@frontegg/rest-api 3.1.74 → 3.1.76-alpha.9502349697
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/BaseApiClient.d.ts +16 -0
- package/BaseApiClient.js +39 -0
- package/ContextHolder/index.d.ts +108 -27
- package/ContextHolder/index.js +155 -50
- package/FetchClient.d.ts +42 -0
- package/FetchClient.js +308 -0
- package/account-settings/index.d.ts +19 -7
- package/account-settings/index.js +23 -13
- package/applications/index.d.ts +49 -44
- package/applications/index.js +51 -37
- package/audits/index.d.ts +27 -15
- package/audits/index.js +27 -17
- package/auth/index.d.ts +817 -768
- package/auth/index.js +902 -721
- package/auth/secutiry-poilicy/index.d.ts +58 -102
- package/auth/secutiry-poilicy/index.js +122 -90
- package/auth/utils.d.ts +2 -2
- package/auth/utils.js +9 -8
- package/connectivity/index.d.ts +126 -27
- package/connectivity/index.js +147 -114
- package/directory/index.d.ts +31 -22
- package/directory/index.js +27 -15
- package/entitlements/index.d.ts +14 -8
- package/entitlements/index.js +12 -4
- package/feature-flags/index.d.ts +8 -2
- package/feature-flags/index.js +16 -8
- package/groups/index.d.ts +73 -49
- package/groups/index.js +64 -45
- package/impersonate/index.d.ts +15 -6
- package/impersonate/index.js +13 -5
- package/index.d.ts +154 -108
- package/index.js +109 -78
- package/interfaces.d.ts +10 -0
- package/metadata/index.d.ts +67 -7
- package/metadata/index.js +52 -32
- package/node/BaseApiClient.js +49 -0
- package/node/ContextHolder/index.js +155 -50
- package/node/FetchClient.js +326 -0
- package/node/account-settings/index.js +27 -16
- package/node/applications/index.js +51 -44
- package/node/audits/index.js +31 -20
- package/node/auth/index.js +768 -1035
- package/node/auth/secutiry-poilicy/index.js +125 -136
- package/node/auth/utils.js +9 -7
- package/node/connectivity/index.js +148 -187
- package/node/directory/index.js +29 -20
- package/node/entitlements/index.js +18 -5
- package/node/feature-flags/index.js +21 -9
- package/node/groups/index.js +65 -63
- package/node/impersonate/index.js +18 -5
- package/node/index.js +116 -71
- package/node/metadata/index.js +61 -52
- package/node/notifications/index.js +37 -27
- package/node/reports/index.js +78 -70
- package/node/roles/index.js +56 -51
- package/node/security-center/index.js +21 -9
- package/node/sub-tenants/index.js +90 -89
- package/node/subscriptions/index.js +69 -107
- package/node/subscriptions/invoices.js +25 -17
- package/node/subscriptions/managedSubscriptions.js +32 -27
- package/node/subscriptions/paymentMethods.js +27 -20
- package/node/subscriptions/paymentProviders.js +15 -6
- package/node/subscriptions/plans.js +17 -9
- package/node/subscriptions/providers/stripe/index.js +26 -21
- package/node/subscriptions/subscriptions.js +32 -27
- package/node/subscriptions/summaries.js +15 -6
- package/node/subscriptions/tenantConfiguration.js +17 -9
- package/node/subscriptions/vendorPublicConfigurations.js +15 -6
- package/node/teams/index.js +130 -138
- package/node/tenants/index.js +65 -60
- package/node/user-phone-numbers/index.js +32 -24
- package/node/users/index.js +58 -53
- package/node/vendor/index.js +17 -6
- package/notifications/index.d.ts +22 -16
- package/notifications/index.js +33 -22
- package/package.json +1 -1
- package/reports/index.d.ts +50 -44
- package/reports/index.js +75 -62
- package/roles/index.d.ts +44 -38
- package/roles/index.js +57 -41
- package/security-center/index.d.ts +14 -2
- package/security-center/index.js +15 -6
- package/sub-tenants/index.d.ts +57 -15
- package/sub-tenants/index.js +88 -68
- package/subscriptions/index.d.ts +56 -11
- package/subscriptions/index.js +58 -11
- package/subscriptions/invoices.d.ts +16 -13
- package/subscriptions/invoices.js +24 -14
- package/subscriptions/managedSubscriptions.d.ts +18 -15
- package/subscriptions/managedSubscriptions.js +33 -22
- package/subscriptions/paymentMethods.d.ts +16 -13
- package/subscriptions/paymentMethods.js +26 -17
- package/subscriptions/paymentProviders.d.ts +8 -5
- package/subscriptions/paymentProviders.js +11 -4
- package/subscriptions/plans.d.ts +11 -8
- package/subscriptions/plans.js +14 -6
- package/subscriptions/providers/stripe/index.d.ts +24 -21
- package/subscriptions/providers/stripe/index.js +27 -16
- package/subscriptions/subscriptions.d.ts +24 -21
- package/subscriptions/subscriptions.js +33 -22
- package/subscriptions/summaries.d.ts +7 -4
- package/subscriptions/summaries.js +10 -3
- package/subscriptions/tenantConfiguration.d.ts +6 -3
- package/subscriptions/tenantConfiguration.js +15 -7
- package/subscriptions/vendorPublicConfigurations.d.ts +5 -2
- package/subscriptions/vendorPublicConfigurations.js +11 -4
- package/teams/index.d.ts +35 -131
- package/teams/index.js +122 -93
- package/tenants/index.d.ts +25 -37
- package/tenants/index.js +62 -46
- package/tenants/interfaces.d.ts +2 -0
- package/user-phone-numbers/index.d.ts +32 -26
- package/user-phone-numbers/index.js +32 -19
- package/users/index.d.ts +21 -15
- package/users/index.js +60 -44
- package/vendor/index.d.ts +12 -6
- package/vendor/index.js +11 -4
- package/fetch.d.ts +0 -24
- package/fetch.js +0 -265
- package/node/fetch.js +0 -306
- package/node/subscriptions/providers/index.js +0 -18
- package/subscriptions/providers/index.d.ts +0 -1
- package/subscriptions/providers/index.js +0 -1
package/auth/index.d.ts
CHANGED
|
@@ -5,771 +5,820 @@ export { setTabTenantInSessionStorage, getTabTenantFromSessionStorage, getCurren
|
|
|
5
5
|
import { ISamlRolesGroup } from "../teams/interfaces";
|
|
6
6
|
import { IAcceptInvitation, IActivateAccount, IAllowedToRememberMfaDevice, ICreateSamlGroup, IDeleteApiToken, IDisableMfa, IEnrollMfaResponse, IForgotPassword, IGetActivateAccountStrategy, IGetActivateAccountStrategyResponse, IGetUserById, IGetUserPasswordConfig, ILogin, ILoginResponse, ILoginViaSocialLogin, ILoginViaSocialLoginResponse, ILoginWithMfa, IOidcPostLogin, IOidcConfiguration, IPostLogin, IPreLogin, IRecoverMFAToken, IResendActivationEmail, IResetPassword, ISamlConfiguration, ISamlVendorConfigResponse, ISignUpResponse, ISignUpUser, ISocialLoginProviderConfiguration, ITenantApiTokensData, IUpdateSamlConfiguration, IUpdateSamlGroup, IUpdateSamlRoles, IUpdateSamlVendorMetadata, IUpdateTenantApiTokensData, IUpdateUserApiTokensData, IUserApiTokensData, IUserIdResponse, IVendorConfig, IVerifyMfa, IVerifyMfaResponse, TestConfig, ISSOPublicConfiguration, IPreLoginWithIdpTypeResponse, IPasswordlessPreLogin, IPasswordlessPostLogin, ICreateSSODomain, IVerifyInviteToken, ISSODomain, ISSOConfigurationDefaultRoles, ISSOConfiguration, IUpdateSSOConfiguration, IOidcPostLoginV2, IExchangeOAuthTokens, IOAuthTokenResponse, ISocialLoginProviderConfigurationV2, ILoginResponseV2, IResetPhoneNumber, IVerifyResetPhoneNumber, IChangePhoneNumber, IVerifyResetPhoneNumberResponse, IResetPhoneNumberResponse, IWebAuthnPreLogin, IWebAuthnPostLogin, IVerifyNewWebAuthnDevice, IWebAuthnPreLoginResponse, ICreateNewDeviceSessionResponse, IAuthStrategiesConfig, ISessionResponse, IChangePhoneNumberWithVerification, IChangePhoneNumberWithVerificationResponse, IVerifyChangePhoneNumber, ISessionConfigurations, IResendInvitationEmail, IPreEnrollMFA, IEnrollMFAAuthenticatorApp, IPreEnrollMFASMS, IEnrollMFASMS, IEnrollMFAWebAuthn, IPreEnrollMFAAuthenticatorAppResponse, IPreEnrollMFAWebAuthnResponse, IVerifyMFAAuthenticatorApp, IPreVerifyMFA, IPreVerifyMFASMSResponse, IVerifyMFASMS, IPreVerifyMFAWebAuthnResponse, IVerifyMFAWebAuthn, IPreEnrollMFASMSResponse, IPreDisableMFASMSResponse, IDisableMFASMS, IDisableMFAWebAuthn, IPreDisableMFAWebAuthnResponse, UserMFADevicesResponse, WithoutMFAToken, IMFAStrategiesResponse, IOAuthLogout, IGetUserAccessTokens, IGetTenantAccessTokens, IDeleteAccessToken, ICreateTenantAccessTokenData, ICreateUserAccessTokenData, IWebAuthnDevices, ICustomSocialLoginProviderConfigurationV1, ILoginResponseV3, IPreVerifyMFAEmailCodeResponse, IVerifyMFAEmailCode, ICreateOrUpdateSSOConfigurationByMetadataUrl, GenerateStepUpRequest, GenerateStepUpResponse } from './interfaces';
|
|
7
7
|
import { IGetUserAuthorizationResponse, IUserProfile } from "../users/interfaces";
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
/**
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
/**
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
/**
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
/**
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
/**
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
/**
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
/**
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
/**
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
223
|
-
|
|
224
|
-
|
|
225
|
-
|
|
226
|
-
|
|
227
|
-
|
|
228
|
-
|
|
229
|
-
|
|
230
|
-
|
|
231
|
-
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
|
|
241
|
-
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
|
|
246
|
-
|
|
247
|
-
|
|
248
|
-
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
|
|
252
|
-
|
|
253
|
-
|
|
254
|
-
|
|
255
|
-
|
|
256
|
-
|
|
257
|
-
|
|
258
|
-
|
|
259
|
-
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
|
|
270
|
-
|
|
271
|
-
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
|
|
278
|
-
|
|
279
|
-
|
|
280
|
-
|
|
281
|
-
|
|
282
|
-
|
|
283
|
-
|
|
284
|
-
|
|
285
|
-
|
|
286
|
-
|
|
287
|
-
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
291
|
-
|
|
292
|
-
|
|
293
|
-
|
|
294
|
-
|
|
295
|
-
|
|
296
|
-
|
|
297
|
-
|
|
298
|
-
|
|
299
|
-
|
|
300
|
-
|
|
301
|
-
|
|
302
|
-
|
|
303
|
-
|
|
304
|
-
|
|
305
|
-
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
|
|
311
|
-
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
|
|
315
|
-
|
|
316
|
-
|
|
317
|
-
|
|
318
|
-
|
|
319
|
-
|
|
320
|
-
|
|
321
|
-
|
|
322
|
-
|
|
323
|
-
|
|
324
|
-
|
|
325
|
-
|
|
326
|
-
|
|
327
|
-
|
|
328
|
-
|
|
329
|
-
|
|
330
|
-
|
|
331
|
-
|
|
332
|
-
|
|
333
|
-
|
|
334
|
-
|
|
335
|
-
|
|
336
|
-
|
|
337
|
-
|
|
338
|
-
|
|
339
|
-
|
|
340
|
-
|
|
341
|
-
|
|
342
|
-
|
|
343
|
-
/**
|
|
344
|
-
|
|
345
|
-
|
|
346
|
-
|
|
347
|
-
|
|
348
|
-
|
|
349
|
-
|
|
350
|
-
|
|
351
|
-
|
|
352
|
-
|
|
353
|
-
|
|
354
|
-
|
|
355
|
-
|
|
356
|
-
|
|
357
|
-
|
|
358
|
-
|
|
359
|
-
|
|
360
|
-
|
|
361
|
-
|
|
362
|
-
|
|
363
|
-
|
|
364
|
-
|
|
365
|
-
|
|
366
|
-
|
|
367
|
-
|
|
368
|
-
|
|
369
|
-
|
|
370
|
-
|
|
371
|
-
|
|
372
|
-
|
|
373
|
-
|
|
374
|
-
|
|
375
|
-
|
|
376
|
-
|
|
377
|
-
|
|
378
|
-
|
|
379
|
-
|
|
380
|
-
|
|
381
|
-
|
|
382
|
-
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
387
|
-
|
|
388
|
-
|
|
389
|
-
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
/**
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
|
|
398
|
-
|
|
399
|
-
/**
|
|
400
|
-
|
|
401
|
-
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
|
|
409
|
-
|
|
410
|
-
|
|
411
|
-
|
|
412
|
-
/**
|
|
413
|
-
|
|
414
|
-
|
|
415
|
-
|
|
416
|
-
|
|
417
|
-
|
|
418
|
-
|
|
419
|
-
|
|
420
|
-
|
|
421
|
-
|
|
422
|
-
|
|
423
|
-
|
|
424
|
-
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
429
|
-
|
|
430
|
-
|
|
431
|
-
|
|
432
|
-
|
|
433
|
-
|
|
434
|
-
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
|
|
441
|
-
|
|
442
|
-
|
|
443
|
-
|
|
444
|
-
|
|
445
|
-
|
|
446
|
-
|
|
447
|
-
|
|
448
|
-
|
|
449
|
-
|
|
450
|
-
|
|
451
|
-
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
455
|
-
|
|
456
|
-
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
|
|
460
|
-
|
|
461
|
-
|
|
462
|
-
|
|
463
|
-
|
|
464
|
-
|
|
465
|
-
|
|
466
|
-
|
|
467
|
-
|
|
468
|
-
|
|
469
|
-
|
|
470
|
-
|
|
471
|
-
|
|
472
|
-
|
|
473
|
-
|
|
474
|
-
|
|
475
|
-
|
|
476
|
-
|
|
477
|
-
|
|
478
|
-
|
|
479
|
-
|
|
480
|
-
|
|
481
|
-
|
|
482
|
-
|
|
483
|
-
/**
|
|
484
|
-
|
|
485
|
-
|
|
486
|
-
|
|
487
|
-
/**
|
|
488
|
-
|
|
489
|
-
|
|
490
|
-
|
|
491
|
-
/**
|
|
492
|
-
|
|
493
|
-
|
|
494
|
-
|
|
495
|
-
|
|
496
|
-
|
|
497
|
-
|
|
498
|
-
|
|
499
|
-
|
|
500
|
-
|
|
501
|
-
|
|
502
|
-
/**
|
|
503
|
-
|
|
504
|
-
|
|
505
|
-
|
|
506
|
-
/**
|
|
507
|
-
|
|
508
|
-
|
|
509
|
-
|
|
510
|
-
/**
|
|
511
|
-
|
|
512
|
-
|
|
513
|
-
|
|
514
|
-
/**
|
|
515
|
-
|
|
516
|
-
|
|
517
|
-
|
|
518
|
-
/**
|
|
519
|
-
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
|
|
523
|
-
|
|
524
|
-
|
|
525
|
-
|
|
526
|
-
|
|
527
|
-
|
|
528
|
-
|
|
529
|
-
/**
|
|
530
|
-
|
|
531
|
-
|
|
532
|
-
|
|
533
|
-
/**
|
|
534
|
-
|
|
535
|
-
|
|
536
|
-
|
|
537
|
-
/**
|
|
538
|
-
|
|
539
|
-
|
|
540
|
-
|
|
541
|
-
/**
|
|
542
|
-
|
|
543
|
-
|
|
544
|
-
|
|
545
|
-
/**
|
|
546
|
-
|
|
547
|
-
|
|
548
|
-
|
|
549
|
-
/**
|
|
550
|
-
|
|
551
|
-
|
|
552
|
-
|
|
553
|
-
/**
|
|
554
|
-
|
|
555
|
-
|
|
556
|
-
|
|
557
|
-
|
|
558
|
-
|
|
559
|
-
|
|
560
|
-
|
|
561
|
-
|
|
562
|
-
|
|
563
|
-
|
|
564
|
-
|
|
565
|
-
|
|
566
|
-
|
|
567
|
-
|
|
568
|
-
|
|
569
|
-
|
|
570
|
-
|
|
571
|
-
|
|
572
|
-
|
|
573
|
-
|
|
574
|
-
|
|
575
|
-
|
|
576
|
-
|
|
577
|
-
|
|
578
|
-
|
|
579
|
-
|
|
580
|
-
|
|
581
|
-
|
|
582
|
-
|
|
583
|
-
|
|
584
|
-
|
|
585
|
-
|
|
586
|
-
|
|
587
|
-
|
|
588
|
-
|
|
589
|
-
|
|
590
|
-
|
|
591
|
-
|
|
592
|
-
|
|
593
|
-
|
|
594
|
-
|
|
595
|
-
|
|
596
|
-
|
|
597
|
-
/**
|
|
598
|
-
|
|
599
|
-
|
|
600
|
-
|
|
601
|
-
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
|
|
608
|
-
|
|
609
|
-
/**
|
|
610
|
-
|
|
611
|
-
|
|
612
|
-
|
|
613
|
-
|
|
614
|
-
|
|
615
|
-
|
|
616
|
-
|
|
617
|
-
|
|
618
|
-
|
|
619
|
-
|
|
620
|
-
|
|
621
|
-
|
|
622
|
-
|
|
623
|
-
|
|
624
|
-
|
|
625
|
-
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
|
|
630
|
-
|
|
631
|
-
|
|
632
|
-
|
|
633
|
-
|
|
634
|
-
|
|
635
|
-
|
|
636
|
-
|
|
637
|
-
|
|
638
|
-
|
|
639
|
-
|
|
640
|
-
|
|
641
|
-
|
|
642
|
-
|
|
643
|
-
|
|
644
|
-
|
|
645
|
-
|
|
646
|
-
|
|
647
|
-
|
|
648
|
-
|
|
649
|
-
|
|
650
|
-
|
|
651
|
-
|
|
652
|
-
|
|
653
|
-
|
|
654
|
-
|
|
655
|
-
|
|
656
|
-
|
|
657
|
-
|
|
658
|
-
|
|
659
|
-
|
|
660
|
-
|
|
661
|
-
|
|
662
|
-
|
|
663
|
-
|
|
664
|
-
|
|
665
|
-
|
|
666
|
-
|
|
667
|
-
|
|
668
|
-
|
|
669
|
-
|
|
670
|
-
|
|
671
|
-
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
|
|
675
|
-
|
|
676
|
-
|
|
677
|
-
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
|
|
681
|
-
|
|
682
|
-
|
|
683
|
-
|
|
684
|
-
|
|
685
|
-
|
|
686
|
-
|
|
687
|
-
|
|
688
|
-
|
|
689
|
-
|
|
690
|
-
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
|
|
697
|
-
|
|
698
|
-
|
|
699
|
-
|
|
700
|
-
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
|
|
710
|
-
|
|
711
|
-
|
|
712
|
-
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
|
|
722
|
-
|
|
723
|
-
|
|
724
|
-
|
|
725
|
-
|
|
726
|
-
|
|
727
|
-
|
|
728
|
-
|
|
729
|
-
|
|
730
|
-
|
|
731
|
-
|
|
732
|
-
|
|
733
|
-
|
|
734
|
-
|
|
735
|
-
|
|
736
|
-
|
|
737
|
-
|
|
738
|
-
|
|
739
|
-
|
|
740
|
-
|
|
741
|
-
|
|
742
|
-
|
|
743
|
-
|
|
744
|
-
|
|
745
|
-
|
|
746
|
-
|
|
747
|
-
|
|
748
|
-
|
|
749
|
-
|
|
750
|
-
|
|
751
|
-
|
|
752
|
-
|
|
753
|
-
|
|
754
|
-
|
|
755
|
-
|
|
756
|
-
|
|
757
|
-
|
|
758
|
-
|
|
759
|
-
|
|
760
|
-
|
|
761
|
-
|
|
762
|
-
|
|
763
|
-
|
|
764
|
-
|
|
765
|
-
|
|
766
|
-
|
|
767
|
-
|
|
768
|
-
|
|
769
|
-
|
|
770
|
-
|
|
771
|
-
|
|
772
|
-
|
|
773
|
-
|
|
774
|
-
*/
|
|
775
|
-
|
|
8
|
+
import { BaseApiClient } from '../BaseApiClient';
|
|
9
|
+
import { SecurityPolicyApi } from './secutiry-poilicy';
|
|
10
|
+
export declare class AuthenticationApi extends BaseApiClient {
|
|
11
|
+
private tenantsApi;
|
|
12
|
+
private entitlementsApi;
|
|
13
|
+
securityPolicy: SecurityPolicyApi;
|
|
14
|
+
constructor(appName: string);
|
|
15
|
+
generateLoginResponse: (loginResponse: ILoginResponse) => Promise<ILoginResponse>;
|
|
16
|
+
generateLoginResponseV2: (loginResponse: ILoginResponse) => Promise<ILoginResponseV2>;
|
|
17
|
+
/**
|
|
18
|
+
* @returns true if entitlements load should be done
|
|
19
|
+
*/
|
|
20
|
+
shouldLoadEntitlements(): boolean;
|
|
21
|
+
/**
|
|
22
|
+
* @returns true if me authorization load should be done
|
|
23
|
+
*/
|
|
24
|
+
shouldLoadMeAuthorization(): boolean;
|
|
25
|
+
generateLoginResponseV3: (loginResponse: ILoginResponse) => Promise<ILoginResponseV3>;
|
|
26
|
+
generateLoginResponseFromOAuthResponse: (oauthResponse: IOAuthTokenResponse) => Promise<ILoginResponse>;
|
|
27
|
+
generateLoginResponseFromOAuthResponseV2: (oauthResponse: IOAuthTokenResponse) => Promise<ILoginResponseV3>;
|
|
28
|
+
/**
|
|
29
|
+
* Check if requested email address has SSO configuration.
|
|
30
|
+
* If true, this function will return the SSO address to navigate to, else return null.
|
|
31
|
+
*/
|
|
32
|
+
preLogin: (body: IPreLogin) => Promise<string | null>;
|
|
33
|
+
/**
|
|
34
|
+
* Check if requested email address has SSO configuration.
|
|
35
|
+
* If true, this function will return the SSO address and IdpType to navigate to.
|
|
36
|
+
*/
|
|
37
|
+
preLoginWithIdpType: (body: IPreLogin) => Promise<IPreLoginWithIdpTypeResponse | null>;
|
|
38
|
+
/**
|
|
39
|
+
* After calling preLogin and navigating to the SSO URL, the IDP will redirect you to the ACS URL.
|
|
40
|
+
* Which is configured in the SSO configuration.
|
|
41
|
+
*/
|
|
42
|
+
postLogin: (body: IPostLogin) => Promise<ILoginResponse>;
|
|
43
|
+
/**
|
|
44
|
+
* After calling preLogin and navigating to the SSO URL, the IDP will redirect you to the redirect URL
|
|
45
|
+
* with code and state.
|
|
46
|
+
*/
|
|
47
|
+
oidcPostLogin: (body: IOidcPostLogin) => Promise<ILoginResponse>;
|
|
48
|
+
/**
|
|
49
|
+
* Login with username and password.
|
|
50
|
+
* If the user has two-factor authentication, the server will return mfaToken with mfaRequired: true,
|
|
51
|
+
* and then `loginWithMfa` should be called with the mfaToken and generated code.
|
|
52
|
+
* Otherwise, the server will accessToken and refreshToken.
|
|
53
|
+
* The refresh token should be used to renew your access token by calling `refreshToken`.
|
|
54
|
+
* @throw exception if login failed
|
|
55
|
+
*/
|
|
56
|
+
login: (body: ILogin) => Promise<ILoginResponse>;
|
|
57
|
+
/**
|
|
58
|
+
* Login with username and password.
|
|
59
|
+
* If the user has two-factor authentication, the server will return mfaToken with mfaRequired: true,
|
|
60
|
+
* and then `loginWithMfa` should be called with the mfaToken and generated code.
|
|
61
|
+
* Otherwise, the server will accessToken and refreshToken.
|
|
62
|
+
* The refresh token should be used to renew your access token by calling `refreshToken`.
|
|
63
|
+
* @throw exception if login failed
|
|
64
|
+
*/
|
|
65
|
+
loginv2: (body: ILogin) => Promise<ILoginResponseV3>;
|
|
66
|
+
/**
|
|
67
|
+
* After login succeeds with an mfaRequired token response, this function should be called
|
|
68
|
+
* with the mfaToken and the generated code from your authenticator app.
|
|
69
|
+
* @throw exception if generated code or mfaToken are incorrect
|
|
70
|
+
*/
|
|
71
|
+
loginWithMfa: (body: ILoginWithMfa) => Promise<ILoginResponse>;
|
|
72
|
+
/**
|
|
73
|
+
* After login succeeds with an mfaRequired token response, this function should be called
|
|
74
|
+
* with the mfaToken and the generated code from your authenticator app.
|
|
75
|
+
* @throw exception if generated code or mfaToken are incorrect
|
|
76
|
+
*/
|
|
77
|
+
loginWithMfaV2: (body: ILoginWithMfa) => Promise<ILoginResponseV3>;
|
|
78
|
+
/**
|
|
79
|
+
* activating account should be called after registering new user or deactivating account
|
|
80
|
+
* ``activateAccount`` should contains userId and the token that has been sent to the user after activation requested.
|
|
81
|
+
* @throws exception if activation failed
|
|
82
|
+
*/
|
|
83
|
+
activateAccount: (body: IActivateAccount) => Promise<void>;
|
|
84
|
+
/**
|
|
85
|
+
* activating account should be called after registering new user or deactivating account
|
|
86
|
+
* ``activateAccount`` should contains userId and the token that has been sent to the user after activation requested.
|
|
87
|
+
* @throws exception if activation failed
|
|
88
|
+
*/
|
|
89
|
+
activateAccountV2: (body: IActivateAccount) => Promise<ILoginResponseV3>;
|
|
90
|
+
/**
|
|
91
|
+
* get account activation configuration.
|
|
92
|
+
*/
|
|
93
|
+
getActivateAccountStrategy: (params: IGetActivateAccountStrategy) => Promise<IGetActivateAccountStrategyResponse>;
|
|
94
|
+
/**
|
|
95
|
+
* resend activation email should be called after a failed user activation.
|
|
96
|
+
* ``resend activation email`` should contain the user email.
|
|
97
|
+
* @throws exception if resend failed
|
|
98
|
+
*/
|
|
99
|
+
resendActivationEmail: (body: IResendActivationEmail) => Promise<void>;
|
|
100
|
+
/**
|
|
101
|
+
* resend invitation email should be called after a failed user invitation.
|
|
102
|
+
* ``resend invitation email`` should contain the user email.
|
|
103
|
+
* @throws exception if resend failed
|
|
104
|
+
*/
|
|
105
|
+
resendInvitationEmail: (body: IResendInvitationEmail) => Promise<void>;
|
|
106
|
+
/**
|
|
107
|
+
* activating account should be called after registering new user or deactivating account
|
|
108
|
+
* ``activateAccount`` should contains userId and the token that has been sent to the user after activation requested.
|
|
109
|
+
* @throws exception if activation failed
|
|
110
|
+
*/
|
|
111
|
+
acceptInvitation: (body: IAcceptInvitation) => Promise<void>;
|
|
112
|
+
/**
|
|
113
|
+
* refresh token called as authenticated use, access and refresh tokens resolved by the cookies.
|
|
114
|
+
* the server will return ILoginResponse with new access Token and refresh token and store it in the browser cookies.
|
|
115
|
+
*/
|
|
116
|
+
refreshToken: () => Promise<ILoginResponse>;
|
|
117
|
+
/**
|
|
118
|
+
* refresh token called as authenticated use, access and refresh tokens resolved by the cookies.
|
|
119
|
+
* the server will return ILoginResponseV2 with new access Token and refresh token and store it in the browser cookies, as well as the tenants.
|
|
120
|
+
*/
|
|
121
|
+
refreshTokenV2: () => Promise<ILoginResponseV2>;
|
|
122
|
+
/**
|
|
123
|
+
* refresh token called as authenticated use, access and refresh tokens resolved by the cookies.
|
|
124
|
+
* the server will return ILoginResponseV3 with new access Token and refresh token and store it in the browser cookies, as well as the tenants and the active tenant.
|
|
125
|
+
*/
|
|
126
|
+
refreshTokenV3: () => Promise<ILoginResponseV3>;
|
|
127
|
+
/**
|
|
128
|
+
* logout from server, invalidate access and refresh token, remove it from cookies.
|
|
129
|
+
*/
|
|
130
|
+
logout: () => Promise<void>;
|
|
131
|
+
/**
|
|
132
|
+
* logout from server on Hosted Login, invalidate access and refresh token, remove it from cookies.
|
|
133
|
+
*/
|
|
134
|
+
OAuthLogout: (params?: IOAuthLogout | undefined) => Promise<void>;
|
|
135
|
+
/**
|
|
136
|
+
* calling forgot password request will send email with link to reset user's password.
|
|
137
|
+
* @throws exception if the user not found
|
|
138
|
+
*/
|
|
139
|
+
forgotPassword: (body: IForgotPassword) => Promise<void>;
|
|
140
|
+
/**
|
|
141
|
+
* reset password should be called after forget password request.
|
|
142
|
+
* userId, new password and the token has been sent to the user email.
|
|
143
|
+
* @throws exception if the user not found, password validation failed or invalid token.
|
|
144
|
+
*/
|
|
145
|
+
resetPassword: (body: IResetPassword) => Promise<void>;
|
|
146
|
+
/**
|
|
147
|
+
* load password configuration for user.
|
|
148
|
+
*/
|
|
149
|
+
loadPasswordConfig: (params?: IGetUserPasswordConfig | undefined) => Promise<Partial<TestConfig> | null>;
|
|
150
|
+
/**
|
|
151
|
+
* recover Multi-Factor authentication by providing the recoveryCode
|
|
152
|
+
* that has been received when activated it
|
|
153
|
+
* @throws exception if recovery code is not valid
|
|
154
|
+
*/
|
|
155
|
+
recoverMfaToken: (body: IRecoverMFAToken) => Promise<void>;
|
|
156
|
+
/**
|
|
157
|
+
* enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
|
|
158
|
+
* the server returns qrCode as png image in base64 format
|
|
159
|
+
* @throws exception if the user already have mfa-enabled
|
|
160
|
+
* ``authorized user``
|
|
161
|
+
*/
|
|
162
|
+
enrollMfa: () => Promise<IEnrollMfaResponse>;
|
|
163
|
+
/**
|
|
164
|
+
* pre enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
|
|
165
|
+
* the server returns qrCode as png image in base64 format
|
|
166
|
+
* @throws exception if the user already have mfa-enabled
|
|
167
|
+
* ``authorized user``
|
|
168
|
+
*/
|
|
169
|
+
preEnrollMFAAuthenticatorApp: () => Promise<IPreEnrollMFAAuthenticatorAppResponse>;
|
|
170
|
+
/**
|
|
171
|
+
* enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
|
|
172
|
+
*/
|
|
173
|
+
enrollMFAAuthenticatorApp: (body: WithoutMFAToken<IEnrollMFAAuthenticatorApp>) => Promise<void>;
|
|
174
|
+
/**
|
|
175
|
+
* pre enroll Multi-Factor SMS
|
|
176
|
+
* the server returns otcToken that should be sent to the enroll function with the code that was sent to
|
|
177
|
+
*/
|
|
178
|
+
preEnrollMFASMS: (body: WithoutMFAToken<IPreEnrollMFASMS>) => Promise<IPreEnrollMFASMSResponse>;
|
|
179
|
+
/**
|
|
180
|
+
* After pre-enrolling with SMS, this function should be called
|
|
181
|
+
* with the otcToken and the code sent to the requested phone number.
|
|
182
|
+
*/
|
|
183
|
+
enrollMFASMS: (body: WithoutMFAToken<IEnrollMFASMS>) => Promise<void>;
|
|
184
|
+
/**
|
|
185
|
+
* Pre-enroll Multi-Factor to use with WebAuthn. The server returns an attestation object.
|
|
186
|
+
*/
|
|
187
|
+
preEnrollMFAWebAuthn: () => Promise<IPreEnrollMFAWebAuthnResponse>;
|
|
188
|
+
/**
|
|
189
|
+
* After pre-enrolling with WebAuthn, this function should be called
|
|
190
|
+
* with the webauthnToken and the attestation object response.
|
|
191
|
+
*/
|
|
192
|
+
enrollMFAWebAuthn: (body: WithoutMFAToken<IEnrollMFAWebAuthn>) => Promise<void>;
|
|
193
|
+
/**
|
|
194
|
+
* After enrolling MFA QR code, verify function should be called
|
|
195
|
+
* with the generated code in the Authenticator App.
|
|
196
|
+
*
|
|
197
|
+
* @return Recovery code to use to disable MFA if your device is lost. This code won't be shown again.
|
|
198
|
+
* @throws Exception if the generated token is invalid. "authorized user"
|
|
199
|
+
*/
|
|
200
|
+
verifyMfa: (body: IVerifyMfa) => Promise<IVerifyMfaResponse>;
|
|
201
|
+
/**
|
|
202
|
+
* Disable MFA by either passing the recoveryCode or the generated code from the Authenticator App.
|
|
203
|
+
*
|
|
204
|
+
* @throws Exception if the generated token or the recoveryCode are incorrect. "authorized user"
|
|
205
|
+
*/
|
|
206
|
+
disableMfa: (body: IDisableMfa) => Promise<void>;
|
|
207
|
+
/**
|
|
208
|
+
* Disable MFA Authenticator App.
|
|
209
|
+
*
|
|
210
|
+
* @throws Exception if the generated token is incorrect. "authorized user"
|
|
211
|
+
*/
|
|
212
|
+
disableMFAAuthenticatorApp: (deviceId: string, body: IDisableMfa) => Promise<void>;
|
|
213
|
+
/**
|
|
214
|
+
* Pre-disable MFA SMS, should be called if user has just one MFA device.
|
|
215
|
+
*
|
|
216
|
+
* @throws Exception if pre-disable is not required for disable. "authorized user"
|
|
217
|
+
*/
|
|
218
|
+
preDisableMFASMS: (deviceId: string) => Promise<IPreDisableMFASMSResponse>;
|
|
219
|
+
/**
|
|
220
|
+
* After pre-disable MFA SMS, this function should be called. Can also be called without pre-disable if
|
|
221
|
+
* the user has more than one MFA device.
|
|
222
|
+
*
|
|
223
|
+
* @throws Exception if pre-disable is not required for disable. "authorized user"
|
|
224
|
+
*/
|
|
225
|
+
disableMFASMS: (deviceId: string, body: IDisableMFASMS) => Promise<void>;
|
|
226
|
+
/**
|
|
227
|
+
* Pre-disable MFA WebAuthn, should be called if user has just one MFA device.
|
|
228
|
+
*
|
|
229
|
+
* @throws Exception if pre-disable is not required for disable. "authorized user"
|
|
230
|
+
*/
|
|
231
|
+
preDisableMFAWebAuthn: (deviceId: string) => Promise<IPreDisableMFAWebAuthnResponse>;
|
|
232
|
+
/**
|
|
233
|
+
* After pre-disable MFA WebAuthn, disable MFA WebAuthn should be called. Can also be called without pre-disable if
|
|
234
|
+
* the user has more than one MFA device.
|
|
235
|
+
*
|
|
236
|
+
* @throws Exception if pre-disable is not required for disable. "authorized user"
|
|
237
|
+
*/
|
|
238
|
+
disableMFAWebAuthn: (deviceId: string, body: IDisableMFAWebAuthn) => Promise<void>;
|
|
239
|
+
/**
|
|
240
|
+
* Returns user MFA devices list split into 3 arrays: webauthn, phones, and authenticators.
|
|
241
|
+
*/
|
|
242
|
+
getMFADevices: () => Promise<UserMFADevicesResponse>;
|
|
243
|
+
/**
|
|
244
|
+
* Pre-enroll Multi-Factor Auth Code to use in 3rd party apps like Google Authenticator.
|
|
245
|
+
* The server returns a qrCode as a PNG image in base64 format.
|
|
246
|
+
*/
|
|
247
|
+
preEnrollMFAAuthenticatorAppForLogin: (body: IPreEnrollMFA) => Promise<IPreEnrollMFAAuthenticatorAppResponse>;
|
|
248
|
+
/**
|
|
249
|
+
* After pre-enrolling with the authenticator app, this function should be called
|
|
250
|
+
* with the generated code in the Authenticator App.
|
|
251
|
+
*/
|
|
252
|
+
enrollMFAAuthenticatorAppForLogin: (body: IEnrollMFAAuthenticatorApp) => Promise<ILoginResponse>;
|
|
253
|
+
/**
|
|
254
|
+
* After pre-enrolling with the authenticator app, this function should be called
|
|
255
|
+
* with the generated code in the Authenticator App.
|
|
256
|
+
*/
|
|
257
|
+
enrollMFAAuthenticatorAppForLoginV2: (body: IEnrollMFAAuthenticatorApp) => Promise<ILoginResponseV3>;
|
|
258
|
+
/**
|
|
259
|
+
* After login succeeded with mfaRequired token response, this function should be called
|
|
260
|
+
* with the selected authenticator app ID, mfaToken, and the generated code from your authenticator app.
|
|
261
|
+
*/
|
|
262
|
+
verifyMFAAuthenticatorAppForLogin: (deviceId: string, body: IVerifyMFAAuthenticatorApp) => Promise<ILoginResponse>;
|
|
263
|
+
/**
|
|
264
|
+
* Pre-verify Multi-Factor Email Code. The server returns an otcToken that should be sent
|
|
265
|
+
* to the verify function with the code that was sent to the email.
|
|
266
|
+
*/
|
|
267
|
+
preVerifyMFAEmailCode: (body: IPreVerifyMFA) => Promise<IPreVerifyMFAEmailCodeResponse>;
|
|
268
|
+
/**
|
|
269
|
+
* After pre-verifying with Email Code, this function should be called
|
|
270
|
+
* with the otcToken and the code that has been sent to the email.
|
|
271
|
+
*/
|
|
272
|
+
verifyMFAEmailCode: (body: IVerifyMFAEmailCode) => Promise<ILoginResponse>;
|
|
273
|
+
/**
|
|
274
|
+
* After pre-verifying with Email Code, this function should be called
|
|
275
|
+
* with the otcToken and the code that has been sent to the email.
|
|
276
|
+
*/
|
|
277
|
+
verifyMFAEmailCodeV2: (body: IVerifyMFAEmailCode) => Promise<ILoginResponseV3>;
|
|
278
|
+
/**
|
|
279
|
+
* Pre-enroll Multi-Factor to use with SMS.
|
|
280
|
+
* The server returns an otcToken that should be sent to the enroll function with the code sent to
|
|
281
|
+
* the requested phone number.
|
|
282
|
+
*/
|
|
283
|
+
preEnrollMFASMSForLogin: (body: IPreEnrollMFASMS) => Promise<IPreEnrollMFASMSResponse>;
|
|
284
|
+
/**
|
|
285
|
+
* After pre-enrolling with SMS, this function should be called
|
|
286
|
+
* with the otcToken and the code sent to the requested phone number.
|
|
287
|
+
*/
|
|
288
|
+
enrollMFASMSForLogin: (body: IEnrollMFASMS) => Promise<ILoginResponse>;
|
|
289
|
+
/**
|
|
290
|
+
* After pre-enrolling with SMS, this function should be called
|
|
291
|
+
* with the otcToken and the code sent to the requested phone number.
|
|
292
|
+
*/
|
|
293
|
+
enrollMFASMSForLoginV2: (body: IEnrollMFASMS) => Promise<ILoginResponseV3>;
|
|
294
|
+
/**
|
|
295
|
+
* After login succeeded with mfaRequired token response, if the user asked to use SMS as MFA
|
|
296
|
+
* this function should be called with the selected device ID and mfaToken.
|
|
297
|
+
*/
|
|
298
|
+
preVerifyMFASMSForLogin: (deviceId: string, body: IPreVerifyMFA) => Promise<IPreVerifyMFASMSResponse>;
|
|
299
|
+
/**
|
|
300
|
+
* After pre-verifying with SMS, this function should be called with otcToken, mfaToken, and the code
|
|
301
|
+
* that has been sent to the selected device.
|
|
302
|
+
*/
|
|
303
|
+
verifyMFASMSForLogin: (deviceId: string, body: IVerifyMFASMS) => Promise<ILoginResponse>;
|
|
304
|
+
/**
|
|
305
|
+
* After pre-verifying with SMS, this function should be called with otcToken, mfaToken, and the code
|
|
306
|
+
* that has been sent to the selected device.
|
|
307
|
+
*/
|
|
308
|
+
verifyMFASMSForLoginV2: (deviceId: string, body: IVerifyMFASMS) => Promise<ILoginResponseV3>;
|
|
309
|
+
/**
|
|
310
|
+
* Pre-enroll Multi-Factor Authentication using WebAuthn for login.
|
|
311
|
+
* The server returns an attestation object.
|
|
312
|
+
* @param body - The request phone number
|
|
313
|
+
*/
|
|
314
|
+
preEnrollMFAWebAuthnForLogin: (body: IPreEnrollMFA) => Promise<IPreEnrollMFAWebAuthnResponse>;
|
|
315
|
+
/**
|
|
316
|
+
* After pre-enrollment with WebAuthn, enrollment should be completed with the WebAuthn token and attestation response.
|
|
317
|
+
* @param body - The enrollment data
|
|
318
|
+
*/
|
|
319
|
+
enrollMFAWebAuthnForLogin: (body: IEnrollMFAWebAuthn) => Promise<ILoginResponse>;
|
|
320
|
+
/**
|
|
321
|
+
* After pre-enrollment with WebAuthn, enrollment should be completed with the WebAuthn token and attestation response.
|
|
322
|
+
* @param body - The enrollment data
|
|
323
|
+
*/
|
|
324
|
+
enrollMFAWebAuthnForLoginV2: (body: IEnrollMFAWebAuthn) => Promise<ILoginResponseV3>;
|
|
325
|
+
/**
|
|
326
|
+
* After successful login with mfaRequired token response, use WebAuthn as MFA.
|
|
327
|
+
* @param deviceId - The device ID
|
|
328
|
+
* @param body - The verification data
|
|
329
|
+
*/
|
|
330
|
+
preVerifyMFAWebAuthnForLogin: (deviceId: string, body: IPreVerifyMFA) => Promise<IPreVerifyMFAWebAuthnResponse>;
|
|
331
|
+
/**
|
|
332
|
+
* After pre-verification with WebAuthn, verify with WebAuthn token and assertion response.
|
|
333
|
+
* @param deviceId - The device ID
|
|
334
|
+
* @param body - The verification data
|
|
335
|
+
*/
|
|
336
|
+
verifyMFAWebAuthnForLogin: (deviceId: string, body: IVerifyMFAWebAuthn) => Promise<ILoginResponse>;
|
|
337
|
+
/**
|
|
338
|
+
* After pre-verification with WebAuthn, verify with WebAuthn token and assertion response.
|
|
339
|
+
* @param deviceId - The device ID
|
|
340
|
+
* @param body - The verification data
|
|
341
|
+
*/
|
|
342
|
+
verifyMFAWebAuthnForLoginV2: (deviceId: string, body: IVerifyMFAWebAuthn) => Promise<ILoginResponseV3>;
|
|
343
|
+
/**
|
|
344
|
+
* Retrieve SAML configurations from the server by the logged-in user (tenantId, vendorId).
|
|
345
|
+
*
|
|
346
|
+
* @returns {enabled: false} if no SAML configuration is found. Otherwise, returns ISamlConfiguration.
|
|
347
|
+
*/
|
|
348
|
+
getSamlConfiguration: () => Promise<ISamlConfiguration>;
|
|
349
|
+
/**
|
|
350
|
+
* Update SAML configuration by the logged-in user (tenantId, vendorId).
|
|
351
|
+
* @param body - The SAML configuration data
|
|
352
|
+
*/
|
|
353
|
+
updateSamlConfiguration: (body: IUpdateSamlConfiguration) => Promise<ISamlConfiguration>;
|
|
354
|
+
/**
|
|
355
|
+
* Retrieve vendor SAML config from the server by the logged-in user (tenantId, vendorId).
|
|
356
|
+
*
|
|
357
|
+
* @throws - Exception 'ACS url information not found' if no SAML vendor configuration is found.
|
|
358
|
+
*/
|
|
359
|
+
getSamlVendorConfiguration: () => Promise<ISamlVendorConfigResponse>;
|
|
360
|
+
/**
|
|
361
|
+
* Update Vendor SAML metadata by the logged-in user (tenantId, vendorId).
|
|
362
|
+
*
|
|
363
|
+
* @returns {enabled: false} if no SAML configuration is found. Otherwise, returns ISamlConfiguration.
|
|
364
|
+
*/
|
|
365
|
+
updateSamlVendorMetadata: (body: IUpdateSamlVendorMetadata) => Promise<ISamlConfiguration>;
|
|
366
|
+
/**
|
|
367
|
+
* Validate SAML configuration's domain by the logged-in user (tenantId, vendorId).
|
|
368
|
+
*
|
|
369
|
+
* @returns {enabled: false} if no SAML configuration is found. Otherwise, returns ISamlConfiguration.
|
|
370
|
+
*/
|
|
371
|
+
validateSamlDomain: () => Promise<ISamlConfiguration>;
|
|
372
|
+
/**
|
|
373
|
+
* Get SAML roles for authorization.
|
|
374
|
+
*
|
|
375
|
+
* @returns An array of role IDs.
|
|
376
|
+
*/
|
|
377
|
+
getSamlRoles: () => Promise<string[]>;
|
|
378
|
+
/**
|
|
379
|
+
* Get SAML roles groups.
|
|
380
|
+
*
|
|
381
|
+
* @returns An array of groups and assigned role IDs.
|
|
382
|
+
*/
|
|
383
|
+
getSamlRolesGroups: () => Promise<ISamlRolesGroup[]>;
|
|
384
|
+
/**
|
|
385
|
+
* Update SAML roles for authorization.
|
|
386
|
+
* @param params - Role IDs data
|
|
387
|
+
*/
|
|
388
|
+
updateSamlRoles: ({ roleIds }: IUpdateSamlRoles) => Promise<void>;
|
|
389
|
+
/**
|
|
390
|
+
* Create SAML group roles for authorization.
|
|
391
|
+
* @param params - Group roles data
|
|
392
|
+
*/
|
|
393
|
+
createSamlGroup: ({ roleIds, group }: ICreateSamlGroup) => Promise<void>;
|
|
394
|
+
/**
|
|
395
|
+
* Update SAML group roles for authorization.
|
|
396
|
+
* @param params - Group roles data
|
|
397
|
+
*/
|
|
398
|
+
updateSamlGroup: ({ roleIds, group, id }: IUpdateSamlGroup) => Promise<void>;
|
|
399
|
+
/**
|
|
400
|
+
* Delete SAML group.
|
|
401
|
+
* @param params - The group ID
|
|
402
|
+
*/
|
|
403
|
+
deleteSamlGroup: ({ id }: {
|
|
404
|
+
id: string;
|
|
405
|
+
}) => Promise<void>;
|
|
406
|
+
/**
|
|
407
|
+
* Retrieve OIDC configurations from the server by the logged-in user (vendorId).
|
|
408
|
+
*
|
|
409
|
+
* @returns {active: true} if no OIDC configuration is found. Otherwise, returns IOidcConfiguration.
|
|
410
|
+
*/
|
|
411
|
+
getOidcConfiguration: () => Promise<IOidcConfiguration>;
|
|
412
|
+
/**
|
|
413
|
+
* Check if one or more SAML/OIDC configurations are active.
|
|
414
|
+
*
|
|
415
|
+
* @returns {isActive: true/false}
|
|
416
|
+
*/
|
|
417
|
+
getSSOPublicConfiguration: () => Promise<ISSOPublicConfiguration>;
|
|
418
|
+
/**
|
|
419
|
+
* Get social login providers configurations for the vendor.
|
|
420
|
+
*
|
|
421
|
+
* @returns An array of providers configurations.
|
|
422
|
+
*/
|
|
423
|
+
getSocialLoginProviders: () => Promise<ISocialLoginProviderConfiguration[]>;
|
|
424
|
+
/**
|
|
425
|
+
* Public route: Get social login providers configurations V2 supports dev credentials as well.
|
|
426
|
+
*
|
|
427
|
+
* @returns An array of providers configurations.
|
|
428
|
+
*/
|
|
429
|
+
getSocialLoginProvidersV2: () => Promise<ISocialLoginProviderConfigurationV2[]>;
|
|
430
|
+
/**
|
|
431
|
+
* Authenticated route: Get social login providers configurations V2 supports dev credentials as well.
|
|
432
|
+
*
|
|
433
|
+
* @returns An array of providers configurations.
|
|
434
|
+
*/
|
|
435
|
+
getSocialLoginProvidersV2ForAuthenticatedUser: () => Promise<ISocialLoginProviderConfigurationV2[]>;
|
|
436
|
+
/**
|
|
437
|
+
* Get custom social login providers configurations.
|
|
438
|
+
*
|
|
439
|
+
* @returns An array of custom providers configurations.
|
|
440
|
+
*/
|
|
441
|
+
getCustomSocialLoginProvidersV1: () => Promise<ICustomSocialLoginProviderConfigurationV1>;
|
|
442
|
+
/**
|
|
443
|
+
* Login using social login.
|
|
444
|
+
*
|
|
445
|
+
* @param params - Social login parameters
|
|
446
|
+
* @returns A cookie with the refresh token.
|
|
447
|
+
*/
|
|
448
|
+
loginViaSocialLogin: (params: ILoginViaSocialLogin) => Promise<ILoginViaSocialLoginResponse>;
|
|
449
|
+
/**
|
|
450
|
+
* Get vendor secure access configuration.
|
|
451
|
+
*/
|
|
452
|
+
getVendorConfig: () => Promise<IVendorConfig>;
|
|
453
|
+
/**
|
|
454
|
+
* Sign up a new user and create a new tenant.
|
|
455
|
+
*
|
|
456
|
+
* @param body - The sign-up data
|
|
457
|
+
*/
|
|
458
|
+
signUpUser: (body: ISignUpUser) => Promise<ISignUpResponse>;
|
|
459
|
+
/**
|
|
460
|
+
* Get all current user active sessions.
|
|
461
|
+
*/
|
|
462
|
+
getCurrentUserSessions: () => Promise<ISessionResponse[]>;
|
|
463
|
+
/**
|
|
464
|
+
* Get current user session.
|
|
465
|
+
*/
|
|
466
|
+
getCurrentUserSession: () => Promise<ISessionResponse>;
|
|
467
|
+
/**
|
|
468
|
+
* Revoke sessions for a user.
|
|
469
|
+
*
|
|
470
|
+
* @param userId - The user ID
|
|
471
|
+
*/
|
|
472
|
+
revokeSessionsForUser: (userId: string) => Promise<void>;
|
|
473
|
+
/**
|
|
474
|
+
* Get session configurations.
|
|
475
|
+
*/
|
|
476
|
+
getSessionConfigurations: () => Promise<ISessionConfigurations>;
|
|
477
|
+
/**
|
|
478
|
+
* Create or update session configurations.
|
|
479
|
+
*
|
|
480
|
+
* @param body - The session configuration data
|
|
481
|
+
*/
|
|
482
|
+
createOrUpdateSessionConfigrations: (body: ISessionConfigurations) => Promise<void>;
|
|
483
|
+
/**
|
|
484
|
+
* Delete user session
|
|
485
|
+
*/
|
|
486
|
+
deleteSessionForUser: (id: string) => Promise<void>;
|
|
487
|
+
/**
|
|
488
|
+
* Delete all user sessions
|
|
489
|
+
*/
|
|
490
|
+
deleteAllSessionsForUser: () => Promise<void>;
|
|
491
|
+
/**
|
|
492
|
+
* Access tokens Configurations
|
|
493
|
+
*/
|
|
494
|
+
/**
|
|
495
|
+
* Get user access tokens data
|
|
496
|
+
*/
|
|
497
|
+
getUserAccessTokensData: () => Promise<IGetUserAccessTokens>;
|
|
498
|
+
/**
|
|
499
|
+
* Get tenant access tokens data
|
|
500
|
+
*/
|
|
501
|
+
getTenantAccessTokensData: () => Promise<IGetTenantAccessTokens>;
|
|
502
|
+
/**
|
|
503
|
+
* Delete Tenant access Token
|
|
504
|
+
*/
|
|
505
|
+
deleteTenantAccessToken: ({ id, }: IDeleteAccessToken) => Promise<void>;
|
|
506
|
+
/**
|
|
507
|
+
* Delete User access Token
|
|
508
|
+
*/
|
|
509
|
+
deleteUserAccessToken: ({ id, }: IDeleteAccessToken) => Promise<void>;
|
|
510
|
+
/**
|
|
511
|
+
* Create User Access Token.
|
|
512
|
+
*/
|
|
513
|
+
createUserAccessToken: (body: ICreateUserAccessTokenData) => Promise<IUserApiTokensData>;
|
|
514
|
+
/**
|
|
515
|
+
* Create Tenant Access Token
|
|
516
|
+
*/
|
|
517
|
+
createTenantAccessToken: (body: ICreateTenantAccessTokenData) => Promise<ITenantApiTokensData>;
|
|
518
|
+
/**
|
|
519
|
+
* Api tokens Configurations
|
|
520
|
+
*/
|
|
521
|
+
/**
|
|
522
|
+
* Get user api tokens data
|
|
523
|
+
*/
|
|
524
|
+
getUserApiTokensData: () => Promise<IUserApiTokensData[]>;
|
|
525
|
+
/**
|
|
526
|
+
* Get tenant api tokens data
|
|
527
|
+
*/
|
|
528
|
+
getTenantApiTokensData: () => Promise<ITenantApiTokensData[]>;
|
|
529
|
+
/**
|
|
530
|
+
* Update User Api Tokens
|
|
531
|
+
*/
|
|
532
|
+
updateUserApiTokensData: (body: IUpdateUserApiTokensData) => Promise<IUserApiTokensData>;
|
|
533
|
+
/**
|
|
534
|
+
* Update Tenant Api Tokens
|
|
535
|
+
*/
|
|
536
|
+
updateTenantApiTokensData: (body: IUpdateTenantApiTokensData) => Promise<ITenantApiTokensData>;
|
|
537
|
+
/**
|
|
538
|
+
* Delete Tenant Api Token
|
|
539
|
+
*/
|
|
540
|
+
deleteTenantApiToken: ({ tokenId, }: IDeleteApiToken) => Promise<void>;
|
|
541
|
+
/**
|
|
542
|
+
* Delete User Api Token
|
|
543
|
+
*/
|
|
544
|
+
deleteUserApiToken: ({ tokenId, }: IDeleteApiToken) => Promise<void>;
|
|
545
|
+
/**
|
|
546
|
+
* Get Tenant Api Token Creator User
|
|
547
|
+
*/
|
|
548
|
+
getUserById: ({ userId, }: IGetUserById) => Promise<IUserIdResponse>;
|
|
549
|
+
/**
|
|
550
|
+
* Checks if remember MFA device is enabled for user.
|
|
551
|
+
*/
|
|
552
|
+
checkIfAllowToRememberMfaDevice: (mfaToken: string) => Promise<IAllowedToRememberMfaDevice>;
|
|
553
|
+
/**
|
|
554
|
+
* Passwordless pre-login authentication
|
|
555
|
+
*/
|
|
556
|
+
passwordlessPreLogin: ({ type, ...body }: IPasswordlessPreLogin) => Promise<void>;
|
|
557
|
+
passwordlessPostLoginV2: ({ type, ...body }: IPasswordlessPostLogin) => Promise<ILoginResponseV3>;
|
|
558
|
+
passwordlessPostLogin: ({ type, ...body }: IPasswordlessPostLogin) => Promise<ILoginResponse>;
|
|
559
|
+
/**
|
|
560
|
+
* Check if tenant invitation token is valid
|
|
561
|
+
* @param token - invitation token
|
|
562
|
+
* @returns tenant name
|
|
563
|
+
*/
|
|
564
|
+
verifyInviteToken: ({ token, }: IVerifyInviteToken) => Promise<string>;
|
|
565
|
+
/**
|
|
566
|
+
* SSO Configurations V1
|
|
567
|
+
*/
|
|
568
|
+
/**
|
|
569
|
+
* Retrieve SSO configurations from server by logged in user (tenantId, vendorId)
|
|
570
|
+
* @return ISSOConfiguration[]
|
|
571
|
+
* ``authorized user``
|
|
572
|
+
*/
|
|
573
|
+
getSSOConfigurations: () => Promise<ISSOConfiguration[]>;
|
|
574
|
+
/**
|
|
575
|
+
* Create SSO configuration by logged in user (tenantId, vendorId)
|
|
576
|
+
* @returns ISSOConfiguration
|
|
577
|
+
* ``authorized user``
|
|
578
|
+
*/
|
|
579
|
+
createSSOConfiguration: (body: IUpdateSSOConfiguration) => Promise<ISSOConfiguration>;
|
|
580
|
+
/**
|
|
581
|
+
* Update SSO configuration by logged in user (tenantId, vendorId)
|
|
582
|
+
* @returns ISSOConfiguration
|
|
583
|
+
* ``authorized user``
|
|
584
|
+
*/
|
|
585
|
+
updateSSOConfiguration: (ssoConfigId: string, body: IUpdateSSOConfiguration) => Promise<ISSOConfiguration>;
|
|
586
|
+
/**
|
|
587
|
+
* Delete SSO configuration by logged in user (tenantId, vendorId)
|
|
588
|
+
* ``authorized user``
|
|
589
|
+
*/
|
|
590
|
+
deleteSSOConfiguration: (ssoConfigId: string) => Promise<void>;
|
|
591
|
+
/**
|
|
592
|
+
* Create SSO configuration by metadata by logged in user (tenantId, vendorId)
|
|
593
|
+
* @returns ISSOConfiguration
|
|
594
|
+
* ``authorized user``
|
|
595
|
+
*/
|
|
596
|
+
createSSOConfigurationByMetadata: (body: IUpdateSamlVendorMetadata) => Promise<ISSOConfiguration>;
|
|
597
|
+
/**
|
|
598
|
+
* Update SSO configuration by metadata by logged in user (tenantId, vendorId)
|
|
599
|
+
* @returns ISSOConfiguration
|
|
600
|
+
* ``authorized user``
|
|
601
|
+
*/
|
|
602
|
+
updateSSOConfigurationByMetadata: (ssoConfigId: string, body: IUpdateSamlVendorMetadata) => Promise<ISSOConfiguration>;
|
|
603
|
+
/**
|
|
604
|
+
* Create SSO configuration by metadata url by logged in user (tenantId, vendorId)
|
|
605
|
+
* @returns ISSOConfiguration
|
|
606
|
+
* ``authorized user``
|
|
607
|
+
*/
|
|
608
|
+
createSSOConfigurationByMetadataUrl: (body: ICreateOrUpdateSSOConfigurationByMetadataUrl) => Promise<ISSOConfiguration>;
|
|
609
|
+
/**
|
|
610
|
+
* Update SSO configuration by metadata url by logged in user (tenantId, vendorId)
|
|
611
|
+
* @returns ISSOConfiguration
|
|
612
|
+
* ``authorized user``
|
|
613
|
+
*/
|
|
614
|
+
updateSSOConfigurationByMetadataUrl: (ssoConfigId: string, body: ICreateOrUpdateSSOConfigurationByMetadataUrl) => Promise<ISSOConfiguration>;
|
|
615
|
+
/**
|
|
616
|
+
* Create SSO configuration domain by logged in user (tenantId, vendorId)
|
|
617
|
+
* @returns ISSODomain
|
|
618
|
+
* ``authorized user``
|
|
619
|
+
*/
|
|
620
|
+
createSSODomain: (ssoConfigId: string, body: ICreateSSODomain) => Promise<ISSODomain>;
|
|
621
|
+
/**
|
|
622
|
+
* Create SSO configuration domain by logged in user (tenantId, vendorId)
|
|
623
|
+
*
|
|
624
|
+
* `authorized user`
|
|
625
|
+
*/
|
|
626
|
+
deleteSSODomain: (ssoConfigId: string, domainId: string) => Promise<void>;
|
|
627
|
+
/**
|
|
628
|
+
* Validate SSO configuration domain by logged in user (tenantId, vendorId)
|
|
629
|
+
*
|
|
630
|
+
* `authorized user`
|
|
631
|
+
* @deprecated(Use validateSSODomainV2 instead)
|
|
632
|
+
*/
|
|
633
|
+
validateSSODomain: (ssoConfigId: string, domainId: string) => Promise<void>;
|
|
634
|
+
/**
|
|
635
|
+
* Validate SSO configuration domain by logged in user (tenantId, vendorId)
|
|
636
|
+
*
|
|
637
|
+
* `authorized user`
|
|
638
|
+
*/
|
|
639
|
+
validateSSODomainV2: (ssoConfigId: string, domainId: string) => Promise<void>;
|
|
640
|
+
/**
|
|
641
|
+
* Get SSO configuration default roles by logged in user (tenantId, vendorId)
|
|
642
|
+
*
|
|
643
|
+
* `authorized user`
|
|
644
|
+
*/
|
|
645
|
+
getSSODefaultRoles: (ssoConfigId: string) => Promise<ISSOConfigurationDefaultRoles>;
|
|
646
|
+
/**
|
|
647
|
+
* Create SSO configuration default roles by logged in user (tenantId, vendorId)
|
|
648
|
+
*
|
|
649
|
+
* `authorized user`
|
|
650
|
+
*/
|
|
651
|
+
setSSODefaultRoles: (ssoConfigId: string, body: IUpdateSamlRoles) => Promise<void>;
|
|
652
|
+
/**
|
|
653
|
+
* Create SSO configuration group roles for authorization
|
|
654
|
+
*/
|
|
655
|
+
createSSOGroup: (ssoConfigId: string, body: ICreateSamlGroup) => Promise<void>;
|
|
656
|
+
/**
|
|
657
|
+
* Update SSO configuration group roles for authorization
|
|
658
|
+
*/
|
|
659
|
+
updateSSOGroup: (ssoConfigId: string, { roleIds, group, id }: IUpdateSamlGroup) => Promise<void>;
|
|
660
|
+
/**
|
|
661
|
+
* Delete SSO configuration group
|
|
662
|
+
*/
|
|
663
|
+
deleteSSOGroup: (ssoConfigId: string, groupId: string) => Promise<void>;
|
|
664
|
+
/**
|
|
665
|
+
* Get SSO configuration groups
|
|
666
|
+
*/
|
|
667
|
+
getSSOGroups: (ssoConfigId: string) => Promise<ISamlRolesGroup[]>;
|
|
668
|
+
/**
|
|
669
|
+
* Check if requested email address has sso configuration
|
|
670
|
+
* If true, this function will return the sso address to navigate to
|
|
671
|
+
* else, return null
|
|
672
|
+
*/
|
|
673
|
+
preLoginV2: (body: IPreLogin) => Promise<IPreLoginWithIdpTypeResponse | null>;
|
|
674
|
+
/**
|
|
675
|
+
* After calling preLogin and navigated to SSO url, the IDP will redirect you to the redirect url
|
|
676
|
+
* with code and state
|
|
677
|
+
*/
|
|
678
|
+
oidcPostLoginV2: (body: IOidcPostLoginV2) => Promise<ILoginResponse>;
|
|
679
|
+
exchangeOAuthTokensV2: (body: IExchangeOAuthTokens) => Promise<ILoginResponseV3>;
|
|
680
|
+
silentOAuthRefreshTokenV2: () => Promise<ILoginResponseV3>;
|
|
681
|
+
exchangeOAuthTokens: (body: IExchangeOAuthTokens) => Promise<ILoginResponse>;
|
|
682
|
+
silentOAuthRefreshToken: () => Promise<ILoginResponse>;
|
|
683
|
+
/**
|
|
684
|
+
* Reset phone should be called in case user want to reset his phone number
|
|
685
|
+
* when using sms authentication strategy. A 6-digits code will be sent to the user email.
|
|
686
|
+
*/
|
|
687
|
+
resetPhoneNumber: (body: IResetPhoneNumber) => Promise<IResetPhoneNumberResponse>;
|
|
688
|
+
/**
|
|
689
|
+
* Verify reset phone should be called after reset phone number request
|
|
690
|
+
* with the token received from the reset phone number request and a code that was sent to the user email
|
|
691
|
+
*/
|
|
692
|
+
verifyResetPhoneNumber: (body: IVerifyResetPhoneNumber) => Promise<IVerifyResetPhoneNumberResponse>;
|
|
693
|
+
/**
|
|
694
|
+
* Change phone number with verification.
|
|
695
|
+
*/
|
|
696
|
+
changePhoneNumberWithVerification: (body: IChangePhoneNumberWithVerification) => Promise<IChangePhoneNumberWithVerificationResponse>;
|
|
697
|
+
/**
|
|
698
|
+
* Verify new phone number.
|
|
699
|
+
*/
|
|
700
|
+
verifyChangePhoneNumber: (body: IVerifyChangePhoneNumber) => Promise<void>;
|
|
701
|
+
/**
|
|
702
|
+
* Change phone number should be called after verify reset phone number with the new phone number
|
|
703
|
+
*/
|
|
704
|
+
changePhoneNumber: (body: IChangePhoneNumber) => Promise<void>;
|
|
705
|
+
/**
|
|
706
|
+
* WebAuthn prelogin should be called when the user wants to be authenticated using his device/android/usb key
|
|
707
|
+
*/
|
|
708
|
+
webAuthnPreLogin: (body: IWebAuthnPreLogin) => Promise<IWebAuthnPreLoginResponse>;
|
|
709
|
+
/**
|
|
710
|
+
* WebAuthn postlogin should be called after the user used his authenticator (device/android/usb key) in order to login
|
|
711
|
+
*/
|
|
712
|
+
webAuthnPostLogin: (body: IWebAuthnPostLogin) => Promise<ILoginResponse>;
|
|
713
|
+
/**
|
|
714
|
+
* WebAuthn postlogin should be called after the user used his authenticator (device/android/usb key) in order to login
|
|
715
|
+
*/
|
|
716
|
+
webAuthnPostLoginV2: (body: IWebAuthnPostLogin) => Promise<ILoginResponseV3>;
|
|
717
|
+
/**
|
|
718
|
+
* WebAuthn create new device should be called once the user wants to add new device as authenticator
|
|
719
|
+
*/
|
|
720
|
+
webAuthnCreateNewDeviceSession: () => Promise<ICreateNewDeviceSessionResponse>;
|
|
721
|
+
/**
|
|
722
|
+
* Get WebAuthn devices should be called in order to get user's WebAuthn devices
|
|
723
|
+
*/
|
|
724
|
+
getWebAuthnDevices: () => Promise<IWebAuthnDevices>;
|
|
725
|
+
/**
|
|
726
|
+
* Delete WebAuthn device should be called in order to delete user's WebAuthn device
|
|
727
|
+
*/
|
|
728
|
+
deleteWebAuthnDevice: (deviceId: string) => Promise<void>;
|
|
729
|
+
/**
|
|
730
|
+
* WebAuthn verify new device should be called after the user used his authenticator in order to register the new device
|
|
731
|
+
*/
|
|
732
|
+
verifyNewDeviceSession: (body: IVerifyNewWebAuthnDevice) => Promise<void>;
|
|
733
|
+
/**
|
|
734
|
+
* ##### Public route
|
|
735
|
+
* Get public vendor auth strategies public configuration
|
|
736
|
+
*/
|
|
737
|
+
getVendorPublicAuthStrategiesConfig: () => Promise<IAuthStrategiesConfig>;
|
|
738
|
+
/**
|
|
739
|
+
* ##### Authenticated route
|
|
740
|
+
* Get public vendor auth strategies public configuration
|
|
741
|
+
*/
|
|
742
|
+
getPublicAuthStrategiesConfigForAuthenticatedUser: () => Promise<IAuthStrategiesConfig>;
|
|
743
|
+
/**
|
|
744
|
+
* Get vendor MFA strategies configuration
|
|
745
|
+
*/
|
|
746
|
+
getMFAStrategiesConfig: () => Promise<IMFAStrategiesResponse>;
|
|
747
|
+
/**
|
|
748
|
+
* Get user permissions and roles
|
|
749
|
+
*/
|
|
750
|
+
getUserAuthorization: () => Promise<IGetUserAuthorizationResponse>;
|
|
751
|
+
/**
|
|
752
|
+
* Get user profile
|
|
753
|
+
*/
|
|
754
|
+
getMeV2: () => Promise<IUserProfile>;
|
|
755
|
+
/**
|
|
756
|
+
* A load entitlements function that catches errors and return undefined if failed to load
|
|
757
|
+
* @returns the loaded entitlements object or undefined if failed to load
|
|
758
|
+
*/
|
|
759
|
+
private noThrowLoadEntitlements;
|
|
760
|
+
/**
|
|
761
|
+
* @returns me and authorization response with entitlements inside user.entitlements
|
|
762
|
+
* Me request will be executed, and me authorization and entitlements will be executed according to FF and configuration.
|
|
763
|
+
*/
|
|
764
|
+
getMeAndEntitlements: () => Promise<IUserProfile>;
|
|
765
|
+
/**
|
|
766
|
+
* Generate step-up session
|
|
767
|
+
* This request returns the step up details to continue step up, or the generated login response when stepped up JWT received from the BE
|
|
768
|
+
*/
|
|
769
|
+
generateStepupSession: (body: GenerateStepUpRequest) => Promise<GenerateStepUpResponse | ILoginResponseV3>;
|
|
770
|
+
/** @deprecated use api.auth.securityPolicy.getGlobalSecurityPolicy() or api.securityPolicy.getGlobalSecurityPolicy() instead */
|
|
771
|
+
getGlobalSecurityPolicy: () => Promise<import("./interfaces").ISecurityPolicy>;
|
|
772
|
+
/** @deprecated use api.auth.securityPolicy.getMfaPolicy() or api.securityPolicy.getMfaPolicy() instead */
|
|
773
|
+
getMfaPolicy: () => Promise<import("./interfaces").ISecurityPolicyMfa>;
|
|
774
|
+
/** @deprecated use api.auth.securityPolicy.getVendorMfaPolicy() or api.securityPolicy.getVendorMfaPolicy() instead */
|
|
775
|
+
getVendorMfaPolicy: () => Promise<import("./interfaces").ISecurityPolicyMfa>;
|
|
776
|
+
/** @deprecated use api.auth.securityPolicy.saveMfaPolicy() or api.securityPolicy.saveMfaPolicy() instead */
|
|
777
|
+
saveMfaPolicy: (body: import("./interfaces").ISaveSecurityPolicyMfa) => Promise<import("./interfaces").ISecurityPolicyMfa>;
|
|
778
|
+
/** @deprecated use api.auth.securityPolicy.getLockoutPolicy() or api.securityPolicy.getLockoutPolicy() instead */
|
|
779
|
+
getLockoutPolicy: () => Promise<import("./interfaces").ISecurityPolicyLockout>;
|
|
780
|
+
/** @deprecated use api.auth.securityPolicy.getVendorLockoutPolicy() or api.securityPolicy.getVendorLockoutPolicy() instead */
|
|
781
|
+
getVendorLockoutPolicy: () => Promise<import("./interfaces").ISecurityPolicyLockout>;
|
|
782
|
+
/** @deprecated use api.auth.securityPolicy.saveLockoutPolicy() or api.securityPolicy.saveLockoutPolicy() instead */
|
|
783
|
+
saveLockoutPolicy: (body: import("./interfaces").ISaveSecurityPolicyLockout) => Promise<import("./interfaces").ISecurityPolicyLockout>;
|
|
784
|
+
/** @deprecated use api.auth.securityPolicy.getCaptchaPolicy() or api.securityPolicy.getCaptchaPolicy() instead */
|
|
785
|
+
getCaptchaPolicy: () => Promise<import("./interfaces").ISecurityPolicyCaptcha | null>;
|
|
786
|
+
/** @deprecated use api.auth.securityPolicy.getPasswordHistoryPolicy() or api.securityPolicy.getPasswordHistoryPolicy() instead */
|
|
787
|
+
getPasswordHistoryPolicy: () => Promise<import("./interfaces").ISecurityPolicyPasswordHistory>;
|
|
788
|
+
/** @deprecated use api.auth.securityPolicy.getVendorPasswordHistoryPolicy() or api.securityPolicy.getVendorPasswordHistoryPolicy() instead */
|
|
789
|
+
getVendorPasswordHistoryPolicy: () => Promise<import("./interfaces").ISecurityPolicyPasswordHistory>;
|
|
790
|
+
/** @deprecated use api.auth.securityPolicy.savePasswordHistoryPolicy() or api.securityPolicy.savePasswordHistoryPolicy() instead */
|
|
791
|
+
savePasswordHistoryPolicy: (body: import("./interfaces").ISaveSecurityPolicyPasswordHistory) => Promise<import("./interfaces").ISecurityPolicyPasswordHistory>;
|
|
792
|
+
/** @deprecated use api.auth.securityPolicy.getPasswordConfigPolicy() or api.securityPolicy.getPasswordConfigPolicy() instead */
|
|
793
|
+
getPasswordConfigPolicy: () => Promise<Partial<TestConfig>>;
|
|
794
|
+
/** @deprecated use api.auth.securityPolicy.getDomainRestrictions() or api.securityPolicy.getDomainRestrictions() instead */
|
|
795
|
+
getDomainRestrictions: () => Promise<{
|
|
796
|
+
items: import("./interfaces").DomainRestriction[];
|
|
797
|
+
}>;
|
|
798
|
+
/** @deprecated use api.auth.securityPolicy.getDomainRestrictionsConfig() or api.securityPolicy.getDomainRestrictionsConfig() instead */
|
|
799
|
+
getDomainRestrictionsConfig: () => Promise<import("./interfaces").DomainRestrictionConfig>;
|
|
800
|
+
/** @deprecated use api.auth.securityPolicy.createDomainRestriction() or api.securityPolicy.createDomainRestriction() instead */
|
|
801
|
+
createDomainRestriction: (body: import("./interfaces").CreateDomainRestriction) => Promise<import("./interfaces").DomainRestriction>;
|
|
802
|
+
/** @deprecated use api.auth.securityPolicy.updateDomainRestrictionConfig() or api.securityPolicy.updateDomainRestrictionConfig() instead */
|
|
803
|
+
updateDomainRestrictionConfig: (body: import("./interfaces").UpdateDomainRestrictionsConfig) => Promise<import("./interfaces").DomainRestrictionConfig>;
|
|
804
|
+
/** @deprecated use api.auth.securityPolicy.deleteDomainRestriction() or api.securityPolicy.deleteDomainRestriction() instead */
|
|
805
|
+
deleteDomainRestriction: (id: string) => Promise<void>;
|
|
806
|
+
/** @deprecated use api.auth.securityPolicy.getIPRestrictions() or api.securityPolicy.getIPRestrictions() instead */
|
|
807
|
+
getIPRestrictions: (params: import("./interfaces").GetIPRestrictionsParams) => Promise<import("..").FronteggPaginationResult<import("./interfaces").IpRestriction[]>>;
|
|
808
|
+
/** @deprecated use api.auth.securityPolicy.getIPRestrictionsConfig() or api.securityPolicy.getIPRestrictionsConfig() instead */
|
|
809
|
+
getIPRestrictionsConfig: () => Promise<import("./interfaces").IPRestrictionsConfig>;
|
|
810
|
+
/** @deprecated use api.auth.securityPolicy.createIPRestriction() or api.securityPolicy.createIPRestriction() instead */
|
|
811
|
+
createIPRestriction: (body: import("./interfaces").CreateIpRestriction) => Promise<void>;
|
|
812
|
+
/** @deprecated use api.auth.securityPolicy.bulkCreateIPRestriction() or api.securityPolicy.bulkCreateIPRestriction() instead */
|
|
813
|
+
bulkCreateIPRestriction: (body: import("./interfaces").BulkCreateIpRestriction) => Promise<void>;
|
|
814
|
+
/** @deprecated use api.auth.securityPolicy.updateIPRestrictionConfig() or api.securityPolicy.updateIPRestrictionConfig() instead */
|
|
815
|
+
updateIPRestrictionConfig: (body: import("./interfaces").IPRestrictionsConfig) => Promise<void>;
|
|
816
|
+
/** @deprecated use api.auth.securityPolicy.deleteIPRestriction() or api.securityPolicy.deleteIPRestriction() instead */
|
|
817
|
+
deleteIPRestriction: (id: string) => Promise<void>;
|
|
818
|
+
/** @deprecated use api.auth.securityPolicy.testCurrentIp() or api.securityPolicy.testCurrentIp() instead */
|
|
819
|
+
testCurrentIp: () => Promise<import("./interfaces").IPValidResponse>;
|
|
820
|
+
/** @deprecated use api.auth.securityPolicy.testCurrentIpInAllowList() or api.securityPolicy.testCurrentIpInAllowList() instead */
|
|
821
|
+
testCurrentIpInAllowList: () => Promise<import("./interfaces").IPValidResponse>;
|
|
822
|
+
}
|
|
823
|
+
declare const _default: AuthenticationApi;
|
|
824
|
+
export default _default;
|