Privicore
  1. Verified authenticator
Privicore
  • Privicore API
  • Utility
    • Utility
    • Check server health
      GET
    • Request command id status
      GET
  • Profile
    • Profile Model and Authentication Workflow
    • Register new profile
      POST
    • Authenticate
      POST
    • Retrieve profile id
      GET
    • Change password
      POST
    • Generate qr token for authorization
      POST
    • Reauthorize authorization token
      POST
    • Revoke authorization token
      POST
    • Retrieve token expiry
      POST
  • OAuth Application
    • OAuth Application Management
    • Register OAuth Application
      POST
    • Retrieve OAuth app configuration
      POST
    • Request OAuth app authorization code
      GET
    • Retrieve OAuth app authorization code
      POST
    • Obtain OAuth app access token
      POST
    • OAuth application list
      GET
    • Retrieve OAuth application scope
      GET
    • Refresh OAuth app access token
      POST
  • Public key
    • Public and Private Key Management
    • Generate your private and public keys
    • Register public key
    • Retrieve public key
    • Retrieve CAB public key
  • Data Token
    • Data Token Management
    • Reserve token space
    • Retrieve temporary data token
    • Exchange data for token
    • Upstream file via stream auth
    • Request data via token
    • Download data
    • Configure information security risk meta
    • Configure file meta
    • List data tokens
    • Update data token
    • Delete data
  • Device
    • Device Management
    • Request unique identifier (i.e. Register new device)
    • Retrieve unique identifier
    • Retrieve profile devices
    • Configure device meta
    • Approve device
    • Reject device
    • Retrieve device configuration
    • Remove device
  • Storage
    • Storage Device Management
    • Register storage device
    • List storage devices
    • Synchronize device
    • Remove storage
  • Verified authenticator
    • Authenticator and Voting Management
    • Register authenticator
      POST
    • List verified authenticators
      GET
    • Retrieve voting strategy
      GET
    • Set quorum size
      POST
    • Set quorum strategy
      POST
    • Set voting time limit
      POST
    • Set maximum voting attempts
      POST
    • Remove authenticator
      POST
    • Register voting configuration
      POST
    • Update voting configuration
      POST
    • List voting configurations
      GET
    • Retrieve voting configuration
      GET
  • Policy
    • Policy Management
    • List policy templates
    • Register policy
    • List active policies
    • List inactive policies
    • Activate policy
    • Deactivate policy
    • Delete policy
    • List registered policies
    • Retrieve registered policy
  • Voting
    • Voting Operations
    • Create voting
    • Check pool status
  • Websockets
    • WebSocket Integration
    • Establishing Connection
    • Join Channel
    • Leave Channel
    • Command Status Messages
    • Data Download Messages
  • Schemas
    • Response
      • CommandAccepted
      • Unauthorized
      • ValidationErrors
    • Schemas
    • profileId
    • deviceIdentifier
    • directoryId
    • directoryName
    • directoryShortName
    • givenName
    • familyName
    • createdAt
    • meta
  1. Verified authenticator

Retrieve voting strategy

GET
/verified-authenticator/retrieve-strategy

Overview#

Retrieve the current voting strategy configuration for your profile's Authenticators.

Retrieve Voting Strategy#

Endpoint: GET /verified-authenticator/retrieve-strategy
Authentication: Required (Authorization token obtained from the step)

Use Case#

Use this endpoint to retrieve the voting strategy currently configured for your profile. The voting strategy determines how votes from Authenticators are counted and when polls succeed or fail. This includes:
Strategy type (unanimous, majority, single approval, threshold)
Quorum size requirements
Voting time limits
Maximum voting attempts
Understanding your current voting strategy is essential for:
Verifying security posture for different operation types
Troubleshooting failed voting workflows
Planning voting configuration changes
Documenting authorization requirements
Returns the active voting strategy configuration
Strategy applies to all polls unless overridden by specific voting configurations
Use this information to understand authorization requirements for operations

Request

Header Params

Request Code Samples

Shell
JavaScript
Java
Swift
Go
PHP
Python
HTTP
C
C#
Objective-C
Ruby
OCaml
Dart
R
Request Request Example
Shell
JavaScript
Java
Swift
curl --location --request GET 'https://sandbox.privicore.com:9009/verified-authenticator/retrieve-strategy' \
--header 'X-DPT-AUTHORIZATION;'

Responses

🟢200OK
application/json
OK
Body

Example
{
    "votingTime": 60,
    "votingAttempts": 1,
    "quorumSize": 1,
    "quorumSizeNeeded": 1,
    "quorumStrategy": "unanimous",
    "createdAt": "2025-02-10T10:03:06+00:00"
}
🟠401Unauthorized
Modified at 2025-12-30 11:23:49
Previous
List verified authenticators
Next
Set quorum size
Built with