is permitted, and the minimum length of five isn't enforced. In this case, usernames don't need to include the `@` character. If a name does include `@`, the portion ahead of the `@` can be used for logging in, provided it identifies a unique User within the org.
* A login pattern of the form `"[...]+"` indicates that usernames must only contain characters from the set given between the brackets. The enclosing brackets and final `+` are required for this form. Character ranges can be indicated using hyphens. To include the hyphen itself in the allowed set, the hyphen must appear first. Any characters in the set except the hyphen, a-z, A-Z, and 0-9 must be preceded by a backslash (`\`). For example, `"[a-z13579\.]+"` would restrict usernames to lowercase letters, odd digits, and periods, while `"[-a-zA-Z0-9]+"` would allow basic alphanumeric characters and hyphens.
manager:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: The `displayName` of the User's manager
managerId:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: The `id` of the User's manager
middleName:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Middle name(s) of the User
mobilePhone:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Mobile phone number of the User
nickName:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Casual way to address the User in real life
organization:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Name of the User's organization
postalAddress:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Mailing address component of the User's address
preferredLanguage:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "User's preferred written or spoken languages. This property\
\ is formatted according to [RFC 7231 Section 5.3.5](https://tools.ietf.org/html/rfc7231#section-5.3.5)."
primaryPhone:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "Primary phone number of the User, such as home number"
profileUrl:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "URL of the User's online Profile (for example, a web page.)\
\ This property is formatted according to the [Relative Uniform Resource\
\ Locators specification](https://tools.ietf.org/html/draft-ietf-scim-core-schema-22#ref-ISO3166)."
secondEmail:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "Secondary email address of the User typically used for account\
\ recovery. This property is formatted according to [RFC 5322 Section\
\ 3.2.3](https://datatracker.ietf.org/doc/html/rfc5322#section-3.2.3)."
state:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: State or region component of the User's address (`region`)
streetAddress:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: Full street address component of the User's address
timezone:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "User's time zone. This property is formatted according to\
\ the [IANA Time Zone database format](https://tools.ietf.org/html/rfc6557)."
title:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: "User's title, such as \"Vice President\""
userType:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: |-
Used to describe the organization to the User relationship such as "Employee" or "Contractor".
**Note:** The `userType` field is an arbitrary string value and isn't related to the newer [User Types](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/) feature.
zipCode:
allOf:
- $ref: '#/components/schemas/UserSchemaAttribute'
description: ZIP code or postal code component of the User's address (`postalCode`)
type: object
UserSchemaDefinitions:
properties:
base:
$ref: '#/components/schemas/UserSchemaBase'
custom:
$ref: '#/components/schemas/UserSchemaPublic'
type: object
UserSchemaProperties:
example:
profile:
allOf:
- $ref: $ref
- $ref: $ref
properties:
profile:
$ref: '#/components/schemas/UserSchemaPropertiesProfile'
type: object
UserSchemaPropertiesProfile:
example:
allOf:
- $ref: $ref
- $ref: $ref
properties:
allOf:
items:
$ref: '#/components/schemas/UserSchemaPropertiesProfileItem'
type: array
type: object
UserSchemaPropertiesProfileItem:
example:
$ref: $ref
properties:
$ref:
type: string
type: object
UserSchemaPublic:
description: All custom Profile properties are defined in a Profile subschema
with the resolution scope `#custom`
properties:
id:
description: The subschema name
readOnly: true
type: string
properties:
additionalProperties:
$ref: '#/components/schemas/UserSchemaAttribute'
description: The `#custom` object properties
type: object
required:
description: A collection indicating required property names
items:
type: string
readOnly: true
type: array
type:
description: The object type
readOnly: true
type: string
type: object
UserStatus:
description: |-
The current status of the user.
The status of a User changes in response to explicit events, such as admin-driven lifecycle changes, user login, or self-service password recovery. Okta doesn't asynchronously sweep through users and update their password expiry state, for example. Instead, Okta evaluates password policy at login time, notices the password has expired, and moves the User to the expired state. When running reports, remember that the data is valid as of the last login or lifecycle event for that user.
enum:
- ACTIVE
- DEPROVISIONED
- LOCKED_OUT
- PASSWORD_EXPIRED
- PROVISIONED
- RECOVERY
- STAGED
- SUSPENDED
readOnly: true
type: string
UserStatusPolicyRuleCondition:
properties:
value:
$ref: '#/components/schemas/PolicyUserStatus'
type: object
UserType:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
properties:
created:
description: A timestamp from when the User Type was created
format: date-time
readOnly: true
type: string
createdBy:
description: The user ID of the account that created the User Type
readOnly: true
type: string
default:
description: A boolean value to indicate if this is the default User Type
readOnly: true
type: boolean
description:
description: The human-readable description of the User Type
type: string
displayName:
description: The human-readable name of the User Type
type: string
id:
description: The unique key for the User Type
type: string
lastUpdated:
description: A timestamp from when the User Type was most recently updated
format: date-time
readOnly: true
type: string
lastUpdatedBy:
description: The user ID of the most recent account to edit the User Type
readOnly: true
type: string
name:
description: "The name of the User Type. The name must start with A-Z or\
\ a-z and contain only A-Z, a-z, 0-9, or underscore (_) characters. This\
\ value becomes read-only after creation and can't be updated."
type: string
_links:
$ref: '#/components/schemas/UserTypeLinks'
required:
- displayName
- name
type: object
UserTypeCondition:
description: Specifies which User Types
to include and/or exclude
properties:
exclude:
description: The User Types to exclude
items:
type: string
type: array
include:
description: The User Types to include
items:
type: string
type: array
required:
- exclude
- include
UserTypeLinks:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
schema:
$ref: '#/components/schemas/UserTypeLinks_allOf_schema'
type: object
example:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
UserTypePostRequest:
example:
displayName: displayName
description: description
properties:
description:
description: The updated human-readable description of the User Type
type: string
displayName:
description: The updated human-readable display name for the User Type
type: string
type: object
UserTypePutRequest:
example:
displayName: displayName
name: name
description: description
properties:
description:
description: The human-readable description of the User Type
type: string
displayName:
description: The human-readable name of the User Type
type: string
name:
description: The name of the existing type
type: string
required:
- description
- displayName
- name
type: object
UserVerificationEnum:
description: "User verification setting. Possible values `DISCOURAGED` (the\
\ authenticator isn't asked to perform user verification, but may do so at\
\ its discretion), `PREFERRED` (the client uses an authenticator capable of\
\ user verification if possible), or `REQUIRED`(the client uses only an authenticator\
\ capable of user verification)"
enum:
- DISCOURAGED
- PREFERRED
- REQUIRED
type: string
UsersLink:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Application Users](/openapi/okta-management/management/tag/ApplicationUsers/#tag/ApplicationUsers/operation/listApplicationUsers)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
VerificationMethod:
description: "Describes the method for verifying the user. The supported method\
\ types are `ASSURANCE` and `AUTH_METHOD_CHAIN`.\n\n The method type `AUTH_METHOD_CHAIN` is an [Early Access](https://developer.okta.com/docs/api/openapi/okta-management/guides/release-lifecycle/#early-access-ea)\
\ (Self-Service) feature. You can \nenable the feature for your org from the\
\ **Settings** > **Features** page in the Admin Console."
discriminator:
mapping:
ASSURANCE: '#/components/schemas/AssuranceMethod'
AUTH_METHOD_CHAIN: '#/components/schemas/AuthenticationMethodChainMethod'
propertyName: type
properties:
type:
$ref: '#/components/schemas/PolicyRuleVerificationMethodType'
type: object
Version:
description: "The version specified as a [Semantic Version](https://semver.org/)."
pattern: "^(0|[1-9]\\d*)\\.(0|[1-9]\\d*)\\.(0|[1-9]\\d*)(?:-((?:0|[1-9]\\d*|\\\
d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\\.(?:0|[1-9]\\d*|\\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\\\
+([0-9a-zA-Z-]+(?:\\.[0-9a-zA-Z-]+)*))?$"
type: string
WebAuthnAttachment:
description: Method attachment
enum:
- ANY
- BUILT_IN
- ROAMING
type: string
WebAuthnCredRequest:
description: "Credential request object for the initialized credential, along\
\ with the enrollment and key identifiers to associate with the credential"
example:
credRequestJwe: credRequestJwe
keyId: keyId
authenticatorEnrollmentId: authenticatorEnrollmentId
properties:
authenticatorEnrollmentId:
description: ID for a WebAuthn Preregistration Factor in Okta
type: string
credRequestJwe:
description: Encrypted JWE of credential request for the fulfillment provider
type: string
keyId:
description: ID for the Okta response key-pair used to encrypt and decrypt
credential requests and responses
type: string
type: object
WebAuthnCredResponse:
description: "Credential response object for enrolled credential details, along\
\ with enrollment and key identifiers to associate the credential"
example:
credResponseJWE: credResponseJWE
authenticatorEnrollmentId: authenticatorEnrollmentId
properties:
authenticatorEnrollmentId:
description: ID for a WebAuthn Preregistration Factor in Okta
type: string
credResponseJWE:
description: Encrypted JWE of credential response from the fulfillment provider
type: string
type: object
WebAuthnPreregistrationFactor:
description: User Factor variant used for WebAuthn Preregistration Factors
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
provider: CUSTOM
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile: "{}"
factorType: call
id: id
vendorName: OKTA
status: ACTIVE
properties:
created:
description: Timestamp indicating when the Factor was enrolled
format: date-time
readOnly: true
type: string
factorType:
$ref: '#/components/schemas/UserFactorType'
id:
description: ID of the Factor
readOnly: true
type: string
lastUpdated:
description: Timestamp indicating when the Factor was last updated
format: date-time
readOnly: true
type: string
profile:
description: Specific attributes related to the Factor
type: object
provider:
$ref: '#/components/schemas/UserFactorProvider'
status:
$ref: '#/components/schemas/UserFactorStatus'
vendorName:
description: Name of the Factor vendor. This is usually the same as the
provider.
example: OKTA
readOnly: true
type: string
_links:
$ref: '#/components/schemas/LinksSelf'
type: object
WellKnownAppAuthenticatorConfiguration:
example:
lastUpdated: 2000-01-23T04:56:07.000+00:00
settings:
userVerification: PREFERRED
createdDate: 2000-01-23T04:56:07.000+00:00
supportedMethods:
- settings:
algorithms:
- ES256
- ES256
transactionTypes:
- CIBA
- CIBA
keyProtection: ANY
type: push
status: ACTIVE
- settings:
algorithms:
- ES256
- ES256
transactionTypes:
- CIBA
- CIBA
keyProtection: ANY
type: push
status: ACTIVE
name: name
authenticatorId: authenticatorId
appAuthenticatorEnrollEndpoint: appAuthenticatorEnrollEndpoint
type: app
key: custom_app
orgId: orgId
properties:
appAuthenticatorEnrollEndpoint:
description: The authenticator enrollment endpoint
type: string
authenticatorId:
description: The unique identifier of the app authenticator
type: string
createdDate:
description: Timestamp when the Authenticator was created
format: date-time
type: string
key:
$ref: '#/components/schemas/AuthenticatorKeyEnum'
lastUpdated:
description: Timestamp when the Authenticator was last modified
format: date-time
type: string
name:
description: The authenticator display name
type: string
orgId:
description: The `id` of the Okta Org
type: string
settings:
$ref: '#/components/schemas/WellKnownAppAuthenticatorConfiguration_settings'
supportedMethods:
items:
$ref: '#/components/schemas/SupportedMethods'
type: array
type:
description: The type of Authenticator
enum:
- app
type: string
type: object
WellKnownOrgMetadata:
example:
pipeline: idx
settings:
analyticsCollectionEnabled: true
bugReportingEnabled: true
omEnabled: true
_links:
organization:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
alternate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
id: id
properties:
id:
description: The unique identifier of the Org
type: string
pipeline:
$ref: '#/components/schemas/PipelineType'
settings:
$ref: '#/components/schemas/WellKnownOrgMetadataSettings'
_links:
$ref: '#/components/schemas/WellKnownOrgMetadata__links'
type: object
WellKnownOrgMetadataSettings:
example:
analyticsCollectionEnabled: true
bugReportingEnabled: true
omEnabled: true
properties:
analyticsCollectionEnabled:
type: boolean
bugReportingEnabled:
type: boolean
omEnabled:
description: Whether the legacy Okta Mobile application is enabled for the
org
type: boolean
type: object
WellKnownSSFMetadata:
description: Metadata about Okta as a transmitter and relevant information for
configuration.
example:
configuration_endpoint: "https://{yourOktaDomain}/api/v1/ssf/stream"
delivery_methods_supported:
- https://schemas.openid.net/secevent/risc/delivery-method/push
- urn:ietf:rfc:8935
jwks_uri: "https://{yourOktaDomain}/oauth2/v1/keys"
issuer: "https://{yourOktaDomain}"
properties:
configuration_endpoint:
description: The URL of the SSF Stream configuration endpoint
example: "https://{yourOktaDomain}/api/v1/ssf/stream"
format: uri
type: string
delivery_methods_supported:
description: An array of supported SET delivery methods
example:
- https://schemas.openid.net/secevent/risc/delivery-method/push
- urn:ietf:rfc:8935
items:
format: uri
type: string
type: array
issuer:
description: The issuer used in Security Event Tokens. This value is set
as `iss` in the claim.
example: "https://{yourOktaDomain}"
type: string
jwks_uri:
description: The URL of the JSON Web Key Set (JWKS) that contains the signing
keys for validating the signatures of Security Event Tokens (SETs)
example: "https://{yourOktaDomain}/oauth2/v1/keys"
format: uri
type: string
title: Shared Signals Framework Metadata
type: object
WidgetGeneration:
description: The generation of the Sign-in Widget
enum:
- G2
- G3
type: string
WsFederationApplication:
allOf:
- $ref: '#/components/schemas/Application'
- properties:
credentials:
$ref: '#/components/schemas/ApplicationCredentials'
name:
description: '`template_wsfed` is the key name for a WS-Federated app
instance with a SAML 2.0 token'
enum:
- template_wsfed
type: string
settings:
$ref: '#/components/schemas/WsFederationApplicationSettings'
required:
- name
- settings
type: object
x-okta-defined-as:
name: template_wsfed
WsFederationApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- properties:
app:
$ref: '#/components/schemas/WsFederationApplicationSettingsApplication'
type: object
WsFederationApplicationSettingsApplication:
properties:
attributeStatements:
description: "You can federate user attributes such as Okta profile fields,\
\ LDAP, Active Directory, and Workday values. The SP uses the federated\
\ WS-Fed attribute values accordingly."
type: string
audienceRestriction:
description: The entity ID of the SP. Use the entity ID value exactly as
provided by the SP.
type: string
authnContextClassRef:
description: Identifies the SAML authentication context class for the assertion's
authentication statement
type: string
groupFilter:
description: "A regular expression that filters for the User Groups you\
\ want included with the `groupName` attribute. If the matching User Group\
\ has a corresponding AD group, then the attribute statement includes\
\ the value of the attribute specified by `groupValueFormat`. If the matching\
\ User Group doesn't contain a corresponding AD group, then the `groupName`\
\ is used in the attribute statement."
type: string
groupName:
description: The group name to include in the WS-Fed response attribute
statement. This property is used in conjunction with the `groupFilter`
property. Groups that are filtered through the `groupFilter` expression
are included with the `groupName` in the attribute statement. Any users
that belong to the group you've filtered are included in the WS-Fed response
attribute statement.
type: string
groupValueFormat:
description: Specifies the WS-Fed assertion attribute value for filtered
groups. This attribute is only applied to Active Directory groups.
enum:
- windowsDomainQualifiedName
- samAccountName
- dn
type: string
nameIDFormat:
description: The username format that you send in the WS-Fed response
type: string
realm:
description: "The uniform resource identifier (URI) of the WS-Fed app that's\
\ used to share resources securely within a domain. It's the identity\
\ that's sent to the Okta IdP when signing in. See [Realm name](https://help.okta.com/okta_help.htm?type=oie&id=ext_Apps_Configure_Okta_Template_WS_Federation#Realm)."
type: string
siteURL:
description: Launch URL for the web app
type: string
usernameAttribute:
description: Specifies additional username attribute statements to include
in the WS-Fed assertion
enum:
- username
- upn
- upnAndUsername
- none
type: string
wReplyOverride:
description: Enables a web app to override the `wReplyURL` URL with a reply
parameter.
type: boolean
wReplyURL:
description: The WS-Fed SP endpoint where your users sign in
example: http://test.acme.com/example-post-sign/
type: string
required:
- audienceRestriction
- authnContextClassRef
- groupValueFormat
- nameIDFormat
- siteURL
- usernameAttribute
- wReplyURL
type: object
X5c:
description: Base64-encoded X.509 certificate chain with DER encoding
items:
example: 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
type: string
type: array
ZoomUsApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- zoomus
example: zoomus
type: string
signOnMode:
enum:
- SAML_2_0
type: string
settings:
$ref: '#/components/schemas/ZoomUsApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Zoom app (key name: `zoomus`)
To create a Zoom app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Zoom app only supports `SAML_2_0` sign-on mode.
example:
name: zoomus
label: Sample Zoom App
signOnMode: SAML_2_0
settings:
app:
subDomain: my-zoom-subdomain
title: Zoom
x-tags:
- Application
x-okta-defined-as:
name: zoomus
ZoomUsApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/ZoomUsApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
ZoomUsApplicationSettingsApplication:
description: Zoom app instance properties
properties:
subDomain:
description: Your Zoom subdomain
type: string
required:
- subDomain
type: object
ZscalerbyzApplication:
allOf:
- $ref: '#/components/schemas/OINApplication'
- type: object
- properties:
name:
enum:
- zscalerbyz
example: zscalerbyz
type: string
signOnMode:
enum:
- BROWSER_PLUGIN
- SAML_2_0
type: string
settings:
$ref: '#/components/schemas/ZscalerbyzApplicationSettings'
required:
- label
- name
- settings
description: |
Schema for the Zscaler 2.0 app (key name: `zscalerbyz`)
To create a Zscaler 2.0 app, use the [Create an Application](/openapi/okta-management/management/tag/Application/#tag/Application/operation/createApplication) request with the following parameters in the request body.
> **Note:** The Zscaler 2.0 app only supports `BROWSER_PLUGIN` and `SAML_2_0` sign-on modes.
example:
name: zscalerbyz
label: Sample Zscaler 2.0 App
signOnMode: SAML_2_0
title: Zscaler 2.0
x-tags:
- Application
x-okta-defined-as:
name: zscalerbyz
ZscalerbyzApplicationSettings:
allOf:
- $ref: '#/components/schemas/ApplicationSettings'
- type: object
- properties:
app:
$ref: '#/components/schemas/ZscalerbyzApplicationSettingsApplication'
signOn:
$ref: '#/components/schemas/OINSaml20ApplicationSettingsSignOn'
required:
- app
ZscalerbyzApplicationSettingsApplication:
description: Zscaler app instance properties
properties:
siteDomain:
description: Your Zscaler domain
type: string
type: object
_embedded:
description: The Public Key Details are defined in the `_embedded` property
of the Key object.
example:
kty: kty
e: e
use: use
kid: kid
alg: alg
"n": "n"
properties:
alg:
description: Algorithm used in the key
nullable: false
readOnly: true
type: string
e:
description: RSA key value (exponent) for key binding
nullable: false
readOnly: true
type: string
kid:
description: Unique identifier for the certificate
nullable: false
readOnly: true
type: string
uniqueItems: true
kty:
description: Cryptographic algorithm family for the certificate's keypair
nullable: false
readOnly: true
type: string
"n":
description: RSA key value (modulus) for key binding
nullable: false
readOnly: true
type: string
use:
description: Acceptable use of the certificate
nullable: true
readOnly: true
type: string
type: object
appLink:
properties:
login:
$ref: '#/components/schemas/HrefObjectAppLink'
logo:
$ref: '#/components/schemas/HrefObjectLogoLink'
readOnly: true
type: object
createdProperty:
description: Timestamp when the object was created
example: 2017-03-28T01:11:10Z
format: date-time
readOnly: true
type: string
enabledPagesType:
enum:
- SIGN_IN
- SSPR
- SSR
title: enabledPages
type: string
x-enumDescriptions:
SIGN_IN: User sign-in page
SSPR: Self-service Password Recovery page
SSR: Self-service Registration page
lastUpdatedProperty:
description: Timestamp when the object was last updated
format: date-time
readOnly: true
type: string
orgBillingContactType:
description: Org billing contact
properties:
contactType:
$ref: '#/components/schemas/OrgContactType'
_links:
$ref: '#/components/schemas/orgBillingContactType__links'
type: object
orgGeneralSettingLinks:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the org using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
example:
preferences:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
oktaCommunication:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
uploadLogo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
oktaSupport:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
contacts:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
contacts:
$ref: '#/components/schemas/orgGeneralSettingLinks_contacts'
logo:
$ref: '#/components/schemas/orgGeneralSettingLinks_logo'
oktaCommunication:
$ref: '#/components/schemas/orgGeneralSettingLinks_oktaCommunication'
oktaSupport:
$ref: '#/components/schemas/orgGeneralSettingLinks_oktaSupport'
preferences:
$ref: '#/components/schemas/orgGeneralSettingLinks_preferences'
uploadLogo:
$ref: '#/components/schemas/orgGeneralSettingLinks_uploadLogo'
readOnly: true
type: object
orgTechnicalContactType:
description: Org technical contact
properties:
contactType:
$ref: '#/components/schemas/OrgContactType'
_links:
$ref: '#/components/schemas/orgTechnicalContactType__links'
type: object
postAPIServiceIntegrationInstance:
allOf:
- $ref: '#/components/schemas/APIServiceIntegrationInstance'
- properties:
clientSecret:
description: The client secret for the API Service Integration instance.
This property is only returned in a POST response.
readOnly: true
type: string
type: object
example:
createdAt: 2023-02-21T20:08:24.000Z
grantedScopes:
- okta.logs.read
createdBy: 00uu3u0ujW1P6AfZC2d5
_links:
client:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
name: My App Cloud Identity Engine
clientSecret: clientSecret
id: 0oa72lrepvp4WqEET1d9
type: my_app_cie
configGuideUrl: "https://{docDomain}/my-app-cie/configuration-guide"
postAPIServiceIntegrationInstanceRequest:
properties:
grantedScopes:
description: "The list of Okta management scopes granted to the API Service\
\ Integration instance. See [Okta management OAuth 2.0 scopes](/oauth2/#okta-admin-management)."
example:
- okta.logs.read
items:
type: string
type: array
type:
description: "The type of the API service integration. This string is an\
\ underscore-concatenated, lowercased API service integration name. For\
\ example, `my_api_log_integration`."
example: my_app_cie
type: string
required:
- grantedScopes
- type
type: object
profile:
additionalProperties:
properties: {}
type: object
description: Specific profile properties for the privileged account
readOnly: true
type: object
subject:
nullable: false
properties:
format:
description: The user identifier
enum:
- opaque
nullable: false
type: string
writeOnly: true
id:
description: ID of the user
nullable: false
type: string
writeOnly: true
type: object
userLink:
properties:
user:
$ref: '#/components/schemas/HrefObjectUserLink'
type: object
schemas-JsonWebKey:
description: "A [JSON Web Key (JWK)](https://tools.ietf.org/html/rfc7517) is\
\ a JSON representation of a cryptographic key. Okta can use these keys to\
\ verify the signature of a JWT when provided for the `private_key_jwt` client\
\ authentication method or for a signed authorize request object. Okta supports\
\ both RSA and Elliptic Curve (EC) keys."
discriminator:
mapping:
EC: '#/components/schemas/JsonWebKeyEC'
RSA: '#/components/schemas/JsonWebKeyRsa'
propertyName: kty
properties:
alg:
$ref: '#/components/schemas/SigningAlgorithm'
kid:
description: The unique identifier of the key
type: string
kty:
$ref: '#/components/schemas/JsonWebKeyType'
status:
$ref: '#/components/schemas/JsonWebKeyStatus'
use:
$ref: '#/components/schemas/JsonWebKeyUse'
type: object
JsonWebKeyEC:
allOf:
- $ref: '#/components/schemas/schemas-JsonWebKey'
- properties:
x:
description: The public x coordinate for the elliptic curve point
type: string
"y":
description: The public y coordinate for the elliptic curve point
type: string
type: object
JsonWebKeyRsa:
allOf:
- $ref: '#/components/schemas/schemas-JsonWebKey'
- properties:
e:
description: The key exponent of a RSA key
type: string
"n":
description: The modulus of the RSA key
type: string
type: object
JsonWebKeyType:
description: The type of public key
enum:
- EC
- RSA
type: string
JsonWebKeyStatus:
description: The status of the public key
enum:
- ACTIVE
- INACTIVE
type: string
JsonWebKeyUse:
description: The intended use of the public key
enum:
- enc
- sig
type: string
updateDefaultProvisioningConnectionForApplication_request:
oneOf:
- $ref: '#/components/schemas/ProvisioningConnectionTokenRequest'
- $ref: '#/components/schemas/ProvisioningConnectionOauthRequest'
updateFeatureForApplication_request:
oneOf:
- $ref: '#/components/schemas/CapabilitiesObject'
- $ref: '#/components/schemas/CapabilitiesInboundProvisioningObject'
uploadApplicationLogo_request:
properties:
file:
description: |
The image file containing the logo.
The file must be in PNG, JPG, SVG, or GIF format, and less than one MB in size.
For best results, use an image with a transparent background and a square dimension of 200 x 200 pixels to prevent upscaling.
format: binary
type: string
required:
- file
type: object
uploadBrandThemeBackgroundImage_request:
description: "The file must be in PNG, JPG, or GIF format and less than 2 MB\
\ in size."
properties:
file:
format: binary
type: string
required:
- file
type: object
uploadBrandThemeFavicon_request:
description: The file must be in PNG or ICO format and have a 1:1 ratio with
a maximum dimension of 512 x 512
properties:
file:
format: binary
type: string
required:
- file
type: object
uploadBrandThemeLogo_request:
description: "The file must be in PNG, JPG, or GIF format and less than 100kB\
\ in size. For best results use landscape orientation, a transparent background,\
\ and a minimum size of 300px by 50px to prevent upscaling."
properties:
file:
format: binary
type: string
required:
- file
type: object
addGroup_request:
properties:
profile:
$ref: '#/components/schemas/OktaUserGroupProfile'
listGroupAssignedRoles_200_response_inner:
oneOf:
- $ref: '#/components/schemas/StandardRole'
- $ref: '#/components/schemas/CustomRole'
assignRoleToGroup_request:
oneOf:
- $ref: '#/components/schemas/StandardRoleAssignmentSchema'
- $ref: '#/components/schemas/CustomRoleAssignmentSchema'
uploadYubikeyOtpTokenSeed_request:
properties:
serialNumber:
description: The unique identifier assigned to each YubiKey device
type: string
publicId:
description: The Yubikey's public ID
type: string
privateId:
description: The Yubikey's private ID
type: string
aesKey:
description: The cryptographic key used in the AES algorithm to encrypt
and decrypt YubiKey OTP
type: string
type: object
uploadOrgLogo_request:
properties:
file:
description: "The file must be in PNG, JPG, or GIF format and less than\
\ 1 MB in size. For best results use landscape orientation, a transparent\
\ background, and a minimum size of 420px by 120px to prevent upscaling."
format: binary
type: string
required:
- file
type: object
listSubscriptionsRole_roleRef_parameter:
oneOf:
- $ref: '#/components/schemas/RoleType'
- title: roleId
type: string
getSsfStreams_200_response:
oneOf:
- items:
$ref: '#/components/schemas/StreamConfiguration'
title: List of Stream Configurations
type: array
- $ref: '#/components/schemas/StreamConfiguration'
assignRoleToUser_request:
oneOf:
- $ref: '#/components/schemas/StandardRoleAssignmentSchema'
- $ref: '#/components/schemas/CustomRoleAssignmentSchema'
type: object
assignRoleToUser_201_response:
oneOf:
- $ref: '#/components/schemas/StandardRole'
- $ref: '#/components/schemas/CustomRole'
type: object
ApiToken_network:
description: The Network Condition of the API Token
example:
include:
- include
- include
connection: connection
exclude:
- exclude
- exclude
properties:
connection:
description: The connection type of the Network Condition
type: string
include:
description: List of included IP network zones
items:
type: string
type: array
exclude:
description: List of excluded IP network zones
items:
type: string
type: array
type: object
AppCustomHrefObject_hints:
description: Describes allowed HTTP verbs for the `href`
properties:
allow:
items:
type: string
type: array
type: object
Application__embedded:
description: "Embedded resources related to the app using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. If the `expand=user/{userId}` query parameter is specified,\
\ then the assigned [Application User](/openapi/okta-management/management/tag/ApplicationUsers/)\
\ is embedded."
example:
user:
key: "{}"
properties:
user:
additionalProperties:
properties: {}
type: object
description: "The specified [Application User](/openapi/okta-management/management/tag/ApplicationUsers/)\
\ assigned to the app"
type: object
readOnly: true
type: object
ApplicationFeature__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- readOnly: true
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ApplicationGroupAssignment__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
app:
$ref: '#/components/schemas/HrefObjectAppLink'
group:
$ref: '#/components/schemas/HrefObjectGroupLink'
type: object
example:
app:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
group:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ApplicationLayout_rule:
properties:
effect:
type: string
condition:
$ref: '#/components/schemas/ApplicationLayoutRuleCondition'
type: object
ApplicationLayouts__links:
properties:
general:
items:
$ref: '#/components/schemas/HrefObject'
type: array
signOn:
items:
$ref: '#/components/schemas/HrefObject'
type: array
provisioning:
items:
$ref: '#/components/schemas/HrefObject'
type: array
readOnly: true
type: object
AuthServerLinks_allOf_claims:
allOf:
- description: Link to the authorization server claims
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthServerLinks_allOf_policies:
allOf:
- description: Link to the authorization server policies
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthServerLinks_allOf_rotateKey:
allOf:
- description: Link to the authorization server key rotation
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthServerLinks_allOf_scopes:
allOf:
- description: Link to the authorization server scopes
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthenticatorEnrollmentPolicyAuthenticatorSettings_constraints:
description: Constraints for the authenticator
minimum: 0
nullable: true
properties:
aaguidGroups:
description: The list of FIDO2 WebAuthn authenticator groups allowed for
enrollment
items:
type: string
uniqueItems: true
type: array
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
AuthenticatorEnrollmentPolicyAuthenticatorSettings_enroll:
description: Enrollment requirements for the authenticator
properties:
self:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyAuthenticatorStatus'
type: object
AuthenticatorEnrollmentPolicyConditions_allOf_people_groups:
description: Specifies a set of Groups whose Users are to be included or excluded
properties:
include:
description: Groups to be included
items:
type: string
type: array
type: object
AuthenticatorEnrollmentPolicyConditions_allOf_people:
description: Identifies Users and Groups that are used together
properties:
groups:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyConditions_allOf_people_groups'
type: object
AuthenticatorEnrollmentPolicyRuleConditions_people_users:
description: Specifies a set of Users to be included or excluded
properties:
exclude:
description: Users to be excluded
items:
type: string
type: array
type: object
AuthenticatorEnrollmentPolicyRuleConditions_people:
description: Identifies Users and Groups that are used together
properties:
users:
$ref: '#/components/schemas/AuthenticatorEnrollmentPolicyRuleConditions_people_users'
type: object
AuthenticatorKeyCustomApp_allOf_provider_configuration_apns:
properties:
id:
description: "ID of the APNs (Apple Push Notification Service) [configurations](https://developer.okta.com/docs/reference/api/push-providers/)"
type: string
appBundleId:
description: "AppBundleId of the APNs (Apple Push Notification Service)\
\ [configurations](https://developer.okta.com/docs/reference/api/push-providers/)"
type: string
debugAppBundleId:
description: "DebugAppBundleId of the APNs (Apple Push Notification Service)\
\ [configurations](https://developer.okta.com/docs/reference/api/push-providers/)"
type: string
type: object
AuthenticatorKeyCustomApp_allOf_provider_configuration_fcm:
properties:
id:
description: "ID of the FCM (Firebase Cloud Messaging Service) [configurations](https://developer.okta.com/docs/reference/api/push-providers/)"
type: string
type: object
AuthenticatorKeyCustomApp_allOf_provider_configuration:
description: The configuration of the provider
properties:
apns:
$ref: '#/components/schemas/AuthenticatorKeyCustomApp_allOf_provider_configuration_apns'
fcm:
$ref: '#/components/schemas/AuthenticatorKeyCustomApp_allOf_provider_configuration_fcm'
type: object
AuthenticatorKeyCustomApp_allOf_provider:
properties:
type:
description: Provider type
enum:
- PUSH
type: string
configuration:
$ref: '#/components/schemas/AuthenticatorKeyCustomApp_allOf_provider_configuration'
type: object
AuthenticatorKeyCustomApp_allOf_settings:
properties:
userVerification:
$ref: '#/components/schemas/CustomAppUserVerificationEnum'
appInstanceId:
description: "The application instance ID. For custom_app, you need to create\
\ an OIDC native app using the [Apps API](https://developer.okta.com/docs/reference/api/apps/)\
\ with `Authorization Code` and `Refresh Token` grant types. You can leave\
\ both `Sign-in redirect URIs` and `Sign-out redirect URIs` as the default\
\ values."
type: string
type: object
AuthenticatorKeyDuo_allOf_provider_configuration_userNameTemplate:
properties:
template:
description: The Duo Security user template name
type: string
type: object
AuthenticatorKeyDuo_allOf_provider_configuration:
properties:
host:
description: The Duo Security API hostname
type: string
integrationKey:
description: The Duo Security integration key
type: string
secretKey:
description: The Duo Security secret key
type: string
userNameTemplate:
$ref: '#/components/schemas/AuthenticatorKeyDuo_allOf_provider_configuration_userNameTemplate'
type: object
AuthenticatorKeyDuo_allOf_provider:
properties:
type:
description: Provider type
enum:
- DUO
type: string
configuration:
$ref: '#/components/schemas/AuthenticatorKeyDuo_allOf_provider_configuration'
type: object
AuthenticatorKeyEmail_allOf_settings:
properties:
allowedFor:
$ref: '#/components/schemas/AllowedForEnum'
tokenLifetimeInMinutes:
default: 5
description: Specifies the lifetime of an email token. Default value is
5 minutes.
type: number
type: object
AuthenticatorKeyOktaVerify_allOf_settings:
properties:
channelBinding:
$ref: '#/components/schemas/ChannelBinding'
compliance:
$ref: '#/components/schemas/Compliance'
userVerification:
$ref: '#/components/schemas/UserVerificationEnum'
appInstanceId:
description: The application instance ID
type: string
type: object
AuthenticatorKeyPhone_allOf_settings:
properties:
allowedFor:
$ref: '#/components/schemas/AllowedForEnum'
type: object
AuthenticatorMethodPush_allOf_settings:
properties:
algorithms:
items:
$ref: '#/components/schemas/AuthenticatorMethodAlgorithm'
type: array
keyProtection:
$ref: '#/components/schemas/PushMethodKeyProtection'
transactionTypes:
items:
$ref: '#/components/schemas/AuthenticatorMethodTransactionType'
type: array
type: object
AuthenticatorMethodSignedNonce_allOf_settings:
properties:
algorithms:
items:
$ref: '#/components/schemas/AuthenticatorMethodAlgorithm'
type: array
keyProtection:
$ref: '#/components/schemas/PushMethodKeyProtection'
showSignInWithOV:
$ref: '#/components/schemas/ShowSignInWithOV'
type: object
AuthenticatorMethodTotp_allOf_settings:
properties:
timeIntervalInSeconds:
description: Time interval for TOTP in seconds
type: integer
encoding:
$ref: '#/components/schemas/OtpTotpEncoding'
algorithm:
$ref: '#/components/schemas/OtpTotpAlgorithm'
passCodeLength:
description: Number of digits in an OTP value
maximum: 10
minimum: 6
multipleOf: 2
type: integer
type: object
AuthenticatorMethodWebAuthn_allOf_settings:
properties:
aaguidGroups:
description: The FIDO2 AAGUID groups
available to the WebAuthn authenticator
items:
$ref: '#/components/schemas/AAGUIDGroupObject'
type: array
userVerification:
$ref: '#/components/schemas/UserVerificationEnum'
attachment:
$ref: '#/components/schemas/WebAuthnAttachment'
type: object
AuthorizationServerPolicy_allOf__links_allOf_rules:
allOf:
- description: Link to the authorization server policy's rules
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
AuthorizationServerPolicy_allOf__links:
allOf:
- $ref: '#/components/schemas/LinksSelfAndLifecycle'
- properties:
rules:
$ref: '#/components/schemas/AuthorizationServerPolicy_allOf__links_allOf_rules'
type: object
example:
activate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
rules:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
BaseContext_session:
description: Details of the user session
properties:
id:
description: The unique identifier for the user's session
example: 102LN9Bnuc4S_ewfc9BYwageA
type: string
userId:
description: The unique identifier for the user
example: 00uq8tMo3zV0OfJON0g3
type: string
login:
description: The username used to identify the user. This is often the user's
email address.
example: user@example.com
type: string
createdAt:
description: Timestamp of when the session was created
example: 2019-03-28T16:45:55Z
format: date-time
type: string
expiresAt:
description: Timestamp of when the session expires
example: 2019-03-28T21:15:23Z
format: date-time
type: string
status:
description: Represents the current status of the user's session
example: ACTIVE
type: string
lastPasswordVerification:
description: Timestamp of when the user was last authenticated
example: 2019-03-28T16:45:55Z
format: date-time
type: string
amr:
description: The authentication method reference
items:
example: "[\"PASSWORD\"]"
type: string
type: array
idp:
$ref: '#/components/schemas/SessionIdentityProvider'
mfaActive:
description: Describes whether multifactor authentication was enabled
example: false
type: boolean
type: object
BaseContext_user_profile:
properties:
login:
description: The username used to identify the user. This is often the user's
email address.
example: user@example.com
type: string
firstName:
description: The first name of the user
example: John
type: string
lastName:
description: The last name of the user
example: Smith
type: string
locale:
description: |-
The user's default location for purposes of localizing items such as currency, date time format, numerical representations, and so on.
A locale value is a concatenation of the [ISO 639-1](https://en.wikipedia.org/wiki/List_of_ISO_639_language_codes) two-letter language code, an underscore, and the [ISO 3166-1](https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2) two-letter country code. For example, `en_US` specifies the language English and country US. This value is `en_US` by default.
example: en_US
type: string
timeZone:
description: The user's timezone
example: America/Los_Angeles
type: string
type: object
BaseContext_user__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of the user. These links are used to discover\
\ what groups the user is a part of and what factors they have enrolled."
properties:
groups:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to retrieve the individual user's group memberships
factors:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to retrieve individual user's factor enrollments
type: object
BaseContext_user:
description: Identifies the Okta user that the token was generated to authenticate
and provides details of their Okta user profile
properties:
id:
description: The unique identifier for the user
example: 00uq8tMo3zV0OfJON0g3
type: string
passwordChanged:
description: The timestamp when the user's password was last updated
example: 2018-09-11T23:19:12Z
format: date-time
type: string
profile:
$ref: '#/components/schemas/BaseContext_user_profile'
_links:
$ref: '#/components/schemas/BaseContext_user__links'
type: object
BaseToken_lifetime:
description: Lifetime of the token
properties:
expiration:
description: Time in seconds until the token expires
type: integer
type: object
BulkUpsertRequestBody_profiles_inner:
example:
profile:
firstName: firstName
lastName: lastName
mobilePhone: mobilePhone
secondEmail: secondEmail
userName: userName
email: email
homeAddress: homeAddress
externalId: externalId
properties:
externalId:
description: The external ID of the entity that needs to be created or updated
in Okta
maxLength: 512
type: string
profile:
$ref: '#/components/schemas/IdentitySourceUserProfileForUpsert'
type: object
BundleEntitlement__links:
allOf:
- properties:
values:
$ref: '#/components/schemas/HrefObject'
BundleEntitlementsResponse__links_next:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the next resource
BundleEntitlementsResponse__links_bundle:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the bundle resource
BundleEntitlementsResponse__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
properties:
next:
$ref: '#/components/schemas/BundleEntitlementsResponse__links_next'
self:
$ref: '#/components/schemas/HrefObjectSelfLink'
bundle:
$ref: '#/components/schemas/BundleEntitlementsResponse__links_bundle'
readOnly: true
type: object
CaepDeviceComplianceChangeEvent_reason_admin:
allOf:
- $ref: '#/components/schemas/SecurityEventReason'
- description: A localized administrative message intended for logging and auditing.
Either
`reason_admin` or `reason_user` is required.
type: object
CaepDeviceComplianceChangeEvent_reason_user:
allOf:
- $ref: '#/components/schemas/SecurityEventReason'
- description: A localized message intended for the end user.
Either `reason_admin`
or `reason_user` is required.
type: object
CreateUserRequest_type:
description: |-
The ID of the User type. Add this value if you want to create a User with a non-default [User Type](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/UserType/).
The User Type determines which [schema](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/Schema/) applies to that user. After a User has been created, the User can
only be assigned a different User Type by an administrator through a full replacement (`PUT`) operation.
example:
id: id
properties:
id:
description: The ID of the User Type
type: string
type: object
DeviceAssuranceAndroidPlatform_allOf_diskEncryptionType:
properties:
include:
items:
$ref: '#/components/schemas/DiskEncryptionTypeAndroid'
type: array
type: object
DeviceAssuranceAndroidPlatform_allOf_screenLockType:
properties:
include:
items:
$ref: '#/components/schemas/ScreenLockType'
type: array
type: object
DeviceAssuranceChromeOSPlatform_allOf_thirdPartySignalProviders:
description: Settings for third-party signal providers (based on the `CHROMEOS`
platform)
properties:
dtc:
$ref: '#/components/schemas/DTCChromeOS'
type: object
DeviceAssuranceMacOSPlatform_allOf_diskEncryptionType:
properties:
include:
items:
$ref: '#/components/schemas/DiskEncryptionTypeDesktop'
type: array
type: object
DeviceAssuranceMacOSPlatform_allOf_thirdPartySignalProviders:
description: Settings for third-party signal providers (based on the `MACOS`
platform)
properties:
dtc:
$ref: '#/components/schemas/DTCMacOS'
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceAssuranceWindowsPlatform_allOf_thirdPartySignalProviders:
description: Settings for third-party signal providers (based on the `WINDOWS`
platform)
properties:
dtc:
$ref: '#/components/schemas/DTCWindows'
type: object
x-okta-lifecycle:
lifecycle: GA
isGenerallyAvailable: false
SKUs: []
DeviceList_allOf__embedded:
description: List of associated users for the device if the `expand=user` query
parameter is specified in the request. Use `expand=userSummary` to get only
a summary of each associated user for the device.
example:
users:
- managementStatus: MANAGED
created: created
screenLockType: NONE
user:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
- managementStatus: MANAGED
created: created
screenLockType: NONE
user:
lastLogin: 2000-01-23T04:56:07.000+00:00
transitioningToStatus: null
realmId: guo1bfiNtSnZYILxO0g4
credentials:
password:
hook:
type: type
value: pa$$word
hash:
iterationCount: 0
salt: salt
keySize: 6
saltOrder: saltOrder
workFactor: 3
digestAlgorithm: SHA256_HMAC
value: value
algorithm: BCRYPT
provider:
name: name
type: ACTIVE_DIRECTORY
recovery_question:
answer: se7en
question: what is your favourite movie?
_links:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
created: 2000-01-23T04:56:07.000+00:00
profile:
profileUrl: profileUrl
lastName: lastName
zipCode: zipCode
preferredLanguage: preferredLanguage
city: city
displayName: displayName
timezone: timezone
locale: locale
login: login
title: title
employeeNumber: employeeNumber
division: division
honorificSuffix: honorificSuffix
countryCode: countryCode
state: state
department: department
email: email
manager: manager
costCenter: costCenter
nickName: nickName
secondEmail: secondEmail
honorificPrefix: honorificPrefix
managerId: managerId
firstName: firstName
primaryPhone: primaryPhone
postalAddress: postalAddress
mobilePhone: mobilePhone
streetAddress: streetAddress
organization: organization
middleName: middleName
userType: userType
type:
lastUpdated: 2000-01-23T04:56:07.000+00:00
lastUpdatedBy: lastUpdatedBy
default: true
createdBy: createdBy
_links:
schema:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
displayName: displayName
name: name
description: description
id: id
lastUpdated: 2000-01-23T04:56:07.000+00:00
passwordChanged: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
statusChanged: 2000-01-23T04:56:07.000+00:00
id: id
activated: 2000-01-23T04:56:07.000+00:00
status: ACTIVE
properties:
users:
description: Users for the device
items:
$ref: '#/components/schemas/DeviceUser'
type: array
readOnly: true
type: object
DomainLinks_allOf_brand:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The associated brand
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
DomainLinks_allOf_certificate:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The certificate link references the domain certificate
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
DomainLinks_allOf_verify:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The verify link verifies the domain and transitions the domain
status to `VERIFIED`
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
DynamicNetworkZone_allOf_asns:
allOf:
- $ref: '#/components/schemas/NetworkZoneAsns'
- description: An array of ASNs for a Network Zone
DynamicNetworkZone_allOf_locations:
allOf:
- $ref: '#/components/schemas/NetworkZoneLocationArray'
- description: An array of geolocations for a Dynamic Network Zone
EmailCustomization_allOf__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
self:
$ref: '#/components/schemas/HrefObject'
template:
$ref: '#/components/schemas/HrefObject'
preview:
$ref: '#/components/schemas/HrefObject'
test:
$ref: '#/components/schemas/HrefObject'
example:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
preview:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
EmailDefaultContent_allOf__links:
type: object
EmailPreview__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
contentSource:
$ref: '#/components/schemas/HrefObject'
template:
$ref: '#/components/schemas/HrefObject'
test:
$ref: '#/components/schemas/HrefObject'
defaultContent:
$ref: '#/components/schemas/HrefObject'
example:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
contentSource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
defaultContent:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
EmailSettingsResponse__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
self:
$ref: '#/components/schemas/HrefObject'
template:
$ref: '#/components/schemas/HrefObject'
example:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
EmailTemplateResponse__embedded:
example:
customizationCount: 0
settings:
_links:
template:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
recipients: ALL_USERS
properties:
settings:
$ref: '#/components/schemas/EmailSettingsResponse'
customizationCount:
type: integer
readOnly: true
type: object
EmailTemplateResponse__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
settings:
$ref: '#/components/schemas/HrefObject'
defaultContent:
$ref: '#/components/schemas/HrefObject'
customizations:
$ref: '#/components/schemas/HrefObject'
test:
$ref: '#/components/schemas/HrefObject'
example:
settings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
defaultContent:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
test:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
customizations:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
EnhancedDynamicNetworkZone_allOf_asns_include:
allOf:
- $ref: '#/components/schemas/NetworkZoneAsns'
- description: An array of ASNs to include for an Enhanced Dynamic Network Zone
EnhancedDynamicNetworkZone_allOf_asns:
description: The
list of ASNs associated with an Enhanced Dynamic Network Zone
properties:
include:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_asns_include'
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
EnhancedDynamicNetworkZone_allOf_locations_include:
allOf:
- $ref: '#/components/schemas/NetworkZoneLocationArray'
- description: An array of geolocations to include for an Enhanced Dynamic Network
Zone
EnhancedDynamicNetworkZone_allOf_locations_exclude:
allOf:
- $ref: '#/components/schemas/NetworkZoneLocationArray'
- description: An array of geolocations to exclude for an Enhanced Dynamic Network
Zone
EnhancedDynamicNetworkZone_allOf_locations:
description: The
list of geolocations to include or exclude for an Enhanced Dynamic Network
Zone
properties:
include:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_locations_include'
exclude:
$ref: '#/components/schemas/EnhancedDynamicNetworkZone_allOf_locations_exclude'
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
EnhancedDynamicNetworkZone_allOf_ipServiceCategories:
description: " IP services, such as a proxy or VPN, to include or exclude\
\ for an Enhanced Dynamic Network Zone"
properties:
include:
description: IP services to include for an Enhanced Dynamic Network Zone
items:
$ref: '#/components/schemas/IPServiceCategory'
maximum: 75
type: array
exclude:
description: IP services to exclude for an Enhanced Dynamic Network Zone
items:
$ref: '#/components/schemas/IPServiceCategory'
maximum: 75
type: array
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
EntitlementValue__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
properties:
group:
$ref: '#/components/schemas/HrefObjectGroupLink'
app:
$ref: '#/components/schemas/HrefObjectAppLink'
resource-set:
$ref: '#/components/schemas/HrefObjectResourceSetLink'
readOnly: true
type: object
EntitlementValuesResponse__links:
anyOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksNext'
nullable: true
EntityRiskPolicyRule_allOf_actions_entityRisk:
description: The object that contains the `actions` array
properties:
actions:
description: The `entityRisk` object's `actions` array can be empty or contain
one of two `action` object value pairs. This object determines the specific
response to a risk event.
items:
$ref: '#/components/schemas/EntityRiskPolicyRuleActionsObject'
type: array
type: object
EntityRiskPolicyRule_allOf_actions:
description: The action to take based on the risk event
properties:
entityRisk:
$ref: '#/components/schemas/EntityRiskPolicyRule_allOf_actions_entityRisk'
type: object
EntityRiskPolicyRuleActionRunWorkflow_workflow:
description: This action runs a workflow
properties:
id:
description: The `id` of the workflow that runs.
type: integer
type: object
EventHook__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
deactivate:
$ref: '#/components/schemas/HrefObject'
verify:
$ref: '#/components/schemas/HrefObject'
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
deactivate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
Feature__links_allOf_dependents:
description: Link to feature dependents
example:
href: href
properties:
href:
description: Link URI
readOnly: true
type: string
readOnly: true
type: object
Feature__links_allOf_dependencies:
description: Link to feature dependencies
example:
href: href
properties:
href:
description: Link URI
readOnly: true
type: string
readOnly: true
type: object
Feature__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
dependents:
$ref: '#/components/schemas/Feature__links_allOf_dependents'
dependencies:
$ref: '#/components/schemas/Feature__links_allOf_dependencies'
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
dependents:
href: href
dependencies:
href: href
GovernanceBundle__links:
allOf:
- properties:
entitlements:
$ref: '#/components/schemas/HrefObject'
GovernanceBundlesResponse__links:
anyOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksNext'
Group__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
apps:
$ref: '#/components/schemas/HrefObject'
logo:
items:
$ref: '#/components/schemas/HrefObject'
type: array
source:
$ref: '#/components/schemas/HrefObject'
users:
$ref: '#/components/schemas/HrefObject'
description: "[Discoverable resources](/openapi/okta-management/management/tag/Group/#tag/Group/operation/listGroups!c=200&path=_links&t=response)\
\ related to the Group"
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
GroupSchemaAttribute_enum_inner:
anyOf:
- type: string
- type: integer
IamRole__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
permissions:
$ref: '#/components/schemas/HrefObject'
example:
permissions:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
IdPCsr__links:
additionalProperties: true
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
publish:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Publish the CSR
example:
publish: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
type: object
IdentityProvider__links:
additionalProperties: true
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
acs:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: SAML 2.0 Assertion Consumer Service URL for the Okta SP
authorize:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: OAuth 2.0 authorization endpoint for the IdP OAuth 2.0 Authorization
Code flow
clientRedirectUri:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Redirect URI for the OAuth 2.0 Authorization Code flow
metadata:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: "Federation metadata document for the IdP (for example: SAML\
\ 2.0 Metadata)"
users:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: IdP users
deactivate:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Deactivate IdP
activate:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: Activate IdP
keys:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: IdP keys
example:
acs: ""
metadata: ""
keys: ""
activate: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
clientRedirectUri: ""
authorize: ""
users: ""
deactivate: ""
type: object
IdentityProviderApplicationUser__links:
additionalProperties: true
allOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksNext'
- properties:
idp:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: The IdP instance
example:
href: "https://{yourOktaDomain}/api/v1/idps/0oa1k5d68qR2954hb0g4"
user:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: The linked Okta User
example:
href: "https://{yourOktaDomain}/api/v1/users/00ulwodIu7wCfdiVR0g3"
example:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
idp:
href: "https://{yourOktaDomain}/api/v1/idps/0oa1k5d68qR2954hb0g4"
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
href: "https://{yourOktaDomain}/api/v1/users/00ulwodIu7wCfdiVR0g3"
type: object
IdpPolicyRuleAction_idp:
properties:
providers:
description: List of configured Identity Providers that a given Rule can
route to. Ability to define multiple providers is a part of the Okta Identity
Engine. This allows users to choose a Provider when they sign in. Contact
support for information on the Identity Engine.
items:
$ref: '#/components/schemas/IdpPolicyRuleActionProvider'
type: array
idpSelectionType:
$ref: '#/components/schemas/IdpSelectionType'
matchCriteria:
description: Required if `idpSelectionType` is set to `DYNAMIC`
items:
$ref: '#/components/schemas/IdpPolicyRuleActionMatchCriteria'
type: array
type: object
ImportScheduleObject_fullImport:
allOf:
- $ref: '#/components/schemas/ImportScheduleSettings'
- description: Determines the full import schedule
ImportScheduleObject_incrementalImport:
allOf:
- $ref: '#/components/schemas/ImportScheduleSettings'
- description: Determines the incremental import schedule
InlineHookRequestObject_url:
description: The URL of the API endpoint
properties:
value:
description: The URL value of the API endpoint
type: string
type: object
LinksActivate_activate:
allOf:
- description: "Activates an enrolled Factor. See [Activate a Factor](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/activateFactor)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksCancel_cancel:
allOf:
- description: Cancels a `push` factor challenge with a `WAITING` status
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksDeactivate_deactivate:
allOf:
- description: "Deactivates the Factor. See [Unenroll a Factor](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/unenrollFactor)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksEnroll_enroll:
allOf:
- description: "Enrolls a supported Factor. See [Enroll a Factor](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/enrollFactor)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksFactor_factor:
allOf:
- description: Link to the Factor resource
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksNextForRoleAssignments_next:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "The next page of results if [pagination](#pagination) is required"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksPoll_poll:
allOf:
- description: Polls the Factor resource for status information. Always use
the `poll` link instead of manually constructing your own URL.
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksQrcode_qrcode:
allOf:
- description: QR code that encodes the push activation code needed for enrollment
on the device
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksQuestions_question:
allOf:
- description: "Lists all supported security questions. See [List all Supported\
\ Security Questions](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/listSupportedSecurityQuestions)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksResend_resend:
allOf:
- description: "Resends the factor enrollment challenge. See [Resend a Factor\
\ enrollment](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/resendEnrollFactor)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksSend_send:
allOf:
- description: Sends an activation link through email or sms for users who can't
scan the QR code
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksUser_user:
allOf:
- description: Returns information on the specified user
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LinksVerify_verify:
allOf:
- description: "Verifies the Factor resource. See [Verify a Factor](/openapi/okta-management/management/tag/UserFactor/#tag/UserFactor/operation/verifyFactor)."
- $ref: '#/components/schemas/HrefObject'
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
LogTarget_changeDetails:
description: |-
Details on the target's changes. Not all event types support the `changeDetails` property, and not all
`target` objects contain the `changeDetails` property. You must include a property within the object.
> **Note:** When querying the `changeDetails` property, you can't search on the `to` or `from` objects alone. You must include a property within the object.
example:
LogTargetChangeDetails:
$ref: '#/components/examples/LogTargetChangeDetails'
properties:
from:
additionalProperties: true
description: The original properties of the target
type: object
to:
additionalProperties: true
description: The updated properties of the target
type: object
type: object
OAuth2Client__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
grants:
allOf:
- $ref: '#/components/schemas/GrantResourcesHrefObject'
description: Link to the grant resources
tokens:
allOf:
- $ref: '#/components/schemas/TokenResourcesHrefObject'
description: Link to the token resources
type: object
example:
grants: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
tokens: ""
OAuth2RefreshToken__embedded:
description: The embedded resources related to the object if the `expand` query
parameter is specified
example:
scopes:
- _links:
scope: ""
displayName: displayName
name: offline_access
description: "Requests a refresh token by default, used to obtain more access\
\ tokens without re-prompting the user for authentication"
id: scppb56cIl4GvGxy70g3
- _links:
scope: ""
displayName: displayName
name: offline_access
description: "Requests a refresh token by default, used to obtain more access\
\ tokens without re-prompting the user for authentication"
id: scppb56cIl4GvGxy70g3
properties:
scopes:
description: The scope objects attached to the Token
items:
$ref: '#/components/schemas/OAuth2RefreshTokenScope'
type: array
readOnly: true
type: object
OAuth2RefreshToken__links_allOf_revoke_allOf_hints:
example:
allow:
- DELETE
- DELETE
properties:
allow:
items:
default: DELETE
enum:
- DELETE
type: string
type: array
OAuth2RefreshToken__links_allOf_revoke:
allOf:
- $ref: '#/components/schemas/RevokeRefreshTokenHrefObject'
- properties:
hints:
$ref: '#/components/schemas/OAuth2RefreshToken__links_allOf_revoke_allOf_hints'
description: Link to revoke the refresh Token
example:
hints:
allow:
- DELETE
- DELETE
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
OAuth2RefreshToken__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
app:
allOf:
- $ref: '#/components/schemas/AppResourceHrefObject'
description: Link to the app resource
revoke:
$ref: '#/components/schemas/OAuth2RefreshToken__links_allOf_revoke'
client:
allOf:
- $ref: '#/components/schemas/AppResourceHrefObject'
description: Link to the client resource
user:
allOf:
- $ref: '#/components/schemas/UserResourceHrefObject'
description: Link to the user resource
authorizationServer:
allOf:
- $ref: '#/components/schemas/AuthorizationServerResourceHrefObject'
description: Link to the Token authorization server resource
type: object
example:
app: ""
authorizationServer: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
hints:
allow:
- DELETE
- DELETE
href: "https://{yourOktaDomain}/api/v1/users/00u5t60iloOHN9pBi0h7/clients/0oabskvc6442nkvQO0h7/tokens/oar579Mcp7OUsNTlo0g3"
client: ""
user: ""
OAuth2RefreshTokenScope__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the current status of an application using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification. This object is used for dynamic discovery of related resources\
\ and lifecycle operations."
example:
scope: ""
properties:
scope:
allOf:
- $ref: '#/components/schemas/OfflineAccessScopeResourceHrefObject'
description: Link to Scope resource
type: object
OAuth2ScopeConsentGrant__embedded_scope:
example:
id: okta.users.read
properties:
id:
description: The name of the Okta scope for which consent is granted
example: okta.users.read
type: string
type: object
OAuth2ScopeConsentGrant__embedded:
description: Embedded resources related to the Grant
example:
scope:
id: okta.users.read
properties:
scope:
$ref: '#/components/schemas/OAuth2ScopeConsentGrant__embedded_scope'
readOnly: true
type: object
OAuth2ScopeConsentGrant__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
app:
allOf:
- $ref: '#/components/schemas/AppResourceHrefObject'
description: Link to the app resource
client:
allOf:
- $ref: '#/components/schemas/AppResourceHrefObject'
description: Link to the client resource
scope:
allOf:
- $ref: '#/components/schemas/ScopeResourceHrefObject'
description: Link to the scope resource
user:
allOf:
- $ref: '#/components/schemas/UserResourceHrefObject'
description: Link to the user resource
authorizationServer:
allOf:
- $ref: '#/components/schemas/AuthorizationServerResourceHrefObject'
description: Link to the authorization server resource
type: object
- readOnly: true
example:
app: ""
authorizationServer: ""
scope: ""
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
client: ""
user: ""
OSVersion_dynamicVersionRequirement:
description: Contains
the necessary properties for a dynamic version requirement
properties:
type:
description: Indicates the type of the dynamic OS version requirement
enum:
- MINIMUM
- EXACT
- EXACT_ANY_SUPPORTED
type: string
x-enumDescriptions:
MINIMUM: The device version must be equal to or newer than the dynamically
determined version. `distanceFromLatestMajor` must be specified for
this type.
EXACT: The device version must be on the same major version as the dynamically
determined version. `distanceFromLatestMajor` must be specified for
this type.
EXACT_ANY_SUPPORTED: The device version must be on a major version which
is supported. You can't specify `distanceFromLatestMajor` for this type.
distanceFromLatestMajor:
description: Indicates the distance from the latest major version
maximum: 1
minimum: 0
type: integer
latestSecurityPatch:
description: Indicates whether the device needs to be on the latest security
patch
type: boolean
type: object
x-okta-lifecycle:
lifecycle: EA
isGenerallyAvailable: false
SKUs: []
OSVersionConstraint_dynamicVersionRequirement:
description: Contains the necessary properties for a dynamic Windows version
requirement
properties:
type:
description: Indicates the type of the dynamic Windows version requirement
enum:
- MINIMUM
- EXACT
- EXACT_ANY_SUPPORTED
- NOT_ALLOWED
type: string
x-enumDescriptions:
MINIMUM: The device version must be equal to or newer than the dynamically
determined Windows version. `distanceFromLatestMajor` must be specified
for this type.
EXACT: The device version must be on the same major version as the dynamically
determined Windows version. `distanceFromLatestMajor` must be specified
for this type.
EXACT_ANY_SUPPORTED: The device version must be on a Windows major version
which is supported. You can't specify `distanceFromLatestMajor` for
this type.
NOT_ALLOWED: The device version isn't allowed. You can't specify `distanceFromLatestMajor`
or `latestSecurityPatch` for this type.
distanceFromLatestMajor:
description: Indicates the distance from the latest Windows major version
maximum: 1
minimum: 0
type: integer
latestSecurityPatch:
description: Indicates whether the policy requires Windows devices to be
on the latest security patch
type: boolean
type: object
OperationResponse_assignmentOperation_configuration_actions_assignUserToRealm:
example:
realmId: realmId
properties:
realmId:
type: string
type: object
OperationResponse_assignmentOperation_configuration_actions:
example:
assignUserToRealm:
realmId: realmId
properties:
assignUserToRealm:
$ref: '#/components/schemas/OperationResponse_assignmentOperation_configuration_actions_assignUserToRealm'
type: object
OperationResponse_assignmentOperation_configuration:
example:
name: name
id: id
conditions:
expression:
value: value
profileSourceId: profileSourceId
actions:
assignUserToRealm:
realmId: realmId
properties:
actions:
$ref: '#/components/schemas/OperationResponse_assignmentOperation_configuration_actions'
conditions:
$ref: '#/components/schemas/Conditions'
id:
type: string
name:
type: string
type: object
OperationResponse_assignmentOperation:
example:
configuration:
name: name
id: id
conditions:
expression:
value: value
profileSourceId: profileSourceId
actions:
assignUserToRealm:
realmId: realmId
properties:
configuration:
$ref: '#/components/schemas/OperationResponse_assignmentOperation_configuration'
type: object
OptInStatusResponse__links:
allOf:
- properties:
optInStatus:
$ref: '#/components/schemas/HrefObject'
OrgCAPTCHASettings__links:
description: Link relations for the CAPTCHA settings object
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
self:
$ref: '#/components/schemas/HrefObject'
readOnly: true
type: object
OrgContactUser__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the Contact Type User object using the [JSON Hypertext Application\
\ Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
example:
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
user:
$ref: '#/components/schemas/HrefObjectUserLink'
readOnly: true
type: object
OrgCreationAdmin_credentials_password:
description: |-
Specifies a password for a user
> **Note:** For information on defaults and configuring your password policies, see [Configure the password authenticator](https://help.okta.com/okta_help.htm?type=oie&id=ext-configure-password) in the help documentation.
example:
value: pa$$word
properties:
value:
description: Password value (which is validated by the Password Policy)
example: pa$$word
format: password
type: string
writeOnly: true
type: object
OrgCreationAdmin_credentials:
description: Specifies primary authentication and recovery credentials for a
User. Credential types and requirements vary depending on the provider and
security policy of the org.
example:
password:
value: pa$$word
recovery_question:
answer: se7en
question: what is your favourite movie?
properties:
password:
$ref: '#/components/schemas/OrgCreationAdmin_credentials_password'
recovery_question:
$ref: '#/components/schemas/RecoveryQuestionCredential'
type: object
OrgCreationAdmin_profile:
additionalProperties: true
description: |-
Specifies the profile attributes for the first super admin user. The minimal set of required attributes are `email`, `firstName`, `lastName`, and `login`.
See [profile](/openapi/okta-management/management/tag/User/#tag/User/operation/getUser!c=200&path=profile&t=response) for additional profile attributes.
example:
firstName: firstName
lastName: lastName
login: login
email: email
properties:
firstName:
description: Given name of the User (`givenName`)
maxLength: 50
minLength: 1
nullable: true
type: string
lastName:
description: The family name of the User (`familyName`)
maxLength: 50
minLength: 1
nullable: true
type: string
email:
description: "The primary email address of the User. For validation, see\
\ [RFC 5322 Section 3.2.3](https://datatracker.ietf.org/doc/html/rfc5322#section-3.2.3)."
format: email
maxLength: 100
minLength: 5
type: string
login:
description: The unique identifier for the User (`username`)
maxLength: 100
type: string
required:
- email
- firstName
- lastName
- login
type: object
OrgOktaCommunicationSetting__links_optIn:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to opt users in to communication emails
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgOktaCommunicationSetting__links_optOut:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to opt users out of communication emails
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgOktaCommunicationSetting__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for this object using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
example:
optOut:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
optIn:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
optIn:
$ref: '#/components/schemas/OrgOktaCommunicationSetting__links_optIn'
optOut:
$ref: '#/components/schemas/OrgOktaCommunicationSetting__links_optOut'
readOnly: true
type: object
OrgOktaSupportSettingsObj__links_extend:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to [extend Okta Support Access](/openapi/okta-management/management/tag/OrgSettingSupport/#tag/OrgSettingSupport/operation/extendOktaSupport)"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgOktaSupportSettingsObj__links_revoke:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to [revoke Okta Support Access](/openapi/okta-management/management/tag/OrgSettingSupport/#tag/OrgSettingSupport/operation/revokeOktaSupport)"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgOktaSupportSettingsObj__links_grant:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to [grant Okta Support Access](/openapi/okta-management/management/tag/OrgSettingSupport/#tag/OrgSettingSupport/operation/grantOktaSupport)"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgOktaSupportSettingsObj__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the Okta Support Settings object using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
example:
extend:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
revoke:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
grant:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
extend:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj__links_extend'
revoke:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj__links_revoke'
grant:
$ref: '#/components/schemas/OrgOktaSupportSettingsObj__links_grant'
readOnly: true
type: object
OrgPreferences__links_hideEndUserFooter:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to hide the footer in the End-User Dashboard
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgPreferences__links_showEndUserFooter:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to show the footer on the End-User Dashboard
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
OrgPreferences__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for this object using the [JSON Hypertext Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
example:
hideEndUserFooter:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
showEndUserFooter:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
hideEndUserFooter:
$ref: '#/components/schemas/OrgPreferences__links_hideEndUserFooter'
showEndUserFooter:
$ref: '#/components/schemas/OrgPreferences__links_showEndUserFooter'
readOnly: true
type: object
PageRoot__embedded:
example:
preview:
pageContent: pageContent
default:
pageContent: pageContent
customized:
pageContent: pageContent
previewUrl: https://openapi-generator.tech
customizedUrl: https://openapi-generator.tech
properties:
default:
$ref: '#/components/schemas/CustomizablePage'
customized:
$ref: '#/components/schemas/CustomizablePage'
customizedUrl:
format: uri
type: string
preview:
$ref: '#/components/schemas/CustomizablePage'
previewUrl:
format: uri
type: string
readOnly: true
type: object
PageRoot__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
default:
$ref: '#/components/schemas/HrefObject'
customized:
$ref: '#/components/schemas/HrefObject'
preview:
$ref: '#/components/schemas/HrefObject'
example:
preview:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
default:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
customized:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
PasswordImportRequestData_action:
description: This object specifies the default action Okta is set to take. Okta
takes this action if your external service sends an empty HTTP 204 response.
You can override the default action by returning a commands object in your
response specifying the action to take.
properties:
credential:
default: UNVERIFIED
description: "The status of the user credential, either `UNVERIFIED` or\
\ `VERIFIED`"
type: string
type: object
PasswordImportRequestData_context_credential:
properties:
username:
description: The `username` that the user supplied when attempting to sign
in to Okta.
type: string
password:
description: The `password` that the user supplied when attempting to sign
in to Okta.
type: string
type: object
PasswordImportRequestData_context:
properties:
request:
$ref: '#/components/schemas/InlineHookRequestObject'
credential:
$ref: '#/components/schemas/PasswordImportRequestData_context_credential'
type: object
PasswordImportResponse_commands_inner_value:
description: |-
The parameter value of the command.
* To indicate that the supplied credentials are valid, supply a type property set to `com.okta.action.update` together with a value property set to `{"credential": "VERIFIED"}`.
* To indicate that the supplied credentials are invalid, supply a type property set to `com.okta.action.update` together with a value property set to `{"credential": "UNVERIFIED"}`.
Alternatively, you can send an empty response (`204`). By default, the `data.action.credential` is always set to `UNVERIFIED`.
properties:
credential:
enum:
- UNVERIFIED
- VERIFIED
type: string
type: object
PasswordImportResponse_commands_inner:
properties:
type:
description: "The location where you specify the command. For the password\
\ import inline hook, there's only one command, `com.okta.action.update`."
value:
$ref: '#/components/schemas/PasswordImportResponse_commands_inner_value'
type: object
PerClientRateLimitSettings_useCaseModeOverrides:
description: A map of Per-Client Rate Limit Use Case to the applicable PerClientRateLimitMode.
Overrides the `defaultMode` property for the specified use cases.
example:
LOGIN_PAGE: null
OIE_APP_INTENT: null
OAUTH2_AUTHORIZE: null
properties:
LOGIN_PAGE:
$ref: '#/components/schemas/PerClientRateLimitMode'
OAUTH2_AUTHORIZE:
$ref: '#/components/schemas/PerClientRateLimitMode'
OIE_APP_INTENT:
$ref: '#/components/schemas/PerClientRateLimitMode'
type: object
Permission__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
role:
$ref: '#/components/schemas/HrefObject'
example:
role:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
PolicyContext_device:
example:
managed: true
registered: true
platform: platform
assuranceId: assuranceId
properties:
platform:
description: "The platform of the device, for example, IOS."
type: string
registered:
description: If the device is registered
type: boolean
managed:
description: If the device is managed
type: boolean
assuranceId:
description: The device assurance policy ID for the simulation
type: string
type: object
PolicyContext_groups:
description: "An array of Group IDs for the simulate operation. Only user IDs\
\ or Group IDs are allowed, not both."
example:
ids:
- ids
- ids
properties:
ids:
items:
type: string
uniqueItems: true
type: array
required:
- ids
type: object
PolicyContext_risk:
description: The risk rule condition level
example:
level: LOW
properties:
level:
enum:
- LOW
- MEDIUM
- HIGH
type: string
type: object
PolicyContext_user:
description: "The user ID for the simulate operation. Only user IDs or Group\
\ IDs are allowed, not both."
example:
id: id
properties:
id:
description: The unique ID number for the user.
type: string
required:
- id
type: object
PolicyContext_zones:
description: The zone ID under the network rule condition.
example:
ids:
- ids
- ids
properties:
ids:
items:
type: string
type: array
type: object
PolicyMapping__links_allOf_application:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the mapped application
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
PolicyMapping__links_allOf_policy:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the mapped policy
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
PolicyMapping__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
application:
$ref: '#/components/schemas/PolicyMapping__links_allOf_application'
policy:
$ref: '#/components/schemas/PolicyMapping__links_allOf_policy'
example:
application:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
policy:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
PostAuthSessionPolicyRule_allOf_actions_postAuthSession:
description: This object contains a `failureActions` array that defines the
specific action to take when post auth session evaluation detects a failure.
properties:
failureActions:
description: An array of objects that define the action. It can be empty
or contain two `action` value pairs.
items:
$ref: '#/components/schemas/PostAuthSessionFailureActionsObject'
type: array
type: object
PostAuthSessionPolicyRule_allOf_actions:
description: The action to take in response to a failure of the reevaluated
global session policy or authentication polices.
properties:
postAuthSession:
$ref: '#/components/schemas/PostAuthSessionPolicyRule_allOf_actions_postAuthSession'
type: object
PostAuthSessionPolicyRule_allOf_conditions:
properties:
people:
$ref: '#/components/schemas/PolicyPeopleCondition'
type: object
RegistrationInlineHookPPData_allOf_data_context_user:
properties:
passwordChanged:
description: The last time the user's password was updated
format: date-time
type: string
_links:
$ref: '#/components/schemas/BaseContext_user__links'
profile:
additionalProperties: true
description: The user to update's current attributes
type: object
id:
type: string
type: object
RegistrationInlineHookPPData_allOf_data_context:
properties:
request:
$ref: '#/components/schemas/InlineHookRequestObject'
user:
$ref: '#/components/schemas/RegistrationInlineHookPPData_allOf_data_context_user'
type: object
RegistrationInlineHookPPData_allOf_data:
properties:
context:
$ref: '#/components/schemas/RegistrationInlineHookPPData_allOf_data_context'
action:
description: The default action the system takes. Set to `ALLOW`. `DENY`
is never sent to your external service
type: string
userProfileUpdate:
additionalProperties: true
description: Name-value pairs for each new attribute supplied by the user
in the Progressive Profile form
type: object
type: object
RegistrationInlineHookSSRData_allOf_data_context:
properties:
request:
$ref: '#/components/schemas/InlineHookRequestObject'
type: object
RegistrationInlineHookSSRData_allOf_data:
properties:
context:
$ref: '#/components/schemas/RegistrationInlineHookSSRData_allOf_data_context'
action:
description: The default action the system will take. Will be `ALLOW`. `DENY`
will never be sent to your external service.
type: string
userProfile:
additionalProperties: true
description: The name-value pairs for each registration-related attribute
supplied by the user in the Profile Enrollment form.
type: object
type: object
RegistrationResponse_commands_inner:
properties:
type:
description: |-
The location where you specify the command. To set attributes in the user's Okta profile, supply a `type` property set to `com.okta.user.profile.update`, together with a `value` property set to a list of key-value pairs corresponding to the Okta user profile attributes you want to set. The attributes must already exist in your user profile schema.
To explicitly allow or deny registration to the user, supply a type property set to `com.okta.action.update`, together with a value property set to `{"registration": "ALLOW"}` or `{"registration": "DENY"}`. The default is to allow registration.
In Okta Identity Engine, to set attributes in the user's profile, supply a `type` property set to `com.okta.user.progressive.profile.update`, together with a `value` property set to a list of key-value pairs corresponding to the Progressive Enrollment attributes that you want to set. See [Registration inline hook - Send response](https://developer.okta.com/docs/guides/registration-inline-hook/nodejs/main/#send-response).
Commands are applied in the order that they appear in the array. Within a single `com.okta.user.profile.update` or `com.okta.user.progressive.profile.update command`, attributes are updated in the order that they appear in the `value` object.
You can never use a command to update the user's password, but you are allowed to set the values of attributes other than password that are designated sensitive in your Okta user schema. However, the values of those sensitive attributes, if included as fields in the Profile Enrollment form, aren't included in the `data.userProfile` object sent to your external service by Okta. See [data.userProfile](/openapi/okta-management/management/tag/InlineHook/#tag/InlineHook/operation/create-registration-hook!path=0/data/userProfile&t=request).
type: string
value:
additionalProperties: true
description: |-
The `value` object is the parameter to pass to the command.
For `com.okta.user.profile.update` commands, `value` should be an object containing one or more name-value pairs for the attributes you wish to update.
For `com.okta.action.update` commands, the value should be an object containing the attribute `action` set to a value of either `ALLOW` or `DENY`, indicating whether the registration should be permitted or not.
Registrations are allowed by default, so setting a value of `ALLOW` for the action field is valid but superfluous.
type: object
type: object
RegistrationResponse_Error_errorCauses_inner:
properties:
errorSummary:
description: Human-readable summary of the error.
type: string
reason:
description: "A brief, enum-like string that indicates the nature of the\
\ error. For example, `UNIQUE_CONSTRAINT` for a property uniqueness violation."
type: string
locationType:
description: "Where in the request the error was found (`body`, `header`,\
\ `url`, or `query`)."
type: string
location:
description: "The valid JSON path to the location of the error. For example,\
\ if there was an error in the user's `login` field, the `location` might\
\ be `data.userProfile.login`."
type: string
domain:
description: "Indicates the source of the error. If the error was in the\
\ user's profile, for example, you might use `end-user`. If the error\
\ occurred in the external service, you might use `external-service`."
type: string
type: object
RegistrationResponse_Error:
description: |-
For the registration inline hook, the `error` object provides a way of displaying an error message to the end user who is trying to register or update their profile.
* If you're using the Okta Sign-In Widget for Profile Enrollment, only the `errorSummary` messages of the `errorCauses` objects that your external service returns appear as inline errors, given the following:
* You don't customize the error handling behavior of the widget.
* The `location` of `errorSummary` in the `errorCauses` object specifies the request object's user profile attribute.
* If you don't return a value for the `errorCauses` object, and deny the user's registration attempt through the `commands` object in your response to Okta, one of the following generic messages appears to the end user:
* "Registration cannot be completed at this time." (SSR)
* "We found some errors. Please review the form and make corrections." (Progressive Enrollment)
* If you don't return an `error` object at all and the registration is denied, the following generic message appears to the end user:
* "Registration denied." (SSR)
* "Profile update denied." (Progressive Enrollment)
>**Note:** If you include an error object in your response, no commands are executed and the registration fails. This holds true even if the top-level `errorSummary` and the `errorCauses` objects are omitted.
properties:
errorSummary:
description: Human-readable summary of one or more errors
type: string
errorCauses:
items:
$ref: '#/components/schemas/RegistrationResponse_Error_errorCauses_inner'
type: array
type: object
ResourceSelectorResponseSchema__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
resources:
$ref: '#/components/schemas/HrefObject'
ResourceSelectorResponseWithoutSelfLinkSchema__links:
allOf:
- properties:
resources:
$ref: '#/components/schemas/HrefObject'
ResourceSet__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
resources:
$ref: '#/components/schemas/HrefObject'
bindings:
$ref: '#/components/schemas/HrefObject'
example:
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resources:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetBindingMembers__links:
allOf:
- $ref: '#/components/schemas/LinksNext'
- properties:
binding:
$ref: '#/components/schemas/HrefObject'
example:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
binding:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetBindingResponse__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
bindings:
$ref: '#/components/schemas/HrefObject'
resource-set:
$ref: '#/components/schemas/HrefObject'
example:
resource-set:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
bindings:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetBindingRole__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
members:
$ref: '#/components/schemas/HrefObject'
example:
members:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetResource__links_self:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The REST API URL of the related resource
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetResource__links_resource:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to this Resource Set Resource object (self)
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetResource__links_groups:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "If applicable, the REST API URL of the related Groups resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetResource__links_users:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "If applicable, the REST API URL of the related Users resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
ResourceSetResource__links:
description: Related discoverable resources
example:
resource:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
groups:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
self:
$ref: '#/components/schemas/ResourceSetResource__links_self'
resource:
$ref: '#/components/schemas/ResourceSetResource__links_resource'
groups:
$ref: '#/components/schemas/ResourceSetResource__links_groups'
users:
$ref: '#/components/schemas/ResourceSetResource__links_users'
readOnly: true
ResourceSetResources__links:
allOf:
- $ref: '#/components/schemas/LinksNext'
- properties:
resource-set:
$ref: '#/components/schemas/HrefObject'
example:
next:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
resource-set:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
RoleGovernanceResources__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksNext'
RoleGovernanceSource__links:
allOf:
- $ref: '#/components/schemas/LinksGovernanceResources'
- $ref: '#/components/schemas/LinksSelf'
SAMLHookResponse_commands_inner_value_inner_value:
description: |-
The value of the claim that you add or replace, and can also include other attributes. If adding to a claim, add another `value` attribute residing within an array called `attributeValues`.
See the following examples:
#### Simple value (integer or string)
`"value": 300` or `"value": "replacementString"`
#### Attribute value (object)
` "value": {
"authContextClassRef": "replacementValue"
}`
#### AttributeValues array value (object)
` "value": {
"attributes": {
"NameFormat": "urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
},
"attributeValues": [
{"attributes": {
"xsi:type": "xs:string"
},
"value": "4321"}
]
}`
oneOf:
- type: string
- type: integer
- type: object
SAMLHookResponse_commands_inner_value_inner:
properties:
op:
description: |-
The name of one of the supported ops:
`add`: Add a new claim to the assertion
`replace`: Modify any element of the assertion
> **Note:** If a response to the SAML assertion inline hook request isn't received from your external service within three seconds, a timeout occurs. In this scenario, the Okta process flow continues with the original SAML assertion returned.
type: string
path:
description: "Location, within the assertion, to apply the operation"
type: string
value:
$ref: '#/components/schemas/SAMLHookResponse_commands_inner_value_inner_value'
type: object
SAMLHookResponse_commands_inner:
properties:
type:
description: One of the supported commands `com.okta.assertion.patch`
type: string
value:
items:
$ref: '#/components/schemas/SAMLHookResponse_commands_inner_value_inner'
type: array
type: object
SAMLHookResponse_error:
description: |-
An object to return an error. Returning an error causes Okta to record a failure event in the Okta System Log.
The string supplied in the `errorSummary` property is recorded in the System Log event.
> **Note:** If the error object doesn't include the defined `errorSummary` property, the following common default message
is returned to the end user: `The callback service returned an error`.
> **Note:** If a response to a SAML inline hook request isn't received from your external service within three seconds, a timeout occurs. In this scenario, the Okta SAML inline hook process continues, and the user is created.
properties:
errorSummary:
description: A human-readable summary of the error
type: string
type: object
SAMLPayLoad_data_context_allOf_protocol_issuer:
properties:
id:
description: The unique identifier of the issuer that provided the SAML
assertion
example: 0oath92zlO60urQOP0g3
type: string
name:
description: The name of the issuer that provided the SAML assertion
example: SAML 2.0 App
type: string
uri:
description: The base URI of the SAML endpoint that's used to assert the
authorization
example: http://www.okta.com/exkth8lMzFm0HZOTU0g3
type: string
type: object
SAMLPayLoad_data_context_allOf_protocol:
description: Details of the assertion protocol being used
properties:
type:
description: The type of authentication protocol being used for the assertion
example: SAML2.0
type: string
issuer:
$ref: '#/components/schemas/SAMLPayLoad_data_context_allOf_protocol_issuer'
type: object
SAMLPayLoad_data_context:
allOf:
- $ref: '#/components/schemas/BaseContext'
- properties:
protocol:
$ref: '#/components/schemas/SAMLPayLoad_data_context_allOf_protocol'
type: object
SAMLPayLoad_data_assertion_subject_confirmation_data:
properties:
recipient:
description: The token endpoint URL of the authorization server
example: http://www.example.com:7070/saml/sso
type: string
type: object
SAMLPayLoad_data_assertion_subject_confirmation:
properties:
method:
description: Used to indicate how the authorization server confirmed the
SAML assertion
example: urn:oasis:names:tc:SAML:2.0:cm:bearer
type: string
data:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_subject_confirmation_data'
type: object
SAMLPayLoad_data_assertion_subject:
description: Provides a JSON representation of the `` element
of the SAML assertion
properties:
nameId:
description: The unique identifier of the user
example: user@example.com
type: string
nameFormat:
description: Indicates how to interpret the attribute name
example: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
type: string
confirmation:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_subject_confirmation'
type: object
SAMLPayLoad_data_assertion_authentication_authnContext:
description: Details of the authentication methods used for the SAML assertion
properties:
authnContextClassRef:
description: Describes the identity provider's supported authentication
context classes
example: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
type: string
type: object
SAMLPayLoad_data_assertion_authentication:
description: Provides a JSON representation of the `` element
of the SAML assertion
properties:
sessionIndex:
description: The unique identifier describing the assertion statement
example: id1553800523546.312669168
type: string
authnContext:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_authentication_authnContext'
type: object
SAMLPayLoad_data_assertion_conditions:
description: Provides a JSON representation of the `` element
of the SAML assertion
properties:
audienceRestriction:
description: Describes which service providers the assertion is valid for
items:
example: "[\"urn:example:sp\"]"
type: string
type: array
type: object
SAMLPayLoad_data_assertion_claims_value_attributes:
properties:
NameFormat:
description: Indicates how to interpret the attribute name
type: string
type: object
SAMLPayLoad_data_assertion_claims_value_attributeValues_inner_attributes:
properties:
xsi:type:
description: Used to derive the type of the attribute
type: string
type: object
SAMLPayLoad_data_assertion_claims_value_attributeValues_inner:
properties:
attributes:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_claims_value_attributeValues_inner_attributes'
value:
description: The actual value of the attribute
type: string
type: object
SAMLPayLoad_data_assertion_claims_value:
properties:
attributes:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_claims_value_attributes'
attributeValues:
items:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_claims_value_attributeValues_inner'
type: array
type: object
SAMLPayLoad_data_assertion_lifetime:
description: "Specifies the expiration time, in seconds, of the SAML assertion"
properties:
expiration:
description: The expiration time in seconds
example: 300
type: integer
type: object
SAMLPayLoad_data_assertion:
description: Details of the SAML assertion that was generated
properties:
subject:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_subject'
authentication:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_authentication'
conditions:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_conditions'
claims:
additionalProperties:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_claims_value'
description: Provides a JSON representation of the ``
element contained in the generated SAML assertion. Contains any optional
SAML attribute statements that you have defined for the app using the
Admin Console's **SAML Settings**.
type: object
lifetime:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion_lifetime'
type: object
SAMLPayLoad_data:
properties:
context:
$ref: '#/components/schemas/SAMLPayLoad_data_context'
assertion:
$ref: '#/components/schemas/SAMLPayLoad_data_assertion'
type: object
Saml_acs_inner:
properties:
index:
description: Index of ACS URL. You can't reuse the same index in the ACS
URL array.
example: 0
maximum: 65535
minimum: 0
type: number
url:
description: Assertion Consumer Service (ACS) URL
example: "https://${org.subdomain}.example.com/saml/login"
format: uri
maxLength: 1024
type: string
type: object
Saml_claims_inner:
properties:
name:
description: The attribute name
example: Address
type: string
values:
description: The Okta values inserted in the attribute statement
items:
example: "${user.homeAddress}"
type: string
type: array
type: object
SecurityEventsProviderRequest_settings:
description: Information about the Security Events Provider for signal ingestion
oneOf:
- $ref: '#/components/schemas/SecurityEventsProviderSettingsSSFCompliant'
- $ref: '#/components/schemas/SecurityEventsProviderSettingsNonSSFCompliant'
type: object
SignInPage_allOf_widgetCustomizations:
example:
usernameInfoTip: usernameInfoTip
showUserIdentifier: true
customLink1Url: customLink1Url
customLink2Url: customLink2Url
classicRecoveryFlowEmailOrUsernameLabel: classicRecoveryFlowEmailOrUsernameLabel
customLink1Label: customLink1Label
passwordInfoTip: passwordInfoTip
forgotPasswordLabel: forgotPasswordLabel
showPasswordVisibilityToggle: true
authenticatorPageCustomLinkLabel: authenticatorPageCustomLinkLabel
unlockAccountLabel: unlockAccountLabel
helpUrl: helpUrl
unlockAccountUrl: unlockAccountUrl
usernameLabel: usernameLabel
signInLabel: signInLabel
customLink2Label: customLink2Label
authenticatorPageCustomLinkUrl: authenticatorPageCustomLinkUrl
passwordLabel: passwordLabel
forgotPasswordUrl: forgotPasswordUrl
helpLabel: helpLabel
widgetGeneration: G2
properties:
signInLabel:
description: The label for the sign in widget
type: string
usernameLabel:
description: The label for the username field
type: string
usernameInfoTip:
description: The label for the username information tip
type: string
passwordLabel:
description: The label for the password field
type: string
passwordInfoTip:
description: The label for the password information tip
type: string
showPasswordVisibilityToggle:
description: Allows users to see their passwords as they type
type: boolean
showUserIdentifier:
description: Allows the user's identifier to appear on authentication and
enrollment pages
type: boolean
forgotPasswordLabel:
description: The label for the forgot password page
type: string
forgotPasswordUrl:
description: The forgot password URL
type: string
unlockAccountLabel:
description: The label for the unlock account link
type: string
unlockAccountUrl:
description: The unlock account URL
type: string
helpLabel:
description: The label for the help link
type: string
helpUrl:
description: The help link URL
type: string
customLink1Label:
description: The label for the first custom link
type: string
customLink1Url:
description: The URL for the first custom link
type: string
customLink2Label:
description: The label for the second custom link
type: string
customLink2Url:
description: The URL for the second custom link
type: string
authenticatorPageCustomLinkLabel:
description: The label for the authenticator page custom link
type: string
authenticatorPageCustomLinkUrl:
description: The URL for the authenticator page custom link
type: string
classicRecoveryFlowEmailOrUsernameLabel:
description: The label for the username field in the classic recovery flow
type: string
widgetGeneration:
$ref: '#/components/schemas/WidgetGeneration'
type: object
SimulatePolicyEvaluations_evaluated:
description: A list of evaluated but not matched policies and rules
example:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
policies:
items:
$ref: '#/components/schemas/SimulateResultPoliciesItems'
type: array
type: object
SimulatePolicyEvaluations_undefined:
description: A list of undefined but not matched policies and rules
example:
policies:
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
rules:
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
- name: name
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
id: id
conditions:
- type: type
status: MATCH
- type: type
status: MATCH
status: null
properties:
policies:
items:
$ref: '#/components/schemas/SimulateResultPoliciesItems'
type: array
type: object
SourceLinks_allOf_schema:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The associated schema
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
StandardRole__embedded_targets_catalog:
description: App targets
example:
apps:
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
properties:
apps:
items:
$ref: '#/components/schemas/CatalogApplication'
type: array
StandardRole__embedded_targets:
description: Targets configured for the Role Assignment
example:
catalog:
apps:
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
groups:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
properties:
groups:
description: Group targets
items:
$ref: '#/components/schemas/Group'
type: array
catalog:
$ref: '#/components/schemas/StandardRole__embedded_targets_catalog'
type: object
StandardRole__embedded:
description: Optional embedded resources for the Role Assignment
example:
targets:
catalog:
apps:
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
- features:
- features
- features
lastUpdated: 2000-01-23T04:56:07.000+00:00
website: website
verificationStatus: verificationStatus
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
displayName: displayName
name: name
description: description
id: id
category: category
signOnModes:
- signOnModes
- signOnModes
status: ACTIVE
groups:
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
- lastUpdated: 2000-01-23T04:56:07.000+00:00
lastMembershipUpdated: 2000-01-23T04:56:07.000+00:00
_embedded:
key: "{}"
_links:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
logo:
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
- templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
source:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
users:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
apps:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
created: 2000-01-23T04:56:07.000+00:00
profile:
name: West Coast Users
description: All Users West of The Rockies
objectClass:
- objectClass
- objectClass
id: 0gabcd1234
type: APP_GROUP
properties:
targets:
$ref: '#/components/schemas/StandardRole__embedded_targets'
type: object
StreamConfiguration_aud:
description: |-
The audience used in the SET. This value is set as `aud` in the claim.
A read-only parameter that is set by the transmitter. If this parameter is included in the request, the value must match the expected value from the transmitter.
example: https://example.com
oneOf:
- example: https://example.com
format: uri
type: string
- items:
example: https://example.com
format: uri
type: string
type: array
SubmissionResponse_config_inner:
properties:
label:
description: Display name of the variable in the Admin Console
example: Subdomain
type: string
name:
description: Name of the variable
example: subdomain
maxLength: 1024
minLength: 1
type: string
type: object
Subscription__links:
description: Discoverable resources related to the subscription
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
self:
$ref: '#/components/schemas/HrefObject'
readOnly: true
type: object
SupportedMethods_settings:
example:
algorithms:
- ES256
- ES256
transactionTypes:
- CIBA
- CIBA
keyProtection: ANY
properties:
keyProtection:
$ref: '#/components/schemas/PushMethodKeyProtection'
algorithms:
description: The encryption algorithm for this authenticator method
items:
$ref: '#/components/schemas/AuthenticatorMethodAlgorithm'
type: array
transactionTypes:
description: The transaction type for this authenticator method
items:
$ref: '#/components/schemas/AuthenticatorMethodTransactionType'
type: array
type: object
TelephonyRequestData_messageProfile:
description: Message profile specifies information about the telephony (sms/voice)
message to be sent to the Okta user
properties:
msgTemplate:
description: Default or Okta org configured sms or voice message template
type: string
phoneNumber:
description: The Okta's user's phone number
type: string
otpExpires:
description: The time when OTP expires
type: string
deliveryChannel:
description: The channel for OTP delivery - SMS or voice
type: string
otpCode:
description: The OTP code requested by the Okta user
type: string
locale:
description: The locale associated with the Okta user
type: string
type: object
TelephonyRequestData_userProfile:
description: User profile specifies information about the Okta user
properties:
firstName:
description: The user's first name
type: string
lastName:
description: The user's last name
type: string
login:
description: The user's Okta login
type: string
userId:
description: The user's Okta user ID
type: string
type: object
TelephonyResponse_commands_inner_value_inner:
properties:
status:
description: Status of telephony callout
enum:
- SUCCESSFUL
- PENDING
- FAILED
type: string
x-enumDescriptions:
SUCCESSFUL: External web service was able to deliver the OTP to the Requester.
PENDING: External web service wasn't able to confirm delivery of the OTP
to the Requester.
FAILED: External web service was unable to deliver the OTP to the Requester.
provider:
description: Telephony provider for sms/voice
type: string
transactionId:
description: Transaction ID for sms/voice
type: string
transactionMetadata:
description: Any relevant metadata for the telephony transaction
type: string
type: object
TelephonyResponse_commands_inner:
properties:
type:
description: "The location where you specify the command. For the Telephony\
\ inline hook, there's only one command, `com.okta.telephony.action`."
type: string
value:
description: "The status of the telephony operation along with optional\
\ additional information about the provider, transaction ID and any other\
\ transaction metadata."
items:
$ref: '#/components/schemas/TelephonyResponse_commands_inner_value_inner'
type: array
type: object
TestInfo_oidcTestConfiguration:
description: OIDC test details
properties:
idp:
description: "Read only.
Indicates if your integration supports IdP-initiated\
\ sign-in flows. If [`sso.oidc.initiateLoginUri`](/openapi/okta-management/management/tag/YourOinIntegrations/#tag/YourOinIntegrations/operation/createSubmission!path=sso/oidc/initiateLoginUri&t=request)\
\ is specified, this property is set to `true`. If [`sso.oidc.initiateLoginUri`](/openapi/okta-management/management/tag/YourOinIntegrations/#tag/YourOinIntegrations/operation/createSubmission!path=sso/oidc/initiateLoginUri&t=request)\
\ isn't set for the integration submission, this property is set to `false`"
readOnly: true
type: boolean
sp:
description: Read only.
Indicates if your integration supports SP-initiated
sign-in flows and is always set to `true` for OIDC SSO
readOnly: true
type: boolean
jit:
description: Indicates if your integration supports Just-In-Time (JIT) provisioning
type: boolean
spInitiateUrl:
description: URL for SP-initiated sign-in flows (required if `sp = true`)
example: https://test.example.com/strawberry/oidc/sp-init
format: uri
maxLength: 512
type: string
required:
- spInitiateUrl
type: object
TestInfo_samlTestConfiguration:
description: SAML test details
properties:
idp:
description: Indicates if your integration supports IdP-initiated sign-in
type: boolean
sp:
description: Indicates if your integration supports SP-initiated sign-in
type: boolean
jit:
description: Indicates if your integration supports Just-In-Time (JIT) provisioning
type: boolean
spInitiateUrl:
description: URL for SP-initiated sign-in flows (required if `sp = true`)
example: https://test.example.com/strawberry/saml/sp-init
format: uri
maxLength: 512
type: string
spInitiateDescription:
description: Instructions on how to sign in to your app using the SP-initiated
flow (required if `sp = true`)
example: Go to your app URL from a browser and enter your username
maxLength: 2048
type: string
required:
- spInitiateUrl
type: object
TestInfo_testAccount:
description: "An account on a test instance of your app with admin privileges.\
\ A test admin account is required by Okta for integration testing. During\
\ OIN QA testing, an Okta analyst uses this admin account to configure your\
\ app for the various test case flows."
properties:
url:
description: The sign-in URL to a test instance of your app
example: https://example.com/strawberry/login
format: uri
maxLength: 512
type: string
username:
description: The username for your app admin account
example: test@example.com
maxLength: 255
type: string
password:
description: The password for your app admin account
example: sUperP@ssw0rd
maxLength: 255
type: string
instructions:
description: "Additional instructions to test the app integration, including\
\ instructions for obtaining test accounts"
example: Go to your app URL from a browser and enter your credentials
maxLength: 2048
type: string
required:
- password
- url
- username
type: object
TokenHookResponse_commands_inner_value_inner_value:
description: Value to set the claim to.
oneOf:
- type: string
- type: integer
- type: object
TokenHookResponse_commands_inner_value_inner:
properties:
op:
description: "The name of one of the supported ops: `add`: Add a claim.\
\ `replace`: Modify an existing claim and update the token lifetime. `remove`:\
\ Remove an existing claim.\n#### `op: add` notes\n\n\nAdd\
\ a claim
\n \n Add a claim\n\n **Existing JSON**\n \n ```\n\
\ {\n \"employeeId\": \"00u12345678\"\n }\n ```\n\n **Operation**\n\
\n ```\n {\n \"commands\": [\n {\n \"type\": \"com.okta.assertion.patch\"\
,\n \"value\": [\n {\n \"op\": \"add\",\n \
\ \"path\": \"/claims/extPatientId\",\n \"value\"\
: \"1234\"\n }\n ]\n },\n {\n \"type\"\
: \"com.okta.assertion.patch\",\n \"value\": [\n {\n \
\ \"op\": \"add\",\n \"path\": \"/claims/external_guid\"\
,\n \"value\": \"F0384685-F87D-474B-848D-2058AC5655A7\"\n \
\ }\n ]\n }\n ]\n }\n ```\n \n **Updated JSON**\n\
\ \n ```\n {\n \"employeeId\": \"00u12345678\",\n \"extPatientId\"\
: 1234,\n \"external_guid\": \"F0384685-F87D-474B-848D-2058AC5655A7\"\
\n }\n ```\n\n > **Note:** If you use the `add` operation and include\
\ an existing claim in your response with a different value, that value\
\ is replaced. Use the `replace` operation instead. If you attempt to\
\ remove a system-specific claim or use an invalid operation, the entire\
\ PATCH fails and errors are logged in the token hooks events. See `op:\
\ replace` notes.\n\n\n\nAdd new members to\
\ existing JSON objects
\n \n If you have a JSON object in\
\ a claim called `employee_profile`, and you want to add the `department_id`\
\ member to the claim, the existing JSON is updated by specifying the\
\ claim in the path, followed by the name of the object member.\n\n **Existing\
\ JSON**\n \n ```\n {\n \"employee_profile\": {\n \"employee_id\"\
: \"1234\",\n \"name\": \"Anna\"\n }\n }\n ```\n\n **Operation**\n\
\n ```\n {\n \"commands\": [\n {\n \"type\": \"com.okta.identity.patch\"\
,\n \"value\": [\n {\n \"op\": \"add\",\n \
\ \"path\": \"/claims/employee_profile/department_id\",\n \
\ \"value\": \"4947\"\n }\n ]\n }\n ]\n\
\ }\n ```\n \n **Updated JSON**\n \n ```\n {\n \"employee_profile\"\
: {\n \"employee_id\": \"1234\",\n \"name\": \"Anna\",\n \
\ \"department_id\": \"4947\"\n }\n }\n ```\n\n > **Note:** If\
\ you attempt to add a member within a JSON object that doesn't exist\
\ or using an invalid operation, the entire PATCH fails and errors are\
\ logged in the token hooks events.\n\n\n\nAdd\
\ new elements to existing arrays
\n \n Append an element to\
\ an array by specifying the name of the array, followed by the index\
\ where you want to insert the element in the path. Alternatively, you\
\ can specify the array name followed by a hyphen (-) in the path to append\
\ an element at the end of the array. For example, you have an array that\
\ contains the user's preferred airports, and you want to add a new airport\
\ to the array. The existing target JSON object is updated by specifying\
\ the claim in the path, followed by the index of where to insert the\
\ claim.\n \n **Existing JSON**\n \n ```\n {\n \"preferred_airports\"\
:[\n \"sjc\",\n \"sfo\",\n \"oak\"\n ]\n }\n ```\n\
\n **Operation**\n\n ```\n {\n \"commands\": [\n {\n \
\ \"type\": \"com.okta.identity.patch\",\n \"value\": [\n \
\ {\n \"op\": \"add\",\n \"path\": \"/claims/preferred_airports/3\"\
,\n \"value\": \"lax\"\n }\n ]\n }\n \
\ ]\n }\n ```\n\n **Updated JSON**\n \n ```\n {\n \"preferred_airports\"\
:[\n \"sjc\",\n \"sfo\",\n \"oak\",\n \"lax\"\n \
\ ]\n }\n ```\n \n > **Note:** If you attempt to add an element within\
\ an array that doesn't exist or specify an invalid index, the entire\
\ PATCH fails and errors are logged in the token hooks events.\n\n\
\n#### `op: replace` notes\n\n\nModify an existing claim
\n\
\n You can modify (`replace`) existing custom claims or OIDC standard\
\ profile claims, such as `birthdate` and `locale`. You can't, however,\
\ modify any system-specific claims, such as `iss` or `ver`. Also, you\
\ can't modify a claim that isn't currently part of the token in the request\
\ payload. Attempting to modify a system-specific claim or using an invalid\
\ operation results in the entire PATCH failing and errors logged in the\
\ token hooks events.\n \n See [Access Tokens Scopes and Claims](/openapi/okta-oauth/guides/overview/#access-token-scopes-and-claims)\
\ for the list of access token-reserved claims that you can't modify.\n\
\n > **Note:** Although the `aud` and `sub` claims are listed as reserved\
\ claims, you can modify those claims in access tokens. You can't modify\
\ these claims in ID tokens.\n\n See [ID Token Claims](/openapi/okta-oauth/guides/overview/#id-token-claims)\
\ for a list of ID token-reserved claims that you can't modify.\n\n **Existing\
\ target JSON object**\n\n ```\n {\n \"employeeId\": \"00u12345678\"\
,\n \"extPatientId\": 1234,\n \"external_guid\": \"F0384685-F87D-474B-848D-2058AC5655A7\"\
\n }\n ```\n\n **Operation**\n\n ```\n {\n \"commands\": [\n \
\ {\n \"type\": \"com.okta.identity.patch\",\n \"value\"\
: [\n {\n \"op\": \"replace\",\n \"path\"\
: \"/claims/extPatientId\",\n \"value\": \"12345\"\n \
\ },\n {\n \"op\": \"replace\",\n \"\
path\": \"/claims/external_guid\",\n \"value\": \"D1495796-G98E-585C-959E-1269CD6766B8\"\
\n }\n ]\n }\n ]\n }\n ```\n\n **Updated JSON***\n\
\n ```\n {\n \"employeeId\": \"00u12345678\",\n \"extPatientId\"\
: 12345,\n \"external_guid\": \"D1495796-G98E-585C-959E-1269CD6766B8\"\
\n }\n ```\n \n\n\n\nModify members within\
\ existing JSON objects and arrays
\n \n Use the `replace`\
\ operation to modify members within JSON objects and elements within\
\ arrays. For example, you have a JSON object in a claim called `employee_profile`,\
\ and you want to update the email address of the employee. The existing\
\ target JSON object is updated by specifying the claim in the path, followed\
\ by the name of the object member that you want to modify.\n\n **Existing\
\ target JSON object**\n \n ```\n {\n \"employee_profile\": {\n\
\ \"employee_id\":\"1234\",\n \"name\":\"Anna\",\n \"email\"\
:\"anna.v@company.com\"\n }\n }\n ```\n\n **Operation**\n\n ```\n\
\ {\n \"commands\": [\n {\n \"type\": \"com.okta.identity.patch\"\
,\n \"value\": [\n {\n \"op\": \"replace\"\
,\n \"path\": \"/claims/employee_profile/email\",\n \
\ \"value\": \"anna@company.com\"\n }\n ]\n }\n\
\ ]\n }\n ```\n\n **Updated JSON**\n \n ```\n {\n \"employee_profile\"\
: {\n \"employee_id\":\"1234\",\n \"name\":\"Anna\",\n \
\ \"email\":\"anna@company.com\"\n }\n }\n ```\n\n > **Note:**\
\ If you attempt to modify a member within a JSON object that doesn't\
\ exist or use an invalid operation, the entire PATCH fails and errors\
\ are logged in the token hooks events.\n \n Similarly, you can replace\
\ elements in an array by specifying the array name and the valid index\
\ of the element that you want to replace in the path.\n\n\n\
\nModify token lifetimes
\n You can modify\
\ how long the access and ID tokens are valid by specifying the `lifetime`\
\ in seconds. The `lifetime` value must be a minimum of five minutes (300\
\ seconds) and a maximum of 24 hours (86,400 seconds).\n\n **Operation**\n\
\n ```\n {\n \"commands\": [\n {\n \"type\": \"com.okta.identity.patch\"\
,\n \"value\": [\n {\n \"op\": \"replace\"\
,\n \"path\": \"/token/lifetime/expiration\",\n \
\ \"value\": 36000\n }\n ]\n },\n {\n \
\ \"type\": \"com.okta.access.patch\",\n \"value\": [\n \
\ {\n \"op\": \"replace\",\n \"path\": \"/token/lifetime/expiration\"\
,\n \"value\": 36000\n }\n ]\n }\n \
\ ]\n }\n ```\n\n\n\n#### `op: remove` notes\n\n\n\
Remove a claim
\n\n You can remove existing custom\
\ claims or OIDC standard profile claims, such as `birthdate` or `locale`.\
\ You can't, however, remove any system-specific claims, such as `iss`\
\ or `ver`. You also can't remove a claim that isn't currently part of\
\ the token in the request payload. If you attempt to remove a system-specific\
\ claim or use an invalid operation, the entire PATCH fails and errors\
\ are logged in the token hooks events.\n\n See [Access Tokens Scopes\
\ and Claims](/openapi/okta-oauth/guides/overview/#access-token-scopes-and-claims)\
\ for the list of access token-reserved claims that you can't modify.\n\
\n See [ID Token Claims](/openapi/okta-oauth/guides/overview/#id-token-claims)\
\ for a list of ID token-reserved claims that you can't modify.\n\n **Operation**\n\
\n ```\n {\n \"commands\": [\n {\n \"type\": \"com.okta.identity.patch\"\
,\n \"value\": [\n {\n \"op\": \"remove\",\n\
\ \"path\": \"/claims/birthdate\",\n \"value\":\
\ null\n }\n ]\n },\n {\n \"type\": \"\
com.okta.access.patch\",\n \"value\": [\n {\n \
\ \"op\": \"remove\",\n \"path\": \"/claims/external_guid\"\
\n }\n ]\n }\n ]\n }\n ```\n\n > **Note:**\
\ The `value` property for the `remove` operation isn't required. If you\
\ provide it in the response, it should be set to `null`. Providing any\
\ other value fails the entire PATCH response.\n\n\n\n\n\
Remove members from existing arrays
\n\n Use the `remove`\
\ operation to remove members from existing arrays. For example, you have\
\ an array that contains the user's preferred airports, and you want to\
\ remove an airport from the array. The existing target JSON object is\
\ updated by specifying the array name followed by the index of the element\
\ that you want to remove. You don't need to specify a value for the remove\
\ operation, but you can specify `null` as the value if you want.\n \n\
\ **Existing target JSON object**\n \n ```\n {\n \"preferred_airports\"\
: [\n \"sjc\",\n \"lax\",\n \"sfo\",\n \"\
oak\"\n ]\n }\n ```\n \n **Operation**\n\n ```\n {\n \"\
commands\": [\n {\n \"type\": \"com.okta.identity.patch\"\
,\n \"value\": [\n {\n \"op\": \"remove\",\n\
\ \"path\": \"/claims/preferred_airports/1\"\n }\n\
\ ]\n }\n ]\n }\n ```\n\n **Updated JSON**\n \n ```\n\
\ {\n \"preferred_airports\": [\n \"sjc\",\n \"sfo\"\
,\n \"oak\"\n ]\n }\n ```\n\n\n\n\nRemove\
\ members from existing JSON objects
\n\n Use the `remove` operation\
\ to remove members from existing JSON objects. Do this by specifying\
\ the JSON object in the path, followed by the claim member that you would\
\ like to remove. For example, you have an `employee_profile` claim, and\
\ you want to remove `email` from it.\n\n**Existing target JSON object**\n\
\n```\n{\n \"employee_profile\": {\n \"employee_id\":\"1234\",\n \
\ \"name\":\"Anna\",\n \"email\":\"anna.v@company.com\"\n }\n\
}\n```\n\n**Operation**\n\n```\n{\n \"commands\": [\n {\n \"\
type\": \"com.okta.identity.patch\",\n \"value\": [\n {\n\
\ \"op\": \"remove\",\n \"path\": \"/claims/employee_profile/email\"\
\n }\n ]\n }\n ]\n}\n```\n\n**Updated JSON**\n```\n{\n\
\ \"employee_profile\": {\n \"employee_id\":\"1234\",\n \"name\"\
:\"Anna\",\n }\n}\n```\n\n"
type: string
path:
description: "Location within the token to apply the operation, specified\
\ as a slash-delimited path. When you add, replace, or remove a claim,\
\ this path always begins with `/claims/` and is followed by the name\
\ of the new claim that you're adding. When you replace a token lifetime,\
\ the path should always be `/token/lifetime/expiration`."
type: string
value:
$ref: '#/components/schemas/TokenHookResponse_commands_inner_value_inner_value'
type: object
TokenHookResponse_commands_inner:
properties:
type:
description: |-
One of the supported commands:
`com.okta.identity.patch`: Modify an ID token
`com.okta.access.patch`: Modify an access token
> **Note:** The `commands` array should only contain commands that can be applied to the requested tokens. For example, if only an ID token is requested, the `commands` array shouldn't contain commands of the type `com.okta.access.patch`.
type: string
value:
description: "The `value` object is where you specify the operation to perform.\
\ It's an array, which allows you to request more than one operation."
items:
$ref: '#/components/schemas/TokenHookResponse_commands_inner_value_inner'
type: array
type: object
TokenHookResponse_error:
description: "When an error object is returned, it causes Okta to return an\
\ OAuth 2.0 error to the requester of the token. In the error response, the\
\ value of `error` is `server_error`, and the value of `error_description`\
\ is the string that you supplied in the `errorSummary` property of the `error`\
\ object that you returned."
properties:
errorSummary:
description: "Human-readable summary of the error. If the error object doesn't\
\ include the `errorSummary` property defined, the following common default\
\ message is returned to the end user: `The callback service returned\
\ an error`."
type: string
type: object
TokenPayLoad_data_context_allOf_protocol_OriginalGrant:
description: "Information about the original token request used to get the refresh\
\ token being used, when in a refresh token request"
properties:
request:
$ref: '#/components/schemas/TokenProtocolRequest'
refresh_token:
$ref: '#/components/schemas/RefreshToken'
type: object
TokenPayLoad_data_context_allOf_protocol_issuer:
description: The authorization server's issuer identifier
properties:
uri:
description: The authorization server's issuer identifier
format: uri
type: string
type: object
TokenPayLoad_data_context_allOf_protocol_client:
description: The client making the token request
properties:
id:
description: The unique identifier of the client
type: string
name:
description: The name of the client
type: string
type:
description: The type of client
example: PUBLIC
type: string
type: object
TokenPayLoad_data_context_allOf_protocol:
description: Details of the authentication protocol
properties:
type:
description: The type of authentication protocol used
example: OAUTH2.0
type: string
request:
$ref: '#/components/schemas/TokenProtocolRequest'
OriginalGrant:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_protocol_OriginalGrant'
issuer:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_protocol_issuer'
client:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_protocol_client'
type: object
TokenPayLoad_data_context_allOf_policy_rule:
description: The authorization server policy rule used to mint the token
properties:
id:
description: The unique identifier for the policy rule
example: 0pr4ktb7elD3ZvrMy0g7
type: string
type: object
TokenPayLoad_data_context_allOf_policy:
description: The authorization server policy used to mint the token
properties:
id:
description: The unique identifier for the policy
example: 00p4ktaq2ryOYtsHC0g7
type: string
rule:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_policy_rule'
type: object
TokenPayLoad_data_context:
allOf:
- $ref: '#/components/schemas/BaseContext'
- properties:
protocol:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_protocol'
policy:
$ref: '#/components/schemas/TokenPayLoad_data_context_allOf_policy'
type: object
TokenPayLoad_data_identity:
allOf:
- description: "Provides information on the properties of the ID token that\
\ Okta has generated, including the existing claims that it contains"
- $ref: '#/components/schemas/BaseToken'
TokenPayLoad_data_access:
allOf:
- description: "Provides information on the properties of the access token that\
\ Okta has generated, including the existing claims that it contains"
- $ref: '#/components/schemas/BaseToken'
- properties:
scopes:
description: "The scopes contained in the token. For descriptions of the\
\ scopes that you can include, see the Okta [OpenID Connect and OAuth\
\ 2.0 API reference](/openapi/okta-oauth/guides/overview/#scopes)."
type: object
type: object
TokenPayLoad_data:
properties:
context:
$ref: '#/components/schemas/TokenPayLoad_data_context'
identity:
$ref: '#/components/schemas/TokenPayLoad_data_identity'
access:
$ref: '#/components/schemas/TokenPayLoad_data_access'
refresh_token:
$ref: '#/components/schemas/RefreshToken'
type: object
UIElement_options:
description: UI Schema element options object
example:
format: text
properties:
format:
description: Specifies how the input appears
enum:
- text
- radio
- select
- checkbox
- radio_yes_no
- radio_true_false
type: string
x-enumDescriptions:
text: The default format for the majority of property types
radio: Radio button options. This option is only available for `string`
data types with an `enum` or `one of` constraint.
select: Displays input as a dropdown list. This option is only available
for the `country-code` data type or a string data type with an enum
or one of constraint.
checkbox: Displays input as a checkbox. This option is only available
for Boolean data types.
radio_yes_no: "Displays input as two radio buttons, one with the option\
\ `yes` and the other `no`. This option is only available for Boolean\
\ data types."
radio_true_false: "Displays input as two radio buttons, one with the option\
\ `true` and the other `false`. This option is only available for Boolean\
\ data types."
type: object
User__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- properties:
self:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to the individual user
activate:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to activate the user
resetPassword:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to reset the User's password
resetFactors:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to reset the User's factors
expirePassword:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to expire the User's password
forgotPassword:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to initiate a forgot password operation
changeRecoveryQuestion:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to change the User's recovery question
deactivate:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to deactivate a user
reactivate:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to reactivate the user
changePassword:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to change the User's password
schema:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to the User's profile schema
suspend:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to suspend the user
unsuspend:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to unsuspend the user
unlock:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to unlock the locked-out user
type:
allOf:
- $ref: '#/components/schemas/HrefObject'
description: URL to the User Type
type: object
- readOnly: true
description: |-
Specifies link relations (see [Web Linking](https://datatracker.ietf.org/doc/html/rfc8288) available for the current status of a user.
The Links object is used for dynamic discovery of related resources, lifecycle operations, and credential operations. The Links object is read-only.
For an individual User result, the Links object contains a full set of link relations available for that User as determined by your policies.
For a collection of users, the Links object contains only the `self` link. Operations that return a collection of Users include List Users and List Group Members.
example:
schema: ""
suspend: ""
resetPassword: ""
unlock: ""
reactivate: ""
unsuspend: ""
resetFactors: ""
type: ""
deactivate: ""
changePassword: ""
forgotPassword: ""
expirePassword: ""
changeRecoveryQuestion: ""
activate: ""
self: ""
UserFactorActivateResponse__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksUser'
- $ref: '#/components/schemas/LinksVerify'
example:
self:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
verify:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
user:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
UserFactorPushTransactionRejected_allOf_profile:
properties:
credentialId:
description: ID for the Factor credential
example: dade.murphy@example.com
type: string
type: object
UserFactorPushTransactionRejected_allOf__links:
allOf:
- $ref: '#/components/schemas/LinksVerify'
- properties:
factor:
$ref: '#/components/schemas/UserFactor'
type: object
UserFactorPushTransactionTimeout_allOf__links:
allOf:
- $ref: '#/components/schemas/LinksVerify'
- properties:
factor:
$ref: '#/components/schemas/UserFactor'
type: object
UserFactorPushTransactionWaiting_allOf__links:
allOf:
- $ref: '#/components/schemas/LinksPoll'
- $ref: '#/components/schemas/LinksCancel'
UserFactorToken_allOf_verify:
oneOf:
- $ref: '#/components/schemas/UserFactorTokenVerifyRSA'
- $ref: '#/components/schemas/UserFactorTokenVerifySymantec'
UserFactorTokenHardware_allOf_verify:
properties:
passCode:
description: OTP for the current time window
example: cccccceukngdfgkukfctkcvfidnetljjiknckkcjulji
type: string
type: object
UserGetSingleton_allOf__embedded:
description: The embedded resources related to the object if the `expand` query
parameter is specified
example:
blocks:
- appliesTo: ANY_DEVICES
type: DEVICE_BASED
- appliesTo: ANY_DEVICES
type: DEVICE_BASED
properties:
blocks:
description: A list of access block details for the User account
items:
$ref: '#/components/schemas/UserBlock'
type: array
type: object
UserImportRequestData_action:
description: The object that specifies the default action Okta is set to take
properties:
result:
description: "The current default action that results when Okta imports\
\ a user. The two possible values are `CREATE_USER` and `LINK_USER`. You\
\ \ncan change the action that is taken by means of the commands object\
\ you return."
enum:
- CREATE_USER
- LINK_USER
type: string
x-enumDescriptions:
CREATE_USER: A new Okta user profile is created for the user
LINK_USER: The user is treated as a match for the existing Okta user identified
by the value of `data.user.id`
type: object
UserImportRequestData_appUser:
description: The app user profile being imported
properties:
profile:
additionalProperties:
type: string
description: "Provides the name-value pairs of the attributes contained\
\ in the app user profile of the user who is being imported. You can change\
\ \nthe values of attributes in the user's app profile by means of the\
\ `commands` object you return. If you change attributes in the app \n\
profile, they then flow through to the Okta user profile, based on matching\
\ and mapping rules."
type: object
type: object
UserImportRequestData_context_application:
description: Details of the app from which the user is being imported
properties:
name:
description: The app name
type: string
id:
description: The app ID
type: string
label:
description: The user-defined display name for the app
type: string
status:
description: The status of the app
enum:
- ACTIVE
- INACTIVE
type: string
type: object
UserImportRequestData_context_job:
description: The details of the running import job
properties:
id:
description: The ID number of the import job
type: string
type:
description: The type of import job
type: string
type: object
UserImportRequestData_context:
properties:
conflicts:
description: An array of user profile attributes that are in conflict
items:
additionalProperties: true
type: object
type: array
application:
$ref: '#/components/schemas/UserImportRequestData_context_application'
job:
$ref: '#/components/schemas/UserImportRequestData_context_job'
matches:
description: The list of Okta users currently matched to the app user based
on import matching. There can be more than one match.
items:
additionalProperties: true
type: object
type: array
policy:
description: The list of any policies that apply to the import matching
items:
additionalProperties: true
type: object
type: array
type: object
UserImportRequestData_user:
description: "Provides information on the Okta user profile currently set to\
\ be used for the user who is being imported, based on the matching \nrules\
\ and attribute mappings that were applied."
properties:
profile:
additionalProperties:
type: string
description: |-
The `data.user.profile` contains the name-value pairs of the attributes in the user profile. If the user has been matched to an existing
Okta user, a `data.user.id` object is included, containing the unique identifier of the Okta user profile.
You can change the values of the attributes by means of the `commands` object you return.
type: object
type: object
UserImportResponse_commands_inner:
properties:
type:
description: |-
The command types supported for the import inline hook.
When using the `com.okta.action.update` command to specify that the user should be treated as a match, you need to also provide a `com.okta.user.update` command that sets the ID of the Okta user.
enum:
- com.okta.appUser.profile.update
- com.okta.user.profile.update
- com.okta.action.update
- com.okta.user.update
type: string
x-enumDescriptions:
com.okta.appUser.profile.update: Change values of attributes in the user's
app user profile
com.okta.user.profile.update: Change values of attributes in the user's
Okta user profile
com.okta.action.update: Specify whether to create a new Okta user for
the user being imported or treat them as a match of an existing Okta
user
com.okta.user.update: Specify the existing Okta user that the imported
user should be treated as a match of.
value:
additionalProperties:
type: string
description: "The `value` object is the parameter to pass to the command.\
\ In the case of the `com.okta.appUser.profile.update` and `com.okta.user.profile.update`\
\ commands, \nthe parameter should be a list of one or more profile attributes\
\ and the values you wish to set them to. In the case of the `com.okta.action.update`\
\ command,\nthe parameter should be a `result` property set to either\
\ `CREATE_USER` or `LINK_USER`."
type: object
type: object
UserImportResponse_error:
description: "An object to return an error. Returning an error causes Okta to\
\ record a failure event in the Okta System Log. \nThe string supplied in\
\ the `errorSummary` property is recorded in the System Log event.\n\n>**Note:**\
\ If a response to an import inline hook request is not received from your\
\ external service within three seconds, a timeout occurs. In this scenario,\
\ the Okta import process continues and the user is created."
properties:
errorSummary:
description: A human-readable summary of the error
type: string
type: object
UserRiskGetResponse__links:
allOf:
- $ref: '#/components/schemas/LinksSelf'
- $ref: '#/components/schemas/LinksUserRef'
UserTypeLinks_allOf_schema:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: The associated schema
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
WellKnownAppAuthenticatorConfiguration_settings:
example:
userVerification: PREFERRED
properties:
userVerification:
$ref: '#/components/schemas/CustomAppUserVerificationEnum'
type: object
WellKnownOrgMetadata__links:
example:
organization:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
alternate:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
properties:
alternate:
$ref: '#/components/schemas/HrefObject'
organization:
$ref: '#/components/schemas/HrefObject'
type: object
orgBillingContactType__links_billing:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the org billing [Contact Type User](/openapi/okta-management/management/tag/OrgSettingContact/#tag/OrgSettingContact/operation/getOrgContactUser)\
\ resource"
orgBillingContactType__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the org billing Contact Type object using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
properties:
billing:
$ref: '#/components/schemas/orgBillingContactType__links_billing'
readOnly: true
type: object
orgGeneralSettingLinks_contacts:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Org Contacts](/openapi/okta-management/management/tag/OrgSettingContact/)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgGeneralSettingLinks_logo:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: Link to the org logo
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgGeneralSettingLinks_oktaCommunication:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Org Communication Settings](/openapi/okta-management/management/tag/OrgSettingCommunication/)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgGeneralSettingLinks_oktaSupport:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Org Support Settings](/openapi/okta-management/management/tag/OrgSettingSupport/)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgGeneralSettingLinks_preferences:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Org Preferences](/openapi/okta-management/management/tag/OrgSettingCustomization/#tag/OrgSettingCustomization/operation/getOrgPreferences)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgGeneralSettingLinks_uploadLogo:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the [Upload Org Logo](/openapi/okta-management/management/tag/OrgSettingCustomization/#tag/OrgSettingCustomization/operation/uploadOrgLogo)\
\ resource"
example:
templated: true
hints:
allow:
- DELETE
- DELETE
name: name
href: href
type: type
orgTechnicalContactType__links_technical:
allOf:
- $ref: '#/components/schemas/HrefObject'
- description: "Link to the org technical [Contact Type User](/openapi/okta-management/management/tag/OrgSettingContact/#tag/OrgSettingContact/operation/getOrgContactUser)\
\ resource"
orgTechnicalContactType__links:
description: "Specifies link relations (see [Web Linking](https://www.rfc-editor.org/rfc/rfc8288))\
\ available for the org technical Contact Type object using the [JSON Hypertext\
\ Application Language](https://datatracker.ietf.org/doc/html/draft-kelly-json-hal-06)\
\ specification"
properties:
technical:
$ref: '#/components/schemas/orgTechnicalContactType__links_technical'
readOnly: true
type: object
securitySchemes:
apiToken:
description: "Pass the API token as the Authorization header value prefixed\
\ with SSWS: `Authorization: SSWS {API Token}`"
in: header
name: Authorization
type: apiKey
oauth2:
description: "Pass the access_token as the value of the Authorization header:\
\ `Authorization: Bearer {access_token}`"
flows:
authorizationCode:
authorizationUrl: /oauth2/v1/authorize
scopes:
okta.agentPools.manage: Allows the app to create and manage agent pools
in your Okta organization
okta.agentPools.read: Allows the app to read agent pools in your Okta
organization
okta.apiTokens.manage: Allows the app to manage API Tokens in your Okta
organization
okta.apiTokens.read: Allows the app to read API Tokens in your Okta organization
okta.appGrants.manage: Allows the app to create and manage grants in your
Okta organization
okta.appGrants.read: Allows the app to read grants in your Okta organization
okta.apps.manage: Allows the app to create and manage Apps in your Okta
organization
okta.apps.read: Allows the app to read information about Apps in your
Okta organization
okta.authenticators.manage: "Allows the app to manage all authenticators.\
\ For example, enrollments or resets."
okta.authenticators.manage.self: "Allows the app to manage a user's own\
\ authenticators. For example, enrollments or resets."
okta.authenticators.read: Allows the app to read org authenticators information
okta.authorizationServers.manage: Allows the app to create and manage
Authorization Servers in your Okta organization
okta.authorizationServers.read: Allows the app to read information about
Authorization Servers in your Okta organization
okta.behaviors.manage: Allows the app to create and manage behavior detection
rules in your Okta organization
okta.behaviors.read: Allows the app to read behavior detection rules in
your Okta organization
okta.brands.manage: Allows the app to create and manage Brands and Themes
in your Okta organization
okta.brands.read: Allows the app to read information about Brands and
Themes in your Okta organization
okta.captchas.manage: Allows the app to create and manage CAPTCHAs in
your Okta organization
okta.captchas.read: Allows the app to read information about CAPTCHAs
in your Okta organization
okta.deviceAssurance.manage: Allows the app to manage device assurances
okta.deviceAssurance.read: Allows the app to read device assurances
okta.deviceChecks.manage: Allows the app to manage device checks
okta.deviceChecks.read: Allows the app to read device checks
okta.devices.manage: Allows the app to manage device status transitions
and delete a device
okta.devices.read: Allows the app to read the existing device's profile
and search devices
okta.directories.groups.manage: Allows the app to manage AD/LDAP Groups
for your Okta organization
okta.domains.manage: Allows the app to manage custom Domains for your
Okta organization
okta.domains.read: Allows the app to read information about custom Domains
for your Okta organization
okta.dr.manage: Allows the app to manage disaster recovery
okta.dr.read: Allows the app to read the disaster recovery status
okta.emailDomains.manage: Allows the app to manage Email Domains for your
Okta organization
okta.emailDomains.read: Allows the app to read information about Email
Domains for your Okta organization
okta.emailServers.manage: Allows the app to manage Email Servers for your
Okta organization
okta.emailServers.read: Allows the app to read information about Email
Servers for your Okta organization
okta.eventHooks.manage: Allows the app to create and manage Event Hooks
in your Okta organization
okta.eventHooks.read: Allows the app to read information about Event Hooks
in your Okta organization
okta.features.manage: Allows the app to create and manage Features in
your Okta organization
okta.features.read: Allows the app to read information about Features
in your Okta organization
okta.groups.manage: Allows the app to manage existing groups in your Okta
organization
okta.groups.read: Allows the app to read information about groups and
their members in your Okta organization
okta.identitySources.manage: Allows the custom identity sources to manage
user entities in your Okta organization
okta.identitySources.read: Allows to read session information for custom
identity sources in your Okta organization
okta.idps.manage: Allows the app to create and manage Identity Providers
in your Okta organization
okta.idps.read: Allows the app to read information about Identity Providers
in your Okta organization
okta.inlineHooks.manage: Allows the app to create and manage Inline Hooks
in your Okta organization
okta.inlineHooks.read: Allows the app to read information about Inline
Hooks in your Okta organization
okta.linkedObjects.manage: Allows the app to manage linked object definitions
in your Okta organization
okta.linkedObjects.read: Allows the app to read linked object definitions
in your Okta organization
okta.logStreams.manage: Allows the app to create and manage log streams
in your Okta organization
okta.logStreams.read: Allows the app to read information about log streams
in your Okta organization
okta.logs.read: Allows the app to read information about System Log entries
in your Okta organization
okta.manifests.manage: Allows the app to manage OIN submissions in your
Okta organization
okta.manifests.read: Allows the app to read OIN submissions in your Okta
organization
okta.networkZones.manage: Allows the app to create and manage Network
Zones in your Okta organization
okta.networkZones.read: Allows the app to read Network Zones in your Okta
organization
okta.oauthIntegrations.manage: Allows the app to create and manage API
service Integration instances in your Okta organization
okta.oauthIntegrations.read: Allows the app to read API service Integration
instances in your Okta organization
okta.orgs.manage: Allows the app to manage organization-specific details
for your Okta organization
okta.orgs.read: Allows the app to read organization-specific details about
your Okta organization
okta.personal.adminSettings.manage: Allows the app to manage the personal
admin settings for the signed-in user
okta.personal.adminSettings.read: Allows the app to read the personal
admin settings for the signed-in user
okta.policies.manage: Allows the app to manage policies in your Okta organization
okta.policies.read: Allows the app to read information about policies
in your Okta organization
okta.principalRateLimits.manage: Allows the app to create and manage Principal
Rate Limits in your Okta organization
okta.principalRateLimits.read: Allows the app to read information about
Principal Rate Limits in your Okta organization
okta.privilegedAccounts.manage: Allows the app to create and manage Privileged
Accounts in your Okta organization
okta.privilegedAccounts.read: Allows the app to read Privileged Accounts
in your Okta organization
okta.privilegedResources.manage: Allows the app to create privileged resources
and manage their details
okta.privilegedResources.read: Allows the app to read the details of existing
privileged resources
okta.profileMappings.manage: Allows the app to manage user profile mappings
in your Okta organization
okta.profileMappings.read: Allows the app to read user profile mappings
in your Okta organization
okta.pushProviders.manage: Allows the app to create and manage push notification
providers such as APNs and FCM
okta.pushProviders.read: Allows the app to read push notification providers
such as APNs and FCM
okta.rateLimits.manage: Allows the app to create and manage rate limits
in your Okta organization
okta.rateLimits.read: Allows the app to read information about rate limits
in your Okta organization
okta.realmAssignments.manage: Allows a user to manage realm assignments
okta.realmAssignments.read: Allows a user to read realm assignments
okta.realms.manage: Allows the app to create new realms and to manage
their details
okta.realms.read: Allows the app to read the existing realms and their
details
okta.resourceSelectors.manage: Allows the app to manage resource selectors
in your Okta org
okta.resourceSelectors.read: Allows the app to read resource selectors
in your Okta org
okta.riskEvents.manage: Allows the app to publish risk events to your
Okta organization
okta.riskProviders.manage: Allows the app to create and manage risk provider
integrations in your Okta organization
okta.riskProviders.read: Allows the app to read all risk provider integrations
in your Okta organization
okta.roles.manage: Allows the app to manage administrative role assignments
for users in your Okta organization. Delegated admins with this permission
can only manage user credential fields and not the credential values
themselves.
okta.roles.read: Allows the app to read administrative role assignments
for users in your Okta organization. Delegated admins with this permission
can only manage user credential fields and not the credential values
themselves.
okta.schemas.manage: Allows the app to create and manage Schemas in your
Okta organization
okta.schemas.read: Allows the app to read information about Schemas in
your Okta organization
okta.securityEventsProviders.manage: Allows the app to create and manage
Security Events Providers in your Okta organization
okta.securityEventsProviders.read: Allows the app to read information
about Security Events Providers in your Okta organization
okta.sessions.manage: Allows the app to manage all sessions in your Okta
organization
okta.sessions.read: Allows the app to read all sessions in your Okta organization
okta.templates.manage: Allows the app to manage all custom templates in
your Okta organization
okta.templates.read: Allows the app to read all custom templates in your
Okta organization
okta.threatInsights.manage: Allows the app to manage all ThreatInsight
configurations in your Okta organization
okta.threatInsights.read: Allows the app to read all ThreatInsight configurations
in your Okta organization
okta.trustedOrigins.manage: Allows the app to manage all Trusted Origins
in your Okta organization
okta.trustedOrigins.read: Allows the app to read all Trusted Origins in
your Okta organization
okta.uischemas.manage: Allows the app to manage all the UI Schemas in
your Okta organization
okta.uischemas.read: Allows the app to read all the UI Schemas in your
Okta organization
okta.userRisk.manage: Allows the app to manage a user's risk in your Okta
org
okta.userRisk.read: Allows the app to read a user's risk in your Okta
org
okta.userTypes.manage: Allows the app to manage user types in your Okta
org
okta.userTypes.read: Allows the app to read user types in your Okta org
okta.users.manage: Allows the app to create new users and to manage all
users' profile and credentials information
okta.users.manage.self: Allows the app to manage the signed-in user's
profile and credentials
okta.users.read: Allows the app to read the existing users' profiles and
credentials
okta.users.read.self: Allows the app to read the signed-in user's profile
and credentials
ssf.manage: Allows the app to create and manage Shared Signals Framework
(SSF) in your Okta organization
ssf.read: Allows the app to read information about Shared Signals Framework
(SSF) in your Okta organization
tokenUrl: /oauth2/v1/token
type: oauth2
x-webhooks:
CreateTelephonyInlineHook:
post:
summary: Create a Telephony Inline Hook
description: "Creates an Okta Telephony inline hook request. This is an automated\
\ request from Okta to your third-party service endpoint.\n\nThe objects that\
\ you return in the JSON payload of your response to this Okta request are\
\ an array of one or more objects,\nwhich specify the Okta commands to execute.\n\
\n>**Note:** The size of your response payload must be less than 256 KB.\n\
\nSee also:\n* For a general introduction to Okta inline hooks, see [Inline\
\ hooks](https://developer.okta.com/docs/concepts/inline-hooks/)\n* For information\
\ on the API for registering external service endpoints with Okta, see [Inline\
\ Hooks Management API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/)\n\
* For an example implementation of a telephony inline hook, see [Telephony\
\ inline hook ](https://developer.okta.com/docs/guides/telephony-inline-hook)\n\
\n### About\n\nThe Okta telephony inline hook allows you to integrate your\
\ own custom code into Okta flows that send SMS or voice call messages. You\
\ can integrate this hook with enrollment, authentication, and recovery flows\
\ that involve the phone authenticator. Okta uses your external provider to\
\ deliver the one-time passcode (OTP) to the Requester. The provider can respond\
\ with commands that indicate if the delivery was successful or not.\n\nYou\
\ can have only one active telephony inline hook per org.\n\nWhen you create\
\ a telephony inline hook, you must include the `authScheme` parameter. See\
\ [Create inline hook](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/#tag/InlineHook/operation/createInlineHook)\
\ and the [authScheme object](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/#tag/InlineHook/operation/createInlineHook!path=channel/0/config/authScheme&t=request)\n\
\n### Time-out behavior\n\nIf the provider response times out, Okta attempts\
\ to send the OTP using the Okta telephony providers. See [Troubleshoot](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/#tag/InlineHook/operation/createTelephonyInlineHook/#troubleshoot).\n\
\n>**Note:** The failover mechanism that uses the Okta telephony providers\
\ is heavily rate-limited.\n\n### Troubleshoot\n\nThis section explains several\
\ common causes of failure for telephony inline hooks.\n\nNote: Administrators\
\ can use the [Okta System Log](https://developer.okta.com/docs/reference/api/system-log/)\
\ to view errors. See the Troubleshooting section in the inline hooks topic\
\ for details on events captured by the Okta System Log.\n\n| Issue \
\ \
\ | Impact \
\ | Error Visibility |\
\ \n|-------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------|-------------------------------------------|\n\
|External service fails to communicate or times out \
\ | Inline hook operation is skipped, OTP is sent to the Requester\
\ using an Okta telephony provider | Administrators only \
\ |\n|External service responds with any HTTP status code besides `200`\
\ | Inline hook operation is skipped, OTP is sent to the\
\ Requester using an Okta telephony provider | Administrators only \
\ | \n|External service returns an error object \
\ | Inline hook operation fails, OTP is sent\
\ to the Requester using an Okta telephony provider | Administrators,\
\ developers, and end users |\n|Hook response is malformed or can't be mapped\
\ to the expected API response | Inline hook operation is skipped\
\ | Administrators\
\ only |\n|Request header doesn't include an `authScheme`\
\ | Inline hook operation is skipped\
\ | Administrators\
\ only |\n|Response uses an invalid status \
\ | Inline hook operation is skipped\
\ | Administrators\
\ only |\n|Operation adds an active telephony inline\
\ hook when a hook exists | Inline hook operation is skipped\
\ | Administrators\
\ only |"
operationId: createTelephonyInlineHook
requestBody:
required: true
content:
application/json:
schema:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/TelephonyRequest'
examples:
TelephonyPayloadExample:
$ref: '#/components/examples/TelephonyPayloadExample'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/TelephonyResponse'
examples:
TelephonySuccessResponse:
$ref: '#/components/examples/TelephonySuccessResponse'
TelephonyFailureResponse:
$ref: '#/components/examples/TelephonyFailureResponse'
"403":
$ref: '#/components/responses/ErrorAccessDenied403'
security:
- apiToken: []
- oauth2: []
tags:
- InlineHook
CreatePasswordImportInlineHook:
post:
summary: Create a Password Import Inline Hook
description: "Creates a password import inline hook request, one type of inline\
\ hook supported by Okta. This is an automated request from Okta to your third-party\
\ service endpoint. This reference provides sample JSON objects that are contained\
\ in the outbound request from Okta to your external service,\nand sample\
\ JSON objects that you can include in your response. The objects that you\
\ return in the JSON payload of your response to this Okta request are an\
\ array of one or more objects,\nwhich specify the Okta commands to execute.\n\
\n>**Note:** The size of your response payload must be less than 256 KB.\n\
\nThe password import inline hook allows you to migrate users from another\
\ data store where you want the users to retain their current passwords.\n\
Use this hook with the [Create User with password import inline hook](https://developer.okta.com/docs/reference/api/users/#create-user-with-password-import-inline-hook)\
\ flow that's provided by the [Users API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/User/).\n\
\nThe password import inline hook is triggered when the user tries to sign\
\ in to Okta for the first time. Okta sends your external service the password\
\ that the user supplied. Your external service then needs to send a response\
\ to Okta indicating whether the password supplied by the end user is valid.\n\
\nIf your service returns a response that indicates that the password is valid,\
\ Okta sets the password for the user. The password import inline hook won't\
\ need to call your service again.\nHowever, if the Okta service is in read-only\
\ mode, it might not be possible to set the password. Okta then needs to call\
\ your service again the next time the user attempts to sign in.\nSee [Password\
\ inline hook and Okta read-only mode](#password-inline-hook-and-okta-read-only-mode)\
\ and [Removing password from existing user store](#password-removal-from-an-existing-user-store).\n\
\n>**Notes:**\n> * Password policies don't apply to the password import inline\
\ hook. That is, if your external service validates the password, the password\
\ is imported even if it doesn't meet the Okta password policy requirements.\n\
> * You can create only one password import inline hook per org.\n\nSee also:\n\
\n * [Inline hooks](https://developer.okta.com/docs/concepts/inline-hooks/)\
\ for a general introduction to Okta inline hooks\n * [Inline Hooks Management\
\ API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/)\
\ for information on the API for registering external service endpoints with\
\ Okta\n * [Add an inline hook](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-inline-hook)\
\ for steps to enable this inline hook in the Admin Console\n * [Password\
\ import inline hook](https://developer.okta.com/docs/guides/password-import-inline-hook/nodejs/main/)\
\ for an example implementation of this inline hook\n\n### Enable a password\
\ import inline hook\n\nTo enable a password import inline hook, you first\
\ need to register your external service endpoint with Okta and configure\
\ it as an inline hook of type `com.okta.user.credential.password.import`.\n\
You can enable the hook using the Admin Console, see [Add an inline hook](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-inline-hook)\
\ or through the [Inline Hooks management API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/).\n\
When creating a user with the Users API, you need to use the [Create User\
\ with password import inline hook](https://developer.okta.com/docs/reference/api/users/#create-user-with-password-import-inline-hook)\
\ use case.\nThis involves specifying a `credentials.password.hook` property\
\ in the request body.\n\nWhen the user that you have added attempts to sign\
\ in to Okta for the first time, the hook is triggered and Okta calls your\
\ external service. The call sends the credentials that the end user provided.\
\ Your service can check\nthe credentials and respond with a command to indicate\
\ whether the credentials are valid or not.\n\n### Password inline hook and\
\ Okta read-only mode\n\nIf your external service responds to Okta indicating\
\ that the credentials are valid, Okta saves the password and can authenticate\
\ the user independently from then on. However, if your Okta org is in a special\
\ [read-only mode](https://support.okta.com/help/s/article/What-is-Oktas-Readonly-Mode)\n\
at the time the user signs in, then saving the password might not be possible.\
\ The next time the end user attempts to sign in, the password import inline\
\ hook needs to be called again.\n\n### Password removal from an existing\
\ user store\n\nBecause of the possibility of your org being in a special\
\ service mode, you shouldn't attempt to permanently delete user passwords\
\ from your existing user store until you can verify the success of the password\
\ import . An Okta System Log Event, `user.import.password`, is available\
\ for this purpose. An event of this type is created every time a password\
\ import inline hook is fired, with its `Event.Outcome` property providing\
\ a status of `FAILURE` or `SUCCESS` for the password import operation. \n\
If the status is `SUCCESS`, Okta has successfully saved the end user's password,\
\ and it's safe to delete it from your previous user store.\n\nYou can configure\
\ an [Event hook](https://developer.okta.com/docs/concepts/event-hooks/) to\
\ send this event type to you for use when triggering automated cleanup of\
\ end-user\npasswords after successful migration."
operationId: createPasswordImportInlineHook
requestBody:
required: true
content:
application/json:
schema:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/PasswordImportRequest'
examples:
PasswordImportPayloadExample:
$ref: '#/components/examples/PasswordImportPayloadExample'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/PasswordImportResponse'
examples:
PasswordImportVerifiedResponse:
$ref: '#/components/examples/PasswordImportVerifiedResponse'
PasswordImportUnVerifiedResponse:
$ref: '#/components/examples/PasswordImportUnVerifiedResponse'
"204":
description: No content - Unverified user response
"403":
$ref: '#/components/responses/ErrorAccessDenied403'
security:
- apiToken: []
- oauth2: []
tags:
- InlineHook
create-registration-hook:
post:
summary: Create a Registration Inline Hook
description: |-
Creates a registration inline hook request, one type of inline hook supported by Okta. This is an automated request from Okta to your third-party service endpoint. This reference provides sample JSON objects that are contained in the outbound request from Okta to your external service,
and sample JSON objects that you can include in your response. The objects that you return in the JSON payload of your response to this Okta request are an array of one or more objects,
which specify the Okta commands to execute.
The Okta registration inline hook allows you to integrate your own custom code into Okta's [Profile Enrollment](https://help.okta.com/okta_help.htm?type=oie&id=ext-create-profile-enrollment) flow. The hook is triggered after Okta receives the registration or profile update request. Your custom code can:
- Allow or deny the registration attempt, based on your own validation of the information the user has submitted
- Set or override the values that are populated in attributes of the user's Okta profile
> **Note:** Profile Enrollment and self-service registration (SSR) inline hooks only work with the [Okta Sign-In Widget](https://developer.okta.com/code/javascript/okta_sign-in_widget/) version 4.5 or later.
See also:
* [Inline hooks](https://developer.okta.com/docs/concepts/inline-hooks/) for a general introduction to Okta inline hooks
* [Inline Hooks Management API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/) for information on the API for registering external service endpoints with Okta
* [Add an inline hook](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-inline-hook) for steps to enable this inline hook in the Admin Console
* [Registration inline hook](https://developer.okta.com/docs/guides/registration-inline-hook) for an example implementation of this inline hook
operationId: create-registration-hook
requestBody:
required: true
content:
application/json:
schema:
allOf:
- $ref: '#/components/schemas/RegistrationInlineHookRequest'
examples:
ProfileEnrollmentRequest:
$ref: '#/components/examples/ProfileEnrollmentRequest'
ProgressiveProfileRequest:
$ref: '#/components/examples/ProgressiveProfileRequest'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/RegistrationResponse'
examples:
ProfileEnrollmentResponse:
$ref: '#/components/examples/ProfileEnrollmentResponse'
ProgressiveProfileResponse:
$ref: '#/components/examples/ProgressiveProfileResponse'
ProfileEnrollmentResponseDeny:
$ref: '#/components/examples/ProfileEnrollmentResponseDeny'
ProgressiveProfileResponseDeny:
$ref: '#/components/examples/ProgressiveProfileResponseDeny'
"204":
description: No content - Allow registration to proceed without any update.
tags:
- InlineHook
security:
- apiToken: []
- oauth2: []
x-okta-no-scope-required: true
CreateUserImportInlineHook:
post:
summary: Create a User Import Inline Hook
description: "Creates a user import inline hook request, one type of inline\
\ hook supported by Okta. This is an automated request from Okta to your third-party\
\ service endpoint. \nThis reference provides sample JSON objects that are\
\ contained in the outbound request from Okta to your external service, and\
\ sample JSON objects that you can include \nin your response. The objects\
\ that you return in the JSON payload of your response to this Okta request\
\ are an array of one or more objects, which specify the Okta commands to\
\ execute.\n\nThe user import inline hook enables you to add custom logic\
\ to the process of importing new users into Okta from an app. You can resolve\
\ conflicts in user name or other profile attributes, \nmodify values of profile\
\ attributes, and control whether the imported user is treated as a match\
\ for an existing user or not. The hook is invoked for each user being imported,\
\ \nat the point immediately after any applicable profile attribute mappings\
\ have been applied, and any potential matches with existing users have been\
\ found, but before the Okta user profile is created.\n\n>**Note:** If the\
\ external service times out after receiving an Okta request, the Okta process\
\ flow continues and the user is created.\n\nSee also:\n* [Inline hooks](https://developer.okta.com/docs/concepts/inline-hooks/)\
\ for a general introduction to Okta inline hooks\n* [Inline Hooks Management\
\ API](https://developer.okta.com/docs/api/openapi/okta-management/management/tag/InlineHook/)\
\ for information on the API for registering external service endpoints with\
\ Okta\n* [Add an inline hook](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-inline-hook)\
\ for steps to enable this inline hook in the Admin Console\n\n>**Note:**\
\ The procedure for associating a user import inline hook with an app using\
\ the Admin Console can't be used with AD or LDAP."
operationId: createUserImportInlineHook
requestBody:
required: true
content:
application/json:
schema:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/UserImportRequest'
examples:
UserImportPayloadExample:
$ref: '#/components/examples/UserImportPayloadExample'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/UserImportResponse'
examples:
UserImportChangeAppUserProfileExample:
$ref: '#/components/examples/UserImportChangeAppUserProfileExample'
UserImportChangeUserProfileExample:
$ref: '#/components/examples/UserImportChangeUserProfileExample'
UserImportCreateANewUserExample:
$ref: '#/components/examples/UserImportCreateANewUserExample'
UserImportMatchExample:
$ref: '#/components/examples/UserImportMatchExample'
UserImportErrorExample:
$ref: '#/components/examples/UserImportErrorExample'
"204":
description: No content - Use the default action
"403":
$ref: '#/components/responses/ErrorAccessDenied403'
security:
- apiToken: []
- oauth2: []
tags:
- InlineHook
create-saml-hook:
post:
summary: Create a SAML Assertion Inline Hook
description: |-
Creates a SAML Assertion inline hook request, one type of inline hook supported by Okta. This is an automated request from Okta to your third-party service endpoint. This reference provides sample JSON objects that are contained in the outbound request from Okta to your external service, and sample JSON objects that you can include in your response. The objects that you return in the JSON payload of your response to this Okta request are an array of one or more objects, which specify the Okta commands to execute.
This type of inline hook is triggered when Okta generates a SAML assertion in response to an authentication request. Before sending the SAML assertion to the app that will consume it, Okta calls out to your external service. Your external service can respond with commands to add attributes to the assertion or to modify its existing attributes.
You can use this functionality to add data to assertions, which might be data that is sensitive, calculated at runtime, or complexly-structured and not appropriate for storing in Okta user profiles. Data added this way is never logged or stored by Okta. As an example, SAML assertions generated for a medical app could be augmented with confidential patient data provided by your external service and not stored in Okta.
This inline hook works only when using custom SAML apps, not apps from the OIN.
See also:
* [Inline hooks](https://developer.okta.com/docs/concepts/inline-hooks/) for a general introduction to Okta inline hooks
* [Inline Hooks Management API](/openapi/okta-management/management/tag/InlineHook/) for information on the API for registering external service endpoints with Okta
* For a use case example of how to implement a SAML assertion inline hook, see [SAML assertion inline hook](https://developer.okta.com/docs/guides/saml-inline-hook)
* For steps to enable this inline hook, see [Add an inline hook](https://help.okta.com/okta_help.htm?type=oie&id=ext-add-inline-hook).
### Specify location within the assertion
Specify the location within the assertion where you want to apply your operation using a slash-delimited path, which follows JSON Patch conventions.
When you perform an `add` op to add a new attribute statement, begin with `/claims/` and follow that with the name of the new attribute that you're adding.
When you modify an existing assertions statement, begin the path with `/subject/`, `/authentication/`, `/conditions/`, or `/claims/`, depending on which part of the assertion you want to modify. You then look deeper within the child elements using slash-delimited element names, for example, `/claims/array/attributeValues/1/value`. (The `/1/` in the path indicates the index of the array, using zero-based indexing.)
### URI claims
Okta supports URI claims with SAML assertion hooks. When you need to replace or add a URI claim, encode the claim name within the command per the [JavaScript Object Notation (JSON) Pointer](https://tools.ietf.org/html/rfc6901) specification. Specifically, this replaces `~` with `~0` and `/` with `~1`.
### SessionNotOnOrAfter support
In some scenarios, your service provider may require the `SessionNotOnOrAfter` attribute for the `` in the SAML assertion, which sets the provider session time correctly. Use `add` op with the path `/authentication/sessionLifetime` and a value for session lifetime in seconds to add this attribute. Okta calculates `SessionNotOnOrAfter` by adding the `/authentication/sessionLifetime` value to the `issueInstant` attribute and returns it in the SAML `data.assertion.
operationId: createSAMLAssertionInlineHook
requestBody:
required: true
content:
application/json:
schema:
allOf:
- $ref: '#/components/schemas/InlineHookBasePayload'
- $ref: '#/components/schemas/SAMLPayLoad'
examples:
SAMLPayloadExample:
$ref: '#/components/examples/SAMLPayLoadExample'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/SAMLHookResponse'
examples:
SAMLHookResponseExample:
$ref: '#/components/examples/SAMLHookResponseExample'
SAMLHookResponseWithURIFormat:
$ref: '#/components/examples/SAMLHookResponseWithURIFormat'
"204":
description: No content - Use the default action
"403":
$ref: '#/components/responses/ErrorAccessDenied403'
security:
- apiToken: []
- oauth2: []
tags:
- InlineHook
create-token-hook:
post:
summary: Create a Token inline hook
description: "Creates a Token inline hook request, one type of inline hook supported\
\ by Okta. This is an automated request from Okta to your third-party service\
\ endpoint. This reference provides sample JSON objects that are contained\
\ in the outbound request from Okta to your external service, and sample JSON\
\ objects that you can include in your response.\n\nThis type of inline hook\
\ is triggered when OAuth 2.0 and OpenID Connect (OIDC) tokens are minted\
\ by your Okta custom authorization server. Before sending the token to the\
\ requester, Okta calls out to your external service. Your service can then\
\ respond with commands to add custom claims to the token or to modify existing\
\ claims.\n\nUse this functionality to add data that is sensitive, calculated\
\ at runtime, or complexly structured and not appropriate for storing in Okta\
\ user profiles. Okta never logs nor stores data that is added this way. As\
\ an example, tokens minted for a medical app could be augmented with confidential\
\ patient data provided by your external service and not stored in Okta.\n\
\nIn addition to adding custom claims, you can modify or remove an existing\
\ custom claim or an OIDC standard profile claim. You can also update how\
\ long an access token or an ID token is valid.\n\nThis inline hook works\
\ only when using an [Okta custom authorization server](https://developer.okta.com/docs/guides/customize-authz-server/main/#create-an-authorization-server),\
\ not the built-in Okta org authorization server.\n\nSee also:\n * [Inline\
\ hooks](https://developer.okta.com/docs/concepts/inline-hooks/) for a general\
\ introduction to Okta inline hooks\n * [Inline Hooks Management API](/openapi/okta-management/management/tag/InlineHook/)\
\ for information on the API for registering external service endpoints with\
\ Okta\n * For an example implementation of this inline hook, see [Token\
\ inline hook](https://developer.okta.com/docs/guides/token-inline-hook)\n\
\n### Timeout behavior\nAfter receiving the Okta request, if there's a response\
\ timeout, the Okta process flow proceeds with the original token returned.\n\
\n### Enabling a token inline hook\nTo activate the inline hook, you first\
\ need to register your external service endpoint with Okta using the [Inline\
\ Hooks Management API](/openapi/okta-management/management/tag/InlineHook).\n\
You then need to associate the registered inline hook with a custom authorization\
\ server policy rule by completing the following steps:\n1. Go to **Security**\
\ > **API** > **Authorization Servers.**\n2. Select a custom authorization\
\ server from the list.\n3. Select **Access Policies** and select a policy\
\ to use with the hook. In most cases, pick the Default Policy.\n4. One of\
\ the policy's rules needs to trigger the inline hook. Click the pencil icon\
\ for a rule to edit it. If you only have one rule, edit the Default Policy\
\ Rule.\n5. Click the **Use this Inline Hook** dropdown menu. Any inline hooks\
\ that you have registered are listed. Select the hook that you would like\
\ to use.\n6. Click **Update Rule**.\n\n> **Note:** You can associate only\
\ one inline hook with each rule.\n\n### Troubleshoot\nThis section covers\
\ what happens when a token inline hook flow fails either due to the external\
\ inline hook service returning an error object or not returning a successful\
\ response, or the inline hook patch fails.\n> **Note:** Administrators can\
\ use the [Okta System Log](https://developer.okta.com/docs/reference/api/system-log/)\
\ to view errors. See the [Troubleshooting](https://developer.okta.com/docs/concepts/inline-hooks/#troubleshooting)\
\ section in the inline hooks concept piece for more information on the events\
\ related to inline hooks that the Okta System Log captures.\n- When there's\
\ a communication failure with the external service, a timeout for example,\
\ the inline hook operation is skipped. The token is generated without any\
\ modification from the inline hook.\n \n **Who can see this error?** Administrators\n\
\n- When the external service returns a response with any other HTTP status\
\ code besides `200`, the inline hook operation is skipped. The token is generated\
\ without any modification from the inline hook.\n \n **Who can see this\
\ error?** Administrators\n\n- When the external service returns an error\
\ object in the response, the entire token inline hook flow fails with no\
\ token generated.\n \n **Who can see this error?** Administrators, developers,\
\ and end users. When the OAuth 2.0 client receives the error, the client\
\ developer can see that error if the client has the debug information. What\
\ the end user sees depends on how errors are handled within the client.\n\
\ > **Note:** See the [error](https://developer.okta.com/docs/reference/token-hook/#error)\
\ section on this page for more information on what to include in the error\
\ object of your response and what the OAuth 2.0 error includes that Okta\
\ returns to the requestor of the token.\n\n- When a hook command (for example,\
\ updating, adding, and deleting claims) can't be performed, the inline hook\
\ operation is skipped. The token is generated without any modification from\
\ the inline hook.\n \n **Who can see this error?** Administrators\n\n \
\ The following actions result in an error:\n - Using an invalid command.\
\ For example, if only an ID token is requested, the `commands` array shouldn't\
\ contain commands of the type `com.okta.access.patch`.\n - Using an invalid\
\ operation\n - Attempting to remove a system-specific claim\n - Attempting\
\ to update a claim that doesn't exist\n - Attempting to update an element\
\ within an array that doesn't exist or specifying an invalid index\n -\
\ Attempting to remove a claim that doesn't exist"
operationId: createTokenInlineHook
requestBody:
required: true
content:
application/json:
schema:
$ref: '#/components/schemas/TokenRequest'
examples:
TokenPayLoadExample:
$ref: '#/components/examples/TokenPayLoadExample'
responses:
"200":
description: Successful response
content:
application/json:
schema:
$ref: '#/components/schemas/TokenHookResponse'
examples:
TokenHookResponse:
$ref: '#/components/examples/TokenHookResponse'
TokenHookResponseWithURIFormat:
$ref: '#/components/examples/TokenHookResponseWithURIFormat'
TokenHookResponseAppendArray:
$ref: '#/components/examples/TokenHookResponseAppendArray'
TokenHookReplaceExisting:
$ref: '#/components/examples/TokenHookReplaceExisting'
TokenHookReplaceInPath:
$ref: '#/components/examples/TokenHookReplaceInPath'
TokenHookModifyLifetime:
$ref: '#/components/examples/TokenHookModifyLifetime'
TokenHookRemoveClaim:
$ref: '#/components/examples/TokenHookRemoveClaim'
TokenHookRemoveFromArray:
$ref: '#/components/examples/TokenHookRemoveFromArray'
TokenHookRemoveFromObject:
$ref: '#/components/examples/TokenHookRemoveFromObject'
TokenHookErrorExample:
$ref: '#/components/examples/TokenHookErrorExample'
"204":
description: No content - Unverified user response
"403":
$ref: '#/components/responses/ErrorAccessDenied403'
security:
- apiToken: []
- oauth2: []
tags:
- InlineHook