@frontegg/rest-api 3.0.33 → 3.0.35
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/auth/index.d.ts +58 -1
- package/auth/index.js +33 -0
- package/auth/interfaces.d.ts +63 -0
- package/auth/interfaces.js +9 -1
- package/index.js +1 -1
- package/node/auth/index.js +66 -0
- package/node/auth/interfaces.js +13 -3
- package/node/index.js +1 -1
- package/node/routers.js +1 -1
- package/package.json +1 -1
- package/routers.js +1 -1
package/auth/index.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
export * from './secutiry-poilicy';
|
|
2
2
|
export * from './enums';
|
|
3
3
|
import { ISamlRolesGroup } from '../teams/interfaces';
|
|
4
|
-
import { IAcceptInvitation, IActivateAccount, IAllowedToRememberMfaDevice, ICreateSamlGroup, IDeleteApiToken, IDisableMfa, IEnrollMfaResponse, IForgotPassword, IGetActivateAccountStrategy, IGetActivateAccountStrategyResponse, IGetUserById, IGetUserPasswordConfig, ILogin, ILoginResponse, ILoginViaSocialLogin, ILoginViaSocialLoginResponse, ILoginWithMfa, IOidcPostLogin, IOidcConfiguration, IPostLogin, IPreLogin, IRecoverMFAToken, IResendActivationEmail, IResetPassword, ISamlConfiguration, ISamlVendorConfigResponse, ISignUpResponse, ISignUpUser, ISocialLoginProviderConfiguration, ITenantApiTokensData, IUpdateSamlConfiguration, IUpdateSamlGroup, IUpdateSamlRoles, IUpdateSamlVendorMetadata, IUpdateTenantApiTokensData, IUpdateUserApiTokensData, IUserApiTokensData, IUserIdResponse, IVendorConfig, IVerifyMfa, IVerifyMfaResponse, TestConfig, ISSOPublicConfiguration, IPreLoginWithIdpTypeResponse, IPasswordlessPreLogin, IPasswordlessPostLogin, ICreateSSODomain, IVerifyInviteToken, ISSODomain, ISSOConfigurationDefaultRoles, ISSOConfiguration, IUpdateSSOConfiguration, IOidcPostLoginV2, IExchangeOAuthTokens, IOAuthTokenResponse, ISocialLoginProviderConfigurationV2, ILoginResponseV2, IResetPhoneNumber, IVerifyResetPhoneNumber, IChangePhoneNumber, IVerifyResetPhoneNumberResponse, IResetPhoneNumberResponse, IWebAuthnPreLogin, IWebAuthnPostLogin, IVerifyNewWebAuthnDevice, IWebAuthnPreLoginResponse, ICreateNewDeviceSessionResponse, IAuthStrategiesConfig, ISessionResponse, IChangePhoneNumberWithVerification, IChangePhoneNumberWithVerificationResponse, IVerifyChangePhoneNumber, ISessionConfigurations, IResendInvitationEmail } from './interfaces';
|
|
4
|
+
import { IAcceptInvitation, IActivateAccount, IAllowedToRememberMfaDevice, ICreateSamlGroup, IDeleteApiToken, IDisableMfa, IEnrollMfaResponse, IForgotPassword, IGetActivateAccountStrategy, IGetActivateAccountStrategyResponse, IGetUserById, IGetUserPasswordConfig, ILogin, ILoginResponse, ILoginViaSocialLogin, ILoginViaSocialLoginResponse, ILoginWithMfa, IOidcPostLogin, IOidcConfiguration, IPostLogin, IPreLogin, IRecoverMFAToken, IResendActivationEmail, IResetPassword, ISamlConfiguration, ISamlVendorConfigResponse, ISignUpResponse, ISignUpUser, ISocialLoginProviderConfiguration, ITenantApiTokensData, IUpdateSamlConfiguration, IUpdateSamlGroup, IUpdateSamlRoles, IUpdateSamlVendorMetadata, IUpdateTenantApiTokensData, IUpdateUserApiTokensData, IUserApiTokensData, IUserIdResponse, IVendorConfig, IVerifyMfa, IVerifyMfaResponse, TestConfig, ISSOPublicConfiguration, IPreLoginWithIdpTypeResponse, IPasswordlessPreLogin, IPasswordlessPostLogin, ICreateSSODomain, IVerifyInviteToken, ISSODomain, ISSOConfigurationDefaultRoles, ISSOConfiguration, IUpdateSSOConfiguration, IOidcPostLoginV2, IExchangeOAuthTokens, IOAuthTokenResponse, ISocialLoginProviderConfigurationV2, ILoginResponseV2, IResetPhoneNumber, IVerifyResetPhoneNumber, IChangePhoneNumber, IVerifyResetPhoneNumberResponse, IResetPhoneNumberResponse, IWebAuthnPreLogin, IWebAuthnPostLogin, IVerifyNewWebAuthnDevice, IWebAuthnPreLoginResponse, ICreateNewDeviceSessionResponse, IAuthStrategiesConfig, ISessionResponse, IChangePhoneNumberWithVerification, IChangePhoneNumberWithVerificationResponse, IVerifyChangePhoneNumber, ISessionConfigurations, IResendInvitationEmail, IPreEnrollMFA, IEnrollMFAAuthenticatorApp, IPreEnrollMFASMS, IEnrollMFASMS, IEnrollMFAWebAuthN, IPreEnrollMFAAuthenticatorAppResponse, IPreEnrollMFAWebAuthNResponse, IVerifyMFAAuthenticatorApp, IPreVerifyMFA, IPreVerifyMFASMSResponse, IVerifyMFASMS, IPreVerifyMFAWebAuthNResponse, IVerifyMFAWebAuthN } from './interfaces';
|
|
5
5
|
/*****************************************
|
|
6
6
|
* Authentication
|
|
7
7
|
*****************************************/
|
|
@@ -145,6 +145,63 @@ export declare function verifyMfa(body: IVerifyMfa): Promise<IVerifyMfaResponse>
|
|
|
145
145
|
* * ``authorized user``
|
|
146
146
|
*/
|
|
147
147
|
export declare function disableMfa(body: IDisableMfa): Promise<void>;
|
|
148
|
+
/**
|
|
149
|
+
* pre enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
|
|
150
|
+
* the server returns qrCode as png image in base64 format
|
|
151
|
+
*/
|
|
152
|
+
export declare function preEnrollAuthenticatorAppForLogin(body: IPreEnrollMFA): Promise<IPreEnrollMFAAuthenticatorAppResponse>;
|
|
153
|
+
/**
|
|
154
|
+
* after pre enroll with authenticator app, enroll authenticator app function should be called
|
|
155
|
+
* with the generated code in the Authenticator App
|
|
156
|
+
*/
|
|
157
|
+
export declare function enrollAuthenticatorAppForLogin(body: IEnrollMFAAuthenticatorApp): Promise<ILoginResponse>;
|
|
158
|
+
/**
|
|
159
|
+
* after login succeeded with mfaRequired token response, this function should be called
|
|
160
|
+
* with the selected authenticator app id, mfaToken and the generated code from your authenticator app.
|
|
161
|
+
*/
|
|
162
|
+
export declare function verifyMFAAuthenticatorAppForLogin(deviceId: string, body: IVerifyMFAAuthenticatorApp): Promise<ILoginResponse>;
|
|
163
|
+
/**
|
|
164
|
+
* pre enroll Multi-Factor to use with SMS
|
|
165
|
+
* the server returns otcToken that should be sent to the enroll function with the code that was sent to
|
|
166
|
+
* the request phone number
|
|
167
|
+
*/
|
|
168
|
+
export declare function preEnrollSMSForLogin(body: IPreEnrollMFASMS): Promise<void>;
|
|
169
|
+
/**
|
|
170
|
+
* after pre enroll with SMS, enroll SMS function should be called
|
|
171
|
+
* with the otcToken and the code that has been sent to the phone number that was requested
|
|
172
|
+
*/
|
|
173
|
+
export declare function enrollSMSForLogin(body: IEnrollMFASMS): Promise<ILoginResponse>;
|
|
174
|
+
/**
|
|
175
|
+
* after login succeeded with mfaRequired token response, if the user asked to use SMS as MFA
|
|
176
|
+
* this function should be called with the selected device id and mfaToken
|
|
177
|
+
*/
|
|
178
|
+
export declare function preVerifyMFASMSForLogin(deviceId: string, body: IPreVerifyMFA): Promise<IPreVerifyMFASMSResponse>;
|
|
179
|
+
/**
|
|
180
|
+
* after pre verify with SMS, this function should be called with otcToken, mfaToken and the code
|
|
181
|
+
* that has been sent to the selected device.
|
|
182
|
+
*/
|
|
183
|
+
export declare function verifyMFASMSForLogin(deviceId: string, body: IVerifyMFASMS): Promise<ILoginResponse>;
|
|
184
|
+
/**
|
|
185
|
+
* pre enroll Multi-Factor to use with WebAuthN
|
|
186
|
+
* the server returns attestation object
|
|
187
|
+
* the request phone number
|
|
188
|
+
*/
|
|
189
|
+
export declare function preEnrollWebAuthNForLogin(body: IPreEnrollMFA): Promise<IPreEnrollMFAWebAuthNResponse>;
|
|
190
|
+
/**
|
|
191
|
+
* after pre enroll with WebAuthN, enroll WebAuthN function should be called
|
|
192
|
+
* with the webauthnToken and the attestation object response
|
|
193
|
+
*/
|
|
194
|
+
export declare function enrollWebAuthnForLogin(body: IEnrollMFAWebAuthN): Promise<ILoginResponse>;
|
|
195
|
+
/**
|
|
196
|
+
* after login succeeded with mfaRequired token response, if the user asked to use WebAuthN as MFA
|
|
197
|
+
* this function should be called with the selected device id and mfaToken.
|
|
198
|
+
*/
|
|
199
|
+
export declare function preVerifyMFAWebAuthNForLogin(deviceId: string, body: IPreVerifyMFA): Promise<IPreVerifyMFAWebAuthNResponse>;
|
|
200
|
+
/**
|
|
201
|
+
* after pre verify with WebAuthN, this function should be called with webauthnTokenToken, mfaToken
|
|
202
|
+
* and the assertion response.
|
|
203
|
+
*/
|
|
204
|
+
export declare function verifyMFAWebAuthNForLogin(deviceId: string, body: IVerifyMFAWebAuthN): Promise<ILoginResponse>;
|
|
148
205
|
/**
|
|
149
206
|
* SSO Configurations
|
|
150
207
|
*/
|
package/auth/index.js
CHANGED
|
@@ -134,6 +134,39 @@ export async function verifyMfa(body) {
|
|
|
134
134
|
export async function disableMfa(body) {
|
|
135
135
|
return Post(`${urls.identity.users.v1}/mfa/disable`, body);
|
|
136
136
|
}
|
|
137
|
+
export async function preEnrollAuthenticatorAppForLogin(body) {
|
|
138
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/enroll`, body);
|
|
139
|
+
}
|
|
140
|
+
export async function enrollAuthenticatorAppForLogin(body) {
|
|
141
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/enroll/verify`, body);
|
|
142
|
+
}
|
|
143
|
+
export async function verifyMFAAuthenticatorAppForLogin(deviceId, body) {
|
|
144
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/${deviceId}/verify`, body);
|
|
145
|
+
}
|
|
146
|
+
export async function preEnrollSMSForLogin(body) {
|
|
147
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/sms/enroll`, body);
|
|
148
|
+
}
|
|
149
|
+
export async function enrollSMSForLogin(body) {
|
|
150
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/sms/enroll/verify`, body);
|
|
151
|
+
}
|
|
152
|
+
export async function preVerifyMFASMSForLogin(deviceId, body) {
|
|
153
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/sms/${deviceId}`, body);
|
|
154
|
+
}
|
|
155
|
+
export async function verifyMFASMSForLogin(deviceId, body) {
|
|
156
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/sms/${deviceId}/verify`, body);
|
|
157
|
+
}
|
|
158
|
+
export async function preEnrollWebAuthNForLogin(body) {
|
|
159
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/enroll`, body);
|
|
160
|
+
}
|
|
161
|
+
export async function enrollWebAuthnForLogin(body) {
|
|
162
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/enroll/verify`, body);
|
|
163
|
+
}
|
|
164
|
+
export async function preVerifyMFAWebAuthNForLogin(deviceId, body) {
|
|
165
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}`, body);
|
|
166
|
+
}
|
|
167
|
+
export async function verifyMFAWebAuthNForLogin(deviceId, body) {
|
|
168
|
+
return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}/verify`, body);
|
|
169
|
+
}
|
|
137
170
|
export async function getSamlConfiguration() {
|
|
138
171
|
return Get(`${urls.team.sso.v1}/saml/configurations`);
|
|
139
172
|
}
|
package/auth/interfaces.d.ts
CHANGED
|
@@ -445,3 +445,66 @@ export interface IAuthStrategyConfig {
|
|
|
445
445
|
export interface IAuthStrategiesConfig {
|
|
446
446
|
secondaryAuthStrategies: IAuthStrategyConfig[];
|
|
447
447
|
}
|
|
448
|
+
export interface IPreEnrollMFA {
|
|
449
|
+
mfaToken: string;
|
|
450
|
+
}
|
|
451
|
+
export interface IEnrollMFA {
|
|
452
|
+
mfaToken: string;
|
|
453
|
+
rememberDevice?: boolean;
|
|
454
|
+
}
|
|
455
|
+
export interface IPreEnrollMFAAuthenticatorAppResponse {
|
|
456
|
+
qrCode: string;
|
|
457
|
+
}
|
|
458
|
+
export interface IEnrollMFAAuthenticatorApp extends IEnrollMFA {
|
|
459
|
+
token: string;
|
|
460
|
+
}
|
|
461
|
+
export interface IPreEnrollMFASMS extends IPreEnrollMFA {
|
|
462
|
+
phoneNumber: string;
|
|
463
|
+
}
|
|
464
|
+
export interface IPreEnrollMFASMSResponse {
|
|
465
|
+
otcToken: string;
|
|
466
|
+
phoneNumber: string;
|
|
467
|
+
}
|
|
468
|
+
export interface IEnrollMFASMS extends IEnrollMFA {
|
|
469
|
+
otcToken: string;
|
|
470
|
+
code: string;
|
|
471
|
+
}
|
|
472
|
+
export declare enum WebAuthnDeviceType {
|
|
473
|
+
Android = "Android",
|
|
474
|
+
USBKey = "USBKey",
|
|
475
|
+
TouchID = "TouchID"
|
|
476
|
+
}
|
|
477
|
+
export interface IEnrollMFAWebAuthN extends IEnrollMFA {
|
|
478
|
+
deviceType: WebAuthnDeviceType;
|
|
479
|
+
webauthnToken: string;
|
|
480
|
+
options: IVerifyNewWebAuthnDevice;
|
|
481
|
+
}
|
|
482
|
+
export interface IPreEnrollMFAWebAuthNResponse {
|
|
483
|
+
options: ICreateNewDeviceSessionResponse;
|
|
484
|
+
}
|
|
485
|
+
export interface IPreVerifyMFA {
|
|
486
|
+
mfaToken: string;
|
|
487
|
+
}
|
|
488
|
+
export interface IVerifyMFA {
|
|
489
|
+
mfaToken: string;
|
|
490
|
+
rememberDevice?: boolean;
|
|
491
|
+
}
|
|
492
|
+
export interface IVerifyMFAAuthenticatorApp extends IVerifyMFA {
|
|
493
|
+
value: string;
|
|
494
|
+
}
|
|
495
|
+
export interface IPreVerifyMFASMSResponse {
|
|
496
|
+
otcToken: string;
|
|
497
|
+
phoneNumber: string;
|
|
498
|
+
}
|
|
499
|
+
export interface IVerifyMFASMS extends IVerifyMFA {
|
|
500
|
+
otcToken: string;
|
|
501
|
+
code: string;
|
|
502
|
+
}
|
|
503
|
+
export interface IPreVerifyMFAWebAuthNResponse {
|
|
504
|
+
webauthnToken: string;
|
|
505
|
+
options: IWebAuthnPreLoginResponse;
|
|
506
|
+
}
|
|
507
|
+
export interface IVerifyMFAWebAuthN extends IVerifyMFA {
|
|
508
|
+
webauthnToken: string;
|
|
509
|
+
options: Omit<IWebAuthnPostLogin, "recaptchaToken" | "invitationToken">;
|
|
510
|
+
}
|
package/auth/interfaces.js
CHANGED
|
@@ -13,4 +13,12 @@ export let SecondaryAuthStrategy;
|
|
|
13
13
|
SecondaryAuthStrategy["WebAuthnPlatform"] = "WebAuthnPlatform";
|
|
14
14
|
SecondaryAuthStrategy["WebAuthnCrossPlatform"] = "WebAuthnCrossPlatform";
|
|
15
15
|
SecondaryAuthStrategy["SmsCode"] = "SmsCode";
|
|
16
|
-
})(SecondaryAuthStrategy || (SecondaryAuthStrategy = {}));
|
|
16
|
+
})(SecondaryAuthStrategy || (SecondaryAuthStrategy = {}));
|
|
17
|
+
|
|
18
|
+
export let WebAuthnDeviceType;
|
|
19
|
+
|
|
20
|
+
(function (WebAuthnDeviceType) {
|
|
21
|
+
WebAuthnDeviceType["Android"] = "Android";
|
|
22
|
+
WebAuthnDeviceType["USBKey"] = "USBKey";
|
|
23
|
+
WebAuthnDeviceType["TouchID"] = "TouchID";
|
|
24
|
+
})(WebAuthnDeviceType || (WebAuthnDeviceType = {}));
|
package/index.js
CHANGED
package/node/auth/index.js
CHANGED
|
@@ -30,6 +30,17 @@ var _exportNames = {
|
|
|
30
30
|
enrollMfa: true,
|
|
31
31
|
verifyMfa: true,
|
|
32
32
|
disableMfa: true,
|
|
33
|
+
preEnrollAuthenticatorAppForLogin: true,
|
|
34
|
+
enrollAuthenticatorAppForLogin: true,
|
|
35
|
+
verifyMFAAuthenticatorAppForLogin: true,
|
|
36
|
+
preEnrollSMSForLogin: true,
|
|
37
|
+
enrollSMSForLogin: true,
|
|
38
|
+
preVerifyMFASMSForLogin: true,
|
|
39
|
+
verifyMFASMSForLogin: true,
|
|
40
|
+
preEnrollWebAuthNForLogin: true,
|
|
41
|
+
enrollWebAuthnForLogin: true,
|
|
42
|
+
preVerifyMFAWebAuthNForLogin: true,
|
|
43
|
+
verifyMFAWebAuthNForLogin: true,
|
|
33
44
|
getSamlConfiguration: true,
|
|
34
45
|
updateSamlConfiguration: true,
|
|
35
46
|
getSamlVendorConfiguration: true,
|
|
@@ -116,7 +127,10 @@ exports.deleteSessionForUser = deleteSessionForUser;
|
|
|
116
127
|
exports.deleteTenantApiToken = deleteTenantApiToken;
|
|
117
128
|
exports.deleteUserApiToken = deleteUserApiToken;
|
|
118
129
|
exports.disableMfa = disableMfa;
|
|
130
|
+
exports.enrollAuthenticatorAppForLogin = enrollAuthenticatorAppForLogin;
|
|
119
131
|
exports.enrollMfa = enrollMfa;
|
|
132
|
+
exports.enrollSMSForLogin = enrollSMSForLogin;
|
|
133
|
+
exports.enrollWebAuthnForLogin = enrollWebAuthnForLogin;
|
|
120
134
|
exports.exchangeOAuthTokens = exchangeOAuthTokens;
|
|
121
135
|
exports.forgotPassword = forgotPassword;
|
|
122
136
|
exports.generateLoginResponse = generateLoginResponse;
|
|
@@ -152,9 +166,14 @@ exports.oidcPostLoginV2 = oidcPostLoginV2;
|
|
|
152
166
|
exports.passwordlessPostLogin = passwordlessPostLogin;
|
|
153
167
|
exports.passwordlessPreLogin = passwordlessPreLogin;
|
|
154
168
|
exports.postLogin = postLogin;
|
|
169
|
+
exports.preEnrollAuthenticatorAppForLogin = preEnrollAuthenticatorAppForLogin;
|
|
170
|
+
exports.preEnrollSMSForLogin = preEnrollSMSForLogin;
|
|
171
|
+
exports.preEnrollWebAuthNForLogin = preEnrollWebAuthNForLogin;
|
|
155
172
|
exports.preLogin = preLogin;
|
|
156
173
|
exports.preLoginV2 = preLoginV2;
|
|
157
174
|
exports.preLoginWithIdpType = preLoginWithIdpType;
|
|
175
|
+
exports.preVerifyMFASMSForLogin = preVerifyMFASMSForLogin;
|
|
176
|
+
exports.preVerifyMFAWebAuthNForLogin = preVerifyMFAWebAuthNForLogin;
|
|
158
177
|
exports.recoverMfaToken = recoverMfaToken;
|
|
159
178
|
exports.refreshToken = refreshToken;
|
|
160
179
|
exports.refreshTokenV2 = refreshTokenV2;
|
|
@@ -179,6 +198,9 @@ exports.validateSSODomain = validateSSODomain;
|
|
|
179
198
|
exports.validateSamlDomain = validateSamlDomain;
|
|
180
199
|
exports.verifyChangePhoneNumber = verifyChangePhoneNumber;
|
|
181
200
|
exports.verifyInviteToken = verifyInviteToken;
|
|
201
|
+
exports.verifyMFAAuthenticatorAppForLogin = verifyMFAAuthenticatorAppForLogin;
|
|
202
|
+
exports.verifyMFASMSForLogin = verifyMFASMSForLogin;
|
|
203
|
+
exports.verifyMFAWebAuthNForLogin = verifyMFAWebAuthNForLogin;
|
|
182
204
|
exports.verifyMfa = verifyMfa;
|
|
183
205
|
exports.verifyNewDeviceSession = verifyNewDeviceSession;
|
|
184
206
|
exports.verifyResetPhoneNumber = verifyResetPhoneNumber;
|
|
@@ -383,6 +405,50 @@ async function disableMfa(body) {
|
|
|
383
405
|
return (0, _fetch.Post)(`${_constants.urls.identity.users.v1}/mfa/disable`, body);
|
|
384
406
|
}
|
|
385
407
|
|
|
408
|
+
async function preEnrollAuthenticatorAppForLogin(body) {
|
|
409
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/enroll`, body);
|
|
410
|
+
}
|
|
411
|
+
|
|
412
|
+
async function enrollAuthenticatorAppForLogin(body) {
|
|
413
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/enroll/verify`, body);
|
|
414
|
+
}
|
|
415
|
+
|
|
416
|
+
async function verifyMFAAuthenticatorAppForLogin(deviceId, body) {
|
|
417
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/${deviceId}/verify`, body);
|
|
418
|
+
}
|
|
419
|
+
|
|
420
|
+
async function preEnrollSMSForLogin(body) {
|
|
421
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/enroll`, body);
|
|
422
|
+
}
|
|
423
|
+
|
|
424
|
+
async function enrollSMSForLogin(body) {
|
|
425
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/enroll/verify`, body);
|
|
426
|
+
}
|
|
427
|
+
|
|
428
|
+
async function preVerifyMFASMSForLogin(deviceId, body) {
|
|
429
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/${deviceId}`, body);
|
|
430
|
+
}
|
|
431
|
+
|
|
432
|
+
async function verifyMFASMSForLogin(deviceId, body) {
|
|
433
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/${deviceId}/verify`, body);
|
|
434
|
+
}
|
|
435
|
+
|
|
436
|
+
async function preEnrollWebAuthNForLogin(body) {
|
|
437
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/enroll`, body);
|
|
438
|
+
}
|
|
439
|
+
|
|
440
|
+
async function enrollWebAuthnForLogin(body) {
|
|
441
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/enroll/verify`, body);
|
|
442
|
+
}
|
|
443
|
+
|
|
444
|
+
async function preVerifyMFAWebAuthNForLogin(deviceId, body) {
|
|
445
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}`, body);
|
|
446
|
+
}
|
|
447
|
+
|
|
448
|
+
async function verifyMFAWebAuthNForLogin(deviceId, body) {
|
|
449
|
+
return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}/verify`, body);
|
|
450
|
+
}
|
|
451
|
+
|
|
386
452
|
async function getSamlConfiguration() {
|
|
387
453
|
return (0, _fetch.Get)(`${_constants.urls.team.sso.v1}/saml/configurations`);
|
|
388
454
|
}
|
package/node/auth/interfaces.js
CHANGED
|
@@ -4,9 +4,10 @@ Object.defineProperty(exports, "__esModule", {
|
|
|
4
4
|
value: true
|
|
5
5
|
});
|
|
6
6
|
var _exportNames = {
|
|
7
|
-
SecondaryAuthStrategy: true
|
|
7
|
+
SecondaryAuthStrategy: true,
|
|
8
|
+
WebAuthnDeviceType: true
|
|
8
9
|
};
|
|
9
|
-
exports.SecondaryAuthStrategy = void 0;
|
|
10
|
+
exports.WebAuthnDeviceType = exports.SecondaryAuthStrategy = void 0;
|
|
10
11
|
|
|
11
12
|
var _interfaces = require("./secutiry-poilicy/interfaces");
|
|
12
13
|
|
|
@@ -36,4 +37,13 @@ exports.SecondaryAuthStrategy = SecondaryAuthStrategy;
|
|
|
36
37
|
SecondaryAuthStrategy["WebAuthnPlatform"] = "WebAuthnPlatform";
|
|
37
38
|
SecondaryAuthStrategy["WebAuthnCrossPlatform"] = "WebAuthnCrossPlatform";
|
|
38
39
|
SecondaryAuthStrategy["SmsCode"] = "SmsCode";
|
|
39
|
-
})(SecondaryAuthStrategy || (exports.SecondaryAuthStrategy = SecondaryAuthStrategy = {}));
|
|
40
|
+
})(SecondaryAuthStrategy || (exports.SecondaryAuthStrategy = SecondaryAuthStrategy = {}));
|
|
41
|
+
|
|
42
|
+
let WebAuthnDeviceType;
|
|
43
|
+
exports.WebAuthnDeviceType = WebAuthnDeviceType;
|
|
44
|
+
|
|
45
|
+
(function (WebAuthnDeviceType) {
|
|
46
|
+
WebAuthnDeviceType["Android"] = "Android";
|
|
47
|
+
WebAuthnDeviceType["USBKey"] = "USBKey";
|
|
48
|
+
WebAuthnDeviceType["TouchID"] = "TouchID";
|
|
49
|
+
})(WebAuthnDeviceType || (exports.WebAuthnDeviceType = WebAuthnDeviceType = {}));
|
package/node/index.js
CHANGED
package/node/routers.js
CHANGED
|
@@ -7,7 +7,7 @@ exports.fronteggSilentRefreshTokenUrl = exports.fronteggRefreshTokenUrl = export
|
|
|
7
7
|
|
|
8
8
|
var _constants = require("./constants");
|
|
9
9
|
|
|
10
|
-
const fronteggAuthApiRoutes = [`${_constants.urls.identity.auth.v1}/logout`, `${_constants.urls.identity.auth.v1}/user/saml/postlogin`, `${_constants.urls.identity.auth.v2}/user/oidc/postlogin`, `${_constants.urls.identity.auth.v1}/user`, `${_constants.urls.identity.auth.v1}/user/mfa/verify`, `${_constants.urls.identity.auth.v1}/user/token/refresh`, `${_constants.urls.identity.users.v1}`, `${_constants.urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/code/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${_constants.urls.identity.users.v1}/activate`, `${_constants.urls.identity.users.v1}/invitation/accept`, `${_constants.urls.oauth.v1}/token`, `${_constants.urls.oauth.v1}/authorize/silent`];
|
|
10
|
+
const fronteggAuthApiRoutes = [`${_constants.urls.identity.auth.v1}/logout`, `${_constants.urls.identity.auth.v1}/user/saml/postlogin`, `${_constants.urls.identity.auth.v2}/user/oidc/postlogin`, `${_constants.urls.identity.auth.v1}/user`, `${_constants.urls.identity.auth.v1}/user/mfa/verify`, `${_constants.urls.identity.auth.v1}/user/token/refresh`, `${_constants.urls.identity.users.v1}`, `${_constants.urls.identity.users.v1}/signUp`, `${_constants.urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/code/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${_constants.urls.identity.users.v1}/activate`, `${_constants.urls.identity.users.v1}/invitation/accept`, `${_constants.urls.oauth.v1}/token`, `${_constants.urls.oauth.v1}/authorize/silent`];
|
|
11
11
|
exports.fronteggAuthApiRoutes = fronteggAuthApiRoutes;
|
|
12
12
|
const fronteggRefreshTokenUrl = `${_constants.urls.identity.auth.v1}/user/token/refresh`;
|
|
13
13
|
exports.fronteggRefreshTokenUrl = fronteggRefreshTokenUrl;
|
package/package.json
CHANGED
package/routers.js
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
1
|
import { urls } from './constants';
|
|
2
|
-
export const fronteggAuthApiRoutes = [`${urls.identity.auth.v1}/logout`, `${urls.identity.auth.v1}/user/saml/postlogin`, `${urls.identity.auth.v2}/user/oidc/postlogin`, `${urls.identity.auth.v1}/user`, `${urls.identity.auth.v1}/user/mfa/verify`, `${urls.identity.auth.v1}/user/token/refresh`, `${urls.identity.users.v1}`, `${urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${urls.identity.auth.v1}/passwordless/code/postlogin`, `${urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${urls.identity.users.v1}/activate`, `${urls.identity.users.v1}/invitation/accept`, `${urls.oauth.v1}/token`, `${urls.oauth.v1}/authorize/silent`];
|
|
2
|
+
export const fronteggAuthApiRoutes = [`${urls.identity.auth.v1}/logout`, `${urls.identity.auth.v1}/user/saml/postlogin`, `${urls.identity.auth.v2}/user/oidc/postlogin`, `${urls.identity.auth.v1}/user`, `${urls.identity.auth.v1}/user/mfa/verify`, `${urls.identity.auth.v1}/user/token/refresh`, `${urls.identity.users.v1}`, `${urls.identity.users.v1}/signUp`, `${urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${urls.identity.auth.v1}/passwordless/code/postlogin`, `${urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${urls.identity.users.v1}/activate`, `${urls.identity.users.v1}/invitation/accept`, `${urls.oauth.v1}/token`, `${urls.oauth.v1}/authorize/silent`];
|
|
3
3
|
export const fronteggRefreshTokenUrl = `${urls.identity.auth.v1}/user/token/refresh`;
|
|
4
4
|
export const fronteggSilentRefreshTokenUrl = `${urls.oauth.v1}/authorize/silent`;
|