mirror of
https://github.com/zitadel/zitadel.git
synced 2025-10-09 11:12:01 +00:00

# Which Problems Are Solved ^Since publishing the new V2 GA APi, we have a lot of broken links in our docs # How the Problems Are Solved replace api links with v2 links
46 lines
1.4 KiB
Plaintext
46 lines
1.4 KiB
Plaintext
Your user has successfully authenticated, and now you ask them if they want to setup MFA to have a more secure account.
|
|
When the user starts the configuration, first you want to show them the possible methods.
|
|
You can either list it implicitly or call the settings service from ZITADEL to get what is configured on the login settings.
|
|
|
|
More detailed information about the API: [Get Login Settings Documentation](/apis/resources/settings_service_v2/settings-service-get-login-settings)
|
|
|
|
Request Example:
|
|
|
|
```bash
|
|
curl --request GET \
|
|
--url https://$ZITADEL_DOMAIN/v2/settings/login \
|
|
--header 'Accept: application/json' \
|
|
--header 'Authorization: Bearer '"$TOKEN"''
|
|
```
|
|
|
|
Response Example:
|
|
The relevant part for the list is the second factor and multi factor list.
|
|
|
|
```bash
|
|
{
|
|
"details": {
|
|
"sequence": "293",
|
|
"changeDate": "2023-03-29T14:16:55.570482Z",
|
|
"resourceOwner": "163840776835432705"
|
|
},
|
|
"settings": {
|
|
"allowUsernamePassword": true,
|
|
"allowRegister": true,
|
|
"allowExternalIdp": true,
|
|
"passkeysType": "PASSKEYS_TYPE_ALLOWED",
|
|
"passwordCheckLifetime": "864000s",
|
|
"externalLoginCheckLifetime": "864000s",
|
|
"mfaInitSkipLifetime": "2592000s",
|
|
"secondFactorCheckLifetime": "64800s",
|
|
"multiFactorCheckLifetime": "43200s",
|
|
"secondFactors": [
|
|
"SECOND_FACTOR_TYPE_OTP",
|
|
"SECOND_FACTOR_TYPE_U2F"
|
|
],
|
|
"multiFactors": [
|
|
"MULTI_FACTOR_TYPE_U2F_WITH_VERIFICATION"
|
|
],
|
|
"resourceOwnerType": "RESOURCE_OWNER_TYPE_ORG"
|
|
}
|
|
}
|
|
``` |