Multi-Factor V2 API
Early Preview
These V2 APIs are in early preview and may be subject to change. Please refer to our V1 APIs for current production use.
Updates made in V2 MFA API’s
Added support for registration and verification of more MFA factors. V2 endpoints provide support for SMS, Voice, Email, Google Authenticator, and OneLogin Protect.
Key limitations of Early Preview Release
Currently there are two limitations of these BETA API’s. In a future release both of these will be enabled.
- No support for providing a custom SMS message within the SMS MFA trigger.
- No support for specifying the OTP type between numeric and alphanumeric as part of the MFA trigger.
Changes from V1
- Verification of OneLogin Protect was previously done using POST. Check out the new way to verify the user has accepted the push notification or OneLogin voice call.
- Only activated factors are returned when retrieving the list of enrolled factors or devices. Check out how to retrieve authentication factors.
- GET /devices has device_id instead of id
Have a Question?

Have a how-to question? Seeing a weird error? Ask us about it on StackOverflow.

Found a bug? Submit a support ticket.

Have a product idea or request? Share it with us in our Ideas Portal.
StackOverflow discussions about "[onelogin] mfa api"
-
Q: AWS API credentials with OneLogin SAML and MFA
Asked Oct 30 2016We want to allow our users to retrieve a set of temporary CLI credentials for a given AWS role by signing in to OneLogin with password and MFA. … We have a working solution, but it requires the user to fully re-authenticate to OneLogin (including MFA) every 60 minutes as the AWS temporary credentials expire. …
-
Q: Implement custom connector to in-house applications
Asked Dec 05 2016Basically the company I work at wants to implement a "login using OneLogin" to our in-house applications and we have MFA enabled. … I tried the API route but it requires the user to enter the MFA code every time they want to log in, which is great for security but users want simple solution. …
-
Q: Getting a SAML assertion after creating a session via API
Asked Apr 04 2017Related to Accessing Third Party Apps After Creating A Session Via API Token and to AWS API credentials with OneLogin SAML and MFA Since AWS assumeRoleWithSAML temporary security credentials are only … It's totally odd to the web base OneLogin usage, where he is logged in once for the whole day or even week (depending on the policy). I know how to get a session via API. …
-
A: Getting a SAML assertion after creating a session via API
Answered Apr 05 2017The "assume user" privilege is locked down pretty tightly in OneLogin, and is not the sort of thing that's given out lightly. … This wouldn't allow for MFA on an app policy, but we are building out the ability to request and verify MFA via API (coming soon) so you could implement MFA in your app (independent of any app policy) …
-
Q: Onelogin API - Verify Factor for SAML assertion when using Duo
Asked Oct 11 2017I've been developing an application that hits the api/1/saml_assertion, https://developers.onelogin.com/api-docs/1/saml-assertions/generate-saml-assertion , endpoint of OneLogin with Duo as my MFA. … duo_sig_request looks like this: 'duo_sig_request': 'TX|<base64 encoded elements>|<what looks like a sha1 hash>:APP|<base64 encoded elements>|<what looks like a sha1 hash>' duo_api_hostname is just the API …

Loading...