Secret
Secrets are similar to passwords but auto-generated by the authorization server and of a certain minimum length. The main purpose is its use as a client secret for client authentication, though it could also be used by any account type other than a client.
Default Secret Policy
minimum 43 characters length
maximum 43 characters length
no password expiration / no required password change
Secrets are case-sensitive.
The default maximum failed attempts before the factor gets temporarily disabled is 5. The factor will auto-unlock after 300 seconds (5 minutes). The counter resets to 0 on each successful login.
Secrets are stored hashed (Argon2id).
Signup
To enroll a secret factor, optionally a label (label
parameter) is provided. The secret value itself is auto-generated by the Quasr service.
Signup with secret factor
POST
https://{tenant_id}.api.quasr.io/factors/signup
Request Body
label
String
Label
id*
String
Factor ID
input
String
Secret
Login
To validate a secret factor, the actual secret (input
parameter) is provided.
Validating an secret factor
POST
https://{tenant_id}.api.quasr.io/factors/login
Request Body
input*
String
Password
id*
String
Enrollment ID
Factor Creation & Configuration
The Password Factor allows for the following parameters and config options:
subtype
"secret:password"
label
<string>
status
"ENABLED" | "DISABLED"
"DISABLED"
score
<positive int>
1
config.regex
regex
"^.{15,100}"
config.unique
true | false
false
config.case_sensitive
true | false
true
config.require_validation_for_enablement
true | false
false
config.threshold
0-4
2
The following API sample calls create an Secret factor labelled "Client Secret" with a score of 6.
GraphQL Example
Node.js Example
Recommended Password Managers
Secrets should be long and complex, which makes them hard or impossible to remember. The use of a password manager is recommended to keep them safe. Here is a list of password managers that we can recommend (Quasr has no affiliation with these vendors).
Additional Resources
Last updated