Authentication and Identity Management

Frontegg offers a comprehensive suite of authentication, user management, and security features to streamline identity management and enhance application security. This section provides an overview of all relevant API endpoints, organized into Authentication, Management, and Self-Service categories.

Authentication Endpoints: Enable secure user login, multi-factor authentication (MFA), passwordless options, and social login integrations, allowing for a flexible and robust sign-in experience.

Management Endpoints: Require environment-level authorization and provide full control over SSO (SAML and OpenID Connect) resources, user roles, permissions, and configurations. These endpoints are designed for administrative use, allowing for centralized identity and access management.

Self-Service Endpoints: Accessible with a user token (JWT), these endpoints empower users to manage their SSO connections and other account settings. Users with the necessary permissions can create, update, or delete SSO configurations directly, ensuring they have the tools to manage their access securely and independently.

Each category in this section helps you configure and extend Frontegg’s capabilities, providing the flexibility to manage user identities, authentication protocols, and access controls as per your application’s needs.

Languages
Servers
EU Region
https://api.frontegg.com/identity/
US Region
https://api.us.frontegg.com/identity/
CA Region
https://api.ca.frontegg.com/identity/
AU Region
https://api.au.frontegg.com/identity/
Frontegg sub-domain for use with user tokens
https://{domain}.frontegg.com/identity/

API token

Operations

General

Operations

MFA

Operations

Passwordless

Operations

SMS

Operations

Account invitations settings

Operations

Core settings

Operations

Custom social OAuth provider

Operations

Data migration

Operations

Delegation

Operations

Email configuration

Operations

Email templates

Operations

M2M tokens

Operations

MFA configuration

Operations

Permissions categories

Operations

Permissions

Operations

Roles

Operations

SMS configuration

Operations

SMS templates

Operations

Sessions configuration

Operations

User pools

Operations

Users

Operations

Account invitations

Operations

Account roles

Operations

API tokens

Operations

Domain restrictions

Operations

IP restrictions

Operations

Lockout policy

Operations

Password settings

Operations

Personal tokens

Operations

Create user access token

Request

Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

Bodyapplication/jsonrequired
descriptionstring
expiresInMinutesnumber>= 1

Token expiration time in minutes. In case of undefined, the token won't be expired

curl -i -X POST \
  https://api.frontegg.com/identity/resources/users/access-tokens/v1 \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'Content-Type: application/json' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string' \
  -d '{
    "description": "string",
    "expiresInMinutes": 1
  }'

Responses

Bodyapplication/json
idstringrequired
descriptionstring
createdAtstring(date-time)required
secretstring
expiresstring(date-time)
Response
application/json
{ "id": "string", "description": "string", "createdAt": "2019-08-24T14:15:22Z", "secret": "string", "expires": "2019-08-24T14:15:22Z" }

Get user access tokens

Request

Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

curl -i -X GET \
  https://api.frontegg.com/identity/resources/users/access-tokens/v1 \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string'

Responses

Bodyapplication/json
accessTokensArray of objects(UserAccessTokenResponse)required
accessTokens[].​idstringrequired
accessTokens[].​descriptionstring
accessTokens[].​createdAtstring(date-time)required
accessTokens[].​secretstring
accessTokens[].​expiresstring(date-time)
Response
application/json
{ "accessTokens": [ { … } ] }

Delete user access token by token ID

Request

Path
idstringrequired
Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

curl -i -X DELETE \
  'https://api.frontegg.com/identity/resources/users/access-tokens/v1/{id}' \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string'

Responses

Create user client credentials token

Request

This route creates a user-specific API token. Send the user’s ID in the frontegg-user-id header and the tenant’s ID in the frontegg-tenant-id header. Optionally, send as POST body params values for metadata and description.

Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

Bodyapplication/jsonrequired
metadataobject

Extra data that will be encoded as part of the JWT

descriptionstring
expiresInMinutesnumber[ 1 .. 5256000 ]

Token expiration time in minutes. In case of undefined, the token won't be expired

curl -i -X POST \
  https://api.frontegg.com/identity/resources/users/api-tokens/v1 \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'Content-Type: application/json' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string' \
  -d '{
    "metadata": {},
    "description": "string",
    "expiresInMinutes": 1
  }'

Responses

Bodyapplication/json
clientIdstringrequired
descriptionstringrequired
metadataobjectrequired

Extra data that will be encoded as part of the JWT

createdAtstring(date-time)required
secretstringrequired
expiresstring(date-time)
Response
application/json
{ "clientId": "string", "description": "string", "metadata": {}, "createdAt": "2019-08-24T14:15:22Z", "secret": "string", "expires": "2019-08-24T14:15:22Z" }

Get user client credentials tokens

Request

This route gets a user-specific API token. Send the user’s ID in the frontegg-user-id header and the tenant’s ID in the frontegg-tenant-id header.

Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

curl -i -X GET \
  https://api.frontegg.com/identity/resources/users/api-tokens/v1 \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string'

Responses

Bodyapplication/jsonArray [
clientIdstringrequired
descriptionstringrequired
metadataobjectrequired

Extra data that will be encoded as part of the JWT

createdAtstring(date-time)required
expiresstring(date-time)
]
Response
application/json
[ { "clientId": "string", "description": "string", "metadata": {}, "createdAt": "2019-08-24T14:15:22Z", "expires": "2019-08-24T14:15:22Z" } ]

Delete user client credentials token by token ID

Request

This route deletes a user-specific API token. Send the token as the ID path param. Send the user’s ID in the frontegg-user-id header and the tenant’s ID in the frontegg-tenant-id header. Optionally, send as POST body params values for metadata and description.

Path
idstringrequired
Headers
frontegg-tenant-idstringrequired

The tenant ID identifier

frontegg-user-idstringrequired

The user ID identifier

curl -i -X DELETE \
  'https://api.frontegg.com/identity/resources/users/api-tokens/v1/{id}' \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'frontegg-tenant-id: string' \
  -H 'frontegg-user-id: string'

Responses

Sessions management

Operations

User groups

Operations

User management

Operations

User sessions

Operations

Users-applications management

Operations