pollPushStatus response

pollPushStatus
output fields
provides the details about the
pollPushStatus
output fields:
pollPushStatus
output fields
Input Field
Required?
Type
Purpose
requestID
Y
String
A unique identifier of the request for the enterprise application. This identifier may be useful for troubleshooting purposes.
status
Y
String
Unique status code. 0000=Success. Any other value is an error.
statusMessage
Y
String
Message corresponding to the status of the request. If the status is not 0000 (success), the message is an error message.
authnTime
N
Datetime
Date and time stamp identifying when the VIP mobile push transaction was approved or denied by the user (in GMT format). Only returned if the transaction was approved or denied.
transactionStatus
Y
List
Status of the mobile push transaction previously sent using either
authenticateUserWithPush
or
authenticateCredentials
.
deviceInfo
Y
String
Includes as much of the following information about the health status and security status of the device as can be captured.
  • os
    : (iOS or Android) The device operating system
  • osVersion
    : (iOS or Android) The version of the device operating system
  • vipAccessVersion
    : (iOS or Android) The version of
    VIP
    Access app installed
  • malwareDetected
    : (Android only) Returns
    true
    if malware is present on the device. Not returned if malware is not present.
  • rootDetected
    : (iOS or Android) Returns
    true
    if the device has been rooted or jailbroken. Not returned if the device has not been rooted or jailbroken.
The
deviceInfo
field is only returned if all of the following conditions are met:
  • The
    authenticateUsersWithPush
    or
    authenticateCredentials
    call includes the
    includeDeviceInfo
    flag.
  • The user has approved or rejected the push notification.
  • A supported version of the
    VIP
    Access client is installed on the user's device to capture the information.
payloadSignature
N
string
If you have integrated
VIP
SDK version 3.0.2 or later with your client app, this is the signature of the following information in one concatenated string. The signature is generated by the client app using the private key on the mobile device.
  1. The clear text version of the display message you sent in the
    EncryptedDisplayParameters
    field of the
    authenticateCredentials
    call.
  2. The credential ID
  3. The transaction ID returned in the authenticateCredentials response
  4. Approval status (Y or N)
To verify the integrity of the encryption, validate the signature using the same text string and the public key returned from the
getCredentialInfo
or
getUserInfo
call.
pubkeyHash
N
If you have integrated
VIP
SDK version 3.0.2 or later with your client app, this is a copy of the
pubkeyHash
value that you sent in the
authenticateCredentials
call.
algName:
N
If you have integrated
VIP
SDK version 3.0.2 or later with your client app, this is algorithm name that you sent in the
authenticateCredentials
call.
Example pollPushStatus response
<?xml version="1.0"?> <S:Envelope xmlns:S="http://schemas.xmlsoap.org/soap/envelope/"> <S:Body> <PollPushStatusResponse xmlns="https://schemas.vip.symantec.com"> <requestId>POLLREQ_12983708234</requestId> <status>0000</status> <statusMessage>Success</statusMessage> <transactionStatus> <transactionId>40362502133c5033</transactionId> <status>0000</status> <statusMessage>Success</statusMessage> <detail>7000</detail> <detailMessage>ba34bd6be2a7c08f</detailMessage> </transactionStatus> <transactionStatus> <transactionId>ba34bd6be2a7c08f</transactionId> <status>7001</status> <statusMessage>Mobile push request in progress </statusMessage> <authnTime>2024-08-28T18:16:38.264Z</authnTime> <deviceInfo> <Key>os</Key> <Value>Android</Value> </deviceInfo> <deviceInfo> <Key>osVersion</Key> <Value>7.0</Value> </deviceInfo> <deviceInfo> <Key>vipAccessVersion</Key> <Value>4.1.1</Value> </deviceInfo> <payloadSignature> <signatureValue>OTj4jch6K8Y8gDClePGQHaROf66YJEVk ke8nj47f76hjbuN9Jvndu5I0xbDwdauRb5FH/cndFPZEwYxv 1EW05B5vt4LWVq36A02zMFBsJINXstElcFL2H+vZ2b3hn06R CahMf4yKZ5GGA33hy1++mIm8YI7t8wtj27WKSA/YjxoMtnJx /ChhB/mzJNtTSv9gP2HE5Krr/eltlKhm9c9nmsAal26ogqa4 klBwdjli6cn82sypP/fqlGRqqxBsG/uGNw7V7ib3yiBVu6hN ugKjuyU/6TBR+W79UdzXDgcOUQ==</signatureValue> <pubkeyHash>++mIm8YI7t8wtj27WKSA/YjxoMtnJxdefgt5 W05B5vt4LWVq36A02zMFBsvsf4ybN78g9gh9gNUtg7bb76bT mzJNtTSv9gP2HE5Krr/eltlKhm9c9nmG</pubkeyHash> <algName>RSA_PKCS1_PADDING</algName> </transactionStatus> </PollPushStatusResponse> </S:Body> </S:Envelope>