https://api.frontegg.com/identity/
https://api.us.frontegg.com/identity/
https://api.ca.frontegg.com/identity/
https://api.au.frontegg.com/identity/
https://{domain}.frontegg.com/identity/
This route authenticates a local user using email and password. Send the frontegg-vendor-host
as a header to declare which vendor. This is your domain name in the Frontegg Portal âžś Workspace Settings âžś Domains âžś Domain Name. Optionally, send login information for the user as POST body params. Include the invitation token if the user is signing up by invitation. Send the recaptcha token if the recaptcha is enabled for login.
https://api.frontegg.com/identity/resources/auth/v1/user
https://api.us.frontegg.com/identity/resources/auth/v1/user
https://api.ca.frontegg.com/identity/resources/auth/v1/user
https://api.au.frontegg.com/identity/resources/auth/v1/user
https://app-xxxx.frontegg.com/identity/resources/auth/v1/user
curl -i -X POST \
https://api.frontegg.com/identity/resources/auth/v1/user \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"email": "string",
"password": "string",
"recaptchaToken": "string",
"invitationToken": "string"
}'
{ "tokenType": "bearer", "mfaRequired": true, "mfaToken": "string", "mfaEnrolled": true, "mfaDevices": { "webauthn": [ … ], "phones": [ … ], "authenticators": [ … ], "emails": [ … ] }, "mfaStrategies": {}, "qrCode": "string", "recoveryCode": "string", "accessToken": "string", "refreshToken": "string", "expiresIn": 0, "expires": "string", "userId": "string", "userEmail": "string", "emailVerified": true, "isBreachedPassword": true }
This route refreshes a JWT based on the refresh token expiration time. If the refresh token is valid, the route returns a new JWT and refresh token. Please note that the route expects the refresh cookie of the logged in user as well. Send the frontegg-vendor-host
as a header to declare which vendor. This is your domain name in the Frontegg Portal âžś Workspace Settings âžś Domains âžś Domain Name. Configure your JWT settings in the Frontegg Portal.
https://api.frontegg.com/identity/resources/auth/v1/user/token/refresh
https://api.us.frontegg.com/identity/resources/auth/v1/user/token/refresh
https://api.ca.frontegg.com/identity/resources/auth/v1/user/token/refresh
https://api.au.frontegg.com/identity/resources/auth/v1/user/token/refresh
https://app-xxxx.frontegg.com/identity/resources/auth/v1/user/token/refresh
curl -i -X POST \
https://api.frontegg.com/identity/resources/auth/v1/user/token/refresh \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'Content-Type: application/json' \
-H 'frontegg-vendor-host: string' \
-d '{}'
{ "tokenType": "bearer", "mfaRequired": true, "mfaToken": "string", "mfaEnrolled": true, "mfaDevices": { "webauthn": [ … ], "phones": [ … ], "authenticators": [ … ], "emails": [ … ] }, "mfaStrategies": {}, "qrCode": "string", "recoveryCode": "string", "accessToken": "string", "refreshToken": "string", "expiresIn": 0, "expires": "string", "userId": "string", "userEmail": "string", "emailVerified": true, "isBreachedPassword": true }
https://api.frontegg.com/identity/resources/auth/v1/logout
https://api.us.frontegg.com/identity/resources/auth/v1/logout
https://api.ca.frontegg.com/identity/resources/auth/v1/logout
https://api.au.frontegg.com/identity/resources/auth/v1/logout
https://app-xxxx.frontegg.com/identity/resources/auth/v1/logout
curl -i -X POST \
https://api.frontegg.com/identity/resources/auth/v1/logout \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'frontegg-vendor-host: string'