On this page

Factors Administration API

The Okta Factors Administration API is a subset of the Factors API. It provides operations to activate or deactivate which factor types are available to use for multifactor authentication. Activating a factor type with this API doesn't enable multifactor authentication. It makes an activated factor available for multifactor authentication only.

After activating a factor with this API, you can't use it until you enable a policy that uses this factor. If there is only one factor enabled in the policy, this API can't disable that factor.

Beta This API is a beta feature.

Factor object

Attribute Description DataType MinLength MaxLength Nullable Unique Readonly
_links discoverable resources related to the factor JSON HAL (opens new window) FALSE FALSE TRUE
factorType type of factor Factor Type FALSE TRUE TRUE
id the factor name Factor Name FALSE TRUE TRUE
provider factor provider Provider Type FALSE TRUE TRUE
status status of factor NOT_SETUP, PENDING_ACTIVATION, ACTIVE, INACTIVE FALSE FALSE TRUE

Factor name

The following factor names are available:

Factor Name Description
google_otp Google Authenticator
okta_otp Okta Verify
okta_question Security Question
okta_sms SMS Authentication
symantec_vip Symantec VIP

Factor type

The following factor types are supported:

Factor Type Description
question Additional security question
sms SMS
token:software:totp Software Time-based One-Time Passcode (TOTP) (opens new window)
token A software or hardware one-time passcode OTP (opens new window) device

Provider type

The following providers are supported:

Provider Description
GOOGLE Google Integration
OKTA Okta
SYMANTEC Symantec VIP Integration

Specifies link relations (see Web Linking (opens new window)) available for the current status of a factor using the JSON Hypertext Application Language (opens new window) specification. This object is used for dynamic discovery of related resources and lifecycle operations.

Link Relation Type Description
activate Permits use of this factor for MFA
deactivate Denies use of this factor for MFA
self The actual factor

Note: The Links Object is read-only.

Factors Administration operations

Get org factor

GET /api/v1/org/factors

Lists factors in your organization

Request parameters

No required parameters

Optionally, you can add a filter based on the status. If desired, add the text filter=status eq 'status_value' where status_value is one of the following: NOT_SETUP, PENDING_ACTIVATION, ACTIVE, or INACTIVE.

Response parameters

Factor

Request example

curl -v -H "Authorization: SSWS yourtoken" \
-H "Accept: application/json" \
-H "Content-Type: application/json" \
-X GET "https://${yourOktaDomain}/api/v1/org/factors"

Response example

[
  {
    "id": "google_otp",
    "provider": "GOOGLE",
    "factorType": "token:software:totp",
    "status": "ACTIVE",
    "_links": {
      "self": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/google_otp",
        "hints": {
          "allow": [
            "GET"
          ]
        }
      },
      "deactivate": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/google_otp/lifecycle/deactivate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      }
    }
  },
  {
    "id": "okta_question",
    "provider": "OKTA",
    "factorType": "question",
    "status": "INACTIVE",
    "_links": {
      "activate": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_question/lifecycle/activate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      },
      "self": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_question",
        "hints": {
          "allow": [
            "GET"
          ]
        }
      }
    }
  },
  {
    "id": "okta_otp",
    "provider": "OKTA",
    "factorType": "token:software:totp",
    "status": "ACTIVE",
    "_links": {
      "self": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_otp",
        "hints": {
          "allow": [
            "GET"
          ]
        }
      },
      "deactivate": {
        "href": "http://{yourOktaDomain}/api/v1/org/factors/okta_otp/lifecycle/deactivate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      }
    }
  },
  {
    "id": "okta_sms",
    "provider": "OKTA",
    "factorType": "sms",
    "status": "ACTIVE",
    "_links": {
      "self": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms",
        "hints": {
          "allow": [
            "GET"
          ]
        }
      },
      "deactivate": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms/lifecycle/deactivate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      }
    }
  },
  {
    "id": "symantec_vip",
    "provider": "SYMANTEC",
    "factorType": "token",
    "status": "NOT_SETUP",
    "_links": {
      "activate": {
        "href": "http://{yourOktaDomain}/api/v1/org/factors/symantec_vip/lifecycle/activate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      },
      "self": {
        "href": "https://{yourOktaDomain}/api/v1/org/factors/symantec_vip",
        "hints": {
          "allow": [
            "GET"
          ]
        }
      }
    }
  }
]

Activate SMS

POST /api/v1/org/factors/okta_sms/lifecycle/activate

Allows multifactor authentication to use an SMS factor

Request parameters

None

Request example

curl -v -H "Authorization: SSWS yourtoken" \
-H "Accept: application/json" \
-H "Content-Type: application/json" \
-X POST "https://${yourOktaDomain}/api/v1/org/factors/okta_sms/lifecycle/activate"

Response example

{
    "id": "okta_sms",
    "provider": "OKTA",
    "factorType": "sms",
    "status": "ACTIVE",
    "_links": {
        "self": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms",
            "hints": {
                "allow": [
                    "GET"
                ]
            }
        },
        "deactivate": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms/lifecycle/deactivate",
            "hints": {
                "allow": [
                    "POST"
                ]
            }
        }
    }
}

Deactivate SMS

POST /api/v1/org/factors/okta_sms/lifecycle/deactivate

Denies use of an SMS factor for multifactor authentication

Request parameters

None

Request example

curl -v -H "Authorization: SSWS yourtoken" \
-H "Accept: application/json" \
-H "Content-Type: application/json" \
-X POST "https://${yourOktaDomain}/api/v1/org/factors/okta_sms/lifecycle/deactivate"

Response example

{
    "id": "okta_sms",
    "provider": "OKTA",
    "factorType": "sms",
    "status": "INACTIVE",
    "_links": {
        "activate": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms/lifecycle/activate",
            "hints": {
                "allow": [
                    "POST"
                ]
            }
        },
        "self": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_sms",
            "hints": {
                "allow": [
                    "GET"
                ]
            }
        }
    }
}

Activate Okta Verify

POST /api/v1/org/factors/okta_otp/lifecycle/activate

Allows multifactor authentication to use Okta Verify as a factor

Request parameters

None

Request example

curl -v -H "Authorization: SSWS yourtoken" \
-H "Accept: application/json" \
-H "Content-Type: application/json" \
-X POST "https://${yourOktaDomain}/api/v1/org/factors/okta_otp/lifecycle/activate"

Response example

{
    "id": "okta_otp",
    "provider": "OKTA",
    "factorType": "token:software:totp",
    "status": "ACTIVE",
    "_links": {
        "self": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_otp",
            "hints": {
                "allow": [
                    "GET"
                ]
            }
        },
        "deactivate": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_otp/lifecycle/deactivate",
            "hints": {
                "allow": [
                    "POST"
                ]
            }
        }
    }
}

Deactivate Okta Verify

POST /api/v1/org/factors/okta_otp/lifecycle/deactivate

Denies use of Okta Verify for multifactor authentication

Request parameters

None

Request example

curl -v -H "Authorization: SSWS yourtoken" \
-H "Accept: application/json" \
-H "Content-Type: application/json" \
-X POST "https://${yourOktaDomain}/api/v1/org/factors/okta_otp/lifecycle/deactivate"

Response example

{
    "id": "okta_otp",
    "provider": "OKTA",
    "factorType": "token:software:totp",
    "status": "INACTIVE",
    "_links": {
        "activate": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_otp/lifecycle/activate",
            "hints": {
                "allow": [
                    "POST"
                ]
            }
        },
        "self": {
            "href": "https://{yourOktaDomain}/api/v1/org/factors/okta_otp",
            "hints": {
                "allow": [
                    "GET"
                ]
            }
        }
    }
}