@frontegg/rest-api 3.0.33 → 3.0.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/auth/index.d.ts CHANGED
@@ -1,7 +1,7 @@
1
1
  export * from './secutiry-poilicy';
2
2
  export * from './enums';
3
3
  import { ISamlRolesGroup } from '../teams/interfaces';
4
- import { IAcceptInvitation, IActivateAccount, IAllowedToRememberMfaDevice, ICreateSamlGroup, IDeleteApiToken, IDisableMfa, IEnrollMfaResponse, IForgotPassword, IGetActivateAccountStrategy, IGetActivateAccountStrategyResponse, IGetUserById, IGetUserPasswordConfig, ILogin, ILoginResponse, ILoginViaSocialLogin, ILoginViaSocialLoginResponse, ILoginWithMfa, IOidcPostLogin, IOidcConfiguration, IPostLogin, IPreLogin, IRecoverMFAToken, IResendActivationEmail, IResetPassword, ISamlConfiguration, ISamlVendorConfigResponse, ISignUpResponse, ISignUpUser, ISocialLoginProviderConfiguration, ITenantApiTokensData, IUpdateSamlConfiguration, IUpdateSamlGroup, IUpdateSamlRoles, IUpdateSamlVendorMetadata, IUpdateTenantApiTokensData, IUpdateUserApiTokensData, IUserApiTokensData, IUserIdResponse, IVendorConfig, IVerifyMfa, IVerifyMfaResponse, TestConfig, ISSOPublicConfiguration, IPreLoginWithIdpTypeResponse, IPasswordlessPreLogin, IPasswordlessPostLogin, ICreateSSODomain, IVerifyInviteToken, ISSODomain, ISSOConfigurationDefaultRoles, ISSOConfiguration, IUpdateSSOConfiguration, IOidcPostLoginV2, IExchangeOAuthTokens, IOAuthTokenResponse, ISocialLoginProviderConfigurationV2, ILoginResponseV2, IResetPhoneNumber, IVerifyResetPhoneNumber, IChangePhoneNumber, IVerifyResetPhoneNumberResponse, IResetPhoneNumberResponse, IWebAuthnPreLogin, IWebAuthnPostLogin, IVerifyNewWebAuthnDevice, IWebAuthnPreLoginResponse, ICreateNewDeviceSessionResponse, IAuthStrategiesConfig, ISessionResponse, IChangePhoneNumberWithVerification, IChangePhoneNumberWithVerificationResponse, IVerifyChangePhoneNumber, ISessionConfigurations, IResendInvitationEmail } from './interfaces';
4
+ import { IAcceptInvitation, IActivateAccount, IAllowedToRememberMfaDevice, ICreateSamlGroup, IDeleteApiToken, IDisableMfa, IEnrollMfaResponse, IForgotPassword, IGetActivateAccountStrategy, IGetActivateAccountStrategyResponse, IGetUserById, IGetUserPasswordConfig, ILogin, ILoginResponse, ILoginViaSocialLogin, ILoginViaSocialLoginResponse, ILoginWithMfa, IOidcPostLogin, IOidcConfiguration, IPostLogin, IPreLogin, IRecoverMFAToken, IResendActivationEmail, IResetPassword, ISamlConfiguration, ISamlVendorConfigResponse, ISignUpResponse, ISignUpUser, ISocialLoginProviderConfiguration, ITenantApiTokensData, IUpdateSamlConfiguration, IUpdateSamlGroup, IUpdateSamlRoles, IUpdateSamlVendorMetadata, IUpdateTenantApiTokensData, IUpdateUserApiTokensData, IUserApiTokensData, IUserIdResponse, IVendorConfig, IVerifyMfa, IVerifyMfaResponse, TestConfig, ISSOPublicConfiguration, IPreLoginWithIdpTypeResponse, IPasswordlessPreLogin, IPasswordlessPostLogin, ICreateSSODomain, IVerifyInviteToken, ISSODomain, ISSOConfigurationDefaultRoles, ISSOConfiguration, IUpdateSSOConfiguration, IOidcPostLoginV2, IExchangeOAuthTokens, IOAuthTokenResponse, ISocialLoginProviderConfigurationV2, ILoginResponseV2, IResetPhoneNumber, IVerifyResetPhoneNumber, IChangePhoneNumber, IVerifyResetPhoneNumberResponse, IResetPhoneNumberResponse, IWebAuthnPreLogin, IWebAuthnPostLogin, IVerifyNewWebAuthnDevice, IWebAuthnPreLoginResponse, ICreateNewDeviceSessionResponse, IAuthStrategiesConfig, ISessionResponse, IChangePhoneNumberWithVerification, IChangePhoneNumberWithVerificationResponse, IVerifyChangePhoneNumber, ISessionConfigurations, IResendInvitationEmail, IPreEnrollMFA, IEnrollMFAAuthenticatorApp, IPreEnrollMFASMS, IEnrollMFASMS, IEnrollMFAWebAuthN, IPreEnrollMFAAuthenticatorAppResponse, IPreEnrollMFAWebAuthNResponse, IVerifyMFAAuthenticatorApp, IPreVerifyMFA, IPreVerifyMFASMSResponse, IVerifyMFASMS, IPreVerifyMFAWebAuthNResponse, IVerifyMFAWebAuthN } from './interfaces';
5
5
  /*****************************************
6
6
  * Authentication
7
7
  *****************************************/
@@ -145,6 +145,63 @@ export declare function verifyMfa(body: IVerifyMfa): Promise<IVerifyMfaResponse>
145
145
  * * ``authorized user``
146
146
  */
147
147
  export declare function disableMfa(body: IDisableMfa): Promise<void>;
148
+ /**
149
+ * pre enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
150
+ * the server returns qrCode as png image in base64 format
151
+ */
152
+ export declare function preEnrollAuthenticatorAppForLogin(body: IPreEnrollMFA): Promise<IPreEnrollMFAAuthenticatorAppResponse>;
153
+ /**
154
+ * after pre enroll with authenticator app, enroll authenticator app function should be called
155
+ * with the generated code in the Authenticator App
156
+ */
157
+ export declare function enrollAuthenticatorAppForLogin(body: IEnrollMFAAuthenticatorApp): Promise<ILoginResponse>;
158
+ /**
159
+ * after login succeeded with mfaRequired token response, this function should be called
160
+ * with the selected authenticator app id, mfaToken and the generated code from your authenticator app.
161
+ */
162
+ export declare function verifyMFAAuthenticatorAppForLogin(deviceId: string, body: IVerifyMFAAuthenticatorApp): Promise<ILoginResponse>;
163
+ /**
164
+ * pre enroll Multi-Factor to use with SMS
165
+ * the server returns otcToken that should be sent to the enroll function with the code that was sent to
166
+ * the request phone number
167
+ */
168
+ export declare function preEnrollSMSForLogin(body: IPreEnrollMFASMS): Promise<void>;
169
+ /**
170
+ * after pre enroll with SMS, enroll SMS function should be called
171
+ * with the otcToken and the code that has been sent to the phone number that was requested
172
+ */
173
+ export declare function enrollSMSForLogin(body: IEnrollMFASMS): Promise<ILoginResponse>;
174
+ /**
175
+ * after login succeeded with mfaRequired token response, if the user asked to use SMS as MFA
176
+ * this function should be called with the selected device id and mfaToken
177
+ */
178
+ export declare function preVerifyMFASMSForLogin(deviceId: string, body: IPreVerifyMFA): Promise<IPreVerifyMFASMSResponse>;
179
+ /**
180
+ * after pre verify with SMS, this function should be called with otcToken, mfaToken and the code
181
+ * that has been sent to the selected device.
182
+ */
183
+ export declare function verifyMFASMSForLogin(deviceId: string, body: IVerifyMFASMS): Promise<ILoginResponse>;
184
+ /**
185
+ * pre enroll Multi-Factor to use with WebAuthN
186
+ * the server returns attestation object
187
+ * the request phone number
188
+ */
189
+ export declare function preEnrollWebAuthNForLogin(body: IPreEnrollMFA): Promise<IPreEnrollMFAWebAuthNResponse>;
190
+ /**
191
+ * after pre enroll with WebAuthN, enroll WebAuthN function should be called
192
+ * with the webauthnToken and the attestation object response
193
+ */
194
+ export declare function enrollWebAuthnForLogin(body: IEnrollMFAWebAuthN): Promise<ILoginResponse>;
195
+ /**
196
+ * after login succeeded with mfaRequired token response, if the user asked to use WebAuthN as MFA
197
+ * this function should be called with the selected device id and mfaToken.
198
+ */
199
+ export declare function preVerifyMFAWebAuthNForLogin(deviceId: string, body: IPreVerifyMFA): Promise<IPreVerifyMFAWebAuthNResponse>;
200
+ /**
201
+ * after pre verify with WebAuthN, this function should be called with webauthnTokenToken, mfaToken
202
+ * and the assertion response.
203
+ */
204
+ export declare function verifyMFAWebAuthNForLogin(deviceId: string, body: IVerifyMFAWebAuthN): Promise<ILoginResponse>;
148
205
  /**
149
206
  * SSO Configurations
150
207
  */
package/auth/index.js CHANGED
@@ -134,6 +134,39 @@ export async function verifyMfa(body) {
134
134
  export async function disableMfa(body) {
135
135
  return Post(`${urls.identity.users.v1}/mfa/disable`, body);
136
136
  }
137
+ export async function preEnrollAuthenticatorAppForLogin(body) {
138
+ return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/enroll`, body);
139
+ }
140
+ export async function enrollAuthenticatorAppForLogin(body) {
141
+ return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/enroll/verify`, body);
142
+ }
143
+ export async function verifyMFAAuthenticatorAppForLogin(deviceId, body) {
144
+ return Post(`${urls.identity.auth.v1}/user/mfa/authenticator/${deviceId}/verify`, body);
145
+ }
146
+ export async function preEnrollSMSForLogin(body) {
147
+ return Post(`${urls.identity.auth.v1}/user/mfa/sms/enroll`, body);
148
+ }
149
+ export async function enrollSMSForLogin(body) {
150
+ return Post(`${urls.identity.auth.v1}/user/mfa/sms/enroll/verify`, body);
151
+ }
152
+ export async function preVerifyMFASMSForLogin(deviceId, body) {
153
+ return Post(`${urls.identity.auth.v1}/user/mfa/sms/${deviceId}`, body);
154
+ }
155
+ export async function verifyMFASMSForLogin(deviceId, body) {
156
+ return Post(`${urls.identity.auth.v1}/user/mfa/sms/${deviceId}/verify`, body);
157
+ }
158
+ export async function preEnrollWebAuthNForLogin(body) {
159
+ return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/enroll`, body);
160
+ }
161
+ export async function enrollWebAuthnForLogin(body) {
162
+ return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/enroll/verify`, body);
163
+ }
164
+ export async function preVerifyMFAWebAuthNForLogin(deviceId, body) {
165
+ return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}`, body);
166
+ }
167
+ export async function verifyMFAWebAuthNForLogin(deviceId, body) {
168
+ return Post(`${urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}/verify`, body);
169
+ }
137
170
  export async function getSamlConfiguration() {
138
171
  return Get(`${urls.team.sso.v1}/saml/configurations`);
139
172
  }
@@ -445,3 +445,66 @@ export interface IAuthStrategyConfig {
445
445
  export interface IAuthStrategiesConfig {
446
446
  secondaryAuthStrategies: IAuthStrategyConfig[];
447
447
  }
448
+ export interface IPreEnrollMFA {
449
+ mfaToken: string;
450
+ }
451
+ export interface IEnrollMFA {
452
+ mfaToken: string;
453
+ rememberDevice?: boolean;
454
+ }
455
+ export interface IPreEnrollMFAAuthenticatorAppResponse {
456
+ qrCode: string;
457
+ }
458
+ export interface IEnrollMFAAuthenticatorApp extends IEnrollMFA {
459
+ token: string;
460
+ }
461
+ export interface IPreEnrollMFASMS extends IPreEnrollMFA {
462
+ phoneNumber: string;
463
+ }
464
+ export interface IPreEnrollMFASMSResponse {
465
+ otcToken: string;
466
+ phoneNumber: string;
467
+ }
468
+ export interface IEnrollMFASMS extends IEnrollMFA {
469
+ otcToken: string;
470
+ code: string;
471
+ }
472
+ export declare enum WebAuthnDeviceType {
473
+ Android = "Android",
474
+ USBKey = "USBKey",
475
+ TouchID = "TouchID"
476
+ }
477
+ export interface IEnrollMFAWebAuthN extends IEnrollMFA {
478
+ deviceType: WebAuthnDeviceType;
479
+ webauthnToken: string;
480
+ options: IVerifyNewWebAuthnDevice;
481
+ }
482
+ export interface IPreEnrollMFAWebAuthNResponse {
483
+ options: ICreateNewDeviceSessionResponse;
484
+ }
485
+ export interface IPreVerifyMFA {
486
+ mfaToken: string;
487
+ }
488
+ export interface IVerifyMFA {
489
+ mfaToken: string;
490
+ rememberDevice?: boolean;
491
+ }
492
+ export interface IVerifyMFAAuthenticatorApp extends IVerifyMFA {
493
+ value: string;
494
+ }
495
+ export interface IPreVerifyMFASMSResponse {
496
+ otcToken: string;
497
+ phoneNumber: string;
498
+ }
499
+ export interface IVerifyMFASMS extends IVerifyMFA {
500
+ otcToken: string;
501
+ code: string;
502
+ }
503
+ export interface IPreVerifyMFAWebAuthNResponse {
504
+ webauthnToken: string;
505
+ options: IWebAuthnPreLoginResponse;
506
+ }
507
+ export interface IVerifyMFAWebAuthN extends IVerifyMFA {
508
+ webauthnToken: string;
509
+ options: Omit<IWebAuthnPostLogin, "recaptchaToken" | "invitationToken">;
510
+ }
@@ -13,4 +13,12 @@ export let SecondaryAuthStrategy;
13
13
  SecondaryAuthStrategy["WebAuthnPlatform"] = "WebAuthnPlatform";
14
14
  SecondaryAuthStrategy["WebAuthnCrossPlatform"] = "WebAuthnCrossPlatform";
15
15
  SecondaryAuthStrategy["SmsCode"] = "SmsCode";
16
- })(SecondaryAuthStrategy || (SecondaryAuthStrategy = {}));
16
+ })(SecondaryAuthStrategy || (SecondaryAuthStrategy = {}));
17
+
18
+ export let WebAuthnDeviceType;
19
+
20
+ (function (WebAuthnDeviceType) {
21
+ WebAuthnDeviceType["Android"] = "Android";
22
+ WebAuthnDeviceType["USBKey"] = "USBKey";
23
+ WebAuthnDeviceType["TouchID"] = "TouchID";
24
+ })(WebAuthnDeviceType || (WebAuthnDeviceType = {}));
package/index.js CHANGED
@@ -1,4 +1,4 @@
1
- /** @license Frontegg v3.0.33
1
+ /** @license Frontegg v3.0.35
2
2
  *
3
3
  * This source code is licensed under the MIT license found in the
4
4
  * LICENSE file in the root directory of this source tree.
@@ -30,6 +30,17 @@ var _exportNames = {
30
30
  enrollMfa: true,
31
31
  verifyMfa: true,
32
32
  disableMfa: true,
33
+ preEnrollAuthenticatorAppForLogin: true,
34
+ enrollAuthenticatorAppForLogin: true,
35
+ verifyMFAAuthenticatorAppForLogin: true,
36
+ preEnrollSMSForLogin: true,
37
+ enrollSMSForLogin: true,
38
+ preVerifyMFASMSForLogin: true,
39
+ verifyMFASMSForLogin: true,
40
+ preEnrollWebAuthNForLogin: true,
41
+ enrollWebAuthnForLogin: true,
42
+ preVerifyMFAWebAuthNForLogin: true,
43
+ verifyMFAWebAuthNForLogin: true,
33
44
  getSamlConfiguration: true,
34
45
  updateSamlConfiguration: true,
35
46
  getSamlVendorConfiguration: true,
@@ -116,7 +127,10 @@ exports.deleteSessionForUser = deleteSessionForUser;
116
127
  exports.deleteTenantApiToken = deleteTenantApiToken;
117
128
  exports.deleteUserApiToken = deleteUserApiToken;
118
129
  exports.disableMfa = disableMfa;
130
+ exports.enrollAuthenticatorAppForLogin = enrollAuthenticatorAppForLogin;
119
131
  exports.enrollMfa = enrollMfa;
132
+ exports.enrollSMSForLogin = enrollSMSForLogin;
133
+ exports.enrollWebAuthnForLogin = enrollWebAuthnForLogin;
120
134
  exports.exchangeOAuthTokens = exchangeOAuthTokens;
121
135
  exports.forgotPassword = forgotPassword;
122
136
  exports.generateLoginResponse = generateLoginResponse;
@@ -152,9 +166,14 @@ exports.oidcPostLoginV2 = oidcPostLoginV2;
152
166
  exports.passwordlessPostLogin = passwordlessPostLogin;
153
167
  exports.passwordlessPreLogin = passwordlessPreLogin;
154
168
  exports.postLogin = postLogin;
169
+ exports.preEnrollAuthenticatorAppForLogin = preEnrollAuthenticatorAppForLogin;
170
+ exports.preEnrollSMSForLogin = preEnrollSMSForLogin;
171
+ exports.preEnrollWebAuthNForLogin = preEnrollWebAuthNForLogin;
155
172
  exports.preLogin = preLogin;
156
173
  exports.preLoginV2 = preLoginV2;
157
174
  exports.preLoginWithIdpType = preLoginWithIdpType;
175
+ exports.preVerifyMFASMSForLogin = preVerifyMFASMSForLogin;
176
+ exports.preVerifyMFAWebAuthNForLogin = preVerifyMFAWebAuthNForLogin;
158
177
  exports.recoverMfaToken = recoverMfaToken;
159
178
  exports.refreshToken = refreshToken;
160
179
  exports.refreshTokenV2 = refreshTokenV2;
@@ -179,6 +198,9 @@ exports.validateSSODomain = validateSSODomain;
179
198
  exports.validateSamlDomain = validateSamlDomain;
180
199
  exports.verifyChangePhoneNumber = verifyChangePhoneNumber;
181
200
  exports.verifyInviteToken = verifyInviteToken;
201
+ exports.verifyMFAAuthenticatorAppForLogin = verifyMFAAuthenticatorAppForLogin;
202
+ exports.verifyMFASMSForLogin = verifyMFASMSForLogin;
203
+ exports.verifyMFAWebAuthNForLogin = verifyMFAWebAuthNForLogin;
182
204
  exports.verifyMfa = verifyMfa;
183
205
  exports.verifyNewDeviceSession = verifyNewDeviceSession;
184
206
  exports.verifyResetPhoneNumber = verifyResetPhoneNumber;
@@ -383,6 +405,50 @@ async function disableMfa(body) {
383
405
  return (0, _fetch.Post)(`${_constants.urls.identity.users.v1}/mfa/disable`, body);
384
406
  }
385
407
 
408
+ async function preEnrollAuthenticatorAppForLogin(body) {
409
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/enroll`, body);
410
+ }
411
+
412
+ async function enrollAuthenticatorAppForLogin(body) {
413
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/enroll/verify`, body);
414
+ }
415
+
416
+ async function verifyMFAAuthenticatorAppForLogin(deviceId, body) {
417
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/authenticator/${deviceId}/verify`, body);
418
+ }
419
+
420
+ async function preEnrollSMSForLogin(body) {
421
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/enroll`, body);
422
+ }
423
+
424
+ async function enrollSMSForLogin(body) {
425
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/enroll/verify`, body);
426
+ }
427
+
428
+ async function preVerifyMFASMSForLogin(deviceId, body) {
429
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/${deviceId}`, body);
430
+ }
431
+
432
+ async function verifyMFASMSForLogin(deviceId, body) {
433
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/sms/${deviceId}/verify`, body);
434
+ }
435
+
436
+ async function preEnrollWebAuthNForLogin(body) {
437
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/enroll`, body);
438
+ }
439
+
440
+ async function enrollWebAuthnForLogin(body) {
441
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/enroll/verify`, body);
442
+ }
443
+
444
+ async function preVerifyMFAWebAuthNForLogin(deviceId, body) {
445
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}`, body);
446
+ }
447
+
448
+ async function verifyMFAWebAuthNForLogin(deviceId, body) {
449
+ return (0, _fetch.Post)(`${_constants.urls.identity.auth.v1}/user/mfa/webauthn/${deviceId}/verify`, body);
450
+ }
451
+
386
452
  async function getSamlConfiguration() {
387
453
  return (0, _fetch.Get)(`${_constants.urls.team.sso.v1}/saml/configurations`);
388
454
  }
@@ -4,9 +4,10 @@ Object.defineProperty(exports, "__esModule", {
4
4
  value: true
5
5
  });
6
6
  var _exportNames = {
7
- SecondaryAuthStrategy: true
7
+ SecondaryAuthStrategy: true,
8
+ WebAuthnDeviceType: true
8
9
  };
9
- exports.SecondaryAuthStrategy = void 0;
10
+ exports.WebAuthnDeviceType = exports.SecondaryAuthStrategy = void 0;
10
11
 
11
12
  var _interfaces = require("./secutiry-poilicy/interfaces");
12
13
 
@@ -36,4 +37,13 @@ exports.SecondaryAuthStrategy = SecondaryAuthStrategy;
36
37
  SecondaryAuthStrategy["WebAuthnPlatform"] = "WebAuthnPlatform";
37
38
  SecondaryAuthStrategy["WebAuthnCrossPlatform"] = "WebAuthnCrossPlatform";
38
39
  SecondaryAuthStrategy["SmsCode"] = "SmsCode";
39
- })(SecondaryAuthStrategy || (exports.SecondaryAuthStrategy = SecondaryAuthStrategy = {}));
40
+ })(SecondaryAuthStrategy || (exports.SecondaryAuthStrategy = SecondaryAuthStrategy = {}));
41
+
42
+ let WebAuthnDeviceType;
43
+ exports.WebAuthnDeviceType = WebAuthnDeviceType;
44
+
45
+ (function (WebAuthnDeviceType) {
46
+ WebAuthnDeviceType["Android"] = "Android";
47
+ WebAuthnDeviceType["USBKey"] = "USBKey";
48
+ WebAuthnDeviceType["TouchID"] = "TouchID";
49
+ })(WebAuthnDeviceType || (exports.WebAuthnDeviceType = WebAuthnDeviceType = {}));
package/node/index.js CHANGED
@@ -1,4 +1,4 @@
1
- /** @license Frontegg v3.0.33
1
+ /** @license Frontegg v3.0.35
2
2
  *
3
3
  * This source code is licensed under the MIT license found in the
4
4
  * LICENSE file in the root directory of this source tree.
package/node/routers.js CHANGED
@@ -7,7 +7,7 @@ exports.fronteggSilentRefreshTokenUrl = exports.fronteggRefreshTokenUrl = export
7
7
 
8
8
  var _constants = require("./constants");
9
9
 
10
- const fronteggAuthApiRoutes = [`${_constants.urls.identity.auth.v1}/logout`, `${_constants.urls.identity.auth.v1}/user/saml/postlogin`, `${_constants.urls.identity.auth.v2}/user/oidc/postlogin`, `${_constants.urls.identity.auth.v1}/user`, `${_constants.urls.identity.auth.v1}/user/mfa/verify`, `${_constants.urls.identity.auth.v1}/user/token/refresh`, `${_constants.urls.identity.users.v1}`, `${_constants.urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/code/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${_constants.urls.identity.users.v1}/activate`, `${_constants.urls.identity.users.v1}/invitation/accept`, `${_constants.urls.oauth.v1}/token`, `${_constants.urls.oauth.v1}/authorize/silent`];
10
+ const fronteggAuthApiRoutes = [`${_constants.urls.identity.auth.v1}/logout`, `${_constants.urls.identity.auth.v1}/user/saml/postlogin`, `${_constants.urls.identity.auth.v2}/user/oidc/postlogin`, `${_constants.urls.identity.auth.v1}/user`, `${_constants.urls.identity.auth.v1}/user/mfa/verify`, `${_constants.urls.identity.auth.v1}/user/token/refresh`, `${_constants.urls.identity.users.v1}`, `${_constants.urls.identity.users.v1}/signUp`, `${_constants.urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/code/postlogin`, `${_constants.urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${_constants.urls.identity.users.v1}/activate`, `${_constants.urls.identity.users.v1}/invitation/accept`, `${_constants.urls.oauth.v1}/token`, `${_constants.urls.oauth.v1}/authorize/silent`];
11
11
  exports.fronteggAuthApiRoutes = fronteggAuthApiRoutes;
12
12
  const fronteggRefreshTokenUrl = `${_constants.urls.identity.auth.v1}/user/token/refresh`;
13
13
  exports.fronteggRefreshTokenUrl = fronteggRefreshTokenUrl;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@frontegg/rest-api",
3
- "version": "3.0.33",
3
+ "version": "3.0.35",
4
4
  "main": "./node/index.js",
5
5
  "license": "MIT",
6
6
  "dependencies": {
package/routers.js CHANGED
@@ -1,4 +1,4 @@
1
1
  import { urls } from './constants';
2
- export const fronteggAuthApiRoutes = [`${urls.identity.auth.v1}/logout`, `${urls.identity.auth.v1}/user/saml/postlogin`, `${urls.identity.auth.v2}/user/oidc/postlogin`, `${urls.identity.auth.v1}/user`, `${urls.identity.auth.v1}/user/mfa/verify`, `${urls.identity.auth.v1}/user/token/refresh`, `${urls.identity.users.v1}`, `${urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${urls.identity.auth.v1}/passwordless/code/postlogin`, `${urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${urls.identity.users.v1}/activate`, `${urls.identity.users.v1}/invitation/accept`, `${urls.oauth.v1}/token`, `${urls.oauth.v1}/authorize/silent`];
2
+ export const fronteggAuthApiRoutes = [`${urls.identity.auth.v1}/logout`, `${urls.identity.auth.v1}/user/saml/postlogin`, `${urls.identity.auth.v2}/user/oidc/postlogin`, `${urls.identity.auth.v1}/user`, `${urls.identity.auth.v1}/user/mfa/verify`, `${urls.identity.auth.v1}/user/token/refresh`, `${urls.identity.users.v1}`, `${urls.identity.users.v1}/signUp`, `${urls.identity.auth.v1}/passwordless/magiclink/postlogin`, `${urls.identity.auth.v1}/passwordless/code/postlogin`, `${urls.identity.auth.v1}/passwordless/smscode/postlogin`, `${urls.identity.users.v1}/activate`, `${urls.identity.users.v1}/invitation/accept`, `${urls.oauth.v1}/token`, `${urls.oauth.v1}/authorize/silent`];
3
3
  export const fronteggRefreshTokenUrl = `${urls.identity.auth.v1}/user/token/refresh`;
4
4
  export const fronteggSilentRefreshTokenUrl = `${urls.oauth.v1}/authorize/silent`;