Login users using one-time login methods like magic links or OTPs. This implements a frontend integration for authentication, where the client obtains an authorization code that your app can exchange in the backend for user tokens.
One-Time Login
URI that will receive the authorization code. This is the server GET endpoint used to call the token endpoint, and should accept 'code' as a query parameter. This URI must also be configured as an allowed redirect URI in the Transmit Admin Portal.
Indicates whether to create a new user at the end of the authentication flow if a user is not found for the provided email. If enabled, public signups must also be configured as allowed for the application.
URI of the resource the request is attempting to access, which is reflected in the audience (aud claim) of the access token. This must be configured as resource for the application.
Require multi factor authentication for this authentication request.
Used to request additional claims in the ID token, such as roles, permissions, and other user profile data. The structure is per the OIDC Standard. For supported claims and how to request custom claims, see the ID Token Reference.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/links/email
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/links/email
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/links/email
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/links/email
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/links/email
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/links/email \
-H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"email": "name@example.com",
"redirect_uri": "https://www.example.com/verify",
"create_new_user": false,
"resource": "string",
"email_content": {
"subject": "string",
"primaryColor": "#6981FF",
"base64logo": "string",
"headerText": "string",
"bodyText": "string",
"linkText": "string",
"infoText": "string",
"footerText": "If you didn'\''t request this email, you can safely ignore it.",
"senderName": "string"
},
"require_mfa": true,
"claims": {
"id_token": {
"roles": null
}
},
"client_attributes": {
"user_agent": "string",
"ip_address": "string"
},
"org_id": "string"
}'{ "message": "Email sent successfully" }
URI that will receive the authorization code. This is the server GET endpoint used to call the token endpoint, and should accept 'code' as a query parameter. This URI must also be configured as an allowed redirect URI in the Transmit Admin Portal.
Indicates whether to create a new user at the end of the authentication flow if a user is not found for the provided email. If enabled, public signups must also be configured as allowed for the application.
URI of the resource the request is attempting to access, which is reflected in the audience (aud claim) of the access token. This must be configured as resource for the application.
Require multi factor authentication for this authentication request.
Used to request additional claims in the ID token, such as roles, permissions, and other user profile data. The structure is per the OIDC Standard. For supported claims and how to request custom claims, see the ID Token Reference.
Flat object that contains the data that your customer should approve for a transaction signing or custom approval flow. It can contain up to 10 keys, and only alphanumeric characters, underscores, hyphens, and periods. It will be returned as a claim in the ID token upon successful authentication.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/otp/email
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/otp/email
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/otp/email
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/otp/email
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/otp/email
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/otp/email \
-H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"email": "name@example.com",
"redirect_uri": "https://www.example.com/verify",
"create_new_user": false,
"resource": "string",
"email_content": {
"subject": "string",
"primaryColor": "#6981FF",
"base64logo": "string",
"headerText": "string",
"bodyText": "string",
"linkText": "string",
"infoText": "string",
"footerText": "If you didn'\''t request this email, you can safely ignore it.",
"senderName": "string"
},
"require_mfa": true,
"claims": {
"id_token": {
"roles": null
}
},
"client_attributes": {
"user_agent": "string",
"ip_address": "string"
},
"org_id": "string",
"approval_data": {
"transaction_id": "eFII2y40uB9hQ98nXt3tc1IHkRt8GrRZiqZuRn_59wT",
"sum": "200"
}
}'{ "message": "OTP email sent", "approval_data": { "transaction_id": "eFII2y40uB9hQ98nXt3tc1IHkRt8GrRZiqZuRn_59wT", "sum": "200" } }
Response type requested for the authentication flow.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/otp/email/validation
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/otp/email/validation
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/otp/email/validation
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/otp/email/validation
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/otp/email/validation
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/otp/email/validation \
-H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"email": "string",
"passcode": "string",
"response_type": "code",
"nonce": "string"
}'{ "result": "string" }
Message to send, must contain {otp} and {app} placeholders to be replaced with one time password and application name. Limited to 140 characters
The sender name that appears as the message sender on recipients devices. Limited to 11 characters. Limited support see https://docs.aws.amazon.com/sns/latest/dg/sns-supported-regions-countries.html
Indicates whether to create a new user at the end of the authentication flow if a user is not found for the provided phone number. If enabled, public signups must also be configured as allowed for the application.
URI that will receive the authorization code once the SMS OTP is validated. This is the server GET endpoint used to call the token endpoint, and should accept 'code' as a query parameter. This URI must also be configured as an allowed redirect URI in the Transmit Admin Portal
Require multi factor authentication for this authentication request.
Used to request additional claims in the ID token, such as roles, permissions, and other user profile data. The structure is per the OIDC Standard. For supported claims and how to request custom claims, see the ID Token Reference.
Flat object that contains the data that your customer should approve for a transaction signing or custom approval flow. It can contain up to 10 keys, and only alphanumeric characters, underscores, hyphens, and periods. It will be returned as a claim in the ID token upon successful authentication.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/otp/sms
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/otp/sms
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/otp/sms
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/otp/sms
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/otp/sms
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/otp/sms \
-H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"custom_message": "string",
"sender_id": "string",
"phone_number": "string",
"create_new_user": false,
"redirect_uri": "string",
"require_mfa": true,
"claims": {
"id_token": {
"roles": null
}
},
"approval_data": {
"transaction_id": "eFII2y40uB9hQ98nXt3tc1IHkRt8GrRZiqZuRn_59wT",
"sum": "200"
},
"org_id": "string"
}'{ "message": "SMS sent", "approval_data": { "transaction_id": "eFII2y40uB9hQ98nXt3tc1IHkRt8GrRZiqZuRn_59wT", "sum": "200" } }
Response type requested for the authentication flow.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/otp/sms/validation
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/otp/sms/validation
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/otp/sms/validation
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/otp/sms/validation
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/otp/sms/validation
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/otp/sms/validation \
-H 'Authorization: Bearer <YOUR_TOKEN_HERE>' \
-H 'Content-Type: application/json' \
-d '{
"phone_number": "string",
"passcode": "string",
"response_type": "code",
"nonce": "string"
}'{ "result": "string" }
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/logout
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/logout
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/logout
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/logout
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/logout
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/logout \
-H 'Authorization: Bearer <YOUR_JWT_HERE>'{ "sessions_count": 0 }
Request
Retrieve ID and access tokens. This API is used to retrieve ID and access tokens using the code that was returned in the redirect URI as a query parameter (for example, when the user clicks a magic link). It may also create a new user if create_new_user was set to true in the send request and no user exists for the email address or phone number (depending on the flow).
Authorization code returned in the redirect URI as a query parameter upon successful authentication
Client ID of the application requesting the token
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/token
- Production environment (US)https://api.transmitsecurity.io/cis/v1/token
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/token
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/token
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/token
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/token \
-H 'Content-Type: application/json' \
-d '{
"code": "GZxLFKTDCnlANVTxNvaWz7AIGPpXqZYSXdAwjiWRuOH",
"client_id": "DgsdfhSDsdfhtSDFXCCXBVMKPws345yscv2345XCZV",
"client_secret": "FzxvdDMbvxnc45sdfb789XCVGEW6usazxcvbw3KPsb23"
}'{ "id_token": "string", "access_token": "string", "refresh_token": "string", "is_user_created": true }