Api documentation

Learn how to get started with our Api documentation

API Reference - AuthorizationAPI 1 Json Yaml Try

Authorization API enables authorization of sensitive actions performed by customers or agents using 2nd factor authentication. Sensitive action authorizations can be explicitly requested by applications or they can be initiated by APIs during authorization checking. Support for 4 eyes verification and separation of duties will be added in future.

Provides authorization levels for a corporate

GET /v1/authorization/authorization-levels

Parameter Type/Format Description
accountID
optional

Query / String

AccountID to filter on

amount
optional

Query / Number

Amount to authorize

authorizationType
optional

Query / String

bankId
required

Query / String

Bank ID

currency
optional

Query / String

Currency code to filter on

identifier
required

Query / String

Corporate ID (for corporate customers) or CIF (for detecting joints)

transactionType
optional

Query / String

Transaction Type

Response

400 - bad input parameter

200 - search results matching criteria

{
  "searchCriteria": {
    "identifier": "CORP001",
    "amount": "15000.22999999999956344254314899444580078125",
    "ccy": "EUR",
    "accountID": "1234567891213123",
    "bankID": "1",
    "transactionType": "PMT",
    "authorizationType": "N/A"
  },
  "Authorizations": {
    "type": "PAYMENT",
    "EnforceHierarchy": false,
    "levels": [
      {
        "level": "1",
        "authorizationCount": "1",
        "currency": "EUR",
        "account": "1234567891213123",
        "users": [
          {
            "name": "JONJ001"
          }
        ]
      }
    ]
  }
}

Evaluates the user for signing and accepts signature if user is allowed and/or valid.

POST /v1/authorization/evaluate-user

Evaluates the user for signing and accepts signature if user is allowed and/or valid.

Parameter Type/Format Description
command
required

Body /

Request with details required for checking the signing rules and inserting a signature if user is allowed to sign the payload.

Response

200 - OK

{
  "reason": "string"
}

Evaluates the existing signatures from supplied payload and calling context against signing rules defined.

POST /v1/authorization/evaluate-signatures

Evaluates the existing signatures from supplied payload and calling context against signing rules defined.

Parameter Type/Format Description
command
required

Body /

Request with details required for status of signing resource.

Response

200 - OK

{
  "reason": "string",
  "signatures": [
    {
      "entity": "string",
      "required": "integer",
      "existing": "integer"
    }
  ]
}

Verify OCRA response

POST /v1/authorization/ocra/verify

Verifies OCRA response to previously generated challenge

Parameter Type/Format Description
cmd
required

Body /

Request with details to verify OCRA response

Response

440 - Your request was well constructed but OCRA response could not be verified. Consider the following possible problems and look into response for more details: - [bad-response]() - [replayed-response]() - [no-such-challenge]()

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

204 - No content - OCRA response is valid

Generate OCRA challenge

POST /v1/authorization/ocra/challenge

Generates OCRA challenge based on optional data for signature provided by application or random seed

Parameter Type/Format Description
cmd
required

Body /

Request with details to generate OCRA challenge

Response

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

200 - OK - OCRA challenge generated

440 - Your request was well constructed but OCRA challenge could not be generated. Consider the following possible problems and look into response for more details: - [no-such-user]()

{
  "challenge-id": "string",
  "challenge-code": "string"
}

Working with one-time passwords

Verify OATH compliant one-time password

POST /v1/authorization/otp/oath/verify

Verifies TOTP or HOTP one-time password entered by user identified with `user-id`

Parameter Type/Format Description
cmd
required

Body /

Request with details to verify HOTP or TOTP

Response

204 - No content - OTP is valid

440 - Your request was well constructed but OTP could not be verified. Consider the following possible problems and look into response for more details: - [bad-otp]() - [replayed-otp]() - [no-such-user]()

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

Verify email one-time password

POST /v1/authorization/otp/email/verify

Verifies one-time password entered by user for verification in progress

Parameter Type/Format Description
cmd
required

Body /

Request with details to verify email OTP

Response

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

440 - Your request was well constructed but OTP coul not be verified. Consider the following possible problems and look into response for more details: - [bad-otp]() - [replayed-otp]() - [no-such-verification]()

204 - No content - OTP is valid

Generate and send email with one-time password

POST /v1/authorization/otp/email/send

Generates one-time password and sends it to receipient specified in `user-id` or `email`

Parameter Type/Format Description
cmd
required

Body /

Command with details to send OTP email

Response

202 - Accepted - Email sent

440 - Your request was well constructed but it could not be processed. Consider the following possible problems and look into response for more details: - [no-such-user]()

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

{}

Verify SMS one-time password

POST /v1/authorization/otp/sms/verify

Verifies one-time password entered by user for verification in progress

Parameter Type/Format Description
cmd
required

Body /

Request with details to verify SMS OTP

Response

204 - No content - OTP is valid

440 - Your request was well constructed but OTP was be verified. Consider the following possible problems and look into response for more details: - [bad-otp]() - [replayed-otp]() - [no-such-verification]()

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

Generate and send SMS one-time password

POST /v1/authorization/otp/sms/send

Generates one-time password and sends it to receipient specified in `user-id` or `phone-number`

Parameter Type/Format Description
cmd
required

Body /

Command with details to send SMS OTP

Response

202 - Accepted - SMS sent

440 - Your request was well constructed but it could not be processed. Consider the following possible problems and look into response for more details: - [no-such-user]()

default - Besides specific status codes above, other standard http [status codes](http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html) can be returned for each request. To learn more see general guidance on [error handling](common-getstarted.html#error-handling)

{}