This endpoint can be used for login using a Kubernetes Service Account token.
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
tenant: telco service: minikube role: default jwt: eyJhbGciOiJSUzI1NiIsImtpZCI6IlM0WC1vV3lqazFWVnZRNG9QUWg2c2owakItUF9wdzU2NVhBc0c2RE9PbmcifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZWNyZXQubmFtZSI6ImFwcC1hLXRva2VuLWY5anBzIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQubmFtZSI6ImFwcC1hIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiYWZiNDZkNjAtZWQ3Mi00YTAwLTk5MmYtM2QyYzE5YjMyOGE0Iiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50OmRlZmF1bHQ6YXBwLWEifQ.ZMrUeVWV-umxU07WZEYFUcYdSTnVSCvsBQH54yGIOzkWWknNMw9dYwGP9g_lOMwmmSCx0v54q4EAq-2CLsRrct9_zyW7W9oXRDCgr3uyCmzJpH8yUeVmPNHb60kZdP3EmjGIXseUJexd_CO82VCcH-eKdSpjkOaEYsJJ6dAZ451z9DkXQtNX9Ct0NuSbzA9mwDxPcSfjMYn_fBhSwdi-X8V5OxIxkw43V2nzb9nPesKzFxZAIr6JU7qHoUEbznfZZ4j7FbROjOZOloqSiA7TdUu1oEbNWj2zqUHvyWps_Gxl39z_Yl3azY_M6kUeuDbgrLrC4QFX9b1X6nXAkKTLcA
token: acd71235-18ec-4035-a4c0-7a79e1bd1ded expires-in: 2764800 expires: 2022-01-12T15:49:54.078484Z accessor: 601ab2f4-9e3a-4e1e-9a99-81aff088cf0e creation-time: 2022-01-11T15:49:54.078484Z renewal-time: 2022-01-11T15:49:54.078484Z
Authenticate towards the system. Providing a tenant is optional, if the username is unique in the system.
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
username: joe@popcorn-systems.com password: secret-password tenant: popcorn-systems otp: "345789" cookie: false
token: 09715875-ac45-4ad7-bfad-00eea3949094 expires-in: 1209600 expires: 2021-02-16T14:24:20.030665Z accessor: 3be91214-176c-4b4d-bae7-4c432f342661 creation-time: 2021-02-15T14:24:20.030665Z renewal-time: 2021-02-15T14:24:20.030665Z totp-required: true totp-enabled: true passkey-required: true passkey-enabled: true
This endpoint completes the OpenID Connect (OIDC) authentication process.
After successful authentication, the OIDC provider redirects the client to this endpoint (or an equivalent web backend endpoint that forwards the request).
The request must include the following query parameters:
state
: A unique value used to prevent CSRF attacks.code
: The authorization code used to obtain a token.nonce
(optional): A value originally provided by the client
to prevent replay attacks.If authentication is successful, a valid token is returned.
state
and code
parameters are required and must match
the expected values.nonce
parameter is optional but is verified if present.state
value is validated to mitigate
CSRF attacks.nonce
was provided during login, it is checked to prevent
replay attacks.This endpoint is typically called by frontend applications or backend services handling the OIDC login flow.
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
state: addbf712-95d1-4058-be82-45b76fc04e5c code: JVX9fZTK9fvsRZxuZ3uuGUuh1zPps1Ng nonce: ee8342cc-7273-4409-99c6-3ca5d894652e
message: Login succeeded token: 09715875-ac45-4ad7-bfad-00eea3949094 expires-in: 1209600 expires: 2021-02-16T14:24:20.030665Z accessor: 3be91214-176c-4b4d-bae7-4c432f342661 creation-time: 2021-02-15T14:24:20.030665Z renewal-time: 2021-02-15T14:24:20.030665Z
This endpoint completes the OpenID Connect (OIDC) authentication process.
After successful authentication, the OIDC provider redirects the client to this endpoint (or an equivalent web backend endpoint that forwards the request).
The request must include the following query parameters:
state
: A unique value used to prevent CSRF attacks.code
: The authorization code used to obtain a token.nonce
(optional): A value originally provided by the client
to prevent replay attacks.If authentication is successful, a valid token is returned.
state
and code
parameters are required and must match
the expected values.nonce
parameter is optional but is verified if present.state
value is validated to mitigate
CSRF attacks.nonce
was provided during login, it is checked to prevent
replay attacks.This endpoint is typically called by frontend applications or backend services handling the OIDC login flow.
fields | string Retrieve only requested fields from the resource See section fields |
state | string |
code | string |
nonce | string |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
message: Login succeeded token: 09715875-ac45-4ad7-bfad-00eea3949094 expires-in: 1209600 expires: 2021-02-16T14:24:20.030665Z accessor: 3be91214-176c-4b4d-bae7-4c432f342661 creation-time: 2021-02-15T14:24:20.030665Z renewal-time: 2021-02-15T14:24:20.030665Z
This endpoint initiates an OpenID Connect (OIDC) authentication flow, typically used by web applications to authenticate users.
oidc-login
to obtain a redirect URL.code
, state
, and optionally nonce
as query parameters. The
callback URL may be the oidc-callback
endpoint directly, or
a callback in the web backend that performs 4.oidc-callback
with these parameters to complete
authentication and receive a valid token.default
value is used.This endpoint supports login initiation with optional parameters to specify the tenant, OIDC provider, and role.
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
tenant: acme oidc: qlik role: default terminal: false cookie: false
url: http://192.168.100.36:9000/auth?client_id=JVX9fZTK9fvsRZxuZ3uuGUuh1zPps1Ng&response_type=code&redirect_uri=https%3A%2F%2F192.168.100.101%3A4646%2Fv1%2Foidc-callback&scope=openid+profile+email+avassa&state=M2Q3MmU5YmMtNDhmOC00Njg0LWJmY2YtNDJlYTg2ZmQ2NmZhOmZvby5hY21lLmNvbQ%3D%3D&nonce=52b947c5-38de-4fda-95ba-fcaa34f97a5f terminal-id: eecfbbef-f61e-4a4f-8f97-1924c089181d state: addbf712-95d1-4058-be82-45b76fc04e5c
This endpoint validates the integrity of the state
parameter before
performing any additional redirects during an OpenID Connect
(OIDC) authentication flow.
state
parameter is used to prevent CSRF attacks and
track authentication sessions in OIDC.state
to determine
an additional redirect URL based on its contents, such as
a state-addition
field.state
remains unchanged before executing any redirection. A HMAC
can also be added to ensure that the state has not been
manipulated. This is configured using the state-hmac-key
setting.state
(required): A unique value originally sent in the
OIDC authentication request.valid
(boolean): Returns true
if the state
is
unchanged, ensuring that no CSRF attack is in progress.state
contents, it can use this endpoint to verify
the state
before proceeding.OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
state: addbf712-95d1-4058-be82-45b76fc04e5c
valid: true
Create a passkey challenge
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
username: johndoe tenant: example-tenant terminal-id: f5dc5c45-0f7f-477d-8638-7e1398761a23
challenge: Z2hXb1pRcU82eHlvbWt1UEFRY2I= rpId: example.com allowedCredentials: - id: A1B2C3D4E5F6G7H8I9J0 type: public-key - id: H7I8J9K0L1M2N3O4P5Q6 type: public-key timeout: 60000
Initiates passkey login from the command line.
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
username: johndoe tenant: example-tenant
url: https://login.avassa.io?terminal_id=f5dc5c45-0f7f-477d-8638-7e1398761a23 terminal-id: f5dc5c45-0f7f-477d-8638-7e1398761a23
Performs a passkey login with the parameters signed by the browser.
OK
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
username: johndoe tenant: example-tenant credentialId: A1B2C3D4E5F6G7H8I9J0 response: authenticatorData: q2x3fGZvbUdlWGR3dz09YXV0aGVudGljYXRvcg== clientDataJSON: eyAiY2hhbGxlbmdlIjogIlpITm1MMEZ1WVc0PSIsICJvcmlnaW4iOiAiaHR0cHM6Ly9leGFtcGxlLmNvbSIsICJ0eXBlIjogIndlYmF1dGhuLmdldCIsICJjcm9zc09yaWdpbiI6IGZhbHNlIH0= signature: MEUCIQD2d45ksjdflkj343sldkjflskdfjslkdjf4= userHandle: abcd1234
token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJqb2huZG9lIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c expires-in: 3600 expires: 2024-09-27T12:34:56Z accessor: some-accessor-identifier creation-time: 2024-09-27T11:34:56Z renewal-time: 2024-09-27T11:34:56Z