Documentation Index
Fetch the complete documentation index at: https://auth0-feat-authentication-api-migration.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
POST /oauth/token
Verifies multi-factor authentication (MFA) using an out-of-band (OOB) challenge (either Push notification, SMS, or Voice). To verify MFA using an OOB challenge, your application must make a request to /oauth/token with grant_type=http://auth0.com/oauth/grant-type/mfa-oob. Include the oob_code you received from the challenge response, as well as the mfa_token you received as part of mfa_required error.
The response to this request depends on the status of the underlying challenge verification:
- If the challenge has been accepted and verified, it will be the same as
passwordorhttp://auth0.com/oauth/grant-type/password-realmgrant types. - If the challenge has been rejected, you will get an
invalid_granterror, meaning that the challenge was rejected by the user. At this point you should stop polling, as this response is final. - If the challenge verification is still pending (meaning it has not been accepted nor rejected), you will get an
authorization_pendingerror, meaning that you must retry the same request a few seconds later. If you request too frequently, you will get aslow_downerror.
binding_method: prompt, your app needs to prompt the user for the binding_code and send it as part of the request. The binding_code is usually a 6-digit number (similar to an OTP) included as part of the challenge. No binding_code is necessary if the challenge response did not include a binding_method. In this scenario, the response will be immediate; you will receive an invalid_grant or an access_token as response.
Learn More
Parameters
A DPoP proof for the request. This is optional and only required if your application uses Demonstrating Proof-of-Possession.
Request Body
Denotes the flow you are using. For OTP MFA, use
http://auth0.com/oauth/grant-type/mfa-oob.Allowed values: http://auth0.com/oauth/grant-type/mfa-oobYour applicationās Client ID.
A JWT containing a signed assertion with your application credentials.
The value is
urn:ietf:params:oauth:client-assertion-type:jwt-bearer.Allowed values: urn:ietf:params:oauth:client-assertion-type:jwt-bearerYour applicationās Client Secret.
The
mfa_token you received from mfa_required error.The oob code received from the challenge request.
A code used to bind the side channel with the main channel you are using to authenticate.
Response
| Status | Description |
|---|---|
| 200 | Successful response for OOB verification. |
| 400 | Bad request due to missing or invalid parameters. |
| 401 | Unauthorized, invalid mfa_token or oob_code. |