The user ID identifier
- Pre-disable SMS MFA
Authentication and Identity Management
Frontegg offers a comprehensive suite of authentication, user management, and security features to streamline identity management and enhance application security. This section provides an overview of all relevant API endpoints, organized into Authentication, Management, and Self-Service categories.
Authentication Endpoints: Enable secure user login, multi-factor authentication (MFA), passwordless options, and social login integrations, allowing for a flexible and robust sign-in experience.
Management Endpoints: Require environment-level authorization and provide full control over SSO (SAML and OpenID Connect) resources, user roles, permissions, and configurations. These endpoints are designed for administrative use, allowing for centralized identity and access management.
Self-Service Endpoints: Accessible with a user token (JWT), these endpoints empower users to manage their SSO connections and other account settings. Users with the necessary permissions can create, update, or delete SSO configurations directly, ensuring they have the tools to manage their access securely and independently.
Each category in this section helps you configure and extend Frontegg’s capabilities, providing the flexibility to manage user identities, authentication protocols, and access controls as per your application’s needs.
Request
Disable multi-factor authentication (MFA) enrollment for a logged-in user within a specific account (tenant).
This endpoint removes MFA for a user, typically used in administrative contexts where a backend system or admin manages user security settings.
The request must include the mfaToken, which is the time-based one-time password (TOTP) generated by the user's authenticator app.
Use this endpoint to programmatically disable MFA for a specific user within an account (tenant).
- EU Regionhttps://api.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify
- US Regionhttps://api.us.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify
- CA Regionhttps://api.ca.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify
- AU Regionhttps://api.au.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify
- Frontegg sub-domain for use with user tokenshttps://app-xxx.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify
- cURL
- JavaScript
- Python
- GO
- Payload
curl -i -X POST \
'https://api.frontegg.com/identity/resources/users/v1/mfa/authenticator/{deviceId}/disable/verify' \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'Content-Type: application/json' \
-H 'frontegg-user-id: string' \
-d '{
"token": "string"
}'Request
Initiate the process of disabling SMS-based multi-factor authentication (MFA) for a specific device.
Provide the target deviceId in the request path to mark the SMS MFA device for pre-disablement. This action prepares the device for subsequent steps required to complete the removal.
Use this route as part of the MFA management flow for disabling SMS-based MFA on a per-device basis.
- EU Regionhttps://api.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable
- US Regionhttps://api.us.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable
- CA Regionhttps://api.ca.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable
- AU Regionhttps://api.au.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable
- Frontegg sub-domain for use with user tokenshttps://app-xxx.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable
- cURL
- JavaScript
- Python
- GO
- Payload
curl -i -X POST \
'https://api.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable' \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'Content-Type: application/json' \
-H 'frontegg-tenant-id: string' \
-H 'frontegg-user-id: string' \
-d '{}'Request
Complete the process of disabling SMS-based multi-factor authentication (MFA) for a specific device.
This step finalizes MFA deactivation for the given deviceId after a prior pre-disable action.
The request must include:
otcToken: The one-time challenge token obtained during the pre-disable step.code: The SMS verification code received by the user.
Use this endpoint as the second step in the SMS MFA removal flow to verify the user's identity and confirm the disable action.
- EU Regionhttps://api.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify
- US Regionhttps://api.us.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify
- CA Regionhttps://api.ca.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify
- AU Regionhttps://api.au.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify
- Frontegg sub-domain for use with user tokenshttps://app-xxx.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify
- cURL
- JavaScript
- Python
- GO
- Payload
curl -i -X POST \
'https://api.frontegg.com/identity/resources/users/v1/mfa/sms/{deviceId}/disable/verify' \
-H 'Authorization: Bearer <YOUR_JWT_HERE>' \
-H 'Content-Type: application/json' \
-H 'frontegg-user-id: string' \
-d '{
"otcToken": "string",
"code": "string"
}'