WebAuthn
This feature is available to licensed FusionAuth instances as of version 1.52.0. A free license is available in the Plan tab for any user who registers in the account portal.
Overview
This API has been available since 1.41.0
This page contains all of the APIs for managing WebAuthn passkeys, sometimes referred to as credentials, and starting and completing WebAuthn ceremonies.
The following APIs are provided to manage WebAuthn passkeys.
Retrieve a Passkey
This API is used to retrieve information about a single WebAuthn passkey or all of a user’s registered passkeys.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Parameters
idUUIDrequiredThe unique Id of the WebAuthn passkey to retrieve.
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Parameters
userIdUUIDrequiredThe unique Id of the User to retrieve WebAuthn passkeys for.
Response
The response for this API contains either a single Passkey or all of the Passkeys belonging to a User. When you call this API with an Id, the response will contain just that Passkey. When you call this API without an Id and provide a User Id in the query string, the response will contain all of the Passkeys belonging to that User. Both response types are defined below along with an example JSON response.
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 401 | You did not supply a valid Authorization header. The header was omitted or your API key was not valid. The response will be empty. See Authentication. | 
| 404 | The object you requested doesn't exist. The response will be empty. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Response Body
credential.algorithmLongThe identifier for the signing algorithm used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
Supported algorithms
| Name | Value | Description | 
|---|---|---|
| RS256 | -257 | RSASSA-PKCS1-v1_5 using SHA-256 | 
| RS384 | -258 | RSASSA-PKCS1-v1_5 using SHA-384 | 
| RS512 | -259 | RSASSA-PKCS1-v1_5 using SHA-512 | 
| PS256 | -37 | RSASSA-PSS w/ SHA-256 | 
| PS384 | -38 | RSASSA-PSS w/ SHA-384 | 
| PS512 | -39 | RSASSA-PSS w/ SHA-512 | 
| ES256 | -7 | ECDSA w/ SHA-256 | 
| ES384 | -35 | ECDSA w/ SHA-384 | 
| ES512 | -36 | ECDSA w/ SHA-512 | 
credential.attestationTypeStringThe type of attestation provided when the passkey was registered. Passkeys registered in FusionAuth will have a value of none. Imported passkeys may have another value.
credential.authenticatorSupportsUserVerificationBooleanIndicates whether this authenticator supports user verification. User verification ensures that the user is authorized to use the authenticator.
This value is currently determined by whether user verification occurred during the registration of this passkey rather than by other means, such as examining FIDO authenticator metadata.
credential.credentialIdStringThe credential Id generated by the authenticator is stored as a base64url-encoded string. This value is used by authenticators to look up a passkey during an authentication ceremony and to prevent multiple passkeys from being registered on the same authenticator for a single user.
credential.dataObjectAn object that can hold any information about the passkey that should be persisted.
credential.discoverableBooleanIndicates whether the passkey is “client-side discoverable.” Discoverable passkeys can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to complete a form field).
credential.displayNameStringThe display name for the passkey selected during registration. This value should have been selected by the user.
credential.idUUIDThe unique identifier for this passkey.
credential.insertInstantLongThe instant that the passkey was added to the FusionAuth database.
credential.lastUseInstantLongThe instant that the passkey was last used to complete a WebAuthn ceremony.
credential.nameStringA unique name meant to disambiguate passkeys with the same credential.displayName .
credential.publicKeyStringThe passkey’s public key, encoded in PEM format.
credential.relyingPartyIdStringThe Relying Party Id used at the time the passkey was registered.
credential.signCountIntegerA signature counter for the passkey. The signature count can be used by a Relying Party to identify a cloned or malfunctioning authenticator.
credential.tenantIdUUIDThe Id of the tenant to which this passkey belongs.
credential.transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify eligible authenticators during a WebAuthn ceremony.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
credential.userAgentStringThe user agent at the time the passkey was registered. This can be useful for troubleshooting purposes.
credential.userIdUUIDThe Id of the user that this passkey belongs to.
Example Response JSON
{
  "credential": {
    "algorithm": -7,
    "attestationType": "none",
    "authenticatorSupportsUserVerification": true,
    "credentialId": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "data": {},
    "displayName": "Chrome Touch ID",
    "name": "richard@fusionauth.io",
    "id": "c664318a-2384-4c35-9475-9a200e1d3b72",
    "insertInstant": 1668011701792,
    "discoverable": false,
    "lastUseInstant": 1668021630599,
    "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
    "relyingPartyId": "piedpiper.com",
    "signCount": 41,
    "tenantId": "30663132-6464-6665-3032-326466613934",
    "transports": [
      "internal"
    ],
    "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
  }
}Response Body
credentials[x]Arraycredentials[x].algorithmLongThe identifier for the signing algorithm used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
Supported algorithms
| Name | Value | Description | 
|---|---|---|
| RS256 | -257 | RSASSA-PKCS1-v1_5 using SHA-256 | 
| RS384 | -258 | RSASSA-PKCS1-v1_5 using SHA-384 | 
| RS512 | -259 | RSASSA-PKCS1-v1_5 using SHA-512 | 
| PS256 | -37 | RSASSA-PSS w/ SHA-256 | 
| PS384 | -38 | RSASSA-PSS w/ SHA-384 | 
| PS512 | -39 | RSASSA-PSS w/ SHA-512 | 
| ES256 | -7 | ECDSA w/ SHA-256 | 
| ES384 | -35 | ECDSA w/ SHA-384 | 
| ES512 | -36 | ECDSA w/ SHA-512 | 
credentials[x].attestationTypeStringThe type of attestation provided when the passkey was registered. Passkeys registered in FusionAuth will have a value of none. Imported passkeys may have another value.
credentials[x].authenticatorSupportsUserVerificationBooleanIndicates whether this authenticator supports user verification. User verification ensures that the user is authorized to use the authenticator.
This value is currently determined by whether user verification occurred during the registration of this passkey rather than by other means, such as examining FIDO authenticator metadata.
credentials[x].credentialIdStringThe credential Id generated by the authenticator is stored as a base64url-encoded string. This value is used by authenticators to look up a passkey during an authentication ceremony and to prevent multiple passkeys from being registered on the same authenticator for a single user.
credentials[x].dataObjectAn object that can hold any information about the passkey that should be persisted.
credentials[x].discoverableBooleanIndicates whether the passkey is “client-side discoverable.” Discoverable passkeys can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to complete a form field).
credentials[x].displayNameStringThe display name for the passkey selected during registration. This value should have been selected by the user.
credentials[x].idUUIDThe unique identifier for this passkey.
credentials[x].insertInstantLongThe instant that the passkey was added to the FusionAuth database.
credentials[x].lastUseInstantLongThe instant that the passkey was last used to complete a WebAuthn ceremony.
credentials[x].nameStringA unique name meant to disambiguate passkeys with the same credential.displayName .
credentials[x].publicKeyStringThe passkey’s public key, encoded in PEM format.
credentials[x].relyingPartyIdStringThe Relying Party Id used at the time the passkey was registered.
credentials[x].signCountIntegerA signature counter for the passkey. The signature count can be used by a Relying Party to identify a cloned or malfunctioning authenticator.
credentials[x].tenantIdUUIDThe Id of the tenant to which this passkey belongs.
credentials[x].transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify eligible authenticators during a WebAuthn ceremony.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
credentials[x].userAgentStringThe user agent at the time the passkey was registered. This can be useful for troubleshooting purposes.
credentials[x].userIdUUIDThe Id of the user that this passkey belongs to.
Example Response JSON
{
  "credentials": [
    {
      "algorithm": -7,
      "attestationType": "none",
      "authenticatorSupportsUserVerification": true,
      "credentialId": "HdN9wqP9mqOonacmiM2gIjASFYg",
      "data": {},
      "displayName": "Chrome Touch ID",
      "name": "richard@fusionauth.io",
      "id": "c664318a-2384-4c35-9475-9a200e1d3b72",
      "insertInstant": 1668011701792,
      "discoverable": false,
      "lastUseInstant": 1668021630599,
      "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
      "relyingPartyId": "piedpiper.com",
      "signCount": 41,
      "tenantId": "30663132-6464-6665-3032-326466613934",
      "transports": [
        "internal"
      ],
      "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
    }
  ]
}Delete a Passkey
This API is used to delete a single WebAuthn passkey or all of a user’s registered passkeys.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Parameters
idUUIDrequiredThe unique Id of the WebAuthn passkey to delete.
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Parameters
userIdUUIDrequiredThe unique Id of the User to delete WebAuthn passkeys for.
Response
This API does not return a JSON response body.
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 401 | You did not supply a valid Authorization header. The header was omitted or your API key was not valid. The response will be empty. See Authentication. | 
| 404 | The object you requested doesn't exist. The response will be empty. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Import Passkeys
This API is used to bulk import multiple passkeys into FusionAuth. Reasonable defaults are provided for optional fields. This request is useful for migrating data from an existing database into FusionAuth.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request. The tenant Id is not required on this request when only one tenant has been configured. If there is more than one tenant, the tenant Id is required.
Supply the tenant Id via this header or by using an API Key scoped to a tenant, which implicitly supplies the tenant Id.
See Making an API request using a Tenant Id for additional information.
Request Body
credentialsArrayrequiredThe list of passkeys to import.
credentials[x].algorithmLongrequiredThe identifier for the signing algorithm used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
Supported algorithms
| Name | Value | Description | 
|---|---|---|
| RS256 | -257 | RSASSA-PKCS1-v1_5 using SHA-256 | 
| RS384 | -258 | RSASSA-PKCS1-v1_5 using SHA-384 | 
| RS512 | -259 | RSASSA-PKCS1-v1_5 using SHA-512 | 
| PS256 | -37 | RSASSA-PSS w/ SHA-256 | 
| PS384 | -38 | RSASSA-PSS w/ SHA-384 | 
| PS512 | -39 | RSASSA-PSS w/ SHA-512 | 
| ES256 | -7 | ECDSA w/ SHA-256 | 
| ES384 | -35 | ECDSA w/ SHA-384 | 
| ES512 | -36 | ECDSA w/ SHA-512 | 
credentials[x].attestationTypeStringDefaults to noneThe attestation type provided when the passkey was registered. FusionAuth doesn’t validate the attestation on import. Supported values are:
- anonymization-ca
- attestation-ca
- basic
- none
- self
Passkeys registered in FusionAuth currently only support the none option, but another value can be supplied during passkey import.
credentials[x].authenticatorSupportsUserVerificationBooleanDefaults to falseIndicates whether this authenticator supports user verification. User verification ensures that the user is authorized to use the authenticator.
credentials[x].credentialIdStringrequiredThe credential Id generated by the authenticator is stored as a base64url-encoded string. This value is used by authenticators to look up a passkey during an authentication ceremony.
credentials[x].dataObjectAn object that can hold any information about the passkey that should be persisted.
credentials[x].discoverableBooleanDefaults to falseIndicates whether the passkey is “client-side discoverable.” Discoverable passkeys can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to provide their username).
credentials[x].displayNameStringrequiredThe display name for the passkey.
credentials[x].idUUIDDefaults to secure random UUIDThe Id of the passkey. If not specified a secure random UUID will be generated.
credentials[x].insertInstantLongDefaults to nowThe instant when the passkey was created.
credentials[x].lastUseInstantLongDefaults to nowThe instant when the passkey was last used.
credentials[x].nameStringrequiredA unique name meant to disambiguate passkeys with the same credential.displayName .
Prior to version 1.42.0 this field was optional.
credentials[x].publicKeyStringrequiredThe passkey’s public key, encoded in PEM format.
credentials[x].relyingPartyIdStringrequiredThe Relying Party Id used at the time the passkey was registered.
This value must match the rpId value when the passkey was created, and the browser origin during WebAuthn authentication in FusionAuth must be compatible with that Relying Party Id.
credentials[x].signCountIntegerDefaults to 0The last known signature count for the passkey.
credentials[x].transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint during the WebAuthn authentication ceremony to help identify eligible authenticators.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
The default value is the empty set, which means that no hints are provided. This does not negatively impact the authentication ceremony.
credentials[x].userAgentStringThe user agent at the time the passkey was registered. This can be useful for troubleshooting WebAuthn passkey issues.
credentials[x].userIdUUIDrequiredThe Id of the user to which this passkey belongs.
validateDbConstraintsBooleanDefaults to falseSet this value to true in order to perform additional validation of the request.
The import request is intended to be used to migrate existing users’ passkeys from one system to another, this means FusionAuth expects all user Ids from the request to exist for the provided tenant. If a non-existent user Id is encountered a 500 will be returned unless this field is set to true.
In order to get additional details about database constraint violations on import, set this value to true and a 400 response will be returned with a JSON body indicating the missing values encountered.
Setting this value to true will dramatically decrease the performance of this request. If importing large numbers of passkeys in a single request you may need to increase request timeouts to ensure this request does not timeout before it has completed.
Example Request JSON
{
  "credentials": [
    {
      "algorithm": -7,
      "credentialId": "vBD52q2FMMM-zxaO-ZMgrN3ewjbmb0ra5E-QCX_3kz0",
      "displayName": "YubiKey",
      "name": "richard@fusionauth.io",
      "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
      "relyingPartyId": "piedpiper.com",
      "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
    },
    {
      "algorithm": -7,
      "attestationType": "none",
      "authenticatorSupportsUserVerification": true,
      "credentialId": "HdN9wqP9mqOonacmiM2gIjASFYg",
      "data": {},
      "displayName": "Chrome Touch ID",
      "name": "richard@fusionauth.io",
      "id": "c664318a-2384-4c35-9475-9a200e1d3b72",
      "insertInstant": 1668011701792,
      "discoverable": false,
      "lastUseInstant": 1668021630599,
      "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
      "relyingPartyId": "piedpiper.com",
      "signCount": 41,
      "transports": [
        "internal"
      ],
      "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
    }
  ]
}Response
Only a status code is available on the Import API, no JSON body will be returned.
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 401 | You did not supply a valid Authorization header. The header was omitted or your API key was not valid. The response will be empty. See Authentication. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
WebAuthn JavaScript API Binary Format
The WebAuthn JavaScript API navigator.credentials.create() and navigator.credentials.get() expect to receive fields containing binary data on the options object as a JavaScript ArrayBuffer and will return binary fields as ArrayBuffers. In order to prevent encoding issues on the FusionAuth API, these fields are passed over the network as base64url-encoded strings.
Select fields on the options JSON object that is passed to the WebAuthn JavaScript API must be converted from base64url-encoded strings to ArrayBuffers after receiving options from the FusionAuth API. Likewise, certain fields on WebAuthn JavaScript API responses must be converted from ArrayBuffers to base64url-encoded strings before calling FusionAuth’s APIs to complete the ceremony.
Converting base64url-encoded String to ArrayBuffer
Converting a base64url-encoded strings to ArrayBuffers is required before the options JSON object from Start a WebAuthn Passkey Registration or Start a WebAuthn Passkey Assertion or Authentication responses are passed to the WebAuthn JavaScript API. The FusionAuth hosted pages will perform this conversion as necessary. If you need to perform this conversion yourself, you can use the following JavaScript function.
Function to convert a base64url-encoded string to an ArrayBuffer
function base64URLToBuffer(base64URL) {
  const base64 = base64URL.replace(/-/g, '+').replace(/_/g, '/');
  const padLen = (4 - (base64.length % 4)) % 4;
  return Uint8Array.from(atob(base64.padEnd(base64.length + padLen, '=')), c => c.charCodeAt(0));
}Fields that require this conversion are documented in the Start a WebAuthn Passkey Registration and Start a WebAuthn Passkey Assertion or Authentication response sections.
Converting ArrayBuffer to base64url-encoded String
Converting ArrayBuffers to base64url-encoded strings is required before the responses from the WebAuthn JavaScript APIs are sent to FusionAuth’s Complete a WebAuthn Passkey Registration, Complete a WebAuthn Passkey Authentication, or Complete a WebAuthn Passkey Assertion APIs. The FusionAuth hosted pages will perform this conversion as necessary. If you need to perform this conversion yourself, you can use the following JavaScript function.
Function to convert an ArrayBuffer to a base64url-encoded string
function bufferToBase64URL(buffer) {
  const bytes = new Uint8Array(buffer);
  let string = '';
  bytes.forEach(b => string += String.fromCharCode(b));
  const base64 = btoa(string);
  return base64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
}Fields that require this conversion are documented in the Complete a WebAuthn Passkey Registration, Complete a WebAuthn Passkey Authentication, and Complete a WebAuthn Passkey Assertion request sections.
Start a WebAuthn Passkey Registration
This API is used to start a WebAuthn registration ceremony by providing some details about the current user and the new passkey. The response is a JSON object which is suitable to be passed to the WebAuthn JavaScript API navigator.credentials.create() function and includes a one-time challenge unique to the current registration ceremony.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Body
displayNameStringrequiredThe primary display name for the new passkey.
nameStringThe optional name for the passkey. This is meant to disambiguate passkeys with the same displayName . When this parameter is omitted, it will be defaulted to the user’s email address. If the user does not have an email address, this parameter will be defaulted to their username instead.
Prior to version 1.42.0 name  was defaulted to a random four character alphanumeric string.
The passkey name is set at the time the passkey is registered. There is currently no way to change the name of the passkey. Prompts displayed by the WebAuthn JavaScript API will continue to display the original value at the time the passkey was registered even if the user updates their email address or username. In order to display the updated email or username the user must register a new passkey.
userAgentStringThe user’s browser’s user agent string. This value is meant for troubleshooting issues with passkeys.
userIdUUIDrequiredThe Id of the user registering the passkey.
workflowStringrequiredThe WebAuthn workflow this passkey is intended to be used with. Selecting the proper value will provide the best user experience by limiting the registration ceremony to authenticators which support the features needed for each workflow. The selected workflow will change the creation options on the response based on the tenant configuration. The possible values are:
- bootstrap- The passkey is intended for use with the bootstrap workflow, which requires the user to “bootstrap” the authentication process by identifying themselves prior to the WebAuthn ceremony and can be used to authenticate from a new device using WebAuthn.
- general- The passkey is not intended for any particular workflow. This value will allow for the most flexible use of the new passkey.
- reauthentication- The passkey is intended for use with the re-authentication workflow, which provides a streamlined user experience for repeated logins from the same device.
Example Request JSON
{
  "displayName": "Chrome Touch ID",
  "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457",
  "workflow": "reauthentication"
}Response
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 401 | You did not supply a valid Authorization header. The header was omitted or your API key was not valid. The response will be empty. See Authentication. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Response Body
The response body contains options to be passed to the WebAuthn JavaScript API. The options.challenge , options.user.id , and options.excludeCredentials[x].id  fields must be converted to ArrayBuffers for the navigator.credentials.create() request. See WebAuthn JavaScript API Binary Format for details.
optionsObjectThe WebAuthn public key credential creation options. This object is passed to the WebAuthn JavaScript API to create a new passkey.
options.attestationStringThe Relying Party’s attestation conveyance preference. Currently supported values include:
- none- The Relying Party is not interested in authenticator attestation.
options.authenticatorSelection.authenticatorAttachmentStringThe Relying Party’s authenticator attachment preference. Authenticators eligible for the current registration ceremony will be limited according to this requested attachment preference. Possible values are:
- platform- The authenticator is integrated with the current device. These typically use the device’s unlock mechanism for user verification (e.g. Touch ID, PIN, pattern).
- cross-platform- The authenticator can be used between multiple devices such as a USB security key or Bluetooth-connected phone.
- null(or omitted) - The Relying Party has no attachment preference. Any attachment will be allowed.
options.authenticatorSelection.userVerificationStringThe Relying Party’s user verification requirement. Eligible authenticators will be filtered according to this preference. Possible values are:
- discouraged- The Relying Party does not want user verification to be used.
- preferred- The Relying Party prefers that user verification is used if available but will not fail the ceremony if it is not provided.
- required- The Relying Party requires user verification for the operation.
options.challengeStringThis field contains a base64url-encoded string that acts as a one-time challenge for the ceremony. This makes WebAuthn resistant to certain kinds of replay attacks.
See Converting base64url-encoded String to ArrayBuffer for details on converting this value for the WebAuthn JavaScript API call.
options.excludeCredentialsArrayA list of passkeys whose generating authenticators should be excluded from the current registration ceremony. This is meant to prevent a user creating multiple passkeys for the same account on the same authenticator.
options.excludeCredentials[x].idStringThe credential Id generated by the authenticator as a base64url-encoded string. An available authenticator that owns any passkey with one of these Ids is excluded from the current ceremony.
See Converting base64url-encoded String to ArrayBuffer for details on converting these values for the WebAuthn JavaScript API call.
options.excludeCredentials[x].transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify authenticators containing one of the options.excludeCredentials .
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
options.excludeCredentials[x].typeStringThe credential type the current passkey refers to. The only value supported by WebAuthn is public-key.
options.extensions.credPropsBooleanIf true, the Relying Party will request the client to report on whether the new passkey is a client-side discoverable credential.
options.pubKeyCredParamsArrayA list of the Relying Party’s acceptable options for the type of passkey and its signing algorithm in order of preference.
options.pubKeyCredParams[x].algLongThe identifier for the signing algorithm to be used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
options.pubKeyCredParams[x].typeStringThe credential type the current passkey refers to. The only value supported by WebAuthn is public-key.
options.rp.idStringThe Relying Party Id for this registration ceremony. Passkeys can only be used to authenticate on sites using the same Relying Party Id they were registered with.
If this value is null or omitted, the WebAuthn JavaScript API will use the browser origin as the Relying Party Id.
options.rp.nameStringThe name of the Relying Party requesting a new passkey to be created. This value is intended for display during WebAuthn ceremonies.
options.timeoutLongThe number of milliseconds the Relying Party is willing to wait for the ceremony to complete. This value is treated as a hint and may be overridden by the client. This is an unsigned value.
options.user.displayNameStringA human-readable display name for the new passkey. This value may be displayed during the current and future WebAuthn ceremonies.
options.user.idStringA user handle that can be used by the Relying Party to uniquely identify the user registering the passkey. FusionAuth uses the base64url-encoded unique Id for the user.
See Converting base64url-encoded String to ArrayBuffer for details on converting this value for the WebAuthn JavaScript API call.
options.user.nameStringA human-readable name for the passkey intended for display. This value is meant to disambiguate between passkeys with a similar displayName .
Example Response JSON
{
  "options": {
    "attestation": "none",
    "authenticatorSelection": {
      "authenticatorAttachment": "platform",
      "userVerification": "required"
    },
    "challenge": "fdnW2u1_Nk9_FY2SprU4mPs0NgBTbo9tOO5Q9EvO1Oc",
    "excludeCredentials": [
      {
        "id": "MBU0eBsaNAt4VEh4Lbn2sQ==",
        "transports": [
          "internal"
        ],
        "type": "public-key"
      }
    ],
    "extensions": {
      "credProps": true
    },
    "pubKeyCredParams": [
      {
        "alg": -36,
        "type": "public-key"
      },
      {
        "alg": -35,
        "type": "public-key"
      },
      {
        "alg": -7,
        "type": "public-key"
      },
      {
        "alg": -39,
        "type": "public-key"
      },
      {
        "alg": -38,
        "type": "public-key"
      },
      {
        "alg": -37,
        "type": "public-key"
      },
      {
        "alg": -259,
        "type": "public-key"
      },
      {
        "alg": -258,
        "type": "public-key"
      },
      {
        "alg": -257,
        "type": "public-key"
      }
    ],
    "rp": {
      "id": "piedpiper.com",
      "name": "Pied Piper"
    },
    "timeout": 180000,
    "user": {
      "displayName": "Chrome Touch ID",
      "id": "NzAzZmUyZDItMmQzOS00Y2I3LWI3NmQtMGI5OTE4ZWQyNDU3",
      "name": "richard@fusionauth.io"
    }
  }
}Complete a WebAuthn Passkey Registration
This API is used to complete a WebAuthn registration ceremony by providing the values returned from the WebAuthn JavaScript API call. The API will validate the request against configured passkey requirements for the workflow and the one-time challenge generated and returned by Start a WebAuthn Passkey Registration.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Body
The credential in the request body contains data returned by the WebAuthn JavaScript API call. The credential.response.attestationObject and credential.response.clientDataJSON fields must be converted to base64url-encoded strings for the FusionAuth API request. See WebAuthn JavaScript API Binary Format for details.
credential.clientExtensionResults.credProps.rkBooleanIf true, the new passkey is “client-side discoverable,” meaning that it can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to complete a form field). If false, or the credential.clientExtensionResults.credProps  field is omitted, the passkey should be treated as if it were not client-side discoverable. FusionAuth does not currently support discoverable credentials (sometimes referred to as “resident keys”).
credential.idStringrequiredA base64url-encoded version of the credential Id generated by the authenticator for this passkey.
credential.rpIdStringIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be omitted from the request object.
credential.response.attestationObjectStringrequiredThe base64url-encoded attestation data from the WebAuthn JavaScript API response, which includes information on the new passkey and other data important for validation. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.clientDataJSONStringrequiredThe base64url-encoded client data from the WebAuthn JavaScript API response. This contains important information for the WebAuthn registration validation process, including the one-time challenge generated when the registration ceremony began. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify eligible authenticators during a WebAuthn ceremony.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
credential.typeStringrequiredThe credential type of the new passkey. The only value supported by WebAuthn is public-key.
originStringrequiredThe browser request origin during the registration ceremony.
rpIdStringrequiredIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be the browser request origin’s effective domain during the ceremony.
userIdUUIDrequiredThe unique Id of the user registering this new passkey.
Example Request JSON
{
  "credential": {
    "clientExtensionResults": {
      "credProps": {
        "rk": true
      }
    },
    "id": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "response": {
      "attestationObject": "v2dhdHRTdG109mhhdXRoRGF0YViemPsv4VW-wth0V9gzsxWRFn-1SyC9gM4-QC4ptMFDNhVFAAAAFmhGAxjmXUwbl-q5EoJkWH0AELmJieDlA5kNXEtcIgWnp1a_YTMmYTECYi0xAWItMlggTmZZ1aeY0PP8-Ebdufqcg9TWEs_mJaFJmJ57uRyQ1BxiLTNYIQCzqsN1dkCeZKpWGKEVP0-eqBlkKGNCjfcdg5221SRZX_9jZm10ZG5vbmX_",
      "clientDataJSON": "eyJjaGFsbGVuZ2UiOiJ2dHk0WG1ES01EMmxTc2dVOEpsOFlIVEtBcGZlWXpMdkRVUksxTXpGd1JvIiwiY3Jvc3NPcmlnaW4iOmZhbHNlLCJvcmlnaW4iOiJodHRwczovL2Z1c2lvbmF1dGguaW8iLCJ0eXBlIjoid2ViYXV0aG4uY3JlYXRlIn0="
    },
    "transports": [
      "internal"
    ],
    "type": "public-key"
  },
  "origin": "https://auth.piedpiper.com",
  "rpId": "piedpiper.com",
  "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
}Response
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Response Body
credential.algorithmLongThe identifier for the signing algorithm used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
Supported algorithms
| Name | Value | Description | 
|---|---|---|
| RS256 | -257 | RSASSA-PKCS1-v1_5 using SHA-256 | 
| RS384 | -258 | RSASSA-PKCS1-v1_5 using SHA-384 | 
| RS512 | -259 | RSASSA-PKCS1-v1_5 using SHA-512 | 
| PS256 | -37 | RSASSA-PSS w/ SHA-256 | 
| PS384 | -38 | RSASSA-PSS w/ SHA-384 | 
| PS512 | -39 | RSASSA-PSS w/ SHA-512 | 
| ES256 | -7 | ECDSA w/ SHA-256 | 
| ES384 | -35 | ECDSA w/ SHA-384 | 
| ES512 | -36 | ECDSA w/ SHA-512 | 
credential.attestationTypeStringThe type of attestation provided when the passkey was registered. Passkeys registered in FusionAuth will have a value of none. Imported passkeys may have another value.
credential.authenticatorSupportsUserVerificationBooleanIndicates whether this authenticator supports user verification. User verification ensures that the user is authorized to use the authenticator.
This value is currently determined by whether user verification occurred during the registration of this passkey rather than by other means, such as examining FIDO authenticator metadata.
credential.credentialIdStringThe credential Id generated by the authenticator is stored as a base64url-encoded string. This value is used by authenticators to look up a passkey during an authentication ceremony and to prevent multiple passkeys from being registered on the same authenticator for a single user.
credential.dataObjectAn object that can hold any information about the passkey that should be persisted.
credential.discoverableBooleanIndicates whether the passkey is “client-side discoverable.” Discoverable passkeys can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to complete a form field).
credential.displayNameStringThe display name for the passkey selected during registration. This value should have been selected by the user.
credential.idUUIDThe unique identifier for this passkey.
credential.insertInstantLongThe instant that the passkey was added to the FusionAuth database.
credential.lastUseInstantLongThe instant that the passkey was last used to complete a WebAuthn ceremony.
credential.nameStringA unique name meant to disambiguate passkeys with the same credential.displayName .
credential.publicKeyStringThe passkey’s public key, encoded in PEM format.
credential.relyingPartyIdStringThe Relying Party Id used at the time the passkey was registered.
credential.signCountIntegerA signature counter for the passkey. The signature count can be used by a Relying Party to identify a cloned or malfunctioning authenticator.
credential.tenantIdUUIDThe Id of the tenant to which this passkey belongs.
credential.transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify eligible authenticators during a WebAuthn ceremony.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
credential.userAgentStringThe user agent at the time the passkey was registered. This can be useful for troubleshooting purposes.
credential.userIdUUIDThe Id of the user that this passkey belongs to.
Example Response JSON
{
  "credential": {
    "algorithm": -7,
    "attestationType": "none",
    "authenticatorSupportsUserVerification": true,
    "credentialId": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "data": {},
    "displayName": "Chrome Touch ID",
    "name": "richard@fusionauth.io",
    "id": "c664318a-2384-4c35-9475-9a200e1d3b72",
    "insertInstant": 1668011701792,
    "discoverable": false,
    "lastUseInstant": 1668021630599,
    "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
    "relyingPartyId": "piedpiper.com",
    "signCount": 41,
    "tenantId": "30663132-6464-6665-3032-326466613934",
    "transports": [
      "internal"
    ],
    "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
  }
}Start a WebAuthn Passkey Assertion or Authentication
This API is used to start a WebAuthn authentication ceremony by providing some details about the current user and the new passkey. The response is a JSON object which is suitable to be passed to the WebAuthn JavaScript API navigator.credentials.get() function and includes a one-time challenge unique to the current ceremony. This same API is used to start a WebAuthn assertion that validates a passkey signature without authenticating the user.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Body
applicationIdUUIDrequiredThe Id for the application to which the user wishes to authenticate.
credentialIdUUIDThe unique database Id for one of a user’s passkeys. When provided, the authentication ceremony will use this passkey. Otherwise, any of a user’s passkeys that meet the user verification requirement will be eligible for the authentication ceremony.
loginIdStringThe login identifier of the authenticating user. The login identifier can be one of the following (see loginIdTypes for information on which of these identifiers will be used):
- Email address
- Phone number (if phoneNumberis included in loginIdTypes )
- Username
loginIdTypesArray<String>Defaults to [email, username]Available since 1.59.0The identity types that FusionAuth will compare the loginId to. Can be one or more of the following:
- email
- phoneNumber
- username
["email", "username"] is supplied with a loginId  value of terry@example.com, then a user with terry@example.com as their email address will match first before any user with terry@example.com as their username.stateObjectAn optional object that will be returned un-modified when you complete the WebAuthn authentication request. This may be useful to return the user to a particular state once they complete the authentication.
userIdUUIDThe unique Id of the authenticating user.
This field is marked optional, but you must provide either the loginId or the userId to complete this API. If both fields are provided in the request body, the userId will be utilized.
workflowStringrequiredThe WebAuthn workflow for the current authentication ceremony. The workflow value changes the options object generated by this API. The options object is built to be passed to the WebAuthn JavaScript API call. The possible values are:
- bootstrap- The user is authenticating using a WebAuthn passkey after providing their email, username, or other information to identify themselves.
- reauthentication- The user is reauthenticating on a device they have previously authenticated from.
Example Request JSON
{
  "applicationId": "82b24314-95f6-4393-b3da-72c341185244",
  "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457",
  "workflow": "reauthentication"
}Response
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 401 | You did not supply a valid Authorization header. The header was omitted or your API key was not valid. The response will be empty. See Authentication. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Response Body
The response body contains options to be passed to the WebAuthn JavaScript API. The options.challenge  and options.allowCredentials[x].id  fields must be converted to ArrayBuffers for the navigator.credentials.get() request. See WebAuthn JavaScript API Binary Format for details.
optionsObjectThe WebAuthn public key credential request options. This object is passed to the WebAuthn JavaScript API to generate an assertion using an available passkey.
options.allowCredentialsArrayAn array containing identifying information for passkeys that are allowed to complete this authentication ceremony, ordered from most to least preferred.
options.allowCredentials[x].idStringThe credential Id generated by the authenticator as a base64url-encoded string. This value is used to locate an authenticator that can complete the ceremony.
See Converting base64url-encoded String to ArrayBuffer for details on converting these values for the WebAuthn JavaScript API call.
options.allowCredentials[x].transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify authenticators containing one of the options.allowCredentials .
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
options.allowCredentials[x].typeStringThe credential type the current passkey refers to. The only value supported by WebAuthn is public-key.
options.challengeStringThis field contains a base64url-encoded string that acts as a one-time challenge for the ceremony. This makes WebAuthn resistant to certain kinds of replay attacks.
See Converting base64url-encoded String to ArrayBuffer for details on converting this value for the WebAuthn JavaScript API call.
options.rpIdStringThe Relying Party Id for this authentication ceremony. Passkeys can only be used to authenticate on sites with the same Relying Party Id with which the passkeys were registered.
If this value is null or omitted, the WebAuthn JavaScript API will use the browser origin as the Relying Party Id.
options.timeoutLongThe number of milliseconds the Relying Party is willing to wait for the ceremony to complete. This value is treated as a hint and may be overridden by the client. This is an unsigned value.
options.userVerificationStringThe Relying Party’s user verification requirement. Eligible authenticators will be filtered according to this preference. Possible values are:
- discouraged- The Relying Party does not want user verification to be used.
- preferred- The Relying Party prefers that user verification is used if available but will not fail the ceremony if it is not provided.
- required- The Relying Party requires user verification for the operation.
Example Response JSON
{
  "options": {
    "allowCredentials": [
      {
        "id": "HdN9wqP9mqOonacmiM2gIjASFYg",
        "transports": [
          "internal"
        ],
        "type": "public-key"
      }
    ],
    "challenge": "fdnW2u1_Nk9_FY2SprU4mPs0NgBTbo9tOO5Q9EvO1Oc",
    "rpId": "piedpiper.com",
    "timeout": 180000,
    "userVerification": "required"
  }
}Complete a WebAuthn Passkey Authentication
This API is used to complete a WebAuthn authentication ceremony by providing the values returned from the WebAuthn JavaScript API call. The API will validate the request against configured passkey requirements for the workflow and the one-time challenge generated and returned by Start a WebAuthn Passkey Assertion or Authentication.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Cookies
fusionauth.trustStringThe Multi-Factor Trust identifier returned by the Multi-Factor Login API response. This value may be provided to bypass the Multi-Factor challenge when a User has Multi-Factor enabled. When this cookie exists on the request it will take precedence over the twoFactorTrustId if provided in the request body.
Request Body
The credential in the request body contains data returned by the WebAuthn JavaScript API call. The credential.response.authenticatorData , credential.response.clientDataJSON , credential.response.signature , and credential.response.userHandle fields must be converted to base64url-encoded strings for the FusionAuth API request. See WebAuthn JavaScript API Binary Format for details.
credential.clientExtensionResultsObjectThe results for WebAuthn extensions requested during authentication. FusionAuth does not currently support any WebAuthn authentication extensions.
credential.idStringrequiredA base64url-encoded version of the credential Id used by the authenticator for this ceremony.
credential.rpIdStringIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be omitted from the request object.
credential.response.authenticatorDataStringrequiredThe base64url-encoded authenticator data from the WebAuthn JavaScript API response, which includes information on the passkey used to complete the ceremony and other data important for validation. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.clientDataJSONStringrequiredThe base64url-encoded client data from the WebAuthn JavaScript API response. This contains important information for the WebAuthn authentication validation process, including the one-time challenge generated when the registration ceremony began. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.signatureStringrequiredThe base64url-encoded signature from the WebAuthn JavaScript API response. The authenticator generates the signature using the selected passkey’s private key by signing over the binary concatenation of credential.response.authenticatorData and the SHA-256 hash of credential.response.clientDataJSON before they are converted to base64url-encoded strings. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.userHandleStringThe base64url-encoded user handle from the WebAuthn JavaScript API response. This field is only required when the user was not identified prior to the authentication ceremony through the use of a client-side discoverable passkey. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.typeStringrequiredThe credential type of the passkey. The only value supported by WebAuthn is public-key.
originStringrequiredThe browser request origin during the authentication ceremony. For example, example.com.
rpIdStringrequiredIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be the browser request origin’s effective domain during the ceremony.
twoFactorTrustIdStringThe Multi-Factor Trust identifier returned by the Multi-Factor Login API response. This value may be provided to bypass the Multi-Factor challenge when a User has Multi-Factor enabled.
Example Request JSON
{
  "credential": {
    "id": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "response": {
      "authenticatorData": "mPsv4VW-wth0V9gzsxWRFn-1SyC9gM4-QC4ptMFDNhUFAAAAKQ==",
      "clientDataJSON": "eyJjaGFsbGVuZ2UiOiJTeTYzQldla285blFsYzVOQmVWcE1BWjFtQ0hvdzBXUXVFeDRJU2xuQzR3IiwiY3Jvc3NPcmlnaW4iOmZhbHNlLCJvcmlnaW4iOiJodHRwczovL2Z1c2lvbmF1dGguaW8iLCJ0eXBlIjoid2ViYXV0aG4uZ2V0In0=",
      "signature": "MEUCIQDUwlDp9aNcYQmvpVGLJ35H8lRWjWsfjVsfPf_5HhY3GwIgahBhISBxv82ZS4ll8TZiJp5bIN2CGx_-VjUymfzKqGA=",
      "userHandle": "NzAzZmUyZDItMmQzOS00Y2I3LWI3NmQtMGI5OTE4ZWQyNDU3"
    },
    "type": "public-key"
  },
  "origin": "https://auth.piedpiper.com",
  "rpId": "piedpiper.com"
}Response
The response for this API contains the User object.
Response Codes
| Code | Description | 
|---|---|
| 200 | The authentication was successful. The response will contain the User object that was authenticated. | 
| 202 | The user was authenticated successfully. The user is not registered for the application specified by the applicationIdon the request.  The response will contain the User object that was authenticated. | 
| 203 | The user was authenticated successfully. The user is required to change their password, the response will contain the changePasswordIdto be used on the Change Password API.  Since version1.15.0, the response will also contain achangePasswordReasonfield which can have one of the following values:
 Example Response JSON  | 
| 212 | The user was authenticated successfully. The user’s email address (if an email address or username was used to authenticate) or phone number has not yet been verified. The response will contain the User object that was authenticated. If the tenant verification strategy has been set to FormField, the response will contain the verification Id that was generated for the user. | 
| 213 | The user was authenticated successfully. The user’s registration has not yet been verified. The response will contain the User object that was authenticated. If the application’s emailConfiguration.verificationStrategy  has been set to FormField, the response will contain the registrationVerificationId  that was generated for the user.Prior to version 1.27.0, this status code was not returned, and you will see a200instead. | 
| 242 | The user was authenticated successfully. The user has two factor authentication enabled. Since version 1.42.0, this status code is also returned when two factor authentication is required. The response will contain thetwoFactorIdto be used on the Complete Two Factor Authentication API.Example Response JSON  | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. | 
| 404 | The user was not found or the password was incorrect. The response will be empty. | 
| 409 | The user is currently in an action that has prevented login. The response will contain the actions that prevented login. Example Response JSON  | 
| 410 | The user has expired. The response will be empty. | 
| 423 | The user is locked and cannot login. The response will be empty. Prior to version 1.9.0a404status code will be returned instead. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
| 504 | One or more Webhook endpoints returned an invalid response or were unreachable. Based on the transaction configuration for this event your action cannot be completed. A stack trace is provided and logged in the FusionAuth log files. | 
Response Body
emailVerificationIdStringAn email verification Id, which is needed when performing your own email verification using the /api/user/verify-email API.
This field is only returned when the tenant.emailConfiguration.verificationStrategy  is set to FormField.
identityVerificationIdStringAvailable since 1.59.0An identity verification Id, which is needed when performing your own identity verification using the /api/identity/verify API.
This field is only returned under the following conditions, based on the identity that was used to log in:
- An email address - the tenant.emailConfiguration.verificationStrategy  is set to FormField.
- A phone number - the tenant.phoneConfiguration.verificationStrategy  is set to FormField.
refreshTokenStringThe refresh token that can be used to obtain a new access token once the provided one has expired.
Because a refresh token is per user and per application, this value will only be returned when an applicationId was provided on the login request and the user is registered to the application.
You must explicitly allow generation of refresh tokens when using the Login API.
Configure the application.loginConfiguration.generateRefreshTokens setting via the API or enable the setting by navigating to the Application -> My Application -> Security tab.
refreshTokenIdStringAvailable since 1.37.0When the refreshToken is returned in the response, this field will also be returned. This unique Id is the persistent identifier for this refresh token, and will not change even when using one-time use refresh tokens. This value may optionally be used to revoke the token using the Refresh Token API.
stateObjectIf authenticated using a One Time Password and state was provided during the Change Password request this value will be returned exactly as it was provided.
tokenStringAvailable since 1.16.0The access token, this string is an encoded JSON Web Token (JWT).
When the user will be sent a setup password email or sms message, this token will not be returned.
tokenExpirationInstantLongAvailable since 1.33.0The instant the token will expire. If the response does not contain a token , this field will also be omitted from the response.
user.activeBooleanTrue if the User is active. False if the User has been deactivated. Deactivated Users will not be able to log in.
user.birthDateStringThe User’s birthdate formatted as YYYY-MM-DD
user.breachedPasswordLastCheckedInstantLongThe instant this user’s password was last checked to determine if it is compromised.
user.connectorIdUUIDAvailable since 1.18.0The unique Id of the Connector associated with the System of Record being used to authenticate the user.
user.cleanSpeakIdUUIDThis Id is used by FusionAuth when the User’s username is sent to CleanSpeak to be moderated (filtered and potentially sent to the approval queue). It is the content Id of the username inside CleanSpeak.
user.dataObjectAn object that can hold any information about the User that should be persisted.
user.data.emailStringThis field will be used as the email address if no user.email field is found.
This feature was removed in version 1.26.0 and added back in 1.27.2.
user.emailStringThe User’s email address.
user.expiryLongThe expiration instant of the User’s account. An expired user is not permitted to log in.
user.firstNameStringThe first name of the User.
user.fullNameStringThe User’s full name as a separate field that is not calculated from firstName and lastName .
user.idUUIDThe User’s unique Id.
user.identitiesArrayAvailable since 1.59.0The list of identities that exist for a User.
user.identities[x].displayValueStringAvailable since 1.59.0The display value for the identity. Only used for username type identities. If the unique username feature is not enabled, this value
will be the same as user.identities[x].value . Otherwise, it will be the username the User has chosen. For
primary username identities, this will be the same value as user.username .
user.identities[x].insertInstantLongAvailable since 1.59.0The instant when the identity was created.
user.identities[x].lastLoginInstantLongAvailable since 1.59.0The instant when the identity was last used to log in. If a User has multiple identity types (username, email, and phoneNumber), then this value will represent the specific identity they last used to log in. This contrasts with user.lastLoginInstant , which represents the last time any of the User’s identities was used to log in.
Identity provider logins will not be reflected here (see user.lastLoginInstant for a field that includes identity provider logins).
user.identities[x].lastUpdateInstantLongAvailable since 1.59.0The instant when the identity was last updated.
user.identities[x].moderationStatusStringAvailable since 1.59.0The current status of the username. This is used if you are moderating usernames via CleanSpeak. The possible values are:
- ACTIVE- the username is active
- PENDING- the username is pending approval/moderation
- REJECTED- the username was rejected during moderation
If a username has been rejected, it is still possible to allow the User to update it and have the new one moderated again.
Only used for username type identities. For primary username identities, this will be the same value as user.usernameStatus .
user.identities[x].typeStringAvailable since 1.59.0The identity type. The possible values are:
- email- identities defined by an email address
- phoneNumber- identities defined by a phone number
- username- identities defined by a username
user.identities[x].valueStringAvailable since 1.59.0The value represented by the identity. The contents of this field depend on user.identities[x].type and will be one of the following:
- Email address - The User’s email address, always lower cased. For primary email identities, this will be the same value as user.email
- Phone number - The User’s phone number, in E.164 canonical format. For primary phone number identities, this will be the same value as user.phoneNumber
- Username - User’s username - this will be the same as user.identities[x].displayValue . For primary username identities, this will be the same value as user.username
This value is unique within a tenant for a particular user.identities[x].type .
If the unique usernames feature is enabled, value will be the unique username (within the tenant). For primary username identities, this will also be the same value as user.uniqueUsername .
user.identities[x].verifiedBooleanAvailable since 1.59.0Whether verification was actually performed on the identity by FusionAuth. This is used in combination with the user.identities[x].verifiedReason to decide whether an identity needs verification.
user.identities[x].verifiedInstantLongAvailable since 1.59.0The instant when verification was performed on the identity. This field is only populated when verification was actually performed on the identity by FusionAuth.
user.identities[x].verifiedReasonStringAvailable since 1.59.0The reason the User’s identity was verified or not verified. The possible values are:
- Skipped- Verification was skipped due to the- skipVerificationparameter on the request
- Trusted- Identity was created via an identity provider or a connector
- Unverifiable- FusionAuth doesn’t know how to verify this identity type. Usernames are an example
- Implicit- Verification was implicitly performed by sending a set password or passwordless message
- Pending- Tenant policy requires verification but no verification has been performed yet
- Completed- Verification was performed by FusionAuth
- Disabled- Tenant policy did not require verification
- Import- User was imported so verification was not performed by FusionAuth
If this field is Disabled, Import, Skipped, Trusted, or Unverifiable, then verification will not be required, regardless of the user.identities[x].verified  value.
For Implicit, Pending, or Completed, the identity will require verification if user.identities[x].verified  is false.
user.imageUrlStringThe URL that points to an image file that is the User’s profile image.
user.insertInstantLongThe instant when the user was created.
user.lastLoginInstantLongThe instant when the User logged in last. See user.identities[x].lastLoginInstant for more granular information based on identity.
user.lastNameStringThe User’s last name.
user.lastUpdateInstantLongThe instant when the User was last updated.
user.membershipsArrayThe list of memberships for the User.
user.memberships[x].dataObjectAn object that can hold any information about the User for this membership that should be persisted.
user.memberships[x].groupIdUUIDThe Id of the Group of this membership.
user.memberships[x].idUUIDThe unique Id of this membership.
user.memberships[x].insertInstantLongThe instant that the membership was created.
user.middleNameStringThe User’s middle name.
user.mobilePhoneStringThe User’s mobile phone number. This is useful if you will be sending push notifications or SMS messages to the User.
This differs from user.phoneNumber and cannot be used to log in.
user.parentEmailStringAvailable since 1.7.0The email address of the user’s parent or guardian. If this value was provided during a create or update operation, this value will only remain until the child is claimed by a parent.
user.passwordChangeRequiredBooleanIndicates that the User’s password needs to be changed during their next login attempt.
user.passwordLastUpdateInstantLongThe instant that the User last changed their password.
user.phoneNumberStringAvailable since 1.59.0The User’s primary phone number. The phone number is stored and returned in E.164 canonical format, however a phone number is considered unique regardless of the format. 303-555-1212 is considered equal to +13035551212 so either version of this phone number can be used whenever providing it as input to an API.
This differs from user.mobilePhone in that user.phoneNumber can be used to log in, just like an email address or a username.
user.preferredLanguagesArray<String>An array of locale strings that give, in order, the User’s preferred languages. These are important for email templates and other localizable text. See Locales.
user.registrationsArrayThe list of registrations for the User. This will include registrations for inactive applications.
user.registrations[x].applicationIdUUIDThe Id of the Application that this registration is for.
user.registrations[x].authenticationTokenStringThe Authentication Token for this registration (if one exists).
user.registrations[x].cleanSpeakIdUUIDThis Id is used by FusionAuth when the User’s username for this registration is sent to CleanSpeak to be moderated (filtered and potentially sent to the approval queue). It is the content Id of the username inside CleanSpeak.
user.registrations[x].dataObjectAn object that can hold any information about the User for this registration that should be persisted.
user.registrations[x].idUUIDThe Id of this registration.
user.registrations[x].insertInstantLongThe instant that this registration was created.
user.registrations[x].lastLoginInstantLongThe instant that the User last logged into the Application for this registration.
user.registrations[x].preferredLanguagesArray<String>An array of locale strings that give, in order, the User’s preferred languages for this registration. These are important for email templates and other localizable text.
user.registrations[x].rolesArray<String>The list of roles that the User has for this registration. The string is the role’s Name not the role’s Id, e.g. admin or user-role.
user.registrations[x].timezoneStringThe User’s preferred timezone for this registration. The string will be in an IANA time zone format.
user.registrations[x].tokensMap<String,StringDEPRECATEDA map that contains tokens returned from identity providers.
For example, if this user has authenticated using the Facebook Identity Provider, the Facebook access token will be available in this map, keyed by name Facebook. For an OpenID Connect Identity provider, or other generic providers, if a token is stored it will be keyed by the Identity Provider unique Id.
The token returned and stored from the Identity Provider is now stored in the IdP link and is retrievable using the Identity Provider Link API.
user.registrations[x].usernameStringThe username of the User for this registration only. This is for display purposes and cannot be used to log in.
user.registrations[x].usernameStatusStringThe current status of the username. This is used if you are moderating usernames via CleanSpeak. The possible values are:
- ACTIVE- the username is active
- PENDING- the username is pending approval/moderation
- REJECTED- the username was rejected during moderation
If a username has been rejected, it is still possible to allow the User to update it and have the new one moderated again.
user.registrations[x].verifiedBooleanThis value indicates if this User’s registration has been verified.
For additional information, see these tutorials:
user.registrations[x].verifiedInstantLongAvailable since 1.48.0The instant that this registration was verified.
user.tenantIdUUIDThe Id of the Tenant that this User belongs to.
user.timezoneStringThe User’s preferred timezone. This can be used as a default to display instants, and it is recommended that you allow Users to change this per-session. The string will be in an IANA time zone format.
user.twoFactor.methods[x].authenticator.algorithmStringThe algorithm used by the TOTP authenticator. With the current implementation, this will always be HmacSHA1.
user.twoFactor.methods[x].authenticator.codeLengthIntegerThe length of code generated by the TOTP. With the current implementation, this will always be 6.
user.twoFactor.methods[x].authenticator.timeStepIntegerThe time-step size in seconds. With the current implementation, this will always be 30.
user.twoFactor.methods[x].emailStringThe value of the email address for this method. Only present if user.twoFactor.methods[x].method  is email.
user.twoFactor.methods[x].idStringThe unique Id of the method.
user.twoFactor.methods[x].lastUsedBooleantrue if this method was used most recently.
user.twoFactor.methods[x].methodStringThe type of this method. There will also be an object with the same value containing additional information about this method. The possible values are:
- authenticator
- email
- sms
user.twoFactor.methods[x].mobilePhoneStringThe value of the mobile phone for this method. Only present if user.twoFactor.methods[x].method  is sms.
user.twoFactorDeliveryStringDEPRECATEDThe User’s preferred delivery for verification codes during a two factor login request.
The possible values are:
- None
- TextMessage
user.twoFactorEnabledBooleanDEPRECATEDDetermines if the User has two factor authentication enabled for their account or not.
Removed in 1.26.0user.usernameStringThe username of the User.
user.usernameStatusStringThe current status of the username. This is used if you are moderating usernames via CleanSpeak. The possible values are:
- ACTIVE- the username is active
- PENDING- the username is pending approval/moderation
- REJECTED- the username was rejected during moderation
If a username has been rejected, it is still possible to allow the User to update it and have the new one moderated again.
user.verifiedBooleanDEPRECATEDWhether or not the User’s primary email identity has been verified. This does NOT indicate whether phone number identity types are verified.
For additional information, see these tutorials:
Deprecated since 1.59.0See user.identities[x].verified and user.identities[x].verifiedReason .
user.verifiedInstantLongAvailable since 1.48.0The first instant that the User’s primary email address or phone number was verified. This value is immutable and cannot change for a user once set.
Example Response JSON
{
  "token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOjE0ODUxNDA5ODQsImlhdCI6MTQ4NTEzNzM4NCwiaXNzIjoiYWNtZS5jb20iLCJzdWIiOiIyOWFjMGMxOC0wYjRhLTQyY2YtODJmYy0wM2Q1NzAzMThhMWQiLCJhcHBsaWNhdGlvbklkIjoiNzkxMDM3MzQtOTdhYi00ZDFhLWFmMzctZTAwNmQwNWQyOTUyIiwicm9sZXMiOltdfQ.Mp0Pcwsz5VECK11Kf2ZZNF_SMKu5CgBeLN9ZOP04kZo",
  "user": {
    "active": true,
    "birthDate": "1976-05-30",
    "connectorId": "e3306678-a53a-4964-9040-1c96f36dda72",
    "data": {
      "displayName": "Johnny Boy",
      "favoriteColors": [
        "Red",
        "Blue"
      ]
    },
    "email": "example@fusionauth.io",
    "expiry": 1571786483322,
    "firstName": "John",
    "fullName": "John Doe",
    "id": "00000000-0000-0001-0000-000000000000",
    "identities": [
      {
        "insertInstant": 1742936980069,
        "lastLoginInstant": 1742936980069,
        "lastUpdateInstant": 1742936980069,
        "primary": true,
        "type": "email",
        "value": "example@fusionauth.io",
        "verified": false,
        "verifiedReason": "Disabled"
      },
      {
        "insertInstant": 1742936980069,
        "lastLoginInstant": 1742936980069,
        "lastUpdateInstant": 1742936980069,
        "primary": true,
        "type": "phoneNumber",
        "value": "+13035551212",
        "verified": false,
        "verifiedReason": "Disabled"
      },
      {
        "displayValue": "johnny123",
        "insertInstant": 1742936980069,
        "lastLoginInstant": 1742936980069,
        "lastUpdateInstant": 1742936980069,
        "moderationStatus": "ACTIVE",
        "primary": true,
        "type": "username",
        "value": "johnny123",
        "verified": false,
        "verifiedReason": "Unverifiable"
      }
    ],
    "imageUrl": "http://65.media.tumblr.com/tumblr_l7dbl0MHbU1qz50x3o1_500.png",
    "insertInstant": 1742936980069,
    "lastLoginInstant": 1742936980069,
    "lastName": "Doe",
    "middleName": "William",
    "mobilePhone": "303-555-1234",
    "passwordChangeRequired": false,
    "passwordLastUpdateInstant": 1742936980069,
    "phoneNumber": "+13035551212",
    "preferredLanguages": [
      "en",
      "fr"
    ],
    "registrations": [
      {
        "applicationId": "10000000-0000-0002-0000-000000000001",
        "data": {
          "displayName": "Johnny",
          "favoriteSports": [
            "Football",
            "Basketball"
          ]
        },
        "id": "00000000-0000-0002-0000-000000000000",
        "insertInstant": 1742936980069,
        "lastLoginInstant": 1742936980069,
        "preferredLanguages": [
          "en",
          "fr"
        ],
        "roles": [
          "user",
          "community_helper"
        ],
        "username": "johnny123",
        "usernameStatus": "ACTIVE",
        "verified": true,
        "verifiedInstant": 1742936980069
      }
    ],
    "timezone": "America/Denver",
    "tenantId": "f24aca2b-ce4a-4dad-951a-c9d690e71415",
    "twoFactor": {
      "methods": [
        {
          "authenticator": {
            "algorithm": "HmacSHA1",
            "codeLength": 6,
            "timeStep": 30
          },
          "id": "35VW",
          "method": "authenticator"
        },
        {
          "id": "V7SH",
          "method": "sms",
          "mobilePhone": "555-555-5555"
        },
        {
          "email": "example@fusionauth.io",
          "id": "7K2G",
          "method": "email"
        }
      ]
    },
    "usernameStatus": "ACTIVE",
    "username": "johnny123",
    "verified": true,
    "verifiedInstant": 1742936980069
  }
}Complete a WebAuthn Passkey Assertion
This API is used to validate a WebAuthn authentication ceremony by providing the values returned from the WebAuthn JavaScript API call, but it does not authenticate the user. This API can be used to confirm that a user has access to a particular passkey without authenticating them.
Request
Request Headers
X-FusionAuth-TenantIdStringThe unique Id of the tenant used to scope this API request.
The tenant Id is not required on this request even when more than one tenant has been configured because the tenant can be identified based upon the request parameters or it is otherwise not required.
Specify a tenant Id on this request when you want to ensure the request is scoped to a specific tenant. The tenant Id may be provided through this header or by using a tenant locked API key to achieve the same result.
See Making an API request using a Tenant Id for additional information.
Request Body
The credential in the request body contains data returned by the WebAuthn JavaScript API call. The credential.response.authenticatorData , credential.response.clientDataJSON , credential.response.signature , and credential.response.userHandle fields must be converted to base64url-encoded strings for the FusionAuth API request. See WebAuthn JavaScript API Binary Format for details.
credential.clientExtensionResultsObjectThe results for WebAuthn extensions requested during authentication. FusionAuth does not currently support any WebAuthn authentication extensions.
credential.idStringrequiredA base64url-encoded version of the credential Id used by the authenticator for this ceremony.
credential.rpIdStringIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be omitted from the request object.
credential.response.authenticatorDataStringrequiredThe base64url-encoded authenticator data from the WebAuthn JavaScript API response, which includes information on the passkey used to complete the ceremony and other data important for validation. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.clientDataJSONStringrequiredThe base64url-encoded client data from the WebAuthn JavaScript API response. This contains important information for the WebAuthn authentication validation process, including the one-time challenge generated when the registration ceremony began. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.signatureStringrequiredThe base64url-encoded signature from the WebAuthn JavaScript API response. The authenticator generates the signature using the selected passkey’s private key by signing over the binary concatenation of credential.response.authenticatorData and the SHA-256 hash of credential.response.clientDataJSON before they are converted to base64url-encoded strings. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.response.userHandleStringThe base64url-encoded user handle from the WebAuthn JavaScript API response. This field is only required when the user was not identified prior to the authentication ceremony through the use of a client-side discoverable passkey. See Converting ArrayBuffer to base64url-encoded String for details on converting this value for the FusionAuth API request.
credential.typeStringrequiredThe credential type of the passkey. The only value supported by WebAuthn is public-key.
originStringrequiredThe browser request origin during the authentication ceremony. For example, example.com.
rpIdStringrequiredIf the tenant configuration overrides the Relying Party Id, this parameter should match tenant.webAuthnConfiguration.relyingPartyId , otherwise the value should be the browser request origin’s effective domain during the ceremony.
twoFactorTrustIdStringThe Multi-Factor Trust identifier returned by the Multi-Factor Login API response. This value may be provided to bypass the Multi-Factor challenge when a User has Multi-Factor enabled.
Example Request JSON
{
  "credential": {
    "id": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "response": {
      "authenticatorData": "mPsv4VW-wth0V9gzsxWRFn-1SyC9gM4-QC4ptMFDNhUFAAAAKQ==",
      "clientDataJSON": "eyJjaGFsbGVuZ2UiOiJTeTYzQldla285blFsYzVOQmVWcE1BWjFtQ0hvdzBXUXVFeDRJU2xuQzR3IiwiY3Jvc3NPcmlnaW4iOmZhbHNlLCJvcmlnaW4iOiJodHRwczovL2Z1c2lvbmF1dGguaW8iLCJ0eXBlIjoid2ViYXV0aG4uZ2V0In0=",
      "signature": "MEUCIQDUwlDp9aNcYQmvpVGLJ35H8lRWjWsfjVsfPf_5HhY3GwIgahBhISBxv82ZS4ll8TZiJp5bIN2CGx_-VjUymfzKqGA=",
      "userHandle": "NzAzZmUyZDItMmQzOS00Y2I3LWI3NmQtMGI5OTE4ZWQyNDU3"
    },
    "type": "public-key"
  },
  "origin": "https://auth.piedpiper.com",
  "rpId": "piedpiper.com"
}Response
The response for this API contains the WebAuthn passkey used to complete the assertion.
Response Codes| Code | Description | 
|---|---|
| 200 | The request was successful. The response will contain a JSON body. | 
| 400 | The request was invalid and/or malformed. The response will contain an Errors JSON Object with the specific errors. This status will also be returned if a paid FusionAuth license is required and is not present. | 
| 500 | There was an internal error. A stack trace is provided and logged in the FusionAuth log files. The response will be empty. | 
| 503 | The search index is not available or encountered an exception so the request cannot be completed. The response will contain a JSON body. | 
Response Body
credential.algorithmLongThe identifier for the signing algorithm used with the passkey. These values are defined by the IANA COSE Algorithms registry. FusionAuth supports a subset of these algorithms.
Supported algorithms
| Name | Value | Description | 
|---|---|---|
| RS256 | -257 | RSASSA-PKCS1-v1_5 using SHA-256 | 
| RS384 | -258 | RSASSA-PKCS1-v1_5 using SHA-384 | 
| RS512 | -259 | RSASSA-PKCS1-v1_5 using SHA-512 | 
| PS256 | -37 | RSASSA-PSS w/ SHA-256 | 
| PS384 | -38 | RSASSA-PSS w/ SHA-384 | 
| PS512 | -39 | RSASSA-PSS w/ SHA-512 | 
| ES256 | -7 | ECDSA w/ SHA-256 | 
| ES384 | -35 | ECDSA w/ SHA-384 | 
| ES512 | -36 | ECDSA w/ SHA-512 | 
credential.attestationTypeStringThe type of attestation provided when the passkey was registered. Passkeys registered in FusionAuth will have a value of none. Imported passkeys may have another value.
credential.authenticatorSupportsUserVerificationBooleanIndicates whether this authenticator supports user verification. User verification ensures that the user is authorized to use the authenticator.
This value is currently determined by whether user verification occurred during the registration of this passkey rather than by other means, such as examining FIDO authenticator metadata.
credential.credentialIdStringThe credential Id generated by the authenticator is stored as a base64url-encoded string. This value is used by authenticators to look up a passkey during an authentication ceremony and to prevent multiple passkeys from being registered on the same authenticator for a single user.
credential.dataObjectAn object that can hold any information about the passkey that should be persisted.
credential.discoverableBooleanIndicates whether the passkey is “client-side discoverable.” Discoverable passkeys can be used in authentication ceremonies without first identifying the user (e.g. by requiring the user to complete a form field).
credential.displayNameStringThe display name for the passkey selected during registration. This value should have been selected by the user.
credential.idUUIDThe unique identifier for this passkey.
credential.insertInstantLongThe instant that the passkey was added to the FusionAuth database.
credential.lastUseInstantLongThe instant that the passkey was last used to complete a WebAuthn ceremony.
credential.nameStringA unique name meant to disambiguate passkeys with the same credential.displayName .
credential.publicKeyStringThe passkey’s public key, encoded in PEM format.
credential.relyingPartyIdStringThe Relying Party Id used at the time the passkey was registered.
credential.signCountIntegerA signature counter for the passkey. The signature count can be used by a Relying Party to identify a cloned or malfunctioning authenticator.
credential.tenantIdUUIDThe Id of the tenant to which this passkey belongs.
credential.transportsArray<String>A list of transport types supported by the authenticator that generated the passkey. This value is used as a hint to help identify eligible authenticators during a WebAuthn ceremony.
FusionAuth treats the list of transports as strings to maximize authenticator compatibility. These values are used as hints during WebAuthn ceremonies and missing, extra, or unexpected values should not cause a ceremony to fail. Some common values are:
- internal- the authenticator is integrated with the client device
- usb- the authenticator can be contacted over USB
- nfc- the authenticator can be contacted over Near Field Communication (NFC)
- ble- the authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy, or BLE)
- cable- “cloud-assisted” BLE. This transport is used for Android devices acting as an authenticator connected to the computer over Bluetooth
- hybrid- replacement for the- cabletransport
credential.userAgentStringThe user agent at the time the passkey was registered. This can be useful for troubleshooting purposes.
credential.userIdUUIDThe Id of the user that this passkey belongs to.
Example Response JSON
{
  "credential": {
    "algorithm": -7,
    "attestationType": "none",
    "authenticatorSupportsUserVerification": true,
    "credentialId": "HdN9wqP9mqOonacmiM2gIjASFYg",
    "data": {},
    "displayName": "Chrome Touch ID",
    "name": "richard@fusionauth.io",
    "id": "c664318a-2384-4c35-9475-9a200e1d3b72",
    "insertInstant": 1668011701792,
    "discoverable": false,
    "lastUseInstant": 1668021630599,
    "publicKey": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEz9DI9AQfZn1aDJG5sw3Ckl7SoQ7E\nLPElDoJMijphvVigTcNMTc8H9Xptl8B20QHMOXGTzaUxLGNY1c8yhw9VVA==\n-----END PUBLIC KEY-----",
    "relyingPartyId": "piedpiper.com",
    "signCount": 41,
    "tenantId": "30663132-6464-6665-3032-326466613934",
    "transports": [
      "internal"
    ],
    "userId": "703fe2d2-2d39-4cb7-b76d-0b9918ed2457"
  }
}