Reset the password of a guest

This API helps you to reset a guest's password.

When you invoke this API, a temporary code is generated that does not actually replace a guest's existing password. The temporary code acts as a one-time password (OTP), by using which guests can validate their update password request.

This API also takes care of scenarios where there might be multiple accounts found with the same username. In that case, the guest's first_name is provided so that the appropriate account can be identified and the reset password email can then be sent to that user.

This API returns either a success parameter that specifies that the password-reset process was successful or an error object if there is any error.

Notes :

  1. You cannot invoke this API by using the tokens that are generated from the guest credentials.
  2. Only those employees who have a role that has permissions to edit a guest’s information, are allowed to access this API.
  3. A password reset email or text message is not sent if Zenoti is unable to identify a unique guest with the provided email, phone, or first_name details.

Response Details

NameTypeDescription
successboolIndicates whether the password-reset process was successful.
user_idguidUnique 32-character identifier of the guest.
user_countintIndicates the number of users identified with the provided email, phone, and first_name details.
matched_withenumIndicates to which details of the guest did the request match: 0 - no match, 1 - username, 2 - email, and 3 - mobile.
verification_codestringThe temporary code or one-time password (OTP) that is sent to the guest's registered email ID after resetting the password.
verification_idguidUnique 32-character verification identifier of the guest.
errorobjectObject that contains error message and error code details. For more information, refer to the error Object table.

error Object

codemessage
400Bad Request.
401Unauthorized.
500Internal Server error.
404User Not Found.
Language
Credentials
Header
Click Try It! to start a request and see the response here!