open-vault/website/content/api-docs/system/mfa/pingid.mdx

113 lines
3 KiB
Plaintext
Raw Normal View History

2017-08-16 02:01:34 +00:00
---
layout: api
page_title: /sys/mfa/method/pingid - HTTP API
description: >-
The '/sys/mfa/method/pingid' endpoint focuses on managing PingID MFA behaviors
in Vault Enterprise.
2017-08-16 02:01:34 +00:00
---
## Configure PingID MFA Method
This endpoint defines a MFA method of type PingID.
| Method | Path |
| :----- | :----------------------------- |
| `POST` | `/sys/mfa/method/pingid/:name` |
2017-08-16 02:01:34 +00:00
### Parameters
- `name` `(string: <required>)` Name of the MFA method.
2017-11-03 15:17:59 +00:00
- `mount_accessor` `(string: <required>)` - The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping.
2017-08-16 02:01:34 +00:00
2017-11-03 15:17:59 +00:00
- `username_format` `(string)` - A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`. If blank, the Alias's Name field will be used as-is. Currently-supported mappings:
2017-11-03 15:17:59 +00:00
- alias.name: The name returned by the mount configured via the `mount_accessor` parameter
- entity.name: The name configured for the Entity
2017-11-03 15:17:59 +00:00
- alias.metadata.`<key>`: The value of the Alias's metadata parameter
2018-03-20 18:54:10 +00:00
- entity.metadata.`<key>`: The value of the Entity's metadata parameter
2017-08-16 02:01:34 +00:00
- `settings_file_base64` `(string)` - A base64-encoded third-party settings file retrieved from PingID's configuration page.
### Sample Payload
```json
{
"mount_accessor": "auth_userpass_1793464a",
"settings_file_base64": "AA8owj3..."
}
```
### Sample Request
```shell-session
2017-08-16 02:01:34 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
2017-08-16 02:01:34 +00:00
```
## Read PingiD MFA Method
This endpoint queries the MFA configuration of PingID type for a given method
name.
| Method | Path |
| :----- | :----------------------------- |
| `GET` | `/sys/mfa/method/pingid/:name` |
2017-08-16 02:01:34 +00:00
### Parameters
- `name` `(string: <required>)` Name of the MFA method.
### Sample Request
```shell-session
2017-08-16 02:01:34 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request GET \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
2017-08-16 02:01:34 +00:00
```
### Sample Response
```json
{
"data": {
"use_signature": true,
"idp_url": "https://idpxnyl3m.pingidentity.com/pingid",
"admin_url": "https://idpxnyl3m.pingidentity.com/pingid",
"authenticator_url": "https://authenticator.pingone.com/pingid/ppm",
"mount_accessor": "auth_userpass_1793464a",
"name": "ping",
"org_alias": "181459b0-9fb1-4938-8c86...",
"type": "pingid",
"username_format": ""
}
2017-08-16 02:01:34 +00:00
}
```
2017-08-16 02:01:34 +00:00
## Delete PingID MFA Method
This endpoint deletes a PingID MFA method.
| Method | Path |
| :------- | :----------------------------- |
| `DELETE` | `/sys/mfa/method/pingid/:name` |
2017-08-16 02:01:34 +00:00
### Parameters
- `name` `(string: <required>)` - Name of the MFA method.
### Sample Request
```shell-session
2017-08-16 02:01:34 +00:00
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
2018-03-23 15:41:51 +00:00
http://127.0.0.1:8200/v1/sys/mfa/method/pingid/ping
2017-08-16 02:01:34 +00:00
```