MyAccount Management
APIs for managing a user's own emails, phones, profile, and app authenticators.
Note: The MyAccount API doesn't support delegated authentication.
The MyAccount App Authenticators API provides operations to enroll, update, and delete an app authenticator. The API also allows users to view and verify pending notification challenges. The API only supports custom authenticators. See the Custom authenticator integration guide.
The MyAccount Email API provides operations to enroll, update, and delete emails. The API also provides utilities to create, view, and answer verification challenges.
Note: The Okta account management policy doesn't support the MyAccount Email API. See Configure an Okta account management policy.
The MyAccount Password API provides operations to enroll, update, and delete passwords.
Note: The Okta account management policy doesn't support the MyAccount Password API. See Configure an Okta account management policy.
The MyAccount Phone API provides operations to enroll, update, and delete phone numbers. The API also provides utilities to create, view, and answer verification challenges.
Note: The Okta account management policy doesn't support the MyAccount Phone API. See Configure an Okta account management policy.
The MyAccount Sessions API provides operations to manage sessions.
See sessions for more information.
The MyAccount WebAuthn API provides operations to enroll, list, and delete WebAuthn enrollments.
Note: When the Passkeys Rebrand self-service Early Access feature is enabled, the FIDO2 (WebAuthn) authenticator is called Passkeys (FIDO2 WebAuthn), and there are new settings and updates to the authenticator page layout. See Configure the FIDO2 (WebAuthn) authenticator and
settings. To enable the Passkeys Rebrand feature, see Enable self-service features.
The registration for a WebAuthn authenticator (also known as the "attestation ceremony") involves a challenge request and response. When you enroll a WebAuthn authenticator, use the following endpoints in this order:
- Start a WebAuthn enrollment. This endpoint returns a random challenge and other data from the Relying Party (RP).
- Create a WebAuthn enrollment. This endpoint creates and sends a signed response that contains the challenge and other data from the RP.