@seamapi/types 1.805.0 → 1.807.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +7 -25
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +5 -23
- package/dist/index.cjs +7 -25
- package/dist/index.cjs.map +1 -1
- package/lib/seam/connect/models/acs/acs-access-group.js +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +1 -1
- package/lib/seam/connect/openapi.d.ts +0 -18
- package/lib/seam/connect/openapi.js +4 -22
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +5 -5
- package/package.json +2 -2
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +1 -1
- package/src/lib/seam/connect/openapi.ts +4 -22
- package/src/lib/seam/connect/route-types.ts +5 -5
|
@@ -124,7 +124,7 @@ export const acs_access_group = common_acs_access_group.extend({
|
|
|
124
124
|
|
|
125
125
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
126
126
|
|
|
127
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
127
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
128
128
|
`);
|
|
129
129
|
export const unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
130
130
|
is_managed: z.literal(false),
|
|
@@ -64,6 +64,6 @@ export const acs_encoder = z.object({
|
|
|
64
64
|
|
|
65
65
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
66
66
|
|
|
67
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
67
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
68
68
|
`);
|
|
69
69
|
//# sourceMappingURL=acs-encoder.js.map
|
|
@@ -234,7 +234,7 @@ export const acs_user = common_acs_user.merge(z.object({
|
|
|
234
234
|
|
|
235
235
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
236
236
|
|
|
237
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
237
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
238
238
|
`);
|
|
239
239
|
export const unmanaged_acs_user = common_acs_user.merge(z.object({
|
|
240
240
|
is_managed: z.literal(false),
|
|
@@ -23275,7 +23275,6 @@ declare const _default: {
|
|
|
23275
23275
|
})[];
|
|
23276
23276
|
summary: string;
|
|
23277
23277
|
tags: never[];
|
|
23278
|
-
'x-draft': string;
|
|
23279
23278
|
'x-fern-sdk-group-name': string[];
|
|
23280
23279
|
'x-fern-sdk-method-name': string;
|
|
23281
23280
|
'x-fern-sdk-return-value': string;
|
|
@@ -23344,7 +23343,6 @@ declare const _default: {
|
|
|
23344
23343
|
})[];
|
|
23345
23344
|
summary: string;
|
|
23346
23345
|
tags: never[];
|
|
23347
|
-
'x-draft': string;
|
|
23348
23346
|
'x-fern-sdk-group-name': string[];
|
|
23349
23347
|
'x-fern-sdk-method-name': string;
|
|
23350
23348
|
'x-response-key': null;
|
|
@@ -23417,7 +23415,6 @@ declare const _default: {
|
|
|
23417
23415
|
})[];
|
|
23418
23416
|
summary: string;
|
|
23419
23417
|
tags: never[];
|
|
23420
|
-
'x-draft': string;
|
|
23421
23418
|
'x-fern-sdk-group-name': string[];
|
|
23422
23419
|
'x-fern-sdk-method-name': string;
|
|
23423
23420
|
'x-response-key': null;
|
|
@@ -23478,7 +23475,6 @@ declare const _default: {
|
|
|
23478
23475
|
})[];
|
|
23479
23476
|
summary: string;
|
|
23480
23477
|
tags: never[];
|
|
23481
|
-
'x-draft': string;
|
|
23482
23478
|
'x-fern-sdk-group-name': string[];
|
|
23483
23479
|
'x-fern-sdk-method-name': string;
|
|
23484
23480
|
'x-fern-sdk-return-value': string;
|
|
@@ -23568,7 +23564,6 @@ declare const _default: {
|
|
|
23568
23564
|
})[];
|
|
23569
23565
|
summary: string;
|
|
23570
23566
|
tags: never[];
|
|
23571
|
-
'x-draft': string;
|
|
23572
23567
|
'x-fern-sdk-group-name': string[];
|
|
23573
23568
|
'x-fern-sdk-method-name': string;
|
|
23574
23569
|
'x-fern-sdk-return-value': string;
|
|
@@ -23712,7 +23707,6 @@ declare const _default: {
|
|
|
23712
23707
|
summary: string;
|
|
23713
23708
|
tags: never[];
|
|
23714
23709
|
'x-batch-keys': string[];
|
|
23715
|
-
'x-draft': string;
|
|
23716
23710
|
'x-fern-sdk-group-name': string[];
|
|
23717
23711
|
'x-fern-sdk-method-name': string;
|
|
23718
23712
|
'x-fern-sdk-return-value': string;
|
|
@@ -23857,7 +23851,6 @@ declare const _default: {
|
|
|
23857
23851
|
summary: string;
|
|
23858
23852
|
tags: never[];
|
|
23859
23853
|
'x-batch-keys': string[];
|
|
23860
|
-
'x-draft': string;
|
|
23861
23854
|
'x-fern-sdk-group-name': string[];
|
|
23862
23855
|
'x-fern-sdk-method-name': string;
|
|
23863
23856
|
'x-fern-sdk-return-value': string;
|
|
@@ -24007,7 +24000,6 @@ declare const _default: {
|
|
|
24007
24000
|
})[];
|
|
24008
24001
|
summary: string;
|
|
24009
24002
|
tags: never[];
|
|
24010
|
-
'x-draft': string;
|
|
24011
24003
|
'x-fern-sdk-group-name': string[];
|
|
24012
24004
|
'x-fern-sdk-method-name': string;
|
|
24013
24005
|
'x-fern-sdk-return-value': string;
|
|
@@ -24147,7 +24139,6 @@ declare const _default: {
|
|
|
24147
24139
|
})[];
|
|
24148
24140
|
summary: string;
|
|
24149
24141
|
tags: never[];
|
|
24150
|
-
'x-draft': string;
|
|
24151
24142
|
'x-fern-sdk-group-name': string[];
|
|
24152
24143
|
'x-fern-sdk-method-name': string;
|
|
24153
24144
|
'x-fern-sdk-return-value': string;
|
|
@@ -24254,7 +24245,6 @@ declare const _default: {
|
|
|
24254
24245
|
})[];
|
|
24255
24246
|
summary: string;
|
|
24256
24247
|
tags: never[];
|
|
24257
|
-
'x-draft': string;
|
|
24258
24248
|
'x-fern-sdk-group-name': string[];
|
|
24259
24249
|
'x-fern-sdk-method-name': string;
|
|
24260
24250
|
'x-fern-sdk-return-value': string;
|
|
@@ -24792,7 +24782,6 @@ declare const _default: {
|
|
|
24792
24782
|
})[];
|
|
24793
24783
|
summary: string;
|
|
24794
24784
|
tags: never[];
|
|
24795
|
-
'x-draft': string;
|
|
24796
24785
|
'x-fern-sdk-group-name': string[];
|
|
24797
24786
|
'x-fern-sdk-method-name': string;
|
|
24798
24787
|
'x-fern-sdk-return-value': string;
|
|
@@ -25335,7 +25324,6 @@ declare const _default: {
|
|
|
25335
25324
|
})[];
|
|
25336
25325
|
summary: string;
|
|
25337
25326
|
tags: never[];
|
|
25338
|
-
'x-draft': string;
|
|
25339
25327
|
'x-fern-sdk-group-name': string[];
|
|
25340
25328
|
'x-fern-sdk-method-name': string;
|
|
25341
25329
|
'x-fern-sdk-return-value': string;
|
|
@@ -25910,7 +25898,6 @@ declare const _default: {
|
|
|
25910
25898
|
})[];
|
|
25911
25899
|
summary: string;
|
|
25912
25900
|
tags: never[];
|
|
25913
|
-
'x-draft': string;
|
|
25914
25901
|
'x-fern-sdk-group-name': string[];
|
|
25915
25902
|
'x-fern-sdk-method-name': string;
|
|
25916
25903
|
'x-fern-sdk-return-value': string;
|
|
@@ -26483,7 +26470,6 @@ declare const _default: {
|
|
|
26483
26470
|
})[];
|
|
26484
26471
|
summary: string;
|
|
26485
26472
|
tags: never[];
|
|
26486
|
-
'x-draft': string;
|
|
26487
26473
|
'x-fern-sdk-group-name': string[];
|
|
26488
26474
|
'x-fern-sdk-method-name': string;
|
|
26489
26475
|
'x-fern-sdk-return-value': string;
|
|
@@ -26568,7 +26554,6 @@ declare const _default: {
|
|
|
26568
26554
|
})[];
|
|
26569
26555
|
summary: string;
|
|
26570
26556
|
tags: never[];
|
|
26571
|
-
'x-draft': string;
|
|
26572
26557
|
'x-fern-sdk-group-name': string[];
|
|
26573
26558
|
'x-fern-sdk-method-name': string;
|
|
26574
26559
|
'x-response-key': null;
|
|
@@ -26650,7 +26635,6 @@ declare const _default: {
|
|
|
26650
26635
|
})[];
|
|
26651
26636
|
summary: string;
|
|
26652
26637
|
tags: never[];
|
|
26653
|
-
'x-draft': string;
|
|
26654
26638
|
'x-fern-sdk-group-name': string[];
|
|
26655
26639
|
'x-fern-sdk-method-name': string;
|
|
26656
26640
|
'x-response-key': null;
|
|
@@ -26741,7 +26725,6 @@ declare const _default: {
|
|
|
26741
26725
|
})[];
|
|
26742
26726
|
summary: string;
|
|
26743
26727
|
tags: never[];
|
|
26744
|
-
'x-draft': string;
|
|
26745
26728
|
'x-fern-sdk-group-name': string[];
|
|
26746
26729
|
'x-fern-sdk-method-name': string;
|
|
26747
26730
|
'x-response-key': null;
|
|
@@ -26830,7 +26813,6 @@ declare const _default: {
|
|
|
26830
26813
|
})[];
|
|
26831
26814
|
summary: string;
|
|
26832
26815
|
tags: never[];
|
|
26833
|
-
'x-draft': string;
|
|
26834
26816
|
'x-fern-sdk-group-name': string[];
|
|
26835
26817
|
'x-fern-sdk-method-name': string;
|
|
26836
26818
|
'x-response-key': null;
|
|
@@ -2689,7 +2689,7 @@ export default {
|
|
|
2689
2689
|
'x-route-path': '/access_methods',
|
|
2690
2690
|
},
|
|
2691
2691
|
acs_access_group: {
|
|
2692
|
-
description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
2692
|
+
description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
2693
2693
|
properties: {
|
|
2694
2694
|
access_group_type: {
|
|
2695
2695
|
deprecated: true,
|
|
@@ -3617,7 +3617,7 @@ export default {
|
|
|
3617
3617
|
'x-undocumented': 'Deprecated. Will be removed.',
|
|
3618
3618
|
},
|
|
3619
3619
|
acs_encoder: {
|
|
3620
|
-
description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3620
|
+
description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
3621
3621
|
properties: {
|
|
3622
3622
|
acs_encoder_id: {
|
|
3623
3623
|
description: 'ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.',
|
|
@@ -4374,7 +4374,7 @@ export default {
|
|
|
4374
4374
|
'x-route-path': '/acs/systems',
|
|
4375
4375
|
},
|
|
4376
4376
|
acs_user: {
|
|
4377
|
-
description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4377
|
+
description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
4378
4378
|
properties: {
|
|
4379
4379
|
access_schedule: {
|
|
4380
4380
|
description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
|
|
@@ -31274,7 +31274,6 @@ export default {
|
|
|
31274
31274
|
],
|
|
31275
31275
|
summary: '/access_grants/create',
|
|
31276
31276
|
tags: [],
|
|
31277
|
-
'x-draft': 'Early access.',
|
|
31278
31277
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31279
31278
|
'x-fern-sdk-method-name': 'create',
|
|
31280
31279
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -31322,7 +31321,6 @@ export default {
|
|
|
31322
31321
|
],
|
|
31323
31322
|
summary: '/access_grants/delete',
|
|
31324
31323
|
tags: [],
|
|
31325
|
-
'x-draft': 'Early access.',
|
|
31326
31324
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31327
31325
|
'x-fern-sdk-method-name': 'delete',
|
|
31328
31326
|
'x-response-key': null,
|
|
@@ -31372,7 +31370,6 @@ export default {
|
|
|
31372
31370
|
],
|
|
31373
31371
|
summary: '/access_grants/delete',
|
|
31374
31372
|
tags: [],
|
|
31375
|
-
'x-draft': 'Early access.',
|
|
31376
31373
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31377
31374
|
'x-fern-sdk-method-name': 'delete',
|
|
31378
31375
|
'x-response-key': null,
|
|
@@ -31410,7 +31407,6 @@ export default {
|
|
|
31410
31407
|
],
|
|
31411
31408
|
summary: '/access_grants/get',
|
|
31412
31409
|
tags: [],
|
|
31413
|
-
'x-draft': 'Early access.',
|
|
31414
31410
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31415
31411
|
'x-fern-sdk-method-name': 'get',
|
|
31416
31412
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -31478,7 +31474,6 @@ export default {
|
|
|
31478
31474
|
],
|
|
31479
31475
|
summary: '/access_grants/get',
|
|
31480
31476
|
tags: [],
|
|
31481
|
-
'x-draft': 'Early access.',
|
|
31482
31477
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31483
31478
|
'x-fern-sdk-method-name': 'get',
|
|
31484
31479
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -31628,7 +31623,6 @@ export default {
|
|
|
31628
31623
|
'acs_access_groups',
|
|
31629
31624
|
'access_methods',
|
|
31630
31625
|
],
|
|
31631
|
-
'x-draft': 'Early access.',
|
|
31632
31626
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31633
31627
|
'x-fern-sdk-method-name': 'get_related',
|
|
31634
31628
|
'x-fern-sdk-return-value': 'batch',
|
|
@@ -31769,7 +31763,6 @@ export default {
|
|
|
31769
31763
|
'acs_access_groups',
|
|
31770
31764
|
'access_methods',
|
|
31771
31765
|
],
|
|
31772
|
-
'x-draft': 'Early access.',
|
|
31773
31766
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31774
31767
|
'x-fern-sdk-method-name': 'get_related',
|
|
31775
31768
|
'x-fern-sdk-return-value': 'batch',
|
|
@@ -31922,7 +31915,6 @@ export default {
|
|
|
31922
31915
|
],
|
|
31923
31916
|
summary: '/access_grants/list',
|
|
31924
31917
|
tags: [],
|
|
31925
|
-
'x-draft': 'Early access.',
|
|
31926
31918
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
31927
31919
|
'x-fern-sdk-method-name': 'list',
|
|
31928
31920
|
'x-fern-sdk-return-value': 'access_grants',
|
|
@@ -32034,7 +32026,6 @@ export default {
|
|
|
32034
32026
|
],
|
|
32035
32027
|
summary: '/access_grants/list',
|
|
32036
32028
|
tags: [],
|
|
32037
|
-
'x-draft': 'Early access.',
|
|
32038
32029
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
32039
32030
|
'x-fern-sdk-method-name': 'list',
|
|
32040
32031
|
'x-fern-sdk-return-value': 'access_grants',
|
|
@@ -32118,7 +32109,6 @@ export default {
|
|
|
32118
32109
|
],
|
|
32119
32110
|
summary: '/access_grants/request_access_methods',
|
|
32120
32111
|
tags: [],
|
|
32121
|
-
'x-draft': 'Early access.',
|
|
32122
32112
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
32123
32113
|
'x-fern-sdk-method-name': 'request_access_methods',
|
|
32124
32114
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -32697,7 +32687,6 @@ export default {
|
|
|
32697
32687
|
],
|
|
32698
32688
|
summary: '/access_grants/unmanaged/get',
|
|
32699
32689
|
tags: [],
|
|
32700
|
-
'x-draft': 'Early access.',
|
|
32701
32690
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
32702
32691
|
'x-fern-sdk-method-name': 'get',
|
|
32703
32692
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -33279,7 +33268,6 @@ export default {
|
|
|
33279
33268
|
],
|
|
33280
33269
|
summary: '/access_grants/unmanaged/get',
|
|
33281
33270
|
tags: [],
|
|
33282
|
-
'x-draft': 'Early access.',
|
|
33283
33271
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
33284
33272
|
'x-fern-sdk-method-name': 'get',
|
|
33285
33273
|
'x-fern-sdk-return-value': 'access_grant',
|
|
@@ -33906,7 +33894,6 @@ export default {
|
|
|
33906
33894
|
],
|
|
33907
33895
|
summary: '/access_grants/unmanaged/list',
|
|
33908
33896
|
tags: [],
|
|
33909
|
-
'x-draft': 'Early access.',
|
|
33910
33897
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
33911
33898
|
'x-fern-sdk-method-name': 'list',
|
|
33912
33899
|
'x-fern-sdk-return-value': 'access_grants',
|
|
@@ -34516,7 +34503,6 @@ export default {
|
|
|
34516
34503
|
],
|
|
34517
34504
|
summary: '/access_grants/unmanaged/list',
|
|
34518
34505
|
tags: [],
|
|
34519
|
-
'x-draft': 'Early access.',
|
|
34520
34506
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
34521
34507
|
'x-fern-sdk-method-name': 'list',
|
|
34522
34508
|
'x-fern-sdk-return-value': 'access_grants',
|
|
@@ -34578,7 +34564,6 @@ export default {
|
|
|
34578
34564
|
],
|
|
34579
34565
|
summary: '/access_grants/unmanaged/update',
|
|
34580
34566
|
tags: [],
|
|
34581
|
-
'x-draft': 'Early access.',
|
|
34582
34567
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
34583
34568
|
'x-fern-sdk-method-name': 'update',
|
|
34584
34569
|
'x-response-key': null,
|
|
@@ -34637,7 +34622,6 @@ export default {
|
|
|
34637
34622
|
],
|
|
34638
34623
|
summary: '/access_grants/unmanaged/update',
|
|
34639
34624
|
tags: [],
|
|
34640
|
-
'x-draft': 'Early access.',
|
|
34641
34625
|
'x-fern-sdk-group-name': ['access_grants', 'unmanaged'],
|
|
34642
34626
|
'x-fern-sdk-method-name': 'update',
|
|
34643
34627
|
'x-response-key': null,
|
|
@@ -34705,7 +34689,6 @@ export default {
|
|
|
34705
34689
|
],
|
|
34706
34690
|
summary: '/access_grants/update',
|
|
34707
34691
|
tags: [],
|
|
34708
|
-
'x-draft': 'Early access.',
|
|
34709
34692
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
34710
34693
|
'x-fern-sdk-method-name': 'update',
|
|
34711
34694
|
'x-response-key': null,
|
|
@@ -34771,7 +34754,6 @@ export default {
|
|
|
34771
34754
|
],
|
|
34772
34755
|
summary: '/access_grants/update',
|
|
34773
34756
|
tags: [],
|
|
34774
|
-
'x-draft': 'Early access.',
|
|
34775
34757
|
'x-fern-sdk-group-name': ['access_grants'],
|
|
34776
34758
|
'x-fern-sdk-method-name': 'update',
|
|
34777
34759
|
'x-response-key': null,
|
|
@@ -38565,7 +38547,7 @@ export default {
|
|
|
38565
38547
|
type: 'object',
|
|
38566
38548
|
},
|
|
38567
38549
|
code: {
|
|
38568
|
-
description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
38550
|
+
description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).',
|
|
38569
38551
|
pattern: '^\\d+$',
|
|
38570
38552
|
type: 'string',
|
|
38571
38553
|
},
|