Remove Multi-Factor U2F​
Remove the configured Universal-Second-Factor (U2F) as a factor from the user. U2F is a device-dependent factor like FingerPrint, Windows-Hello, etc.
Path Parameters
userId string required
tokenId string required
Header Parameters
x-zitadel-orgid string
The default is always the organization of the requesting user. If you like to get a user from another organization include the header. Make sure the requesting user has permission in the requested organization.
Responses
- 200
- default
OK
application/json
application/grpc
application/grpc-web+proto
Schema
Example (from schema)
Schema
details object
{
"details": {
"sequence": "2",
"creationDate": "2024-05-24T19:39:28.819Z",
"changeDate": "2024-05-24T19:39:28.819Z",
"resourceOwner": "69629023906488334"
}
}
Schema
Example (from schema)
Schema
details object
{
"details": {
"sequence": "2",
"creationDate": "2024-05-24T19:39:28.819Z",
"changeDate": "2024-05-24T19:39:28.819Z",
"resourceOwner": "69629023906488334"
}
}
Schema
Example (from schema)
Schema
details object
{
"details": {
"sequence": "2",
"creationDate": "2024-05-24T19:39:28.819Z",
"changeDate": "2024-05-24T19:39:28.819Z",
"resourceOwner": "69629023906488334"
}
}
An unexpected error response.
application/json
application/grpc
application/grpc-web+proto
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
DELETE /users/:userId/auth_factors/u2f/:tokenId
Authorization
name: OAuth2type: oauth2scopes:openid,urn:zitadel:iam:org:project:id:zitadel:aud
flows: { "authorizationCode": { "authorizationUrl": "$CUSTOM-DOMAIN/oauth/v2/authorize", "tokenUrl": "$CUSTOM-DOMAIN/oauth/v2/token", "scopes": { "openid": "openid", "urn:zitadel:iam:org:project:id:zitadel:aud": "urn:zitadel:iam:org:project:id:zitadel:aud" } } }
Request
Request
curl / cURL
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
python / requests
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
go / native
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
nodejs / axios
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
ruby / Net::HTTP
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
csharp / RestSharp
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
php / cURL
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
java / OkHttp
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
powershell / RestMethod
curl -L -X DELETE 'https://$CUSTOM-DOMAIN/management/v1/users/:userId/auth_factors/u2f/:tokenId' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'