@authrim/core 0.1.4 → 0.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.ts CHANGED
@@ -4012,205 +4012,6 @@ declare class FrontChannelLogoutUrlBuilder {
4012
4012
  validateRequest(url: string | URL, expected?: FrontChannelLogoutValidationOptions): FrontChannelLogoutValidationResult;
4013
4013
  }
4014
4014
 
4015
- /**
4016
- * JWT Utilities
4017
- *
4018
- * Note: This module only provides decoding (parsing) functionality.
4019
- * JWT signature verification MUST be performed by the server.
4020
- * Never trust decoded JWT claims without server-side verification.
4021
- */
4022
-
4023
- /**
4024
- * JWT Header
4025
- */
4026
- interface JwtHeader {
4027
- alg: string;
4028
- typ?: string;
4029
- kid?: string;
4030
- [key: string]: unknown;
4031
- }
4032
- /**
4033
- * Decoded JWT structure
4034
- */
4035
- interface DecodedJwt<T = Record<string, unknown>> {
4036
- header: JwtHeader;
4037
- payload: T;
4038
- signature: string;
4039
- }
4040
- /**
4041
- * Decode a JWT without verifying the signature
4042
- *
4043
- * WARNING: This function does NOT verify the JWT signature.
4044
- * Use this only for reading claims after the token has been
4045
- * validated by the authorization server.
4046
- *
4047
- * @param jwt - JWT string to decode
4048
- * @returns Decoded JWT parts
4049
- * @throws Error if the JWT format is invalid
4050
- */
4051
- declare function decodeJwt<T = Record<string, unknown>>(jwt: string): DecodedJwt<T>;
4052
- /**
4053
- * Decode an ID token and extract claims
4054
- *
4055
- * WARNING: This function does NOT verify the ID token.
4056
- * The token MUST be verified by the authorization server before use.
4057
- *
4058
- * @param idToken - ID token string
4059
- * @returns ID token claims
4060
- */
4061
- declare function decodeIdToken(idToken: string): IdTokenClaims;
4062
- /**
4063
- * Check if a JWT is expired
4064
- *
4065
- * @param jwt - Decoded JWT payload with exp claim
4066
- * @param skewSeconds - Clock skew tolerance in seconds (default: 0)
4067
- * @returns true if expired
4068
- */
4069
- declare function isJwtExpired(payload: {
4070
- exp?: number;
4071
- }, skewSeconds?: number): boolean;
4072
- /**
4073
- * Get the nonce claim from an ID token
4074
- *
4075
- * @param idToken - ID token string
4076
- * @returns nonce value or undefined
4077
- */
4078
- declare function getIdTokenNonce(idToken: string): string | undefined;
4079
-
4080
- /**
4081
- * Back-Channel Logout Validator
4082
- *
4083
- * Implements OpenID Connect Back-Channel Logout 1.0
4084
- * https://openid.net/specs/openid-connect-backchannel-1_0.html
4085
- *
4086
- * Back-channel logout allows the OP to notify RPs of logout events
4087
- * via direct HTTP calls (server-to-server).
4088
- *
4089
- * NOTE: This validator performs claims validation only.
4090
- * JWT signature verification MUST be performed separately using JWKS.
4091
- */
4092
-
4093
- /**
4094
- * Back-channel logout event URI
4095
- */
4096
- declare const BACKCHANNEL_LOGOUT_EVENT = "http://schemas.openid.net/event/backchannel-logout";
4097
- /**
4098
- * Back-channel logout validation error codes
4099
- */
4100
- type BackChannelLogoutErrorCode = 'invalid_format' | 'invalid_issuer' | 'invalid_audience' | 'invalid_events' | 'expired' | 'not_yet_valid' | 'missing_sub_and_sid' | 'sub_mismatch' | 'sid_mismatch' | 'missing_jti' | 'nonce_present';
4101
- /**
4102
- * Options for validating a logout token
4103
- */
4104
- interface BackChannelLogoutValidationOptions {
4105
- /** Expected issuer */
4106
- issuer: string;
4107
- /** Expected audience (client_id) */
4108
- audience: string;
4109
- /** Maximum age in seconds (default: 60) */
4110
- maxAge?: number;
4111
- /** Clock skew tolerance in seconds (default: 30) */
4112
- clockSkew?: number;
4113
- /** Expected session ID (optional) */
4114
- expectedSid?: string;
4115
- /** Expected subject (optional) */
4116
- expectedSub?: string;
4117
- }
4118
- /**
4119
- * Result of back-channel logout token validation
4120
- */
4121
- interface BackChannelLogoutValidationResult {
4122
- /** Whether the token is valid */
4123
- valid: boolean;
4124
- /** Validated claims (if valid) */
4125
- claims?: LogoutTokenClaims;
4126
- /** JWT header (if valid) */
4127
- header?: JwtHeader;
4128
- /** Error message (if invalid) */
4129
- error?: string;
4130
- /** Error code (if invalid) */
4131
- errorCode?: BackChannelLogoutErrorCode;
4132
- }
4133
- /**
4134
- * Back-Channel Logout Validator
4135
- *
4136
- * Validates logout_token JWTs per OIDC Back-Channel Logout 1.0.
4137
- *
4138
- * ## Security Notes
4139
- *
4140
- * 1. **JWT Signature Verification**: This class performs claims validation only.
4141
- * JWT signature verification MUST be performed separately using JWKS
4142
- * before calling validate().
4143
- *
4144
- * 2. **JTI Replay Protection**: This validator checks for jti presence only.
4145
- * The application MUST implement jti replay protection by:
4146
- * - Storing used jti values (at least until token expiry + clock skew)
4147
- * - Rejecting tokens with previously-used jti values
4148
- *
4149
- * Usage (Node.js server receiving back-channel logout request):
4150
- * ```typescript
4151
- * // 1. Receive logout_token from POST body
4152
- * const logoutToken = req.body.logout_token;
4153
- *
4154
- * // 2. Verify JWT signature using JWKS (not shown - use jose or similar)
4155
- * await verifyJwtSignature(logoutToken, jwks);
4156
- *
4157
- * // 3. Validate claims
4158
- * const validator = new BackChannelLogoutValidator();
4159
- * const result = validator.validate(logoutToken, {
4160
- * issuer: 'https://op.example.com',
4161
- * audience: 'my-client-id'
4162
- * });
4163
- *
4164
- * if (!result.valid) {
4165
- * return res.status(400).send('Invalid logout token');
4166
- * }
4167
- *
4168
- * // 4. Check for jti replay (application responsibility)
4169
- * if (await jtiStore.has(result.claims.jti)) {
4170
- * return res.status(400).send('Token replay detected');
4171
- * }
4172
- * await jtiStore.set(result.claims.jti, true, maxAge + clockSkew);
4173
- *
4174
- * // 5. Perform logout for sub and/or sid
4175
- * await logoutUser(result.claims.sub, result.claims.sid);
4176
- * ```
4177
- */
4178
- declare class BackChannelLogoutValidator {
4179
- /**
4180
- * Validate a logout_token
4181
- *
4182
- * Per OIDC Back-Channel Logout 1.0, the logout_token MUST:
4183
- * - Be a valid JWT
4184
- * - Contain iss, aud, iat, jti claims
4185
- * - Contain events claim with back-channel logout event
4186
- * - Contain either sub or sid (or both)
4187
- * - NOT contain a nonce claim
4188
- *
4189
- * @param logoutToken - JWT logout token to validate
4190
- * @param options - Validation options
4191
- * @returns Validation result
4192
- */
4193
- validate(logoutToken: string, options: BackChannelLogoutValidationOptions): BackChannelLogoutValidationResult;
4194
- /**
4195
- * Extract claims from a logout token without validation
4196
- *
4197
- * Useful for inspecting the token before/during validation.
4198
- *
4199
- * @param logoutToken - JWT logout token
4200
- * @returns Claims or null if invalid format
4201
- */
4202
- extractClaims(logoutToken: string): LogoutTokenClaims | null;
4203
- /**
4204
- * Extract header from a logout token without validation
4205
- *
4206
- * Useful for getting kid to select the correct JWKS key.
4207
- *
4208
- * @param logoutToken - JWT logout token
4209
- * @returns Header or null if invalid format
4210
- */
4211
- extractHeader(logoutToken: string): JwtHeader | null;
4212
- }
4213
-
4214
4015
  /**
4215
4016
  * Debug Module Types
4216
4017
  *
@@ -4440,6 +4241,71 @@ declare function stringToBase64url(str: string): string;
4440
4241
  */
4441
4242
  declare function base64urlToString(base64url: string): string;
4442
4243
 
4244
+ /**
4245
+ * JWT Utilities
4246
+ *
4247
+ * Note: This module only provides decoding (parsing) functionality.
4248
+ * JWT signature verification MUST be performed by the server.
4249
+ * Never trust decoded JWT claims without server-side verification.
4250
+ */
4251
+
4252
+ /**
4253
+ * JWT Header
4254
+ */
4255
+ interface JwtHeader {
4256
+ alg: string;
4257
+ typ?: string;
4258
+ kid?: string;
4259
+ [key: string]: unknown;
4260
+ }
4261
+ /**
4262
+ * Decoded JWT structure
4263
+ */
4264
+ interface DecodedJwt<T = Record<string, unknown>> {
4265
+ header: JwtHeader;
4266
+ payload: T;
4267
+ signature: string;
4268
+ }
4269
+ /**
4270
+ * Decode a JWT without verifying the signature
4271
+ *
4272
+ * WARNING: This function does NOT verify the JWT signature.
4273
+ * Use this only for reading claims after the token has been
4274
+ * validated by the authorization server.
4275
+ *
4276
+ * @param jwt - JWT string to decode
4277
+ * @returns Decoded JWT parts
4278
+ * @throws Error if the JWT format is invalid
4279
+ */
4280
+ declare function decodeJwt<T = Record<string, unknown>>(jwt: string): DecodedJwt<T>;
4281
+ /**
4282
+ * Decode an ID token and extract claims
4283
+ *
4284
+ * WARNING: This function does NOT verify the ID token.
4285
+ * The token MUST be verified by the authorization server before use.
4286
+ *
4287
+ * @param idToken - ID token string
4288
+ * @returns ID token claims
4289
+ */
4290
+ declare function decodeIdToken(idToken: string): IdTokenClaims;
4291
+ /**
4292
+ * Check if a JWT is expired
4293
+ *
4294
+ * @param jwt - Decoded JWT payload with exp claim
4295
+ * @param skewSeconds - Clock skew tolerance in seconds (default: 0)
4296
+ * @returns true if expired
4297
+ */
4298
+ declare function isJwtExpired(payload: {
4299
+ exp?: number;
4300
+ }, skewSeconds?: number): boolean;
4301
+ /**
4302
+ * Get the nonce claim from an ID token
4303
+ *
4304
+ * @param idToken - ID token string
4305
+ * @returns nonce value or undefined
4306
+ */
4307
+ declare function getIdTokenNonce(idToken: string): string | undefined;
4308
+
4443
4309
  /**
4444
4310
  * Hash Utilities
4445
4311
  *
@@ -4905,7 +4771,7 @@ interface PasskeyLoginStartResponse {
4905
4771
  */
4906
4772
  interface PasskeyLoginFinishRequest {
4907
4773
  challenge_id: string;
4908
- credential: AuthenticatorAssertionResponseJSON;
4774
+ credential: AuthenticationResponseJSON;
4909
4775
  code_verifier: string;
4910
4776
  }
4911
4777
  /**
@@ -4942,7 +4808,7 @@ interface PasskeySignupStartResponse {
4942
4808
  */
4943
4809
  interface PasskeySignupFinishRequest {
4944
4810
  challenge_id: string;
4945
- credential: AuthenticatorAttestationResponseJSON;
4811
+ credential: RegistrationResponseJSON;
4946
4812
  code_verifier: string;
4947
4813
  }
4948
4814
  /**
@@ -5079,13 +4945,51 @@ interface AuthenticatorAssertionResponseJSON {
5079
4945
  userHandle?: string;
5080
4946
  }
5081
4947
  /**
5082
- * AuthenticatorAttestationResponse as JSON
4948
+ * AuthenticatorAttestationResponse as JSON (inner response part)
5083
4949
  */
5084
4950
  interface AuthenticatorAttestationResponseJSON {
5085
4951
  clientDataJSON: string;
5086
4952
  attestationObject: string;
5087
4953
  transports?: AuthenticatorTransportType[];
5088
4954
  }
4955
+ /**
4956
+ * Full RegistrationResponseJSON format (compatible with @simplewebauthn/server)
4957
+ *
4958
+ * This is the complete WebAuthn credential structure returned by navigator.credentials.create()
4959
+ */
4960
+ interface RegistrationResponseJSON {
4961
+ /** Credential ID (base64url) */
4962
+ id: string;
4963
+ /** Credential ID (base64url, same as id) */
4964
+ rawId: string;
4965
+ /** Attestation response */
4966
+ response: AuthenticatorAttestationResponseJSON;
4967
+ /** Always 'public-key' */
4968
+ type: 'public-key';
4969
+ /** Client extension results */
4970
+ clientExtensionResults: Record<string, unknown>;
4971
+ /** Authenticator attachment type */
4972
+ authenticatorAttachment?: 'platform' | 'cross-platform' | null;
4973
+ }
4974
+ /**
4975
+ * Full AuthenticationResponseJSON format (compatible with @simplewebauthn/server)
4976
+ *
4977
+ * This is the complete WebAuthn credential structure returned by navigator.credentials.get()
4978
+ */
4979
+ interface AuthenticationResponseJSON {
4980
+ /** Credential ID (base64url) */
4981
+ id: string;
4982
+ /** Credential ID (base64url, same as id) */
4983
+ rawId: string;
4984
+ /** Assertion response */
4985
+ response: AuthenticatorAssertionResponseJSON;
4986
+ /** Always 'public-key' */
4987
+ type: 'public-key';
4988
+ /** Client extension results */
4989
+ clientExtensionResults: Record<string, unknown>;
4990
+ /** Authenticator attachment type */
4991
+ authenticatorAttachment?: 'platform' | 'cross-platform' | null;
4992
+ }
5089
4993
  /**
5090
4994
  * Direct Auth client configuration
5091
4995
  */
@@ -5157,4 +5061,4 @@ interface DirectAuthClient {
5157
5061
  session: SessionAuth;
5158
5062
  }
5159
5063
 
5160
- export { type AddressClaim, type AttestationConveyancePreferenceType, type AuthCallbackCompleteEvent, type AuthCallbackEvent, type AuthCallbackProcessingEvent, type AuthFallbackEvent, type AuthInitEvent, type AuthLoginCompleteEvent, type AuthLogoutCompleteEvent, type AuthPopupBlockedEvent, type AuthRedirectingEvent, type AuthRequiredEvent, type AuthResult, type AuthState, type AuthStateSnapshot, type AuthState$1 as AuthStateType, type AuthenticationExtensionsClientInputsType, type AuthenticatorAssertionResponseJSON, type AuthenticatorAttachmentType, type AuthenticatorAttestationResponseJSON, type AuthenticatorSelectionCriteriaType, type AuthenticatorTransportType, AuthorizationCodeFlow, type AuthorizationContext, type AuthorizationUrlResult, AuthrimClient, type AuthrimClientConfig, AuthrimError, type AuthrimErrorCode, type AuthrimErrorMeta, type AuthrimErrorOptions, type AuthrimErrorRemediation, type AuthrimErrorSeverity, type AuthrimErrorUserAction, type AuthrimEventHandler, type AuthrimEventName, type AuthrimEvents, type AuthrimStorage, type AutoRefreshOptions, AutoRefreshScheduler, BACKCHANNEL_LOGOUT_EVENT, type BackChannelLogoutErrorCode, type BackChannelLogoutValidationOptions, type BackChannelLogoutValidationResult, BackChannelLogoutValidator, type BaseEventPayload, type BuildAuthorizationUrlOptions, type COSEAlgorithmIdentifier, type CheckSessionMessage, type CheckSessionResponse, type ClientAssertionClaims, type ClientAuthMethod, type ClientAuthResult, type ClientCredentials, ClientCredentialsClient, type ClientCredentialsClientOptions, type ClientCredentialsTokenOptions, type ClientSecretCredentials, type CodeChallengeMethod, type CoreEventName, type CryptoProvider, type DPoPCryptoProvider, type DPoPKeyPair, DPoPManager, type DPoPManagerConfig, type DPoPProofClaims, type DPoPProofHeader, type DPoPProofOptions, DebugContext, type DebugLogLevel, type DebugLogger, type DebugOptions, type DebugTimelineEvent, type DecodedJwt, type DeviceAuthorizationResponse, type DeviceFlowAccessDeniedResult, DeviceFlowClient, type DeviceFlowCompletedResult, type DeviceFlowExpiredResult, type DeviceFlowPendingResult, type DeviceFlowPollResult, type DeviceFlowSlowDownResult, type DeviceFlowStartOptions, type DeviceFlowState, type DirectAuthClient, type DirectAuthClientConfig, type DirectAuthError, type DirectAuthLogoutOptions, type DirectAuthTokenRequest, type DirectAuthTokenResponse, DiscoveryClient, type EmailCodeAuth, type EmailCodeSendOptions, type EmailCodeSendRequest, type EmailCodeSendResponse, type EmailCodeSendResult, type EmailCodeVerifyOptions, type EmailCodeVerifyRequest, type EmailCodeVerifyResponse, type EmitClassifiedErrorOptions, type EndpointOverrides, type ErrorClassification, type ErrorEvent, type ErrorEventEmitter, type ErrorEventPayload, type ErrorFatalEvent, type ErrorRecoverableEvent, type ErrorSeverity, EventEmitter, EventTimeline, type ExchangeCodeOptions, type FrontChannelLogoutBuildParams, type FrontChannelLogoutParams, FrontChannelLogoutUrlBuilder, type FrontChannelLogoutUrlOptions, type FrontChannelLogoutUrlResult, type FrontChannelLogoutValidationOptions, type FrontChannelLogoutValidationResult, type GenerateAuthStateOptions, type HashOptions, type HttpClient, type HttpOptions, type HttpResponse, type IntrospectTokenOptions, type IntrospectionResponse, type IntrospectionTokenTypeHint, JARBuilder, type JARBuilderConfig, type JARMResponseClaims, type JARMValidationOptions, type JARMValidationResult, JARMValidator, type JARMValidatorConfig, type JARRequestObjectClaims, type JARRequestOptions, type JWK, type JwtHeader, LogoutHandler, type LogoutHandlerOptions, type LogoutOptions, type LogoutResult, type LogoutTokenClaims, type MfaMethod, type NextAction, type NoClientCredentials, type OAuthErrorResponse, type OIDCDiscoveryDocument, PARClient, type PARClientOptions, type PARRequest, type PARResponse, type PARResult, PKCEHelper, type PKCEPair, type PasskeyAuth, type PasskeyCredential, type PasskeyLoginFinishRequest, type PasskeyLoginFinishResponse, type PasskeyLoginOptions, type PasskeyLoginStartRequest, type PasskeyLoginStartResponse, type PasskeyRegisterOptions, type PasskeySignUpOptions, type PasskeySignupFinishRequest, type PasskeySignupFinishResponse, type PasskeySignupStartRequest, type PasskeySignupStartResponse, type PrivateKeyJwtCredentials, type PublicKeyCredentialCreationOptionsJSON, type PublicKeyCredentialDescriptorJSON, type PublicKeyCredentialParametersType, type PublicKeyCredentialRequestOptionsJSON, type PublicKeyCredentialRpEntityType, type PublicKeyCredentialType, type PublicKeyCredentialUserEntityJSON, type RedactLevel, type ResidentKeyRequirementType, type ResolvedConfig, type RetryOptions, type RevokeTokenOptions, STORAGE_KEYS, type Session, type SessionAuth, type SessionChangeEvent, type SessionChangedEvent, type SessionCheckResult, type SessionEndedEvent, type SessionLogoutBroadcastEvent, type SessionManagementConfig, SessionManager, type SessionManagerOptions, type SessionStartedEvent, type SessionState, SessionStateCalculator, type SessionStateCalculatorOptions, type SessionStateParams, type SessionStateResult, type SessionSyncEvent, SilentAuthHandler, type SilentAuthOptions, type SilentAuthResult, type SilentAuthUrlResult, type SocialAuth, type SocialLoginOptions, type SocialProvider, type StandardClaims, type StateChangeEvent, StateManager, TOKEN_TYPE_URIS, type TimelineEntry, TokenApiClient, type TokenApiClientOptions, type TokenErrorEvent, type TokenExchangeRequest, type TokenExchangeResponse, type TokenExchangeResult, type TokenExchangedEvent, type TokenExpiredEvent, type TokenExpiringEvent, TokenIntrospector, type TokenIntrospectorOptions, TokenManager, type TokenManagerOptions, type TokenRefreshFailedEvent, type TokenRefreshedEvent, type TokenRefreshingEvent, type TokenResponse, TokenRevoker, type TokenRevokerOptions, type TokenSet, type TokenTypeHint, type TokenTypeUri, type User, type UserInfo, type UserVerificationRequirementType, type WarningITPEvent, type WarningPrivateModeEvent, type WarningStorageFallbackEvent, type WebOnlyEventName, base64urlDecode, base64urlEncode, base64urlToString, buildClientAuthentication, calculateBackoffDelay, calculateDsHash, classifyError, createAuthrimClient, createCancellableOperation, createConsoleLogger, createDebugLogger, createRetryFunction, decodeIdToken, decodeJwt, emitClassifiedError, getErrorMeta, getIdTokenNonce, isCancellationError, isJarRequired, isJwtExpired, isRetryableError, noopLogger, normalizeIssuer, parseRetryAfterHeader, raceWithCancellation, resolveConfig, sleep, stringToBase64url, timingSafeEqual, withAbortSignal, withRetry };
5064
+ export { type AddressClaim, type AttestationConveyancePreferenceType, type AuthCallbackCompleteEvent, type AuthCallbackEvent, type AuthCallbackProcessingEvent, type AuthFallbackEvent, type AuthInitEvent, type AuthLoginCompleteEvent, type AuthLogoutCompleteEvent, type AuthPopupBlockedEvent, type AuthRedirectingEvent, type AuthRequiredEvent, type AuthResult, type AuthState, type AuthStateSnapshot, type AuthState$1 as AuthStateType, type AuthenticationExtensionsClientInputsType, type AuthenticationResponseJSON, type AuthenticatorAssertionResponseJSON, type AuthenticatorAttachmentType, type AuthenticatorAttestationResponseJSON, type AuthenticatorSelectionCriteriaType, type AuthenticatorTransportType, AuthorizationCodeFlow, type AuthorizationContext, type AuthorizationUrlResult, AuthrimClient, type AuthrimClientConfig, AuthrimError, type AuthrimErrorCode, type AuthrimErrorMeta, type AuthrimErrorOptions, type AuthrimErrorRemediation, type AuthrimErrorSeverity, type AuthrimErrorUserAction, type AuthrimEventHandler, type AuthrimEventName, type AuthrimEvents, type AuthrimStorage, type AutoRefreshOptions, AutoRefreshScheduler, type BaseEventPayload, type BuildAuthorizationUrlOptions, type COSEAlgorithmIdentifier, type CheckSessionMessage, type CheckSessionResponse, type ClientAssertionClaims, type ClientAuthMethod, type ClientAuthResult, type ClientCredentials, ClientCredentialsClient, type ClientCredentialsClientOptions, type ClientCredentialsTokenOptions, type ClientSecretCredentials, type CodeChallengeMethod, type CoreEventName, type CryptoProvider, type DPoPCryptoProvider, type DPoPKeyPair, DPoPManager, type DPoPManagerConfig, type DPoPProofClaims, type DPoPProofHeader, type DPoPProofOptions, DebugContext, type DebugLogLevel, type DebugLogger, type DebugOptions, type DebugTimelineEvent, type DecodedJwt, type DeviceAuthorizationResponse, type DeviceFlowAccessDeniedResult, DeviceFlowClient, type DeviceFlowCompletedResult, type DeviceFlowExpiredResult, type DeviceFlowPendingResult, type DeviceFlowPollResult, type DeviceFlowSlowDownResult, type DeviceFlowStartOptions, type DeviceFlowState, type DirectAuthClient, type DirectAuthClientConfig, type DirectAuthError, type DirectAuthLogoutOptions, type DirectAuthTokenRequest, type DirectAuthTokenResponse, DiscoveryClient, type EmailCodeAuth, type EmailCodeSendOptions, type EmailCodeSendRequest, type EmailCodeSendResponse, type EmailCodeSendResult, type EmailCodeVerifyOptions, type EmailCodeVerifyRequest, type EmailCodeVerifyResponse, type EmitClassifiedErrorOptions, type EndpointOverrides, type ErrorClassification, type ErrorEvent, type ErrorEventEmitter, type ErrorEventPayload, type ErrorFatalEvent, type ErrorRecoverableEvent, type ErrorSeverity, EventEmitter, EventTimeline, type ExchangeCodeOptions, type FrontChannelLogoutBuildParams, type FrontChannelLogoutParams, FrontChannelLogoutUrlBuilder, type FrontChannelLogoutUrlOptions, type FrontChannelLogoutUrlResult, type FrontChannelLogoutValidationOptions, type FrontChannelLogoutValidationResult, type GenerateAuthStateOptions, type HashOptions, type HttpClient, type HttpOptions, type HttpResponse, type IntrospectTokenOptions, type IntrospectionResponse, type IntrospectionTokenTypeHint, JARBuilder, type JARBuilderConfig, type JARMResponseClaims, type JARMValidationOptions, type JARMValidationResult, JARMValidator, type JARMValidatorConfig, type JARRequestObjectClaims, type JARRequestOptions, type JWK, type JwtHeader, LogoutHandler, type LogoutHandlerOptions, type LogoutOptions, type LogoutResult, type LogoutTokenClaims, type MfaMethod, type NextAction, type NoClientCredentials, type OAuthErrorResponse, type OIDCDiscoveryDocument, PARClient, type PARClientOptions, type PARRequest, type PARResponse, type PARResult, PKCEHelper, type PKCEPair, type PasskeyAuth, type PasskeyCredential, type PasskeyLoginFinishRequest, type PasskeyLoginFinishResponse, type PasskeyLoginOptions, type PasskeyLoginStartRequest, type PasskeyLoginStartResponse, type PasskeyRegisterOptions, type PasskeySignUpOptions, type PasskeySignupFinishRequest, type PasskeySignupFinishResponse, type PasskeySignupStartRequest, type PasskeySignupStartResponse, type PrivateKeyJwtCredentials, type PublicKeyCredentialCreationOptionsJSON, type PublicKeyCredentialDescriptorJSON, type PublicKeyCredentialParametersType, type PublicKeyCredentialRequestOptionsJSON, type PublicKeyCredentialRpEntityType, type PublicKeyCredentialType, type PublicKeyCredentialUserEntityJSON, type RedactLevel, type RegistrationResponseJSON, type ResidentKeyRequirementType, type ResolvedConfig, type RetryOptions, type RevokeTokenOptions, STORAGE_KEYS, type Session, type SessionAuth, type SessionChangeEvent, type SessionChangedEvent, type SessionCheckResult, type SessionEndedEvent, type SessionLogoutBroadcastEvent, type SessionManagementConfig, SessionManager, type SessionManagerOptions, type SessionStartedEvent, type SessionState, SessionStateCalculator, type SessionStateCalculatorOptions, type SessionStateParams, type SessionStateResult, type SessionSyncEvent, SilentAuthHandler, type SilentAuthOptions, type SilentAuthResult, type SilentAuthUrlResult, type SocialAuth, type SocialLoginOptions, type SocialProvider, type StandardClaims, type StateChangeEvent, StateManager, TOKEN_TYPE_URIS, type TimelineEntry, TokenApiClient, type TokenApiClientOptions, type TokenErrorEvent, type TokenExchangeRequest, type TokenExchangeResponse, type TokenExchangeResult, type TokenExchangedEvent, type TokenExpiredEvent, type TokenExpiringEvent, TokenIntrospector, type TokenIntrospectorOptions, TokenManager, type TokenManagerOptions, type TokenRefreshFailedEvent, type TokenRefreshedEvent, type TokenRefreshingEvent, type TokenResponse, TokenRevoker, type TokenRevokerOptions, type TokenSet, type TokenTypeHint, type TokenTypeUri, type User, type UserInfo, type UserVerificationRequirementType, type WarningITPEvent, type WarningPrivateModeEvent, type WarningStorageFallbackEvent, type WebOnlyEventName, base64urlDecode, base64urlEncode, base64urlToString, buildClientAuthentication, calculateBackoffDelay, calculateDsHash, classifyError, createAuthrimClient, createCancellableOperation, createConsoleLogger, createDebugLogger, createRetryFunction, decodeIdToken, decodeJwt, emitClassifiedError, getErrorMeta, getIdTokenNonce, isCancellationError, isJarRequired, isJwtExpired, isRetryableError, noopLogger, normalizeIssuer, parseRetryAfterHeader, raceWithCancellation, resolveConfig, sleep, stringToBase64url, timingSafeEqual, withAbortSignal, withRetry };