User Login Id Duplicate Create
User Login Id Duplicate Create
This feature is only available in the Enterprise plan. Please visit our pricing page to learn more.
This event is generated when a request to create a user with a login Id (email or username) which is already in use has been received.
Event typeuser.loginId.duplicate.create
Event Scope
Prior to version 1.37.0 this was a tenant or application scoped event. It can be sent to all applications or to one or more specified applications.
The ability to limit the generation of an event for only certain applications is legacy functionality and is removed as of version 1.37.0. In earlier versions, you almost certainly want to enable this event at the tenant level and optionally filter on the tenantId when consuming the event.
In version 1.37.0 and later this is a tenant scoped event. It can be sent to all tenants or to one or more specified tenants. Those tenants will only be sent events related to their tenant. You can optionally also filter on the applicationId when consuming the event.
Transaction Compatibility
This event is non-transactional. The operation will succeed regardless of the webhook response status code.
Event Body
The instant that the event was generated.
The email address that is already in-use.
The username that is already in-use.
The existing user that is using the requested email address or username. See the Users API for property definitions and example JSON.
The unique Id of the event. You may receive an event more than once based upon your transaction settings. This Id may be used to identify a duplicate event.
The unique tenant identifier. This value may not be returned if not applicable.
The event type, this value will always be user.loginId.duplicate.create
.
The user that on the create request that attempted to use a duplicate login Id. See the Users API for property definitions and example JSON.
Example Event JSON
{
"event": {
"createInstant": 1629436630996,
"duplicateEmail": "ceo@example.com",
"existing": {
"active": true,
"birthDate": "1981-06-04",
"connectorId": "e3306678-a53a-4964-9040-1c96f36dda72",
"data": {
"Company": "Aviato",
"foobar": "baz",
"user_type": "iconoclast"
},
"email": "ceo@example.com",
"firstName": "Ehrlich",
"id": "9ea5b4b6-14df-44af-8a5e-c6e4bcb31ced",
"insertInstant": 1625783576299,
"lastLoginInstant": 1629232057071,
"lastName": "Bachman",
"lastUpdateInstant": 1628024498202,
"passwordChangeRequired": false,
"passwordLastUpdateInstant": 1625783576327,
"registrations": [
{
"applicationId": "d23ecde6-0661-44a7-808b-a23013e6dfdc",
"id": "1a01a91e-9861-490f-b4a0-5f91804fa06f",
"insertInstant": 1626116367082,
"lastLoginInstant": 1628102540879,
"lastUpdateInstant": 1626116367082,
"roles": [
"USER"
],
"usernameStatus": "ACTIVE",
"verified": true
},
{
"applicationId": "3c219e58-ed0e-4b18-ad48-f4f92793ae32",
"id": "22e6a9b2-1d37-463f-8cba-1bd78aa74345",
"insertInstant": 1625783576372,
"lastLoginInstant": 1629232057071,
"lastUpdateInstant": 1625783576372,
"roles": [
"admin"
],
"usernameStatus": "ACTIVE",
"verified": true
}
],
"tenantId": "a743e2cd-55bb-789c-b076-8846fdd3a51f",
"twoFactor": {},
"usernameStatus": "ACTIVE",
"verified": true
},
"id": "faa4669c-8cfd-48fa-a6dd-9a1c1f783eff",
"info": {
"ipAddress": "71.229.161.136",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36"
},
"type": "user.loginId.duplicate.create",
"user": {
"active": true,
"birthDate": "1990-12-22",
"connectorId": "e3306678-a53a-4964-9040-1c96f36dda72",
"email": "ceo@example.com",
"firstName": "Nelson",
"id": "9ea5b4b6-14df-44af-8a5e-c6e4bcb31ced",
"insertInstant": 1625783576511,
"lastLoginInstant": 1625783576511,
"lastName": "Bighetti",
"lastUpdateInstant": 1628024498202,
"passwordChangeRequired": false,
"passwordLastUpdateInstant": 1625783576327,
"tenantId": "a743e2cd-55bb-789c-b076-8846fdd3a51f",
"twoFactor": {},
"usernameStatus": "ACTIVE",
"verified": true
}
}
}