The User Credentials API provides operations to manage user credentials in your org.
okta.users.manage
Updates a User's password by validating the User's current Password.
This operation provides an option to delete all the sessions of the specified User. However, if the request is made in the context of a session owned by the specified User, that session isn't cleared.
You can only perform this operation on Users in STAGED
, ACTIVE
, PASSWORD_EXPIRED
, or RECOVERY
status that have a valid Password credential.
The User transitions to ACTIVE
status when successfully invoked in RECOVERY
status.
object (PasswordCredential) Specifies a password for a user. When a user has a valid password, imported hashed password, or password hook, and a response object contains
a password credential, then the password object is a bare object without the value property defined (for example, For information on defaults and configuring your password policies, see Configure the password authenticator in the help documentation. | |||||||||||
| |||||||||||
object (PasswordCredential) Specifies a password for a user. When a user has a valid password, imported hashed password, or password hook, and a response object contains
a password credential, then the password object is a bare object without the value property defined (for example, For information on defaults and configuring your password policies, see Configure the password authenticator in the help documentation. | |||||||||||
| |||||||||||
revokeSessions | boolean Default: false When set to |
Success
Bad Request
Forbidden
Not Found
Too Many Requests
{- "oldPassword": {
- "value": "tlpWENT2m"
}, - "newPassword": {
- "value": "uTVM,TPw55"
}, - "revokeSessions": true
}
{- "password": { },
- "recovery_question": {
- "question": "Who's a major player in the cowboy scene?"
}, - "provider": {
- "type": "OKTA",
- "name": "OKTA"
}
}
okta.users.manage
Updates a User's Recovery Question and answer credential by validating the User's current Password.
You can only perform this operation on Users in STAGED
, ACTIVE
, or RECOVERY
status that have a valid Password credential.
object (PasswordCredential) Specifies a password for a user. When a user has a valid password, imported hashed password, or password hook, and a response object contains
a password credential, then the password object is a bare object without the value property defined (for example, For information on defaults and configuring your password policies, see Configure the password authenticator in the help documentation. | |||||||||||
| |||||||||||
object (RecoveryQuestionCredential) Specifies a secret question and answer that's validated (case insensitive) when a user forgets their password or unlocks their account. The answer property is write-only. | |||||||||||
Success
Bad Request
Forbidden
Not Found
Too Many Requests
{- "password": {
- "value": "tlpWENT2m"
}, - "recovery_question": {
- "question": "How many roads must a man walk down?",
- "answer": "forty two"
}
}
{- "password": { },
- "recovery_question": {
- "question": "How many roads must a man walk down?"
}, - "provider": {
- "type": "OKTA",
- "name": "OKTA"
}
}
okta.users.manage
Starts the forgot password flow.
Generates a one-time token (OTT) that you can use to reset a User's Password.
The User must validate their security question's answer when visiting the reset link. This operation can only be performed on Users with an ACTIVE status and a valid Recovery Question credential.
Note: If you have migrated to Identity Engine, you can allow Users to recover passwords with any enrolled MFA authenticator. See Self-service account recovery
If an email address is associated with multiple Users, keep in mind the following to ensure a successful password recovery lookup:
If sendEmail
is false
, returns a link for the User to reset their Password. This operation doesn't affect the status of the User.
Reset URL
Forbidden
Not Found
Too Many Requests
{
}
okta.users.manage
Resets the User's password to the specified password if the provided answer to the recovery question is correct. You must include the Recovery Question answer with the submission.
object (PasswordCredential) Specifies a password for a user. When a user has a valid password, imported hashed password, or password hook, and a response object contains
a password credential, then the password object is a bare object without the value property defined (for example, For information on defaults and configuring your password policies, see Configure the password authenticator in the help documentation. | |||||||||||
| |||||||||||
object (RecoveryQuestionCredential) Specifies a secret question and answer that's validated (case insensitive) when a user forgets their password or unlocks their account. The answer property is write-only. | |||||||||||
Credentials
Bad Request
Forbidden
Not Found
Too Many Requests
{- "password": {
- "value": "uTVM,TPw55"
}, - "recovery_question": {
- "answer": "Annie Oakley"
}
}
{- "password": { },
- "recovery_question": {
- "question": "Who's a major player in the cowboy scene?"
}, - "provider": {
- "type": "OKTA",
- "name": "OKTA"
}
}
okta.users.manage
Expires the password. This operation transitions the User status to PASSWORD_EXPIRED
so that the User must change their password the next time that they sign in.
If you have integrated Okta with your on-premises Active Directory (AD), then setting a User's Password as expired in Okta also expires the Password in AD.
When the User tries to sign in to Okta, delegated authentication finds the password-expired status in AD,
and the User is presented with the password-expired page where they can change their Password.
Success
Forbidden
Not Found
Too Many Requests
{- "id": "00ub0oNGTSWTBKOLGLNR",
- "status": "PASSWORD_EXPIRED",
- "created": "2013-06-24T16:39:18.000Z",
- "activated": "2013-06-24T16:39:19.000Z",
- "statusChanged": "2013-06-24T16:39:19.000Z",
- "lastLogin": "2013-06-24T17:39:19.000Z",
- "lastUpdated": "2013-06-27T16:35:28.000Z",
- "passwordChanged": "2013-06-24T16:39:19.000Z",
- "profile": {
- "firstName": "Isaac",
- "lastName": "Brock",
- "email": "isaac.brock@example.com",
- "login": "isaac.brock@example.com",
- "mobilePhone": "555-415-1337"
}, - "credentials": {
- "password": { },
- "recovery_question": {
- "question": "Who's a major player in the cowboy scene?"
}, - "provider": {
- "type": "OKTA",
- "name": "OKTA"
}
}, - "_links": {
- "resetPassword": {
}, - "resetFactors": {
}, - "expirePassword": {
}, - "forgotPassword": {
}, - "changeRecoveryQuestion": {
}, - "deactivate": {
}, - "changePassword": {
}
}
}
okta.users.manage
Expires the password and resets the User's Password to a temporary password. This operation transitions the User status to PASSWORD_EXPIRED
so that the User must change their password the next time that they sign in.
User's Password is reset to a temporary password that is returned, and then the User's Password is expired.
If revokeSessions
is included in the request with a value of true
, the User's current outstanding sessions are revoked and require re-authentication.
If you have integrated Okta with your on-premises Active Directory (AD), then setting a User's Password as expired in Okta also expires the Password in AD.
When the User tries to sign in to Okta, delegated authentication finds the password-expired status in AD,
and the User is presented with the password-expired page where they can change their Password.
Success
Forbidden
Not Found
Too Many Requests
{- "tempPassword": "F46gy7X4"
}
okta.users.manage
Resets password. Generates a one-time token (OTT) that you can use to reset a User's password. You can automatically email the OTT link to the User or return the OTT to the API caller and distribute using a custom flow.
This operation transitions the User to the RECOVERY
status. The User is then not able to sign in or initiate a forgot password flow until they complete the reset flow.
This operation provides an option to delete all the User's sessions. However, if the request is made in the context of a session owned by the specified User, that session isn't cleared.
Note: You can also use this API to convert a User with the Okta Credential Provider to use a Federated Provider. After this conversion, the User can't directly sign in with a password. To convert a federated User back to an Okta User, use the default API call.
If an email address is associated with multiple Users, keep in mind the following to ensure a successful password recovery lookup:
sendEmail
is false
, returns a link for the User to reset their password.Success
Forbidden
Not Found
Too Many Requests
{- "summary": "Reset password without sending email",
}