POST /api/v1/users/{userId}/authenticator-enrollments/tac
Creates an auto-activated Temporary access code (TAC) authenticator enrollment
Servers
- https://{yourOktaDomain}
Path parameters
| Name | Type | Required | Description |
|---|---|---|---|
userId |
String | Yes |
ID of an existing Okta user |
Request headers
| Name | Type | Required | Description |
|---|---|---|---|
Content-Type |
String | Yes |
The media type of the request body.
Default value: "application/json" |
Request body fields
| Name | Type | Required | Description |
|---|---|---|---|
profile |
Object | No |
Defines the authenticator specific parameters |
profile.ttl |
String | No |
Time-to-live (TTL) in minutes. Specifies how long the TAC enrollment is valid after it's created and activated.
The configured value must be between 10 minutes ( |
profile.multiUse |
Boolean | No |
Determines whether the enrollment can be used more than once. To enable multi-use, the org-level authenticator’s configuration must allow multi-use. |
authenticatorId |
String | Yes |
Unique identifier of the TAC authenticator |
How to start integrating
- Add HTTP Task to your workflow definition.
- Search for the API you want to integrate with and click on the name.
- This loads the API reference documentation and prepares the Http request settings.
- Click Test request to test run your request to the API and see the API's response.