JUMP TOAuthenticateanonymous-otp-controllerGenerate an Anonymous One Time PINpostValidate the Anonymous One Time PINpostauthentication-controllerActivate devicepostActivate a new user and add devicepostForgot device PIN - returns an activation codepostLogin devicepostLogout devicedeleteReset device PIN - uses the Forgot device PIN activation codepostdevice-controllerDelete devicedeleteUpdate devicepatchDelete other device auth details not linked to the specified authKeyUuiddeleteDevice Forgot PINpostReset your device pinpostDevice Setup Pinpostiam-controllerAllows an externally authenticated user e.g. a CRM user to get the details of an authenticated usergetAllows an externally authenticated user e.g. a CRM user to update user details e.g. email, mobile number and locked using userUuid or username as query parameterspatchAllows an externally authenticated user e.g. a CRM user to delete a authenticate userdeleteUpdate a user from IAMpatchAllows an externally authenticated user e.g. a CRM user to get the list of devices of an authenticate usergetAllows an externally authenticated user e.g. a CRM user to delete a device for an authenticate userdeleteAllows an externally authenticated user e.g. a CRM user to update a device for an authenticate userpatchAllows an externally authenticated user to generate a OTP for an Authenticate userpostjwt-controllerRenew JWT Token for a devicegetGet Public Key for the ApplicationUuidgetValidate JWT Tokengetmfa-controllerCreate an Mfa Device for users created and activated using the SilentMFA flowpostRegister an Mfa user or device for SilentMFA OIDC flowpostRegister an MFA user (or device if the user already exists and is verified) for SilentMFA non OIDC flowpostCreate a Mfa User as a part of user registration flow in SilentMFAputSilent MFA user device created for an active user or activated for a verified devicepatchmfa-verify-controllerVerify a silentMfa User or verify a silentMfa Device which has been in pre-provisioned stategetopen-id-controllerOpenID Connect authorize endpointgetOpenID Connect JWKS endpointgetOpenID Connect token endpointpostotp-controllerValidate the One Time PINpostself-service-controllerAdd a new device for an existing userpostGenerate a One Time PIN linked to self service for a purposepostValidate the One Time PIN linked to self service for a purposepostAdd a new userpostuser-controllerGet details for the current usergetGet a list of otps for the requested usergetGenerate a One Time PIN linked to Authenticated User for a purposepostValidate the One Time PIN linked to Authenticated User for a purposepostGet a usergetDelete a userdeleteUpdate a userpatchGet user devicesgetweb-authn-controllerGet challenge for WebAuthn device authenticationpostValidate challenge for WebAuthn device authenticationpostGet challenge for WebAuthn device registrationpostValidate challenge for WebAuthn device registrationpostSilent MFASilent MFA OverviewOnboard user to Silent MFApostStart Silent MFA SessionpostValidate Silent MFA SessionpostClient Backend Endpoints - Silent MFA IntegrationStep 1: Register new UserRegister a new user or devicepostStep 2: Verify User/DevicePolling endpoint to check whether user/device has been verified to auto-loginpostVerify a new user or devicegetStep 3: LoginRegister a new user or devicepostPowered by anonymous-otp-controllerAuthenticate API Reference