POST
request to the MFA Associate endpoint to enroll the user’s authenticator. The bearer token required by this endpoint is the MFA token obtained in the previous step.
To enroll with push, set the authenticator_types
parameter to [oob]
and the oob_channels
parameter to [auth0]
.
User is already enrolled
error, the user already has an MFA factor enrolled. Before associating another factor with the user, you must challenge the user with the existing factor.
If this is the first time the user is associating an authenticator, you’ll notice the response includes recovery_codes
. Recovery codes are used to access the user’s account in the event that they lose access to the account or device used for their second-factor authentication. These are one-time usable codes, and new ones are generated as necessary.
barcode_uri
in the Guardian application, within the next 5 minutes.
Once that is done, the Guardian application will notify Auth0 that the user enrolled successfully. To know if that happened, poll the Auth0 with the oob_code
returned by the MFA Associate endpoint call.
authorization_pending
response, indicating that you need to call oauth_token
again in a few seconds:
active
is true
.
authenticator_id
for the factor you want to challenge. You can list all enrolled authenticators using the MFA Authenticators endpoint:
POST
to the MFA Challenge endpoint using the corresponding authenticator_id
and the mfa_token
.
Result | Description |
---|---|
authorization_pending | Error: If the challenge has not been accepted or rejected. |
slow_down | Error: If the polling is too frequent. |
access_token and refresh_token | If the challenge has been accepted; polling should be stopped at this point. |
invalid_grant | Error: If the challenge has been rejected: polling should be stopped at this point. |