You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"idToken": "A String", # A valid Identity Platform ID token. If passed, the user's account at the IdP will be linked to the account represented by this ID token.
599
599
"pendingIdToken": "A String",
600
-
"pendingToken": "A String", # An opaque string from a previous SignInWithIdp response. If set, it can be used to repeat the sign-in operation from the previous SignInWithIdp operation.
600
+
"pendingToken": "A String", # An opaque string from a previous SignInWithIdp response. If set, it can be used to repeat the sign-in operation from the previous SignInWithIdp operation. This may be present if the user needs to confirm their account information as part of a previous federated login attempt, or perform account linking.
601
601
"postBody": "A String", # If the user is signing in with an authorization response obtained via a previous CreateAuthUri authorization request, this is the body of the HTTP POST callback from the IdP, if present. Otherwise, if the user is signing in with a manually provided IdP credential, this should be a URL-encoded form that contains the credential (e.g. an ID token or access token for OAuth 2.0 IdPs) and the provider ID of the IdP that issued the credential. For example, if the user is signing in to the Google provider using a Google ID token, this should be set to `id_token=[GOOGLE_ID_TOKEN]&providerId=google.com`, where `[GOOGLE_ID_TOKEN]` should be replaced with the Google ID token. If the user is signing in to the Facebook provider using a Facebook authentication token, this should be set to `id_token=[FACEBOOK_AUTHENTICATION_TOKEN]&providerId=facebook.com&nonce= [NONCE]`, where `[FACEBOOK_AUTHENTICATION_TOKEN]` should be replaced with the Facebook authentication token. Nonce is required for validating the token. The request will fail if no nonce is provided. If the user is signing in to the Facebook provider using a Facebook access token, this should be set to `access_token=[FACEBOOK_ACCESS_TOKEN]&providerId=facebook.com`, where `[FACEBOOK_ACCESS_TOKEN]` should be replaced with the Facebook access token. If the user is signing in to the Twitter provider using a Twitter OAuth 1.0 credential, this should be set to `access_token=[TWITTER_ACCESS_TOKEN]&oauth_token_secret=[TWITTER_TOKEN_SECRET]&providerId=twitter.com`, where `[TWITTER_ACCESS_TOKEN]` and `[TWITTER_TOKEN_SECRET]` should be replaced with the Twitter OAuth access token and Twitter OAuth token secret respectively.
602
602
"requestUri": "A String", # Required. The URL to which the IdP redirects the user back. This can be set to `http://localhost` if the user is signing in with a manually provided IdP credential.
603
603
"returnIdpCredential": True or False, # Whether or not to return OAuth credentials from the IdP on the following errors: `FEDERATED_USER_ID_ALREADY_LINKED` and `EMAIL_EXISTS`.
Copy file name to clipboardExpand all lines: docs/dyn/identitytoolkit_v2.accounts.mfaEnrollment.html
+16Lines changed: 16 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -110,6 +110,10 @@ <h3>Method Details</h3>
110
110
"sessionInfo": "A String", # An opaque string that represents the enrollment session.
111
111
},
112
112
"tenantId": "A String", # The ID of the Identity Platform tenant that the user enrolling MFA belongs to. If not set, the user belongs to the default Identity Platform project.
113
+
"totpVerificationInfo": { # Mfa request info specific to TOTP auth for FinalizeMfa. # Verification information for TOTP.
114
+
"sessionInfo": "A String", # An opaque string that represents the enrollment session.
"totpAuthInfo": { # Mfa response info specific to TOTP auth for FinalizeMfa. # Auxiliary auth info specific to TOTP auth.
136
+
},
131
137
}</pre>
132
138
</div>
133
139
@@ -153,6 +159,8 @@ <h3>Method Details</h3>
153
159
"safetyNetToken": "A String", # Android only. Used to assert application identity in place of a recaptcha token. A SafetyNet Token can be generated via the [SafetyNet Android Attestation API](https://developer.android.com/training/safetynet/attestation.html), with the Base64 encoding of the `phone_number` field as the nonce.
154
160
},
155
161
"tenantId": "A String", # The ID of the Identity Platform tenant that the user enrolling MFA belongs to. If not set, the user belongs to the default Identity Platform project.
162
+
"totpEnrollmentInfo": { # Mfa request info specific to TOTP auth for StartMfa. # Sign-in info specific to TOTP auth.
163
+
},
156
164
}
157
165
158
166
x__xgafv: string, V1 error format.
@@ -167,6 +175,14 @@ <h3>Method Details</h3>
167
175
"phoneSessionInfo": { # Phone Verification info for a StartMfa response. # Verification info to authorize sending an SMS for phone verification.
168
176
"sessionInfo": "A String", # An opaque string that represents the enrollment session.
169
177
},
178
+
"totpSessionInfo": { # Mfa response info specific to TOTP auth for StartMfa. # Enrollment response info specific to TOTP auth.
179
+
"finalizeEnrollmentTime": "A String", # The time by which the enrollment must finish.
180
+
"hashingAlgorithm": "A String", # The hashing algorithm used to generate the verification code.
181
+
"periodSec": 42, # Duration in seconds at which the verification code will change.
182
+
"sessionInfo": "A String", # An encoded string that represents the enrollment session.
183
+
"sharedSecretKey": "A String", # A base 32 encoded string that represents the shared TOTP secret. The base 32 encoding is the one specified by [RFC4648#section-6](https://datatracker.ietf.org/doc/html/rfc4648#section-6). (This is the same as the base 32 encoding from [RFC3548#section-5](https://datatracker.ietf.org/doc/html/rfc3548#section-5).)
184
+
"verificationCodeLength": 42, # The length of the verification code that needs to be generated.
Copy file name to clipboardExpand all lines: docs/dyn/identitytoolkit_v2.accounts.mfaSignIn.html
+4Lines changed: 4 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -98,6 +98,7 @@ <h3>Method Details</h3>
98
98
The object takes the form of:
99
99
100
100
{ # Finalizes sign-in by verifying MFA challenge.
101
+
"mfaEnrollmentId": "A String", # The MFA enrollment ID from the user's list of current MFA enrollments.
101
102
"mfaPendingCredential": "A String", # Required. Pending credential from first factor sign-in.
102
103
"phoneVerificationInfo": { # Phone Verification info for a FinalizeMfa request. # Proof of completion of the SMS based MFA challenge.
103
104
"androidVerificationProof": "A String", # Android only. Uses for "instant" phone number verification though GmsCore.
@@ -106,6 +107,9 @@ <h3>Method Details</h3>
106
107
"sessionInfo": "A String", # An opaque string that represents the enrollment session.
107
108
},
108
109
"tenantId": "A String", # The ID of the Identity Platform tenant the user is signing in to. If not set, the user will sign in to the default Identity Platform project.
110
+
"totpVerificationInfo": { # TOTP verification info for FinalizeMfaSignInRequest. # Proof of completion of the TOTP based MFA challenge.
Copy file name to clipboardExpand all lines: docs/dyn/identitytoolkit_v2.projects.html
+24Lines changed: 24 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -161,6 +161,14 @@ <h3>Method Details</h3>
161
161
"enabledProviders": [ # A list of usable second factors for this project.
162
162
"A String",
163
163
],
164
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
165
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
166
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
167
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
168
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
169
+
},
170
+
},
171
+
],
164
172
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
165
173
},
166
174
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -334,6 +342,14 @@ <h3>Method Details</h3>
334
342
"enabledProviders": [ # A list of usable second factors for this project.
335
343
"A String",
336
344
],
345
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
346
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
347
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
348
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
349
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
350
+
},
351
+
},
352
+
],
337
353
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
338
354
},
339
355
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -506,6 +522,14 @@ <h3>Method Details</h3>
506
522
"enabledProviders": [ # A list of usable second factors for this project.
507
523
"A String",
508
524
],
525
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
526
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
527
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
528
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
529
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
530
+
},
531
+
},
532
+
],
509
533
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
510
534
},
511
535
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
Copy file name to clipboardExpand all lines: docs/dyn/identitytoolkit_v2.projects.tenants.html
+48Lines changed: 48 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -164,6 +164,14 @@ <h3>Method Details</h3>
164
164
"enabledProviders": [ # A list of usable second factors for this project.
165
165
"A String",
166
166
],
167
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
168
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
169
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
170
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
171
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
172
+
},
173
+
},
174
+
],
167
175
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
168
176
},
169
177
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -227,6 +235,14 @@ <h3>Method Details</h3>
227
235
"enabledProviders": [ # A list of usable second factors for this project.
228
236
"A String",
229
237
],
238
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
239
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
240
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
241
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
242
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
243
+
},
244
+
},
245
+
],
230
246
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
231
247
},
232
248
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -315,6 +331,14 @@ <h3>Method Details</h3>
315
331
"enabledProviders": [ # A list of usable second factors for this project.
316
332
"A String",
317
333
],
334
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
335
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
336
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
337
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
338
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
339
+
},
340
+
},
341
+
],
318
342
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
319
343
},
320
344
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -446,6 +470,14 @@ <h3>Method Details</h3>
446
470
"enabledProviders": [ # A list of usable second factors for this project.
447
471
"A String",
448
472
],
473
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
474
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
475
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
476
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
477
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
478
+
},
479
+
},
480
+
],
449
481
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
450
482
},
451
483
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -527,6 +559,14 @@ <h3>Method Details</h3>
527
559
"enabledProviders": [ # A list of usable second factors for this project.
528
560
"A String",
529
561
],
562
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
563
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
564
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
565
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
566
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
567
+
},
568
+
},
569
+
],
530
570
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
531
571
},
532
572
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
@@ -591,6 +631,14 @@ <h3>Method Details</h3>
591
631
"enabledProviders": [ # A list of usable second factors for this project.
592
632
"A String",
593
633
],
634
+
"providerConfigs": [ # A list of usable second factors for this project along with their configurations. This field does not support phone based MFA, for that use the 'enabled_providers' field.
635
+
{ # ProviderConfig describes the supported MFA providers along with their configurations.
636
+
"state": "A String", # Describes the state of the MultiFactor Authentication type.
637
+
"totpProviderConfig": { # TotpMFAProviderConfig represents the TOTP based MFA provider. # TOTP MFA provider config for this project.
638
+
"adjacentIntervals": 42, # The allowed number of adjacent intervals that will be used for verification to avoid clock skew.
639
+
},
640
+
},
641
+
],
594
642
"state": "A String", # Whether MultiFactor Authentication has been enabled for this project.
595
643
},
596
644
"monitoring": { # Configuration related to monitoring project activity. # Configuration related to monitoring project activity.
"description": "An opaque string from a previous SignInWithIdp response. If set, it can be used to repeat the sign-in operation from the previous SignInWithIdp operation.",
2844
+
"description": "An opaque string from a previous SignInWithIdp response. If set, it can be used to repeat the sign-in operation from the previous SignInWithIdp operation. This may be present if the user needs to confirm their account information as part of a previous federated login attempt, or perform account linking.",
0 commit comments