Skip to main content

Pass-through authenticator

A pass-through authenticator uses HTTP connectors to interact with external services through APIs. Authentication is determined by the API response values. Only responses with a status code of 200 proceed to the next evaluation flow.

Pass-through authenticators cannot be assigned directly to users. Instead, they are automatically applied based on the groups users belong to and the policies associated with those groups.

Pass-through authenticators can handle multiple requests using both a Challenge Connector and an Authenticate Connector, or a single request using only the Authenticate Connector. In all cases, the Authenticate Connector is required.

About HTTP connectors

An HTTP Connector is an IDaaS UI component used to configure and send requests to external APIs. These requests include headers, a request body, and authorization details. The API response values are captured as result items and evaluated by IDaaS features such as the External Risk Engine and pass-through authenticators.

Prerequisites

To follow the examples in this guide, an IDaaS user and group are required. The examples reference pass-through-user and pass-through-group.

Example 1: Pass-through authenticator without a Challenge Connector

These steps provide an example of how to configure a pass-through authenticator without a Challenge Connector using the Entrust Identity Verification API. In this example, IDaaS calls the Entrust IDV API to get an applicant record during authentication.

Step 1: Create a pass-through authentication definition

Create a pass-through authentication definition named Only-Auth-PTD without including a Challenge HTTP Connector.

  1. Complete the configuration on the Pass-through Authenticator Definition page (Home > Configuration > Pass-through Authenticator Definition).

  2. Set the Pass-through Authenticator Definition Name to Only-Auth-PTD.

  3. Leave the Challenge HTTP Connector field blank.

    Only-Auth-PTD pass-through authentication definition page with a blank Challenge HTTP Connector field

  4. Configure the Authenticate Connector Details to define the external service API call that IDaaS executes during the authentication flow. Define the Authenticate Connector as follows:

    • Repository: https://documentation.identity.entrust.com
    • External API: https://api.eu.onfido.com/v3.6/applicants/
    • Authorization header: Token token=YOUR_API_TOKEN

    This request gets an applicant record in Entrust IDV using applicants ID provided in the URL path. In this example, a result item is configured: Applicant ID (id).

    Authenticate Connector configuration showing the Entrust IDV get applicant API and result items

  5. Define the Authenticate Connector Success Criteria. The specified value is compared to the value returned when the connector runs. If the two values match, the connector is considered successful.

    Authenticate Connector Details showing success criteria configuration for the Only-Auth-PTD definition

Step 2: Create a group policy and assign a pass-through group

Create a group policy for pass-through authentication and assign it to Only-Auth-PTD.

  1. Complete the configuration on the Group Policies page (Home > Policies > Group Policies).

  2. Set the group policy Name to pass-through-group-policy.

  3. Set the Group to pass-through-group.

  4. Set the Setting Categories to Pass-through Authenticator.

  5. Set the Pass-through Authentication Definition to Only-Auth-PTD.

    Group policy pass-through-group-policy configured with the Only-Auth-PTD pass-through authentication definition

Step 3: Create a custom authentication flow

Pass-through authentication requires a custom authentication flow. The following example shows an authentication flow that uses pass-through authentication as the default second-factor authenticator.

Create a custom authentication flow on the Authentication Flows page (Home > Security > Authentication Flows).

Custom authentication flow configured with pass-through authentication as the default second-factor authenticator

Step 4: Create an authentication API and a resource rule

Create an authentication API and a resource rule that uses the custom authentication flow you created in Step 3: Create a custom authentication flow.

Go to Home > Security > Authentication Flows to complete this configuration.

Authentication API and resource rule configured to use the custom pass-through authentication flow

Step 5: Use the IDaaS Authentication API to perform pass-through authentication

To use the IDaaS Authentication API for pass-through authentication, complete the following steps:

  1. Call the Query API using the user ID of pass-through-user. The response includes PASSTHROUGH as the authenticator in the authenticatorTypes field.

    Query API response showing PASSTHROUGH in the authenticatorTypes field

  2. Call the User Challenge API. Because there is no challenge connector, the response has a null value for PassthroughAuthenticationResponse in the result.

    User Challenge API response with a null PassthroughAuthenticationResponse value

  3. Call the User Authenticate API to complete the authentication process. This API includes a dedicated attribute, passthroughAuthenticatorParms, which is a placeholder to the Authenticate Connector. The response returns details of the pass-through Authenticate Connector in the PassthroughAuthenticationResponse object, including a list of PassthroughAuthenticationResultItems. In this example, the returned items include id (applicant ID).

    User Authenticate API response showing PassthroughAuthenticationResponse with PassthroughAuthenticationResultItems


Example 2: Pass-through authenticator with a Challenge Connector

These steps demonstrate how to configure a pass-through authenticator that uses both a Challenge Connector and an Authenticate Connector using the Entrust Identity Verification API.

In this example:

  • The Challenge Connector gets an applicant record in Entrust IDV and returns an applicant_id.
  • The Authenticate Connector uses the applicant_id from the challenge step to get an applicant's consents.

Step 1: Create a pass-through authentication definition

  1. Complete the configuration on the Pass-through Authenticator Definition page (Home > Configuration > Pass-through Authenticator Definition).

  2. Set the Pass-through Authenticator Definition Name to Onfido-Challenge-And-Authenticate-PTD.

    Onfido-Challenge-And-Authenticate-PTD pass-through authentication definition page

  3. Define the Challenge HTTP Connector as follows:

    • Repository: https://documentation.identity.entrust.com
    • External API: https://api.eu.onfido.com/v3.6/applicants/
    • Authorization header: Token token=YOUR_API_TOKEN

    This request gets an applicant record in Entrust IDV using applicants ID provided in the URL path. A result item id is configured.

    Challenge HTTP Connector configuration showing the Entrust IDV create applicant API and result items

  4. Define the Challenge Connector Success Criteria. The specified value is compared to the actual value returned when the connector runs. If the two values match, the connector is considered successful. In this example, the comparison is made against the id result item.

    Challenge Connector Success Criteria configured to compare the applicant ID result item

  5. Define the Authenticate Connector Details to specify the external API call that IDaaS executes during the authentication flow:

    • Repository: https://documentation.identity.entrust.com
    • External API: https://api.eu.onfido.com/v3.6/workflow_runs/
    • Authorization header: Token token=YOUR_API_TOKEN

    This request gets an applicant's list of consents. A result item name is configured.

    Authenticate Connector configuration showing the Entrust IDV create workflow run API and result items

  6. Define the Authenticate Connector Success Criteria. The specified value is compared to the value returned when the connector runs. If the two values match, the connector is considered successful.

    Authenticate Connector Success Criteria configuration for the Onfido-Challenge-And-Authenticate-PTD definition

Step 2: Create a group policy and assign a pass-through group

Create a group policy for pass-through authentication and assign it to Onfido-Challenge-And-Authenticate-PTD.

  1. Complete the configuration on the Group Policies page (Home > Policies > Group Policies).

  2. Set the group policy Name to pass-through-group-policy.

  3. Set the Group to pass-through-group.

  4. Set the Setting Categories to Pass-through Authenticator.

  5. Set the Pass-through Authentication Definition to Onfido-Challenge-And-Authenticate-PTD.

    Group policy pass-through-group-policy configured with the Onfido-Challenge-And-Authenticate-PTD pass-through authentication definition

Step 3: Create a custom authentication flow

Pass-through authentication requires a custom authentication flow. The following example demonstrates a flow that uses pass-through authentication as the default second-factor authenticator.

Create a custom authentication flow on the Authentication Flows page (Home > Security > Authentication Flows).

Custom authentication flow configured with pass-through authentication as the default second-factor authenticator

Step 4: Create an authentication API and a resource rule

Create an authentication API and a resource rule that uses the custom authentication flow you created in Step 3: Create a custom authentication flow.

Go to Home > Security > Authentication Flows to complete this configuration.

Authentication API and resource rule configured to use the custom pass-through authentication flow

Step 5: Use the IDaaS Authentication API to perform pass-through authentication

To use the IDaaS Authentication API for pass-through authentication, complete the following steps:

  1. Call the Query API with the user ID of pass-through-user. The response includes PASSTHROUGH as the authenticator in the authenticatorTypes field.

    Query API response showing PASSTHROUGH in the authenticatorTypes field

  2. Call the User Challenge API. The response returns details of the pass-through Challenge Connector in the PassthroughAuthenticationResponse object, including a list of PassthroughAuthenticationResultItems. In this example, id (applicant ID) is returned as passthroughAuthenticationResultItems.

    User Challenge API response showing PassthroughAuthenticationResultItems with applicant id

  3. Call the User Authenticate API to complete the authentication process. The response returns details of the pass-through Authenticate Connector in the PassthroughAuthenticationResponse object, including a list of PassthroughAuthenticationResultItems. In this example, the returned items include the list of consents of an applicant.

    User Authenticate API response showing PassthroughAuthenticationResultItems with name