@stytch/vanilla-js 4.2.0 → 4.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,23 @@
1
1
  # @stytch/vanilla-js
2
2
 
3
+ ## 4.3.0
4
+
5
+ ### Minor Changes
6
+
7
+ - 5877da8: Add support for theming inputs in UI components
8
+
9
+ ### Patch Changes
10
+
11
+ - Updated dependencies [5877da8]
12
+ - @stytch/core@2.4.0
13
+
14
+ ## 4.2.1
15
+
16
+ ### Patch Changes
17
+
18
+ - Updated dependencies [c50b9ad]
19
+ - @stytch/core@2.3.0
20
+
3
21
  ## 4.2.0
4
22
 
5
23
  ### Minor Changes
@@ -234,6 +234,10 @@ interface Member {
234
234
  role_id: string;
235
235
  sources: RoleSource[];
236
236
  }[];
237
+ /**
238
+ * The member's default MFA method.
239
+ */
240
+ default_mfa_method: string;
237
241
  }
238
242
  type B2BAuthenticateResponse = ResponseCommon & {
239
243
  /**
@@ -376,6 +380,19 @@ interface Organization {
376
380
  * The list's accepted values are: sso, magic_link, password, google_oauth, and microsoft_oauth.
377
381
  */
378
382
  allowed_auth_methods: string[];
383
+ /**
384
+ * The setting that controls which mfa methods can be used by Members of an Organization.
385
+ * The accepted values are:
386
+ * ALL_ALLOWED – the default setting which allows all MFA methods to be used.
387
+ * RESTRICTED – only methods that comply with allowed_mfa_methods can be used for MFA. This setting does not apply to Members with is_breakglass set to true.
388
+ */
389
+ mfa_methods?: string;
390
+ /**
391
+ * An array of allowed MFA methods.
392
+ * This list is enforced when mfa_methods is set to RESTRICTED.
393
+ * The list's accepted values are: sms_otp and totp.
394
+ */
395
+ allowed_mfa_methods?: ("sms_otp" | "totp")[];
379
396
  /**
380
397
  * The setting that controls the MFA policy for all Members in the Organization. The accepted values are:
381
398
  * REQUIRED_FOR_ALL – All Members within the Organization will be required to complete MFA every time they wish to log in.
@@ -234,6 +234,10 @@ interface Member {
234
234
  role_id: string;
235
235
  sources: RoleSource[];
236
236
  }[];
237
+ /**
238
+ * The member's default MFA method.
239
+ */
240
+ default_mfa_method: string;
237
241
  }
238
242
  type B2BAuthenticateResponse = ResponseCommon & {
239
243
  /**
@@ -376,6 +380,19 @@ interface Organization {
376
380
  * The list's accepted values are: sso, magic_link, password, google_oauth, and microsoft_oauth.
377
381
  */
378
382
  allowed_auth_methods: string[];
383
+ /**
384
+ * The setting that controls which mfa methods can be used by Members of an Organization.
385
+ * The accepted values are:
386
+ * ALL_ALLOWED – the default setting which allows all MFA methods to be used.
387
+ * RESTRICTED – only methods that comply with allowed_mfa_methods can be used for MFA. This setting does not apply to Members with is_breakglass set to true.
388
+ */
389
+ mfa_methods?: string;
390
+ /**
391
+ * An array of allowed MFA methods.
392
+ * This list is enforced when mfa_methods is set to RESTRICTED.
393
+ * The list's accepted values are: sms_otp and totp.
394
+ */
395
+ allowed_mfa_methods?: ("sms_otp" | "totp")[];
379
396
  /**
380
397
  * The setting that controls the MFA policy for all Members in the Organization. The accepted values are:
381
398
  * REQUIRED_FOR_ALL – All Members within the Organization will be required to complete MFA every time they wish to log in.