Get the login settings​
Return the settings for the requested context
Query Parameters
- 200
- 403
- 404
- default
OK
Schema
details object
on read: the sequence of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
on read: the timestamp of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
settings object
defines if a user is allowed to log in with username and password
defines if a person is allowed to register a user on this organization
defines if a user is allowed to add a defined identity provider. E.g. Google auth
defines if a user MUST use a multi-factor to log in
Possible values: [PASSKEYS_TYPE_NOT_ALLOWED
, PASSKEYS_TYPE_ALLOWED
]
Default value: PASSKEYS_TYPE_NOT_ALLOWED
defines if passkeys are allowed for users
defines if password reset link should be shown in the login screen
defines if unknown username on login screen directly returns an error or always displays the password screen
defines where the user will be redirected to if the login is started without app context (e.g. from mail)
Defines after how much time the user has to re-authenticate with the password.
Defines after how much time the user has to re-authenticate with an external provider.
Defines after how much time the mfa prompt will be shown again.
Defines after how long the second-factor check is valid.
Defines how long the multi-factor check is valid.
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
Possible values: [MULTI_FACTOR_TYPE_UNSPECIFIED
, MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION
]
If set to true, the suffix (@domain.com) of an unknown username input on the login screen will be matched against the org domains and will redirect to the registration of that organization on success.
defines if the user can additionally (to the login name) be identified by their verified email address
defines if the user can additionally (to the login name) be identified by their verified phone number
Possible values: [RESOURCE_OWNER_TYPE_UNSPECIFIED
, RESOURCE_OWNER_TYPE_INSTANCE
, RESOURCE_OWNER_TYPE_ORG
]
Default value: RESOURCE_OWNER_TYPE_UNSPECIFIED
resource_owner_type returns if the settings is managed on the organization or on the instance
if activated, only local authenticated users are forced to use MFA. Authentication through IDPs won't prompt a MFA step in the login.
{
"details": {
"sequence": "2",
"changeDate": "2024-06-13T06:44:35.919Z",
"resourceOwner": "69629023906488334"
},
"settings": {
"allowUsernamePassword": true,
"allowRegister": true,
"allowExternalIdp": true,
"forceMfa": true,
"passkeysType": "PASSKEYS_TYPE_NOT_ALLOWED",
"hidePasswordReset": true,
"ignoreUnknownUsernames": true,
"defaultRedirectUri": "https://acme.com/ui/console",
"passwordCheckLifetime": "864000s",
"externalLoginCheckLifetime": "864000s",
"mfaInitSkipLifetime": "2592000s",
"secondFactorCheckLifetime": "64800s",
"multiFactorCheckLifetime": "43200s",
"secondFactors": [
"SECOND_FACTOR_TYPE_UNSPECIFIED"
],
"multiFactors": [
"MULTI_FACTOR_TYPE_UNSPECIFIED"
],
"allowDomainDiscovery": true,
"disableLoginWithEmail": true,
"disableLoginWithPhone": true,
"resourceOwnerType": "RESOURCE_OWNER_TYPE_UNSPECIFIED",
"forceMfaLocalOnly": true
}
}
Schema
details object
on read: the sequence of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
on read: the timestamp of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
settings object
defines if a user is allowed to log in with username and password
defines if a person is allowed to register a user on this organization
defines if a user is allowed to add a defined identity provider. E.g. Google auth
defines if a user MUST use a multi-factor to log in
Possible values: [PASSKEYS_TYPE_NOT_ALLOWED
, PASSKEYS_TYPE_ALLOWED
]
Default value: PASSKEYS_TYPE_NOT_ALLOWED
defines if passkeys are allowed for users
defines if password reset link should be shown in the login screen
defines if unknown username on login screen directly returns an error or always displays the password screen
defines where the user will be redirected to if the login is started without app context (e.g. from mail)
Defines after how much time the user has to re-authenticate with the password.
Defines after how much time the user has to re-authenticate with an external provider.
Defines after how much time the mfa prompt will be shown again.
Defines after how long the second-factor check is valid.
Defines how long the multi-factor check is valid.
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
Possible values: [MULTI_FACTOR_TYPE_UNSPECIFIED
, MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION
]
If set to true, the suffix (@domain.com) of an unknown username input on the login screen will be matched against the org domains and will redirect to the registration of that organization on success.
defines if the user can additionally (to the login name) be identified by their verified email address
defines if the user can additionally (to the login name) be identified by their verified phone number
Possible values: [RESOURCE_OWNER_TYPE_UNSPECIFIED
, RESOURCE_OWNER_TYPE_INSTANCE
, RESOURCE_OWNER_TYPE_ORG
]
Default value: RESOURCE_OWNER_TYPE_UNSPECIFIED
resource_owner_type returns if the settings is managed on the organization or on the instance
if activated, only local authenticated users are forced to use MFA. Authentication through IDPs won't prompt a MFA step in the login.
{
"details": {
"sequence": "2",
"changeDate": "2024-06-13T06:44:35.920Z",
"resourceOwner": "69629023906488334"
},
"settings": {
"allowUsernamePassword": true,
"allowRegister": true,
"allowExternalIdp": true,
"forceMfa": true,
"passkeysType": "PASSKEYS_TYPE_NOT_ALLOWED",
"hidePasswordReset": true,
"ignoreUnknownUsernames": true,
"defaultRedirectUri": "https://acme.com/ui/console",
"passwordCheckLifetime": "864000s",
"externalLoginCheckLifetime": "864000s",
"mfaInitSkipLifetime": "2592000s",
"secondFactorCheckLifetime": "64800s",
"multiFactorCheckLifetime": "43200s",
"secondFactors": [
"SECOND_FACTOR_TYPE_UNSPECIFIED"
],
"multiFactors": [
"MULTI_FACTOR_TYPE_UNSPECIFIED"
],
"allowDomainDiscovery": true,
"disableLoginWithEmail": true,
"disableLoginWithPhone": true,
"resourceOwnerType": "RESOURCE_OWNER_TYPE_UNSPECIFIED",
"forceMfaLocalOnly": true
}
}
Schema
details object
on read: the sequence of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
on read: the timestamp of the last event reduced by the projection
on manipulation: the timestamp of the event(s) added by the manipulation
settings object
defines if a user is allowed to log in with username and password
defines if a person is allowed to register a user on this organization
defines if a user is allowed to add a defined identity provider. E.g. Google auth
defines if a user MUST use a multi-factor to log in
Possible values: [PASSKEYS_TYPE_NOT_ALLOWED
, PASSKEYS_TYPE_ALLOWED
]
Default value: PASSKEYS_TYPE_NOT_ALLOWED
defines if passkeys are allowed for users
defines if password reset link should be shown in the login screen
defines if unknown username on login screen directly returns an error or always displays the password screen
defines where the user will be redirected to if the login is started without app context (e.g. from mail)
Defines after how much time the user has to re-authenticate with the password.
Defines after how much time the user has to re-authenticate with an external provider.
Defines after how much time the mfa prompt will be shown again.
Defines after how long the second-factor check is valid.
Defines how long the multi-factor check is valid.
Possible values: [SECOND_FACTOR_TYPE_UNSPECIFIED
, SECOND_FACTOR_TYPE_OTP
, SECOND_FACTOR_TYPE_U2F
, SECOND_FACTOR_TYPE_OTP_EMAIL
, SECOND_FACTOR_TYPE_OTP_SMS
]
Possible values: [MULTI_FACTOR_TYPE_UNSPECIFIED
, MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION
]
If set to true, the suffix (@domain.com) of an unknown username input on the login screen will be matched against the org domains and will redirect to the registration of that organization on success.
defines if the user can additionally (to the login name) be identified by their verified email address
defines if the user can additionally (to the login name) be identified by their verified phone number
Possible values: [RESOURCE_OWNER_TYPE_UNSPECIFIED
, RESOURCE_OWNER_TYPE_INSTANCE
, RESOURCE_OWNER_TYPE_ORG
]
Default value: RESOURCE_OWNER_TYPE_UNSPECIFIED
resource_owner_type returns if the settings is managed on the organization or on the instance
if activated, only local authenticated users are forced to use MFA. Authentication through IDPs won't prompt a MFA step in the login.
{
"details": {
"sequence": "2",
"changeDate": "2024-06-13T06:44:35.920Z",
"resourceOwner": "69629023906488334"
},
"settings": {
"allowUsernamePassword": true,
"allowRegister": true,
"allowExternalIdp": true,
"forceMfa": true,
"passkeysType": "PASSKEYS_TYPE_NOT_ALLOWED",
"hidePasswordReset": true,
"ignoreUnknownUsernames": true,
"defaultRedirectUri": "https://acme.com/ui/console",
"passwordCheckLifetime": "864000s",
"externalLoginCheckLifetime": "864000s",
"mfaInitSkipLifetime": "2592000s",
"secondFactorCheckLifetime": "64800s",
"multiFactorCheckLifetime": "43200s",
"secondFactors": [
"SECOND_FACTOR_TYPE_UNSPECIFIED"
],
"multiFactors": [
"MULTI_FACTOR_TYPE_UNSPECIFIED"
],
"allowDomainDiscovery": true,
"disableLoginWithEmail": true,
"disableLoginWithPhone": true,
"resourceOwnerType": "RESOURCE_OWNER_TYPE_UNSPECIFIED",
"forceMfaLocalOnly": true
}
}
Returned when the user does not have permission to access the resource.
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Returned when the resource does not exist.
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
An unexpected error response.
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
- Array [
- ]
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}