This API scope covers all endpoints related to user authentication, Single Sign-On (SSO), Multi-Factor Authentication (MFA), Windows Integrated Authentication, token management, and authorization checks within the MFT system. The base endpoint URL for all operations is http://localhost:8010/vault_rest. Most authenticated endpoints require an API key (bearer token) provided in the Authorization: Bearer <token> header. This token can be obtained from the /vault_rest/authenticate endpoint using basic authentication (username and password) or through SSO/Windows authentication flows. For initial authentication endpoints like /vault_rest/authenticate, basic authentication (Authorization: Basic <base64(username:password)>) is required. API keys have an expiration time and can be extended or recycled using the token management endpoints.

Server
http://localhost:8010
Server Variables

Basic authentication using username and password.

Bearer token authentication using an API key.

Authentication

Endpoints for user login, logout, and session management.

Request an API key

Requests an API key (authentication token) for subsequent API calls. This endpoint typically requires basic authentication (username and password) in the Authorization header to obtain a bearer token.

Auth
GET /vault_rest/authenticate
Copy
Responses
200

API key successfully generated.

objectobject

Result of an authentication attempt, including the API key.

Resultstring

The outcome of the authentication attempt.

Enum: Success,ErrorServiceUnavailable,ErrorInvalidCredentials,ErrorMfaRequired

Tokenstring

The generated authentication token (API key).

Expiresdate-time

The expiration date and time of the token.

ExpiresStringstring

The expiration date and time of the token as a string.

UiMessageKeystring

A key for UI messages related to the authentication result.

Messagestring

A human-readable message related to the authentication result.

Response
Copy

Log out and invalidate the current API key

Invalidates the current authentication token (API key), effectively logging out the user. The token can no longer be used for subsequent authenticated requests.

Auth
DELETE /vault_rest/authenticate
Copy
Responses
200

Authentication token successfully invalidated.

objectobject

Result of cancelling an authentication token.

successboolean

Indicates if the token cancellation was successful.

Response
Copy

Initiate SSO pre-authentication

Initiates the pre-authentication process for Single Sign-On (SSO) using OIDC. This endpoint typically returns information needed to redirect the user to the identity provider.

Auth
GET /vault_rest/pre-authenticate-sso
Copy
Responses
200

SSO pre-authentication initiated successfully.

objectobject

Result of the SSO pre-authentication process.

redirectUrlstring

The URL to redirect the user to for SSO authentication.

statestring

A state parameter to maintain state between the request and the callback.

Response
Copy

Complete SSO authentication via GET

Completes the Single Sign-On (SSO) authentication process by receiving an authorization code and state via a GET request. This is commonly used as a redirect URI callback from an identity provider after successful authentication.

Auth
Query String
codestring

The authorization code received from the identity provider.

statestring

The state parameter used for CSRF protection, echoed back from the identity provider.

GET /vault_rest/authenticate-sso
Copy
Responses
200

SSO authentication completed successfully.

No response body
Response
Copy

Complete SSO authentication via POST

Completes the Single Sign-On (SSO) authentication process by receiving authentication data via a POST request. This is typically used for callback mechanisms from an identity provider.

Auth
Request Body

SSO authentication details.

objectobject
ssoDatastring

Encoded SSO data from the identity provider.

POST /vault_rest/authenticate-sso
Copy
Responses
200

SSO authentication completed successfully.

No response body
Response
Copy

Authenticate using an SSO token

Authenticates a user using an existing Single Sign-On (SSO) token. This endpoint validates the provided SSO token to establish an authenticated session.

Auth
GET /vault_rest/authenticate-sso-token
Copy
Responses
200

SSO token authenticated successfully.

No response body
Response
Copy

Mfa

Endpoints for Multi-Factor Authentication (MFA) configuration and validation.

Validate a One-Time Password (OTP)

Validates a provided One-Time Password (OTP) as part of a multi-factor authentication (MFA) flow. This is typically called after initial authentication to complete the login process.

Auth
Request Body

OTP validation request.

objectobject

Request body for validating a One-Time Password.

otpstring

The One-Time Password to validate.

POST /vault_rest/validate-otp
Copy
Responses
200

OTP validated successfully.

objectobject

Result of OTP validation.

successboolean

Indicates if the OTP validation was successful.

messagestring

A message related to the OTP validation result.

Response
Copy

Get Multi-Factor Authentication (MFA) settings

Retrieves the current Multi-Factor Authentication (MFA) settings for the current user or system.

Auth
GET /vault_rest/settings/mfa
Copy
Responses
200

MFA settings retrieved successfully.

objectobject

Result of retrieving MFA settings.

enabledboolean

Whether MFA is currently enabled.

configuredMethodsarray[string]

List of configured MFA methods.

Enum: TOTP,SMS,Email

Response
Copy

Update Multi-Factor Authentication (MFA) settings

Updates the Multi-Factor Authentication (MFA) settings for the current user or system. This can include enabling/disabling MFA, configuring methods, etc.

Auth
Request Body

MFA settings update request.

objectobject

Request body for updating MFA settings.

enabledboolean

Whether MFA should be enabled or disabled.

POST /vault_rest/settings/mfa
Copy
Responses
200

MFA settings updated successfully.

objectobject

Result of updating MFA settings.

successboolean

Indicates if the MFA settings update was successful.

Response
Copy

Initiate token exchange for MFA

Initiates the process to exchange an existing authentication token for a new one, typically in scenarios involving Multi-Factor Authentication (MFA) where an OTP is required for the exchange.

Auth
POST /vault_rest/pre-exchange-token
Copy
Responses
200

Token exchange pre-initiated successfully.

objectobject

Model for initiating token exchange with MFA.

mfaRequiredboolean

Indicates if MFA is required for the token exchange.

challengestring

A challenge string for MFA.

Response
Copy

Complete token exchange with OTP

Completes the token exchange process by providing the necessary information, including an OTP, to receive a new authentication token. This is part of an MFA-enabled token refresh or upgrade flow.

Auth
Request Body

Token exchange request with OTP.

objectobject

Request body for completing token exchange.

otpstring

The One-Time Password for token exchange.

POST /vault_rest/exchange-token
Copy
Responses
200

Token exchange completed successfully.

objectobject

Result of token exchange.

tokenstring

The new authentication token.

expiresdate-time

The expiration date and time of the new token.

Response
Copy

Extend the expiration of an authentication token

Extends the expiration time of an existing authentication token. This allows users to maintain their session without needing to re-authenticate fully.

Auth
Request Body

Request to extend token expiration.

objectobject

Request body for extending an authentication token.

tokenIdstring

The ID of the token to extend.

extensionDurationint32

Duration in minutes to extend the token.

PUT /vault_rest/token
Copy
Responses
200

Token expiration extended successfully.

objectobject

Result of extending an authentication token.

successboolean

Indicates if the token extension was successful.

newTokenExpiresdate-time

The new expiration date and time of the token.

Response
Copy

Create a new authentication token

Creates a new authentication token. This endpoint can be used by administrators or authorized users to generate tokens for other users or service accounts.

Auth
Request Body

Request to create a new authentication token.

objectobject

Request body for creating a new authentication token.

userIdstring

The ID of the user for whom to create the token.

durationMinutesint32

The duration in minutes for which the token should be valid.

POST /vault_rest/token
Copy
Responses
200

New authentication token created successfully.

objectobject

Result of creating a new authentication token.

tokenstring

The newly created authentication token.

expiresdate-time

The expiration date and time of the new token.

Response
Copy

Delete a specific authentication token

Deletes a specific authentication token, rendering it invalid for future API requests. This can be used to revoke access for a particular token.

Auth
Request Body

Request to delete an authentication token.

objectobject

Request body for deleting an authentication token.

tokenIdstring

The ID of the token to delete.

DELETE /vault_rest/token
Copy
Responses
200

Authentication token deleted successfully.

objectobject

Result of deleting an authentication token.

successboolean

Indicates if the token deletion was successful.

Response
Copy

Extend the idle session timeout

Extends the idle session timeout for the current authenticated session. This prevents the session from expiring due to inactivity.

Auth
GET /vault_rest/token/extend_session
Copy
Responses
200

Idle session timeout extended successfully.

objectobject

Result of extending an idle session.

successboolean

Indicates if the idle session extension was successful.

newIdleTimeoutdate-time

The new idle session timeout.

Response
Copy

Generate a new API key

Generates a new API key (authentication token) for the current authenticated user. This can be used to replace an existing token or generate an additional one.

Auth
GET /vault_rest/tokens/generate
Copy
Responses
200

New API key generated successfully.

stringstring

The newly generated authentication token.

Response
Copy

Enumerate authentication tokens

Retrieves a paginated list of authentication tokens. This endpoint is typically used by administrators to manage and monitor active tokens.

Auth
Path Params
startinteger

The starting index for the list of tokens (0-based).

minimum: 0

countinteger

The maximum number of tokens to retrieve.

minimum: 1

GET /vault_rest/tokens/{start}/{count}
Copy
Responses
200

List of authentication tokens retrieved successfully.

objectobject

Result of enumerating authentication tokens.

tokensarray[object]
idstring
userIdstring
expiresdate-time
createddate-time
totalCountint32
Response
Copy

Recycle the current authentication token

Recycles the current authentication token, effectively invalidating it and generating a new one in its place. This is useful for rotating tokens without a full logout/login cycle.

Auth
POST /vault_rest/token/recycle
Copy
Responses
200

Authentication token recycled successfully.

objectobject

Result of recycling an authentication token.

successboolean

Indicates if the token recycling was successful.

newTokenstring

The newly generated authentication token.

newExpiresdate-time

The expiration date and time of the new token.

Response
Copy

Authorization

Endpoints for checking user permissions against specific resources.

Check authorization for a specific resource type

Checks if the current authenticated user has authorization to access or perform actions on a specified resource type. The resourceType parameter identifies the type of resource being checked.

Auth
Path Params
resourceTypestring

The type of resource to check authorization for (e.g., "file", "user", "settings").

GET /vault_rest/authorization/{resourceType}
Copy
Responses
200

Authorization check result.

objectobject

Result of an authorization check.

isAuthorizedboolean

Indicates if the user is authorized for the resource.

messagestring

A message providing more details about the authorization result.

Response
Copy

Windows Authentication

Endpoints for authenticating users via Windows Integrated Authentication.

Authenticate using Windows Integrated Authentication

Authenticates a user based on their Windows Integrated Authentication (WIA) identity. This endpoint leverages the existing Windows authentication context to generate an API key (authentication token) for the user. The X-Forwarded-For header is used to determine the client IP address if present. This endpoint does not require an explicit Authorization header in the API request, as Windows authentication occurs at the HTTP transport layer.

Auth
Headers
X-Forwarded-Forstring

The client IP address if the request is proxied.

GET /vault_rest/authenticate-windows
Copy
Responses
200

Windows authentication successful, API key generated.

objectobject

Result of an authentication attempt, including the API key.

Resultstring

The outcome of the authentication attempt.

Enum: Success,ErrorServiceUnavailable,ErrorInvalidCredentials,ErrorMfaRequired

Tokenstring

The generated authentication token (API key).

Expiresdate-time

The expiration date and time of the token.

ExpiresStringstring

The expiration date and time of the token as a string.

UiMessageKeystring

A key for UI messages related to the authentication result.

Messagestring

A human-readable message related to the authentication result.

503

Service unavailable or user could not be uniquely identified.

Response
Copy