These endpoints allow administrators to manage user accounts across the Alphabet platform. Every endpoint underDocumentation Index
Fetch the complete documentation index at: https://alphabet-06152314.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
/api/v1/admin requires an authenticated session with the AdminOnly authorization policy. Requests without a valid bearer token or without the required role will be rejected.
Base path: /api/v1/admin/users
POST /api/v1/admin/users
Creates a new user account directly from the administration area, bypassing self-registration. This is useful for provisioning back-office, support, or managed accounts. Authorization:Bearer <accessToken> — AdminOnly
Request body
The email address for the new account. Must be unique.
The initial password. Must meet the configured complexity requirements.
The user’s first name.
The user’s last name.
The role to assign to the new account (e.g.,
"Support", "Admin"). Accepted values depend on your role configuration.Responses
201 Created —UserDto
The unique identifier (GUID) for the created user.
The registered email address.
The user’s first name.
The user’s last name.
ProblemDetails — Creation failed (e.g., email already in use, password too weak, invalid role).
Example
GET /api/v1/admin/users
Returns the full list of user accounts visible to administrators. Authorization:Bearer <accessToken> — AdminOnly
No request body.
Responses
200 OK —UserDto[]
An array of user objects. Each item contains userId, email, firstName, and lastName.
GET /api/v1/admin/users/
Returns detailed information for a single user account, including account status, lockout state, two-factor configuration, and audit-friendly timestamps. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user to retrieve.
Responses
200 OK —AdminUserDetailDto
The user’s unique identifier.
The registered email address.
The user’s first name.
The user’s last name.
The list of roles assigned to the user.
Whether the account is currently locked.
ISO 8601 timestamp of when the lockout expires, or
null if the account is not locked or locked indefinitely.Whether MFA is active on the account.
Whether the user’s email address has been verified.
ISO 8601 timestamp of when the account was created.
ProblemDetails — User not found.
POST /api/v1/admin/users//lock
Locks the specified user account for a fixed duration or indefinitely. A locked account cannot sign in until it is unlocked. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user to lock.
Request body
How long to lock the account, in minutes. Pass
0 to lock indefinitely.Responses
200 OK — Account locked. 400 Bad Request —ProblemDetails — Lock failed.
Example
POST /api/v1/admin/users//unlock
Clears the lockout state for a previously locked account, allowing the user to sign in again. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user to unlock.
Responses
200 OK — Account unlocked. 400 Bad Request —ProblemDetails — Unlock failed.
POST /api/v1/admin/users//reset-password
Resets the user’s password immediately without requiring the current password. This endpoint is intended for administrator-led account recovery and support scenarios. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user whose password should be reset.
Request body
The new password. Must meet the configured complexity requirements.
Responses
200 OK — Password reset successfully. 400 Bad Request —ProblemDetails — Reset failed (e.g., password does not meet complexity requirements).
This endpoint does not require the user’s current password. It generates an internal reset token and applies the new password immediately. Consider notifying the user after performing an admin-initiated reset.
POST /api/v1/admin/users//send-reset-link
Creates a password reset token and emails a reset link to the user’s registered address using the configured communication provider. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user to send the reset link to.
Responses
200 OK — Reset link sent. 400 Bad Request —ProblemDetails — Send failed (e.g., user not found or email delivery error).
POST /api/v1/admin/users//force-logout
Revokes all refresh tokens and updates the user’s security stamp, immediately invalidating all active sessions across every device and client. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user to force out.
Responses
200 OK — All sessions revoked. 400 Bad Request —ProblemDetails — Force logout failed.
Existing access tokens remain technically valid until they expire naturally (15 minutes by default). Only refresh tokens are revoked immediately. To prevent re-authentication, combine this endpoint with an account lock if needed.
GET /api/v1/admin/users//audit-logs
Returns security and administrative activity for the selected user, including sign-in attempts, password actions, and account-management operations. Authorization:Bearer <accessToken> — AdminOnly
Path parameters
The GUID of the user whose audit logs to retrieve.
Query parameters
The maximum number of records to return.
The number of records to skip before returning results. Use with
take for pagination.Responses
200 OK —AuditLogDto[]
An array of audit log entries for the user. Each entry records the event type, timestamp, and relevant details for the action.