List Second Factors (2FA)​
Returns a list of second factors (2FA) configured on the login settings of the organization. Authentication factors are used as an additional layer of security for your users (e.g. Authentication App, FingerPrint, Windows Hello, etc). Per definition, it is called the second factor as it is used after a password. In the UI we generalize it as multi-factor.
Header Parameters
The default is always the organization of the requesting user. If you like to get/set a result of another organization include the header. Make sure the user has permission to access the requested data.
- 200
- default
A successful response.
Schema
details object
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
{
"details": {
"totalResult": "2",
"processedSequence": "267831",
"viewTimestamp": "2024-04-09T11:59:30.457Z"
},
"result": [
"SECOND_FACTOR_TYPE_OTP"
]
}
Schema
details object
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
{
"details": {
"totalResult": "2",
"processedSequence": "267831",
"viewTimestamp": "2024-04-09T11:59:30.457Z"
},
"result": [
"SECOND_FACTOR_TYPE_OTP"
]
}
Schema
details object
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
{
"details": {
"totalResult": "2",
"processedSequence": "267831",
"viewTimestamp": "2024-04-09T11:59:30.457Z"
},
"result": [
"SECOND_FACTOR_TYPE_OTP"
]
}
An unexpected error response.
Schema
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
POST /policies/login/second_factors/_search
Authorization
name: OAuth2type: oauth2scopes:openid,urn:zitadel:iam:org:project:id:zitadel:aud
flows: { "authorizationCode": { "authorizationUrl": "$CUSTOM-DOMAIN/oauth/v2/authorize", "tokenUrl": "$CUSTOM-DOMAIN/oauth/v2/token", "scopes": { "openid": "openid", "urn:zitadel:iam:org:project:id:zitadel:aud": "urn:zitadel:iam:org:project:id:zitadel:aud" } } }
Request
Request
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
curl -L -X POST 'https://$CUSTOM-DOMAIN/management/v1/policies/login/second_factors/_search' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'