Authenticate transactions with push notification
Once your mobile app is registered, it can be used for passwordless authentication to the customer application. Push authentication is the default authentication method. To use push authentication on an Android device, Google Play Services must be installed.
The Nevis Mobile Authentication SDK allows the use of the fetch
channel to get a list of ongoing operations for a specific device. This ensures that if there is intermittent or network lag, or if the push service is unavailable, users can always be provided with the request they generated. For more information, see the relevant sections in the documentation for Nevis Mobile Authentication SDK and nevisFIDO.
The following diagram shows the end-to-end sequence of a push authentication operation. The steps that must be performed to integrate the Authentication Cloud into your application are in bold.
Send an HTTP request to the approval endpoint
For detailed information on the HTTP request parameters and response fields, see the Approval endpoint page of the API reference documentation.
Send the POST https://{instance}.mauth.nevis.cloud/api/v1/approval
call with your instance
ID, and configure the HTTP request as follows:
- Send your access key or intent token in the Authorization Bearer token header. For more information on the intent token, see Intent endpoint.
- Set the
channel
parameter topush
. - Set the
username
oruserId
parameter. - Configure the
message
parameter. This displays a notification message on the user device.You can format the
message
with a limited set of supported HTML tags. To enable text formatting, enclose the transaction confirmation text in the<html></html>
HTML tags. If you include an unsupported tag, such as<p>
or<div>
, or add any attribute to a tag, you will receive an HTTP 400 Bad Request response. The following tags and formatting options are supported:<b></b>
: bold<br>
: line break<em></em>
: emphasis<i></i>
: italic<strong></strong>
: strong<u></u>
: underline
- Optionally, configure the
notificationMessage
parameter to display a notification message in the notification center or notification drawer. - To use a specific authenticator for the authentication operation, set the
authenticatorId
parameter. If this parameter is not configured, the default authenticator is used, which is the authenticator registered most recently. - Optionally, set the
uafOptions.visualChannelLinking
parameter torequired
to enable number matching for push authentication.
HTTP request examples
- cURL
- Python 3
curl "https://$instance.mauth.nevis.cloud/api/v1/approval" \
-XPOST \
-H "Authorization: Bearer $access_key" \
-H 'Content-Type: application/json' \
-d "{ \"message\":\"$message\",
\"channel\":\"push\",
\"prompt\":\"false\",
\"uafOptions\": {
\"visualChannelLinking\":\"required\"
},
\"username\": \"$username\" }"
data = { 'channel': 'push', 'username': username,
'message': message }
resp = requests.post(f'https://{instance}.mauth.nevis.cloud/api/v1/approval',
headers = {'authorization': f'Bearer {access_key}'},
json = data)
print(resp.json())
Once the authentication operation is started, Authentication Cloud transmits the push to Google Firebase, which then sends the push notification to the mobile app. If the user is rate limited, the authentication operation fails. Authentication Cloud then sends a response to your application with a transactionId
and a statusToken
.
Then, the push notification is displayed on the user device.
If the push rate limiting feature is enabled, Authentication Cloud checks whether the user is rate limited for push before transmitting the push to Google Firebase. If yes, the authentication operation fails and a HTTP 429 - Too many requests
error is returned. In a successful approval operation, the rateLimitInfo.push.sent
field in the HTTP response contains the number of push notifications sent in the previous 24 hours.
HTTP response example
- Push
- Push with rate limiting
201 Created
: Approval using push
{
"transactionId": "e7c4328a-5497-4768-ac49-471db85defd4",
"userId": "7e16ba00-92e2-4fcb-b30e-1af8fdc843aa",
"statusToken": "eyJhb...CGJNfkA"
}
201 Created
: Approval using push
{
"transactionId": "052286a9-0151-4fd8-a9d9-3b6ccf222a14",
"userId": "eccc043b-abec-45d2-b20c-6e336c4ccb35",
"statusToken": "eyJhb...gFmvetQ",
"rateLimitInfo": {
"push": {
"sent": "8",
"timeframe": "PT24H"
}
}
}
Start polling the status endpoint
To verify the success of the approval operation, start polling the status
endpoint from your frontend application. The recommended polling interval is 1.5 seconds. Depending on your circumstances, such as user needs and production system capabilities, you might need to adjust the wait times between two polling cycles.
For detailed information on the HTTP request parameters and response fields, see the Status endpoint page of the API reference documentation.
Send the POST https://{instance}.mauth.nevis.cloud/api/v1/status
call with your instance ID, and configure the HTTP request as follows:
Send the
statusToken
that was retrieved during the approval operation.- Poll for the status as long as
status
is pending.
When you receive a succeeded
, failed
, or unknown
status, you can react accordingly. If the status is succeeded
, continue with verifying the operation from your backend application.
After accepting the push notification, the user can authenticate themselves, for example, with PIN or biometric data. The authentication response to the Authentication Cloud includes a signed message. The response is validated with the previously stored public key.
HTTP request examples
- cURL
- Python 3
# Set $statusToken
curl "https://$instance.mauth.nevis.cloud/api/v1/status" \
-XPOST \
-H 'Content-Type: application/json' \
-d "{ \"statusToken\": \"$statusToken\" }"
data = {'statusToken': 'eyJhb...lc3g'}
resp = requests.post(f'https://{instance}.mauth.nevis.cloud/api/v1/status', json = data)
print(resp.json())
HTTP response examples
- Status is pending
- Status is succeeded
- Status is failed
- Status is unknown
200 OK
: Pending - The operation is still waiting for confirmation by the user
{
"transactionId": "b7d44592-91f3-4f4b-9e37-202a3061edc3",
"status": "pending",
"userId": "7e16ba00-92e2-4fcb-b30e-1af8fdc843aa",
"username": "Userxyz123",
"token": "eyJhb...Fl9bpEXGGw",
"createdAt": "2020-10-09T12:52:48Z",
"lastUpdatedAt": "2020-10-09T12:52:48Z"
}
200 OK
: Succeeded - The operation was successfully confirmed by the user
{
"transactionId": "b7d44592-91f3-4f4b-9e37-202a3061edc3",
"status": "succeeded",
"userId": "7e16ba00-92e2-4fcb-b30e-1af8fdc843aa",
"username": "Userxyz123",
"token": "eyJhb...Fl9bpEXGGw",
"createdAt": "2020-10-09T12:52:48Z",
"lastUpdatedAt": "2020-10-09T12:52:48Z"
}
412 Precondition Failed
: The transaction was aborted or timed out
{
"transactionId": "b7d44592-91f3-4f4b-9e37-202a3061edc3",
"status": "failed",
"userId": "7e16ba00-92e2-4fcb-b30e-1af8fdc843aa",
"username": "Userxyz123",
"token": "eyJhb...Fl9bpEXGGw",
"createdAt": "2020-10-09T12:52:48Z",
"lastUpdatedAt": "2020-10-09T12:52:48Z"
}
404 Not Found
: The provided status token is not known
{
"status": "unknown"
}
After confirming the push notification, the user can authenticate themselves, for example, with PIN or biometric data. The authentication response to the Authentication Cloud includes a signed message. The response is validated with the previously stored public key.
Verify the operation
Once the authentication is successful and you receive the server response, verify the operation. Use of the following verification methods:
- HTTP request to the
status
endpoint - HTTP request to the
introspect
endpoint
Send an HTTP request to the status endpoint
By calling the status
endpoint from your backend application, you request Authentication Cloud to verify the validity and the authenticity of the operation. This is done by using the statusToken
from the previous HTTP response.
For detailed information on the HTTP request parameters and response fields, see the Status endpoint page of the API reference documentation.
Send the POST https://{instance}.mauth.nevis.cloud/api/v1/status
call with your instance ID and include the statusToken
that was retrieved during the operation.
Send an HTTP request to the introspect endpoint
By calling the introspect
endpoint from your backend application, you request Authentication Cloud to verify the validity and the authenticity of the user. This is done by using the transaction token returned by the status
endpoint.
For detailed information on the HTTP request parameters and response fields, see the Introspect endpoint page of the API reference documentation.
Send the POST https://{instance}.mauth.nevis.cloud/api/v1/introspect
call with your instance ID, and configure the HTTP request to the introspect
endpoint as follows:
- Send your access key in the Authorization Bearer token header.
- Add your token that you want to verify.
HTTP request examples
- cURL
- Python 3
# Set $token
curl "https://$instance.mauth.nevis.cloud/api/v1/introspect" \
-XPOST \
-H "Authorization: Bearer $access_key" \
--data-urlencode "token=$token"
data = {'token': 'eyJhb...lc3g'}
resp = requests.post(f'https://{instance}.mauth.nevis.cloud/api/v1/introspect',
headers = {'authorization': f'Bearer {access_key}'},
data = data)
print(resp.json())
HTTP response examples
- Active and valid access key
- Valid transaction token
- Valid status token
- Valid intent token
- Invalid token
200 OK
: Active and valid access key
{
"active": true,
"iat": 1642436165000,
"sub": "c8edb1d1-6dac-470f-b2fb-c25277a5c5b6",
"aud": "api",
"iss": "https://{instance}.mauth.nevis.cloud/"
}
200 OK
: Valid transaction token
{
"active": true,
"iat": 1654759374000,
"sub": "fc6bf4bb-9f46-48a9-95d6-91051a3d6468",
"aud": "transaction",
"iss": "https://{instance}.mauth.nevis.cloud/"
}
200 OK
: Valid status token
{
"active": true,
"iat": 1662625372000,
"sub": "29886449-532e-4de7-923d-845e94b81762",
"aud": "status",
"iss": "https://{instance}.mauth.nevis.cloud/",
"jti": "fdc3e23e-9ec8-4375-9b13-9a586270a9cd"
}
200 OK
: Valid intent token
{
"iat": 1662626062,
"exp": 1662626662,
"aud": "intent",
"iss": "https://{instance}.mauth.nevis.cloud/",
"sub": "0afb658e-9536-430f-a69b-d53a7a603be1",
"scope": "enroll:sms,app"
}
200 OK
: Invalid token
{
"active": false
}