Your suggested change has been received. Thank you.

close

Credential API (v1)

Download OpenAPI specification:Download

Introduction to the Credential API

The Credential API is aimed at managing end users credentials, such as passwords, primary emails, etc. Credentials can be managed by the end user himself (Self Service) or via a 'Server-to-server' (Management / Admin) process.

Versions of the API

The current version of the credential API only manages the primary email addresses, primary phonenumbers and passwords. Subsequent versions will also support social accounts.

Explanations

What is a credential? In the context of identity management, the term credential can be informally defined as 'anything a user has that gives him access to his account'. A more subtle observation is that 'the term credential is used to denote both the thing uniquely possessed by the user and the corresponding information bound to the digital identity' (source: A Taxonomy of User Authentication Methods - Gartner). iWelcome Credential API aims at managing the credential information that is linked to the digital identity. Email addresses (a.k.a. primary emails) can be considered as credential for 2 reasons:

  • They may be used as identifier during login
  • Forgotten passwords can be reset using a link that is send to the user's email address.

iWelcome calls an email address that is used for these purposes a primary email address. A (primary) phonenumber is a credential since it can be used to send a login-code for 2FA purposes.

Returns the primary email for the user

The endpoint is protected and allows end users(CIAM or admin) to get the primary email. The regular users must have 'credential:primary-email:get' scope and admin users must have the 'credential:primary-email:admin:get' scope in order to view another user's primary email.

Authorizations:
OAuth2
path Parameters
user_id
required
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...

Responses

Request to make an email address the user's primary email.

When this API is called, it triggers the following process:

  • The email address is added to the user's profile if it wasn't already included. If the email address is added, it will get the type 'home' by default.
  • A verification email is sent to the requested primary email address containing a verification link.
  • When the recipient clicks on the link to confirm, he is asked to login to make sure that the person that has access to the email box is the same person as the person that is the legitimate user of the identity. If the recipient successfully logs in, the user's primary email address is updated to the requested value.

Multiple calls to this endpoint can be done:

  • Every call will generate a new email, so this API-call can be (mis)used to have an end user re-confirm his primary email address.

A user's profile can have multiple email addresses:

  • The list of all emails for a user can be obtained through the iWelcome SCIM API. The credential API reveals only the ones that are primary or are requested to become primary.
  • Until the 'new' email address is confirmed by the end user, the primary email address of the end user will not be changed; it will still have the 'old' value.

If the authenticated user has the scope 'credential:primary-email:post', it can create a new primary email request. An admin user can create a new primary email request only if the scope 'credential:primary-email:admin:post' is present.

Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json
user_id
required
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...
primary_email
required
string <= 254 characters ^[a-zA-Z0-9!#$%&'*+-/=?^_`{|}~]+(?:\.[a-zA-Z0...
redirect_url
string^((((https?)://))(%[0-9A-Fa-f]{2}|[-()_.!~*';...

After the user has successfully confirmed the new email address he will be redirected to this url. The url may indicate some iWelcome page or it may indicate a web page from a 3rd party. Url whitelisting is applied.

id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_email": "string",
  • "redirect_url": "string",
  • "id_token": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "id": "string",
  • "user_id": "string",
  • "requested_primary_email": "string",
  • "request_datetime": "2019-08-24T14:15:22Z",
  • "email_verification_expiration_datetime": "2019-08-24T14:15:22Z",
  • "redirect_url": "string"
}

Endpoint to confirm a user's email address

When a user's email address needs to be verified, it sends a link to the user's email address. When that link is clicked on, the user needs to login (if not already) before this protected endpoint can be invoked to confirm the email address and make it primary. The provided access token must have the 'credential:primary-email:post' scope. The reason for protecting this endpoint is to make sure that the user that clicks on the confirmation link, is the legitimate user of the account. This may not be in the case in the following scenario's:

  • The end-user made a typo when entering his 'new' primary e-mail request; he may have entered d.johnsson@mydomain.com instead of d.johnson@mydomain.com. If Dan Johnsson clicks on the link, he has in fact taken-over the account and Dave Johnson has lost access to his account because logging in with the original email address (e.g. davejohnson@mydomain.com) and password is no longer working.
  • An end-user may have left a device on which he is logged-in 'open' and a malicious person can change the e-mail address unnoticed. Again, the legitimate user would loose access to the account.

iWelcome considers this as a best practice in the context of 'security and privacy by design'. Customers who prefer a more user-friendly process without the need for logging in, can consider using the "/credential/v1/public/primary-email-confirmation" endpoint instead.

The confirmation has the following effects on the attribute value metadata (AVM) of the new email address:

  • currency.LastVerification is set to current timestamp
  • accuracy.Validation is set to valid
  • accuracy.VerificationLevel is set to 1
  • accuracy.VerificationMethod is set to Proof of Possession
  • accuracy.Verifier is set to Provider
  • provenance.provider is set to the configured data controller for the segment
  • provenance.pedigree is set to self-asserted
Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json

the token and the authenticated user

token
required
string <= 100 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$

It is a random string which is part of the confirmation email. The confirmation email is sent when the API which triggers a primary email request is called. The result of calling that API would be an email sent to the user, containing a link on which the user must click in order to confirm the primary email, and that link contains the token.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "token": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_email": "string",
  • "previous_primary_email": "string",
  • "redirect_url": "string"
}

Unprotected endpoint to confirm a user's email address without authenticating the enduser.

Customers need to request iWelcome to expose this endpoint, which by default is not the case, since usage does not follow the principle of 'security by design'. The benefit of this endpoint above the protected version is that the end-user will get a better user-experience since he doesn't have to login when confirming the new e-mail address.

This endpoint is the same as the /credential/v1/primary-email-request endpoint, but without the need for the end-user to authenticate himself. As a consequence, a 401 response is not applicable.

Request Body schema: application/vnd.iwelcome.v1+json

the token and the authenticated user

token
required
string <= 100 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$

It is a random string which is part of the confirmation email. The confirmation email is sent when the API which triggers a primary email request is called. The result of calling that API would be an email sent to the user, containing a link on which the user must click in order to confirm the primary email, and that link contains the token.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "token": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_email": "string",
  • "previous_primary_email": "string",
  • "redirect_url": "string"
}

Returns the current primary phone number

The endpoint is protected and allows end users(CIAM or admin) to get the current primary phone number. The regular users must have 'credential:primary-phonenumber:get' scope and admin users must have the 'credential:primary-phonenumber:admin:get' scope in order to view another user's primary phone number.

Authorizations:
OAuth2
path Parameters
user_id
required
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...

Responses

Request to make a phone number the user's primary phone number.

When this API is called, it triggers the following process:

  • The phone number is added to the user's profile if it wasn't already included. If the phone number is added, it will get the type 'home' by default. If the phone number is already verified, it will be made primary without sending an SMS for validation.
  • A SMS is sent to the requested primary phone number containing a OTP token.
  • When calling /primary-phone-number-confirmation with the previously obtained OTP token, the phone number becomes primary.

Multiple calls to this endpoint can be done:

  • Every call will generate a new SMS, so this API-call can be (mis)used to have an end user re-confirm his primary phone number.

A user's profile can have multiple phone numbers:

  • The list of all phone numbers for a user can be obtained through the iWelcome SCIM API. The credential API reveals only the ones that are primary or are requested to become primary.
  • Until the 'new' phone number is confirmed by the end user, the primary phone number of the end user will not be changed; it will still have the 'old' value.

If the authenticated user has the scope 'credential:primary-phonenumber:post', it can create a new primary phone number request. An admin user can create a new primary phone number request only if the scope 'credential:primary-phonenumber:admin:post' is present.

Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json
user_id
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...
primary_phone_number
required
string <= 30 characters ^(tel:)?((?:\+|00)[1-9]|0)(|\-)(\d)?((\(\d{1,...
locale
string <= 5 characters ^[a-zA-Z_-]+$
id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

transmission_method
string <= 32 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$

The channel through which the OTP will be sent to the user in order to confirms its primary phone number. Examples: "sms", "voice", etc.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_phone_number": "string",
  • "locale": "strin",
  • "id_token": "string",
  • "transmission_method": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "requested_primary_phone_number": "string",
  • "requested_locale": "string",
  • "request_datetime": "2019-08-24T14:15:22Z"
}

Endpoint to confirm a user's phone number

When a user's phone number needs to be verified, it sends a SMS with the OTP token to the user's phone number. When that token is provided to this endpoint along with an access token containing the 'credential:primary-phonenumber:post' scope, the user's phone number will become primary.

The confirmation has the following effects on the attribute value metadata (AVM) of the new phone number:

  • currency.LastVerification is set to current timestamp
  • accuracy.Validation is set to valid
  • accuracy.VerificationLevel is set to 1
  • accuracy.VerificationMethod is set to Proof of Possession
  • accuracy.Verifier is set to Provider
  • provenance.provider is set to the configured data controller for the segment
  • provenance.pedigree is set to self-asserted
Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json

the token and the authenticated user

verification_code
required
string <= 100 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$
phone_number
required
string <= 30 characters ^(tel:)?((?:\+|00)[1-9]|0)(|\-)(\d)?((\(\d{1,...

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "verification_code": "string",
  • "phone_number": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_phone_number": "string",
  • "previous_primary_phone_number": "string"
}

Request to make a phone number the user's primary phone number.

When this API is called, it triggers the following process:

  • The phone number is added to the user's profile if it wasn't already included. If the phone number is added, it will get the type 'home' by default. If the phone number is already verified, it will be made primary without sending an SMS for validation.
  • A SMS is sent to the requested primary phone number containing a OTP token.
  • When calling /primary-phone-number-confirmation with the previously obtained OTP token, the phone number becomes primary.

Multiple calls to this endpoint can be done:

  • Every call will generate a new SMS, so this API-call can be (mis)used to have an end user re-confirm his primary phone number.

A user's profile can have multiple phone numbers:

  • The list of all phone numbers for a user can be obtained through the iWelcome SCIM API. The credential API reveals only the ones that are primary or are requested to become primary.
  • Until the 'new' phone number is confirmed by the end user, the primary phone number of the end user will not be changed; it will still have the 'old' value.

If the authenticated user has the scope 'credential:primary-phonenumber:post', it can create a new primary phone number request. The authenticated user id will be used for performing the operation. An admin user can create a new primary phone number request only if the scope 'credential:primary-phonenumber:admin:post' is present. If this scope is present, then the request must contain the user id, otherwise the request will fail with 400 Bad Request, indicating that the user_id is not valid.

Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json
user_id
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...
primary_phone_number
required
string <= 30 characters ^(tel:)?((?:\+|00)[1-9]|0)(|\-)(\d)?((\(\d{1,...
locale
string <= 5 characters ^[a-zA-Z_-]+$
id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

transmission_method
string <= 32 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$

The channel through which the OTP will be sent to the user in order to confirms its primary phone number. Examples: "sms", "voice", etc.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_phone_number": "string",
  • "locale": "strin",
  • "id_token": "string",
  • "transmission_method": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "requested_primary_phone_number": "string",
  • "requested_locale": "string",
  • "request_datetime": "2019-08-24T14:15:22Z"
}

Endpoint which can be used to confirm the authenticated user's primary phone number, or by an admin to confirm the phone number on behalf of another user.

When a user's phone number needs to be verified, it sends a SMS with the OTP token to the user's phone number. When the authenticated user is verifying it's own phone number, the scope 'credential:primary-phonenumber::post' is required. If an admin is performing this operation on behalf of the user, the scope 'credential:primary-phonenumber:admin:post' is needed. If this scope is present, then the request must contain the user id, otherwise the request will fail with 400 Bad Request, indicating that the user_id is not valid. Assuming the access token has the correct scope assigned, the user's phone number will become primary.

The confirmation has the following effects on the attribute value metadata (AVM) of the new phone number:

  • currency.LastVerification is set to current timestamp
  • accuracy.Validation is set to valid
  • accuracy.VerificationLevel is set to 1
  • accuracy.VerificationMethod is set to Proof of Possession
  • accuracy.Verifier is set to Provider
  • provenance.provider is set to the configured data controller for the segment
  • provenance.pedigree is set to self-asserted
Authorizations:
OAuth2
Request Body schema: application/vnd.iwelcome.v1+json

the token and the authenticated user

verification_code
required
string <= 100 characters ^[\p{L}\p{Zs}0-9\.,_'\-]+$
phone_number
required
string <= 30 characters ^(tel:)?((?:\+|00)[1-9]|0)(|\-)(\d)?((\(\d{1,...
user_id
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "verification_code": "string",
  • "phone_number": "string",
  • "user_id": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "user_id": "string",
  • "primary_phone_number": "string",
  • "previous_primary_phone_number": "string"
}

The endpoint used to complete the identity link.

Endpoint used to link a (social) identity to the authenticated user. The 'state' parameter that the OAuth identity provider provided in the call-back must be used. The access_token needs to have one of the following scopes: 'credential:identity-link:put' is needed when the authenticated user is linking its own IDP and scope 'credential:identity-link:admin:put' is needed when the link is made by an application. In this situation, the user id of the identity link with 'authorizationCode' is set to the one from the payload.

Authorizations:
OAuth2
path Parameters
id
required
string

identifier for the linked account

Request Body schema: application/json

the Authorization codet

authorization_code
required
string^[\p{L}\/p\\{Zs}0-9\.,_'\-%=&]+$

Authorization code as received from the OAuth Identity Provider

id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

user_id
string

Responses

Request samples

Content type
application/json
{
  • "authorization_code": "string",
  • "id_token": "string",
  • "user_id": "string"
}

Endpoint used to unlink a (social) account from the authenticated user.

Endpoint used to unlink a (social) account from the authenticated user. The access_token needs to have one of the following scopes 'credential:identity-link:delete' is needed when the authenticated user is deleting its own identity link and to delete a link of somebody else the access_token needs to have scope 'credential:identity-link:admin:delete' as authorisation.

Authorizations:
OAuth2
path Parameters
id
required
string

identifier for the linked account

Request Body schema: application/json
id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

Responses

Request samples

Content type
application/json
{
  • "id_token": "string"
}

Set password for provided user id

This is a protected endpoint and allows end users(CIAM or admin) to set their passwords. Admin users must have the 'credential:password:manager' scope in order to set another user's password.

Authorizations:
OAuth2
header Parameters
Authorization
required
string

The authorization header must contain 'Bearer '

Request Body schema: application/json
userId
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...

A string representing the id of the user to set the password for.

password
string

A string representing the password to assign for the user specified.

Responses

Request samples

Content type
application/json
{
  • "userId": "string",
  • "password": "string"
}

Get password policy

Authorizations:
OAuth2

Responses

Response samples

Content type
application/json
{
  • "maxPasswordAge": "P183D",
  • "warningInterval": "P14D",
  • "minimumLength": 8,
  • "minimumLowercaseCharacters": 1,
  • "minimumUppercaseCharacters": 1,
  • "minimumDecimals": 1,
  • "minimumSpecialCharacters": 1,
  • "minimumNumberOfCategoriesToBeUsed": 4,
  • "forbiddenLeadingChars": "abc",
  • "forbiddenTrailingChars": "xyz",
  • "accountLockout": {
    },
  • "passwordHistory": {
    },
  • "forcePasswordChange": {
    }
}

Get password metadata

Obtain information about the user's password.

Authorizations:
OAuth2
path Parameters
user_id
required
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...

Responses

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "set_date": "2019-08-24T14:15:22Z",
  • "password_provided": true,
  • "is_expired": true,
  • "validity_duration": {
    },
  • "expiration_date": "2019-08-24T14:15:22Z"
}

Change password for provided user id

The Set Password API is a protected endpoint and allows end-users(CIAM) to change their password. For security reasons, the authenticated user needs to provide either one of: * current password * ID-token

path Parameters
user_id
required
string^[a-zA-Z0-9]{8}-?[a-zA-Z0-9]{4}-?[a-zA-Z0-9]{...
header Parameters
Authorization
required
string

The end-user's access_token must be provided as a Bearer token, for example "Bearer 2YotnFZFEjr1zCsicMWpAA".

Request Body schema: application/vnd.iwelcome.v1+json
password
required
string

A string representing the password to assign for the user specified.

current_password
string

A string representing the user's current password. This is mandatory

id_token
string (IDtoken)

An ID-token is the primary extension that OpenID Connect makes to OAuth 2.0 to enable End-Users to be Authenticated. It is a security token that contains Claims about the Authentication of an End-User, such as auth_time and acr.

Depending on configuration, the credential API may evaluate the values of the auth_time and acr claims. The auth_time claim may be used to check if the user was authenticated at a sufficiently recent moment. The acr claim may be used to check if the user was authenticated sufficiently strong, i.e. with 2FA. The required maximum age and acr value can be configured indepently for each type of credential; primary email, primary phone and password. If reauthentication is needed, a 403 error response is returned.

Responses

Request samples

Content type
application/vnd.iwelcome.v1+json
{
  • "password": "string",
  • "current_password": "string",
  • "id_token": "string"
}

Response samples

Content type
application/vnd.iwelcome.v1+json
{
  • "set_date": "2019-08-24T14:15:22Z",
  • "password_provided": true,
  • "is_expired": true,
  • "validity_duration": {
    },
  • "expiration_date": "2019-08-24T14:15:22Z"
}