@authrim/core 0.1.4 → 0.1.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +2 -2
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +107 -203
- package/dist/index.d.ts +107 -203
- package/dist/index.js +2 -2
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.d.cts
CHANGED
|
@@ -4012,205 +4012,6 @@ declare class FrontChannelLogoutUrlBuilder {
|
|
|
4012
4012
|
validateRequest(url: string | URL, expected?: FrontChannelLogoutValidationOptions): FrontChannelLogoutValidationResult;
|
|
4013
4013
|
}
|
|
4014
4014
|
|
|
4015
|
-
/**
|
|
4016
|
-
* JWT Utilities
|
|
4017
|
-
*
|
|
4018
|
-
* Note: This module only provides decoding (parsing) functionality.
|
|
4019
|
-
* JWT signature verification MUST be performed by the server.
|
|
4020
|
-
* Never trust decoded JWT claims without server-side verification.
|
|
4021
|
-
*/
|
|
4022
|
-
|
|
4023
|
-
/**
|
|
4024
|
-
* JWT Header
|
|
4025
|
-
*/
|
|
4026
|
-
interface JwtHeader {
|
|
4027
|
-
alg: string;
|
|
4028
|
-
typ?: string;
|
|
4029
|
-
kid?: string;
|
|
4030
|
-
[key: string]: unknown;
|
|
4031
|
-
}
|
|
4032
|
-
/**
|
|
4033
|
-
* Decoded JWT structure
|
|
4034
|
-
*/
|
|
4035
|
-
interface DecodedJwt<T = Record<string, unknown>> {
|
|
4036
|
-
header: JwtHeader;
|
|
4037
|
-
payload: T;
|
|
4038
|
-
signature: string;
|
|
4039
|
-
}
|
|
4040
|
-
/**
|
|
4041
|
-
* Decode a JWT without verifying the signature
|
|
4042
|
-
*
|
|
4043
|
-
* WARNING: This function does NOT verify the JWT signature.
|
|
4044
|
-
* Use this only for reading claims after the token has been
|
|
4045
|
-
* validated by the authorization server.
|
|
4046
|
-
*
|
|
4047
|
-
* @param jwt - JWT string to decode
|
|
4048
|
-
* @returns Decoded JWT parts
|
|
4049
|
-
* @throws Error if the JWT format is invalid
|
|
4050
|
-
*/
|
|
4051
|
-
declare function decodeJwt<T = Record<string, unknown>>(jwt: string): DecodedJwt<T>;
|
|
4052
|
-
/**
|
|
4053
|
-
* Decode an ID token and extract claims
|
|
4054
|
-
*
|
|
4055
|
-
* WARNING: This function does NOT verify the ID token.
|
|
4056
|
-
* The token MUST be verified by the authorization server before use.
|
|
4057
|
-
*
|
|
4058
|
-
* @param idToken - ID token string
|
|
4059
|
-
* @returns ID token claims
|
|
4060
|
-
*/
|
|
4061
|
-
declare function decodeIdToken(idToken: string): IdTokenClaims;
|
|
4062
|
-
/**
|
|
4063
|
-
* Check if a JWT is expired
|
|
4064
|
-
*
|
|
4065
|
-
* @param jwt - Decoded JWT payload with exp claim
|
|
4066
|
-
* @param skewSeconds - Clock skew tolerance in seconds (default: 0)
|
|
4067
|
-
* @returns true if expired
|
|
4068
|
-
*/
|
|
4069
|
-
declare function isJwtExpired(payload: {
|
|
4070
|
-
exp?: number;
|
|
4071
|
-
}, skewSeconds?: number): boolean;
|
|
4072
|
-
/**
|
|
4073
|
-
* Get the nonce claim from an ID token
|
|
4074
|
-
*
|
|
4075
|
-
* @param idToken - ID token string
|
|
4076
|
-
* @returns nonce value or undefined
|
|
4077
|
-
*/
|
|
4078
|
-
declare function getIdTokenNonce(idToken: string): string | undefined;
|
|
4079
|
-
|
|
4080
|
-
/**
|
|
4081
|
-
* Back-Channel Logout Validator
|
|
4082
|
-
*
|
|
4083
|
-
* Implements OpenID Connect Back-Channel Logout 1.0
|
|
4084
|
-
* https://openid.net/specs/openid-connect-backchannel-1_0.html
|
|
4085
|
-
*
|
|
4086
|
-
* Back-channel logout allows the OP to notify RPs of logout events
|
|
4087
|
-
* via direct HTTP calls (server-to-server).
|
|
4088
|
-
*
|
|
4089
|
-
* NOTE: This validator performs claims validation only.
|
|
4090
|
-
* JWT signature verification MUST be performed separately using JWKS.
|
|
4091
|
-
*/
|
|
4092
|
-
|
|
4093
|
-
/**
|
|
4094
|
-
* Back-channel logout event URI
|
|
4095
|
-
*/
|
|
4096
|
-
declare const BACKCHANNEL_LOGOUT_EVENT = "http://schemas.openid.net/event/backchannel-logout";
|
|
4097
|
-
/**
|
|
4098
|
-
* Back-channel logout validation error codes
|
|
4099
|
-
*/
|
|
4100
|
-
type BackChannelLogoutErrorCode = 'invalid_format' | 'invalid_issuer' | 'invalid_audience' | 'invalid_events' | 'expired' | 'not_yet_valid' | 'missing_sub_and_sid' | 'sub_mismatch' | 'sid_mismatch' | 'missing_jti' | 'nonce_present';
|
|
4101
|
-
/**
|
|
4102
|
-
* Options for validating a logout token
|
|
4103
|
-
*/
|
|
4104
|
-
interface BackChannelLogoutValidationOptions {
|
|
4105
|
-
/** Expected issuer */
|
|
4106
|
-
issuer: string;
|
|
4107
|
-
/** Expected audience (client_id) */
|
|
4108
|
-
audience: string;
|
|
4109
|
-
/** Maximum age in seconds (default: 60) */
|
|
4110
|
-
maxAge?: number;
|
|
4111
|
-
/** Clock skew tolerance in seconds (default: 30) */
|
|
4112
|
-
clockSkew?: number;
|
|
4113
|
-
/** Expected session ID (optional) */
|
|
4114
|
-
expectedSid?: string;
|
|
4115
|
-
/** Expected subject (optional) */
|
|
4116
|
-
expectedSub?: string;
|
|
4117
|
-
}
|
|
4118
|
-
/**
|
|
4119
|
-
* Result of back-channel logout token validation
|
|
4120
|
-
*/
|
|
4121
|
-
interface BackChannelLogoutValidationResult {
|
|
4122
|
-
/** Whether the token is valid */
|
|
4123
|
-
valid: boolean;
|
|
4124
|
-
/** Validated claims (if valid) */
|
|
4125
|
-
claims?: LogoutTokenClaims;
|
|
4126
|
-
/** JWT header (if valid) */
|
|
4127
|
-
header?: JwtHeader;
|
|
4128
|
-
/** Error message (if invalid) */
|
|
4129
|
-
error?: string;
|
|
4130
|
-
/** Error code (if invalid) */
|
|
4131
|
-
errorCode?: BackChannelLogoutErrorCode;
|
|
4132
|
-
}
|
|
4133
|
-
/**
|
|
4134
|
-
* Back-Channel Logout Validator
|
|
4135
|
-
*
|
|
4136
|
-
* Validates logout_token JWTs per OIDC Back-Channel Logout 1.0.
|
|
4137
|
-
*
|
|
4138
|
-
* ## Security Notes
|
|
4139
|
-
*
|
|
4140
|
-
* 1. **JWT Signature Verification**: This class performs claims validation only.
|
|
4141
|
-
* JWT signature verification MUST be performed separately using JWKS
|
|
4142
|
-
* before calling validate().
|
|
4143
|
-
*
|
|
4144
|
-
* 2. **JTI Replay Protection**: This validator checks for jti presence only.
|
|
4145
|
-
* The application MUST implement jti replay protection by:
|
|
4146
|
-
* - Storing used jti values (at least until token expiry + clock skew)
|
|
4147
|
-
* - Rejecting tokens with previously-used jti values
|
|
4148
|
-
*
|
|
4149
|
-
* Usage (Node.js server receiving back-channel logout request):
|
|
4150
|
-
* ```typescript
|
|
4151
|
-
* // 1. Receive logout_token from POST body
|
|
4152
|
-
* const logoutToken = req.body.logout_token;
|
|
4153
|
-
*
|
|
4154
|
-
* // 2. Verify JWT signature using JWKS (not shown - use jose or similar)
|
|
4155
|
-
* await verifyJwtSignature(logoutToken, jwks);
|
|
4156
|
-
*
|
|
4157
|
-
* // 3. Validate claims
|
|
4158
|
-
* const validator = new BackChannelLogoutValidator();
|
|
4159
|
-
* const result = validator.validate(logoutToken, {
|
|
4160
|
-
* issuer: 'https://op.example.com',
|
|
4161
|
-
* audience: 'my-client-id'
|
|
4162
|
-
* });
|
|
4163
|
-
*
|
|
4164
|
-
* if (!result.valid) {
|
|
4165
|
-
* return res.status(400).send('Invalid logout token');
|
|
4166
|
-
* }
|
|
4167
|
-
*
|
|
4168
|
-
* // 4. Check for jti replay (application responsibility)
|
|
4169
|
-
* if (await jtiStore.has(result.claims.jti)) {
|
|
4170
|
-
* return res.status(400).send('Token replay detected');
|
|
4171
|
-
* }
|
|
4172
|
-
* await jtiStore.set(result.claims.jti, true, maxAge + clockSkew);
|
|
4173
|
-
*
|
|
4174
|
-
* // 5. Perform logout for sub and/or sid
|
|
4175
|
-
* await logoutUser(result.claims.sub, result.claims.sid);
|
|
4176
|
-
* ```
|
|
4177
|
-
*/
|
|
4178
|
-
declare class BackChannelLogoutValidator {
|
|
4179
|
-
/**
|
|
4180
|
-
* Validate a logout_token
|
|
4181
|
-
*
|
|
4182
|
-
* Per OIDC Back-Channel Logout 1.0, the logout_token MUST:
|
|
4183
|
-
* - Be a valid JWT
|
|
4184
|
-
* - Contain iss, aud, iat, jti claims
|
|
4185
|
-
* - Contain events claim with back-channel logout event
|
|
4186
|
-
* - Contain either sub or sid (or both)
|
|
4187
|
-
* - NOT contain a nonce claim
|
|
4188
|
-
*
|
|
4189
|
-
* @param logoutToken - JWT logout token to validate
|
|
4190
|
-
* @param options - Validation options
|
|
4191
|
-
* @returns Validation result
|
|
4192
|
-
*/
|
|
4193
|
-
validate(logoutToken: string, options: BackChannelLogoutValidationOptions): BackChannelLogoutValidationResult;
|
|
4194
|
-
/**
|
|
4195
|
-
* Extract claims from a logout token without validation
|
|
4196
|
-
*
|
|
4197
|
-
* Useful for inspecting the token before/during validation.
|
|
4198
|
-
*
|
|
4199
|
-
* @param logoutToken - JWT logout token
|
|
4200
|
-
* @returns Claims or null if invalid format
|
|
4201
|
-
*/
|
|
4202
|
-
extractClaims(logoutToken: string): LogoutTokenClaims | null;
|
|
4203
|
-
/**
|
|
4204
|
-
* Extract header from a logout token without validation
|
|
4205
|
-
*
|
|
4206
|
-
* Useful for getting kid to select the correct JWKS key.
|
|
4207
|
-
*
|
|
4208
|
-
* @param logoutToken - JWT logout token
|
|
4209
|
-
* @returns Header or null if invalid format
|
|
4210
|
-
*/
|
|
4211
|
-
extractHeader(logoutToken: string): JwtHeader | null;
|
|
4212
|
-
}
|
|
4213
|
-
|
|
4214
4015
|
/**
|
|
4215
4016
|
* Debug Module Types
|
|
4216
4017
|
*
|
|
@@ -4440,6 +4241,71 @@ declare function stringToBase64url(str: string): string;
|
|
|
4440
4241
|
*/
|
|
4441
4242
|
declare function base64urlToString(base64url: string): string;
|
|
4442
4243
|
|
|
4244
|
+
/**
|
|
4245
|
+
* JWT Utilities
|
|
4246
|
+
*
|
|
4247
|
+
* Note: This module only provides decoding (parsing) functionality.
|
|
4248
|
+
* JWT signature verification MUST be performed by the server.
|
|
4249
|
+
* Never trust decoded JWT claims without server-side verification.
|
|
4250
|
+
*/
|
|
4251
|
+
|
|
4252
|
+
/**
|
|
4253
|
+
* JWT Header
|
|
4254
|
+
*/
|
|
4255
|
+
interface JwtHeader {
|
|
4256
|
+
alg: string;
|
|
4257
|
+
typ?: string;
|
|
4258
|
+
kid?: string;
|
|
4259
|
+
[key: string]: unknown;
|
|
4260
|
+
}
|
|
4261
|
+
/**
|
|
4262
|
+
* Decoded JWT structure
|
|
4263
|
+
*/
|
|
4264
|
+
interface DecodedJwt<T = Record<string, unknown>> {
|
|
4265
|
+
header: JwtHeader;
|
|
4266
|
+
payload: T;
|
|
4267
|
+
signature: string;
|
|
4268
|
+
}
|
|
4269
|
+
/**
|
|
4270
|
+
* Decode a JWT without verifying the signature
|
|
4271
|
+
*
|
|
4272
|
+
* WARNING: This function does NOT verify the JWT signature.
|
|
4273
|
+
* Use this only for reading claims after the token has been
|
|
4274
|
+
* validated by the authorization server.
|
|
4275
|
+
*
|
|
4276
|
+
* @param jwt - JWT string to decode
|
|
4277
|
+
* @returns Decoded JWT parts
|
|
4278
|
+
* @throws Error if the JWT format is invalid
|
|
4279
|
+
*/
|
|
4280
|
+
declare function decodeJwt<T = Record<string, unknown>>(jwt: string): DecodedJwt<T>;
|
|
4281
|
+
/**
|
|
4282
|
+
* Decode an ID token and extract claims
|
|
4283
|
+
*
|
|
4284
|
+
* WARNING: This function does NOT verify the ID token.
|
|
4285
|
+
* The token MUST be verified by the authorization server before use.
|
|
4286
|
+
*
|
|
4287
|
+
* @param idToken - ID token string
|
|
4288
|
+
* @returns ID token claims
|
|
4289
|
+
*/
|
|
4290
|
+
declare function decodeIdToken(idToken: string): IdTokenClaims;
|
|
4291
|
+
/**
|
|
4292
|
+
* Check if a JWT is expired
|
|
4293
|
+
*
|
|
4294
|
+
* @param jwt - Decoded JWT payload with exp claim
|
|
4295
|
+
* @param skewSeconds - Clock skew tolerance in seconds (default: 0)
|
|
4296
|
+
* @returns true if expired
|
|
4297
|
+
*/
|
|
4298
|
+
declare function isJwtExpired(payload: {
|
|
4299
|
+
exp?: number;
|
|
4300
|
+
}, skewSeconds?: number): boolean;
|
|
4301
|
+
/**
|
|
4302
|
+
* Get the nonce claim from an ID token
|
|
4303
|
+
*
|
|
4304
|
+
* @param idToken - ID token string
|
|
4305
|
+
* @returns nonce value or undefined
|
|
4306
|
+
*/
|
|
4307
|
+
declare function getIdTokenNonce(idToken: string): string | undefined;
|
|
4308
|
+
|
|
4443
4309
|
/**
|
|
4444
4310
|
* Hash Utilities
|
|
4445
4311
|
*
|
|
@@ -4905,7 +4771,7 @@ interface PasskeyLoginStartResponse {
|
|
|
4905
4771
|
*/
|
|
4906
4772
|
interface PasskeyLoginFinishRequest {
|
|
4907
4773
|
challenge_id: string;
|
|
4908
|
-
credential:
|
|
4774
|
+
credential: AuthenticationResponseJSON;
|
|
4909
4775
|
code_verifier: string;
|
|
4910
4776
|
}
|
|
4911
4777
|
/**
|
|
@@ -4942,7 +4808,7 @@ interface PasskeySignupStartResponse {
|
|
|
4942
4808
|
*/
|
|
4943
4809
|
interface PasskeySignupFinishRequest {
|
|
4944
4810
|
challenge_id: string;
|
|
4945
|
-
credential:
|
|
4811
|
+
credential: RegistrationResponseJSON;
|
|
4946
4812
|
code_verifier: string;
|
|
4947
4813
|
}
|
|
4948
4814
|
/**
|
|
@@ -5079,13 +4945,51 @@ interface AuthenticatorAssertionResponseJSON {
|
|
|
5079
4945
|
userHandle?: string;
|
|
5080
4946
|
}
|
|
5081
4947
|
/**
|
|
5082
|
-
* AuthenticatorAttestationResponse as JSON
|
|
4948
|
+
* AuthenticatorAttestationResponse as JSON (inner response part)
|
|
5083
4949
|
*/
|
|
5084
4950
|
interface AuthenticatorAttestationResponseJSON {
|
|
5085
4951
|
clientDataJSON: string;
|
|
5086
4952
|
attestationObject: string;
|
|
5087
4953
|
transports?: AuthenticatorTransportType[];
|
|
5088
4954
|
}
|
|
4955
|
+
/**
|
|
4956
|
+
* Full RegistrationResponseJSON format (compatible with @simplewebauthn/server)
|
|
4957
|
+
*
|
|
4958
|
+
* This is the complete WebAuthn credential structure returned by navigator.credentials.create()
|
|
4959
|
+
*/
|
|
4960
|
+
interface RegistrationResponseJSON {
|
|
4961
|
+
/** Credential ID (base64url) */
|
|
4962
|
+
id: string;
|
|
4963
|
+
/** Credential ID (base64url, same as id) */
|
|
4964
|
+
rawId: string;
|
|
4965
|
+
/** Attestation response */
|
|
4966
|
+
response: AuthenticatorAttestationResponseJSON;
|
|
4967
|
+
/** Always 'public-key' */
|
|
4968
|
+
type: 'public-key';
|
|
4969
|
+
/** Client extension results */
|
|
4970
|
+
clientExtensionResults: Record<string, unknown>;
|
|
4971
|
+
/** Authenticator attachment type */
|
|
4972
|
+
authenticatorAttachment?: 'platform' | 'cross-platform' | null;
|
|
4973
|
+
}
|
|
4974
|
+
/**
|
|
4975
|
+
* Full AuthenticationResponseJSON format (compatible with @simplewebauthn/server)
|
|
4976
|
+
*
|
|
4977
|
+
* This is the complete WebAuthn credential structure returned by navigator.credentials.get()
|
|
4978
|
+
*/
|
|
4979
|
+
interface AuthenticationResponseJSON {
|
|
4980
|
+
/** Credential ID (base64url) */
|
|
4981
|
+
id: string;
|
|
4982
|
+
/** Credential ID (base64url, same as id) */
|
|
4983
|
+
rawId: string;
|
|
4984
|
+
/** Assertion response */
|
|
4985
|
+
response: AuthenticatorAssertionResponseJSON;
|
|
4986
|
+
/** Always 'public-key' */
|
|
4987
|
+
type: 'public-key';
|
|
4988
|
+
/** Client extension results */
|
|
4989
|
+
clientExtensionResults: Record<string, unknown>;
|
|
4990
|
+
/** Authenticator attachment type */
|
|
4991
|
+
authenticatorAttachment?: 'platform' | 'cross-platform' | null;
|
|
4992
|
+
}
|
|
5089
4993
|
/**
|
|
5090
4994
|
* Direct Auth client configuration
|
|
5091
4995
|
*/
|
|
@@ -5157,4 +5061,4 @@ interface DirectAuthClient {
|
|
|
5157
5061
|
session: SessionAuth;
|
|
5158
5062
|
}
|
|
5159
5063
|
|
|
5160
|
-
export { type AddressClaim, type AttestationConveyancePreferenceType, type AuthCallbackCompleteEvent, type AuthCallbackEvent, type AuthCallbackProcessingEvent, type AuthFallbackEvent, type AuthInitEvent, type AuthLoginCompleteEvent, type AuthLogoutCompleteEvent, type AuthPopupBlockedEvent, type AuthRedirectingEvent, type AuthRequiredEvent, type AuthResult, type AuthState, type AuthStateSnapshot, type AuthState$1 as AuthStateType, type AuthenticationExtensionsClientInputsType, type AuthenticatorAssertionResponseJSON, type AuthenticatorAttachmentType, type AuthenticatorAttestationResponseJSON, type AuthenticatorSelectionCriteriaType, type AuthenticatorTransportType, AuthorizationCodeFlow, type AuthorizationContext, type AuthorizationUrlResult, AuthrimClient, type AuthrimClientConfig, AuthrimError, type AuthrimErrorCode, type AuthrimErrorMeta, type AuthrimErrorOptions, type AuthrimErrorRemediation, type AuthrimErrorSeverity, type AuthrimErrorUserAction, type AuthrimEventHandler, type AuthrimEventName, type AuthrimEvents, type AuthrimStorage, type AutoRefreshOptions, AutoRefreshScheduler,
|
|
5064
|
+
export { type AddressClaim, type AttestationConveyancePreferenceType, type AuthCallbackCompleteEvent, type AuthCallbackEvent, type AuthCallbackProcessingEvent, type AuthFallbackEvent, type AuthInitEvent, type AuthLoginCompleteEvent, type AuthLogoutCompleteEvent, type AuthPopupBlockedEvent, type AuthRedirectingEvent, type AuthRequiredEvent, type AuthResult, type AuthState, type AuthStateSnapshot, type AuthState$1 as AuthStateType, type AuthenticationExtensionsClientInputsType, type AuthenticationResponseJSON, type AuthenticatorAssertionResponseJSON, type AuthenticatorAttachmentType, type AuthenticatorAttestationResponseJSON, type AuthenticatorSelectionCriteriaType, type AuthenticatorTransportType, AuthorizationCodeFlow, type AuthorizationContext, type AuthorizationUrlResult, AuthrimClient, type AuthrimClientConfig, AuthrimError, type AuthrimErrorCode, type AuthrimErrorMeta, type AuthrimErrorOptions, type AuthrimErrorRemediation, type AuthrimErrorSeverity, type AuthrimErrorUserAction, type AuthrimEventHandler, type AuthrimEventName, type AuthrimEvents, type AuthrimStorage, type AutoRefreshOptions, AutoRefreshScheduler, type BaseEventPayload, type BuildAuthorizationUrlOptions, type COSEAlgorithmIdentifier, type CheckSessionMessage, type CheckSessionResponse, type ClientAssertionClaims, type ClientAuthMethod, type ClientAuthResult, type ClientCredentials, ClientCredentialsClient, type ClientCredentialsClientOptions, type ClientCredentialsTokenOptions, type ClientSecretCredentials, type CodeChallengeMethod, type CoreEventName, type CryptoProvider, type DPoPCryptoProvider, type DPoPKeyPair, DPoPManager, type DPoPManagerConfig, type DPoPProofClaims, type DPoPProofHeader, type DPoPProofOptions, DebugContext, type DebugLogLevel, type DebugLogger, type DebugOptions, type DebugTimelineEvent, type DecodedJwt, type DeviceAuthorizationResponse, type DeviceFlowAccessDeniedResult, DeviceFlowClient, type DeviceFlowCompletedResult, type DeviceFlowExpiredResult, type DeviceFlowPendingResult, type DeviceFlowPollResult, type DeviceFlowSlowDownResult, type DeviceFlowStartOptions, type DeviceFlowState, type DirectAuthClient, type DirectAuthClientConfig, type DirectAuthError, type DirectAuthLogoutOptions, type DirectAuthTokenRequest, type DirectAuthTokenResponse, DiscoveryClient, type EmailCodeAuth, type EmailCodeSendOptions, type EmailCodeSendRequest, type EmailCodeSendResponse, type EmailCodeSendResult, type EmailCodeVerifyOptions, type EmailCodeVerifyRequest, type EmailCodeVerifyResponse, type EmitClassifiedErrorOptions, type EndpointOverrides, type ErrorClassification, type ErrorEvent, type ErrorEventEmitter, type ErrorEventPayload, type ErrorFatalEvent, type ErrorRecoverableEvent, type ErrorSeverity, EventEmitter, EventTimeline, type ExchangeCodeOptions, type FrontChannelLogoutBuildParams, type FrontChannelLogoutParams, FrontChannelLogoutUrlBuilder, type FrontChannelLogoutUrlOptions, type FrontChannelLogoutUrlResult, type FrontChannelLogoutValidationOptions, type FrontChannelLogoutValidationResult, type GenerateAuthStateOptions, type HashOptions, type HttpClient, type HttpOptions, type HttpResponse, type IntrospectTokenOptions, type IntrospectionResponse, type IntrospectionTokenTypeHint, JARBuilder, type JARBuilderConfig, type JARMResponseClaims, type JARMValidationOptions, type JARMValidationResult, JARMValidator, type JARMValidatorConfig, type JARRequestObjectClaims, type JARRequestOptions, type JWK, type JwtHeader, LogoutHandler, type LogoutHandlerOptions, type LogoutOptions, type LogoutResult, type LogoutTokenClaims, type MfaMethod, type NextAction, type NoClientCredentials, type OAuthErrorResponse, type OIDCDiscoveryDocument, PARClient, type PARClientOptions, type PARRequest, type PARResponse, type PARResult, PKCEHelper, type PKCEPair, type PasskeyAuth, type PasskeyCredential, type PasskeyLoginFinishRequest, type PasskeyLoginFinishResponse, type PasskeyLoginOptions, type PasskeyLoginStartRequest, type PasskeyLoginStartResponse, type PasskeyRegisterOptions, type PasskeySignUpOptions, type PasskeySignupFinishRequest, type PasskeySignupFinishResponse, type PasskeySignupStartRequest, type PasskeySignupStartResponse, type PrivateKeyJwtCredentials, type PublicKeyCredentialCreationOptionsJSON, type PublicKeyCredentialDescriptorJSON, type PublicKeyCredentialParametersType, type PublicKeyCredentialRequestOptionsJSON, type PublicKeyCredentialRpEntityType, type PublicKeyCredentialType, type PublicKeyCredentialUserEntityJSON, type RedactLevel, type RegistrationResponseJSON, type ResidentKeyRequirementType, type ResolvedConfig, type RetryOptions, type RevokeTokenOptions, STORAGE_KEYS, type Session, type SessionAuth, type SessionChangeEvent, type SessionChangedEvent, type SessionCheckResult, type SessionEndedEvent, type SessionLogoutBroadcastEvent, type SessionManagementConfig, SessionManager, type SessionManagerOptions, type SessionStartedEvent, type SessionState, SessionStateCalculator, type SessionStateCalculatorOptions, type SessionStateParams, type SessionStateResult, type SessionSyncEvent, SilentAuthHandler, type SilentAuthOptions, type SilentAuthResult, type SilentAuthUrlResult, type SocialAuth, type SocialLoginOptions, type SocialProvider, type StandardClaims, type StateChangeEvent, StateManager, TOKEN_TYPE_URIS, type TimelineEntry, TokenApiClient, type TokenApiClientOptions, type TokenErrorEvent, type TokenExchangeRequest, type TokenExchangeResponse, type TokenExchangeResult, type TokenExchangedEvent, type TokenExpiredEvent, type TokenExpiringEvent, TokenIntrospector, type TokenIntrospectorOptions, TokenManager, type TokenManagerOptions, type TokenRefreshFailedEvent, type TokenRefreshedEvent, type TokenRefreshingEvent, type TokenResponse, TokenRevoker, type TokenRevokerOptions, type TokenSet, type TokenTypeHint, type TokenTypeUri, type User, type UserInfo, type UserVerificationRequirementType, type WarningITPEvent, type WarningPrivateModeEvent, type WarningStorageFallbackEvent, type WebOnlyEventName, base64urlDecode, base64urlEncode, base64urlToString, buildClientAuthentication, calculateBackoffDelay, calculateDsHash, classifyError, createAuthrimClient, createCancellableOperation, createConsoleLogger, createDebugLogger, createRetryFunction, decodeIdToken, decodeJwt, emitClassifiedError, getErrorMeta, getIdTokenNonce, isCancellationError, isJarRequired, isJwtExpired, isRetryableError, noopLogger, normalizeIssuer, parseRetryAfterHeader, raceWithCancellation, resolveConfig, sleep, stringToBase64url, timingSafeEqual, withAbortSignal, withRetry };
|