cidaas-javascript-sdk 4.2.4 → 4.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +18 -3
  2. package/README.md +3 -0
  3. package/dist/authentication/{index.d.ts → Authentication.d.ts} +2 -2
  4. package/dist/authentication/{index.js → Authentication.js} +2 -9
  5. package/dist/common/Common.model.d.ts +37 -0
  6. package/dist/common/Common.model.js +26 -0
  7. package/dist/{web-auth → common}/Helper.d.ts +6 -6
  8. package/dist/{web-auth → common}/Helper.js +10 -10
  9. package/dist/common/JwtHelper.d.ts +8 -0
  10. package/dist/{web-auth → common}/JwtHelper.js +8 -8
  11. package/dist/common/User.model.d.ts +134 -0
  12. package/dist/common/User.model.js +2 -0
  13. package/dist/consent-service/ConsentService.d.ts +96 -0
  14. package/dist/consent-service/ConsentService.js +127 -0
  15. package/dist/consent-service/ConsentService.model.d.ts +102 -0
  16. package/dist/consent-service/ConsentService.model.js +2 -0
  17. package/dist/index.d.ts +1 -1
  18. package/dist/index.js +1 -1
  19. package/dist/login-service/LoginService.d.ts +143 -0
  20. package/dist/login-service/LoginService.js +247 -0
  21. package/dist/login-service/LoginService.model.d.ts +138 -0
  22. package/dist/login-service/LoginService.model.js +13 -0
  23. package/dist/token-service/TokenService.d.ts +139 -0
  24. package/dist/token-service/TokenService.js +242 -0
  25. package/dist/token-service/TokenService.model.d.ts +149 -0
  26. package/dist/token-service/TokenService.model.js +43 -0
  27. package/dist/user-service/UserService.d.ts +317 -0
  28. package/dist/user-service/UserService.js +451 -0
  29. package/dist/user-service/UserService.model.d.ts +142 -0
  30. package/dist/user-service/UserService.model.js +10 -0
  31. package/dist/verification-service/VerificationService.d.ts +218 -0
  32. package/dist/verification-service/VerificationService.js +288 -0
  33. package/dist/verification-service/VerificationService.model.d.ts +158 -0
  34. package/dist/verification-service/VerificationService.model.js +2 -0
  35. package/dist/web-auth/WebAuth.d.ts +110 -177
  36. package/dist/web-auth/WebAuth.js +120 -150
  37. package/dist/web-auth/webauth.model.d.ts +50 -0
  38. package/dist/web-auth/webauth.model.js +2 -0
  39. package/package.json +1 -1
  40. package/dist/web-auth/ConsentService.d.ts +0 -123
  41. package/dist/web-auth/ConsentService.js +0 -136
  42. package/dist/web-auth/Entities.d.ts +0 -516
  43. package/dist/web-auth/Entities.js +0 -69
  44. package/dist/web-auth/JwtHelper.d.ts +0 -7
  45. package/dist/web-auth/LoginService.d.ts +0 -165
  46. package/dist/web-auth/LoginService.js +0 -246
  47. package/dist/web-auth/TokenService.d.ts +0 -143
  48. package/dist/web-auth/TokenService.js +0 -249
  49. package/dist/web-auth/UserService.d.ts +0 -345
  50. package/dist/web-auth/UserService.js +0 -471
  51. package/dist/web-auth/VerificationService.d.ts +0 -224
  52. package/dist/web-auth/VerificationService.js +0 -278
  53. /package/dist/authentication/{authentication.model.d.ts → Authentication.model.d.ts} +0 -0
  54. /package/dist/authentication/{authentication.model.js → Authentication.model.js} +0 -0
@@ -1,5 +1,14 @@
1
- import { OidcSettings, LoginRedirectOptions, LogoutRedirectOptions, PopupSignInOptions, PopupSignOutOptions, SilentSignInOptions, LoginRequestOptions, User, LogoutResponse } from '../authentication';
2
- import { AccessTokenRequest, TokenIntrospectionEntity, UserEntity, ResetPasswordEntity, IConfiguredListRequestEntity, IInitVerificationAuthenticationRequestEntity, FindUserEntity, IUserEntity, IEnrollVerificationSetupRequestEntity, IUserLinkEntity, ChangePasswordEntity, IConsentAcceptEntity, IAuthVerificationAuthenticationRequestEntity, LoginFormRequestEntity, AccountVerificationRequestEntity, ValidateResetPasswordEntity, AcceptResetPasswordEntity, PhysicalVerificationLoginRequest, IChangePasswordEntity, IUserActivityPayloadEntity } from "./Entities";
1
+ import { GetAccessTokenRequest, RenewTokenRequest, TokenIntrospectionRequest } from '../token-service/TokenService.model';
2
+ import { AcceptClaimConsentRequest, AcceptConsentRequest, AcceptScopeConsentRequest, GetConsentDetailsRequest, GetConsentVersionDetailsRequest, RevokeClaimConsentRequest } from '../consent-service/ConsentService.model';
3
+ import { FirstTimeChangePasswordRequest, LoginAfterRegisterRequest, LoginWithCredentialsRequest, MfaContinueRequest, PasswordlessLoginRequest, ProgressiveRegistrationHeader, SocialProviderPathParameter, SocialProviderQueryParameter } from '../login-service/LoginService.model';
4
+ import { LoginPrecheckRequest } from '../common/Common.model';
5
+ import { CidaasUser } from '../common/User.model';
6
+ import { ChangePasswordRequest, CompleteLinkAccountRequest, DeduplicationLoginRequest, DeleteUserAccountRequest, GetDeduplicationDetailsRequest, GetInviteUserDetailsRequest, GetUserProfileRequest, HandleResetPasswordRequest, InitiateLinkAccountRequest, InitiateResetPasswordRequest, RegisterDeduplicationRequest, RegisterRequest, ResetPasswordRequest, UserCheckExistsRequest, getCommunicationStatusRequest } from '../user-service/UserService.model';
7
+ import { HTTPRequestHeader } from "../common/Common.model";
8
+ import { User } from "oidc-client-ts";
9
+ import { OidcSettings, LoginRedirectOptions, PopupSignInOptions, SilentSignInOptions, LogoutRedirectOptions, PopupSignOutOptions, LogoutResponse, LoginRequestOptions } from "../authentication/Authentication.model";
10
+ import { AuthenticateMFARequest, CancelMFARequest, CheckVerificationTypeConfiguredRequest, ConfigureFriendlyNameRequest, ConfigureVerificationRequest, EnrollVerificationRequest, GetMFAListRequest, InitiateAccountVerificationRequest, InitiateEnrollmentRequest, InitiateMFARequest, InitiateVerificationRequest, VerifyAccountRequest } from "../verification-service/VerificationService.model";
11
+ import { DeleteDeviceRequest, GetClientInfoRequest, GetRegistrationSetupRequest, GetUserActivitiesRequest, LogoutUserRequest, UpdateProfileImageRequest, UserActionOnEnrollmentRequest } from "./webauth.model";
3
12
  export declare const createPreloginWebauth: (authority: string) => WebAuth;
4
13
  export declare class WebAuth {
5
14
  constructor(settings: OidcSettings);
@@ -112,7 +121,7 @@ export declare class WebAuth {
112
121
  * });
113
122
  * ```
114
123
  */
115
- getRequestId(): Promise<unknown>;
124
+ getRequestId(): Promise<any>;
116
125
  /**
117
126
  * To get the tenant basic information, call **getTenantInfo()**. This will return the basic tenant details such as tenant name and allowed login with types (Email, Mobile, Username).
118
127
  * @example
@@ -124,7 +133,7 @@ export declare class WebAuth {
124
133
  * });
125
134
  * ```
126
135
  */
127
- getTenantInfo(): Promise<unknown>;
136
+ getTenantInfo(): Promise<any>;
128
137
  /**
129
138
  * To logout the user by using cidaas internal api, call **logoutUser()**.
130
139
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/3b5ce6a54bf29-logout for more details.
@@ -135,9 +144,7 @@ export declare class WebAuth {
135
144
  * });
136
145
  * ```
137
146
  */
138
- logoutUser(options: {
139
- access_token: string;
140
- }): void;
147
+ logoutUser(options: LogoutUserRequest): void;
141
148
  /**
142
149
  * To get the client basic information, call **getClientInfo()**. This will return the basic client details such as client name and its details.
143
150
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/dc8a6cfb28abb-public-page-information for more details.
@@ -152,15 +159,13 @@ export declare class WebAuth {
152
159
  * });
153
160
  * ```
154
161
  */
155
- getClientInfo(options: {
156
- requestId: string;
157
- }): Promise<unknown>;
162
+ getClientInfo(options: GetClientInfoRequest): Promise<any>;
158
163
  /**
159
164
  * To get all devices information associated to the client, call **getDevicesInfo()**
160
165
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/2a2feed70303c-get-device-by-user for more details.
161
166
  * @example
162
167
  * ```js
163
- * const options = {};
168
+ * const options = null; // the payload is deprecated and will be removed in the next major release
164
169
  * const accessToken = 'your access token';
165
170
  * cidaas.getDevicesInfo(options, accessToken).then(function (resp) {
166
171
  * // the response will give you devices informations.
@@ -169,7 +174,7 @@ export declare class WebAuth {
169
174
  * });
170
175
  * ```
171
176
  */
172
- getDevicesInfo(options: any, accessToken: string): Promise<unknown>;
177
+ getDevicesInfo(options: void, accessToken: string): Promise<any>;
173
178
  /**
174
179
  * To delete device associated to the client, call **deleteDevice()**
175
180
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/3d44ad903d6e8-logout-the-user-for-a-device for more details.
@@ -186,10 +191,7 @@ export declare class WebAuth {
186
191
  * });
187
192
  * ```
188
193
  */
189
- deleteDevice(options: {
190
- device_id: string;
191
- userAgent?: string;
192
- }, accessToken: string): Promise<unknown>;
194
+ deleteDevice(options: DeleteDeviceRequest, accessToken: string): Promise<any>;
193
195
  /**
194
196
  * To handle registration, first you need the registration fields. To get the registration fields, call **getRegistrationSetup()**. This will return the fields that has to be needed while registration.
195
197
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/4eae72956f65a-registration-field-setup for more details.
@@ -205,10 +207,7 @@ export declare class WebAuth {
205
207
  * });
206
208
  * ```
207
209
  */
208
- getRegistrationSetup(options: {
209
- acceptlanguage?: string;
210
- requestId: string;
211
- }): Promise<unknown>;
210
+ getRegistrationSetup(options: GetRegistrationSetupRequest): Promise<any>;
212
211
  /**
213
212
  * to generate device info, call **createDeviceInfo()**.
214
213
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/9b5a892afaf0b-create-device-info for more details.
@@ -221,268 +220,194 @@ export declare class WebAuth {
221
220
  * });
222
221
  * ```
223
222
  */
224
- createDeviceInfo(): Promise<unknown>;
223
+ createDeviceInfo(): Promise<any>;
225
224
  /**
226
225
  * get the user profile information
227
226
  * @param options
228
227
  * @returns
229
228
  */
230
- getUserProfile(options: {
231
- access_token: string;
232
- }): Promise<unknown>;
229
+ getUserProfile(options: GetUserProfileRequest): Promise<any>;
233
230
  /**
234
231
  * renew token using refresh token
235
232
  * @param options
236
233
  * @returns
237
234
  */
238
- renewToken(options: AccessTokenRequest): Promise<unknown>;
235
+ renewToken(options: RenewTokenRequest): Promise<any>;
239
236
  /**
240
237
  * get access token from code
241
238
  * @param options
242
239
  * @returns
243
240
  */
244
- getAccessToken(options: AccessTokenRequest): Promise<unknown>;
241
+ getAccessToken(options: GetAccessTokenRequest): Promise<any>;
245
242
  /**
246
243
  * validate access token
247
244
  * @param options
248
245
  * @returns
249
246
  */
250
- validateAccessToken(options: TokenIntrospectionEntity): Promise<unknown>;
247
+ validateAccessToken(options: TokenIntrospectionRequest): Promise<any>;
251
248
  /**
252
249
  * login with username and password
253
250
  * @param options
254
251
  */
255
- loginWithCredentials(options: LoginFormRequestEntity): void;
252
+ loginWithCredentials(options: LoginWithCredentialsRequest): void;
256
253
  /**
257
254
  * login with social
258
255
  * @param options
259
256
  * @param queryParams
260
257
  */
261
- loginWithSocial(options: {
262
- provider: string;
263
- requestId: string;
264
- }, queryParams: {
265
- dc: string;
266
- device_fp: string;
267
- }): void;
258
+ loginWithSocial(options: SocialProviderPathParameter, queryParams?: SocialProviderQueryParameter): void;
268
259
  /**
269
260
  * register with social
270
261
  * @param options
271
262
  * @param queryParams
272
263
  */
273
- registerWithSocial(options: {
274
- provider: string;
275
- requestId: string;
276
- }, queryParams: {
277
- dc: string;
278
- device_fp: string;
279
- }): void;
264
+ registerWithSocial(options: SocialProviderPathParameter, queryParams?: SocialProviderQueryParameter): void;
280
265
  /**
281
266
  * register user
282
267
  * @param options
283
268
  * @param headers
284
269
  * @returns
285
270
  */
286
- register(options: UserEntity, headers: {
287
- requestId: string;
288
- captcha?: string;
289
- acceptlanguage?: string;
290
- bot_captcha_response?: string;
291
- trackId?: string;
292
- }): Promise<unknown>;
271
+ register(options: RegisterRequest, headers: HTTPRequestHeader): Promise<any>;
293
272
  /**
294
273
  * get invite info
295
274
  * @param options
296
275
  * @returns
297
276
  */
298
- getInviteUserDetails(options: {
299
- invite_id: string;
300
- callLatestAPI?: boolean;
301
- }): Promise<unknown>;
277
+ getInviteUserDetails(options: GetInviteUserDetailsRequest): Promise<any>;
302
278
  /**
303
279
  * get Communication status
304
280
  * @param options
305
281
  * @returns
306
282
  */
307
- getCommunicationStatus(options: {
308
- sub: string;
309
- }, headers: {
310
- requestId: string;
311
- }): Promise<unknown>;
283
+ getCommunicationStatus(options: getCommunicationStatusRequest, headers?: HTTPRequestHeader): Promise<any>;
312
284
  /**
313
285
  * initiate verification
314
286
  * @param options
315
287
  * @returns
316
288
  */
317
- initiateAccountVerification(options: AccountVerificationRequestEntity): void;
289
+ initiateAccountVerification(options: InitiateAccountVerificationRequest): void;
318
290
  /**
319
291
  * verify account
320
292
  * @param options
321
293
  * @returns
322
294
  */
323
- verifyAccount(options: {
324
- accvid: string;
325
- code: string;
326
- }): Promise<unknown>;
295
+ verifyAccount(options: VerifyAccountRequest): Promise<any>;
327
296
  /**
328
297
  * initiate reset password
329
298
  * @param options
330
299
  * @returns
331
300
  */
332
- initiateResetPassword(options: ResetPasswordEntity): Promise<unknown>;
301
+ initiateResetPassword(options: InitiateResetPasswordRequest): Promise<any>;
333
302
  /**
334
303
  * handle reset password
335
304
  * @param options
336
305
  */
337
- handleResetPassword(options: ValidateResetPasswordEntity): Promise<unknown>;
306
+ handleResetPassword(options: HandleResetPasswordRequest): Promise<any>;
338
307
  /**
339
308
  * reset password
340
309
  * @param options
341
310
  */
342
- resetPassword(options: AcceptResetPasswordEntity): Promise<unknown>;
311
+ resetPassword(options: ResetPasswordRequest): Promise<any>;
343
312
  /**
344
313
  * get mfa list
345
314
  * @param options
346
315
  * @returns
347
316
  */
348
- getMFAList(options: IConfiguredListRequestEntity): Promise<unknown>;
317
+ getMFAList(options: GetMFAListRequest): Promise<any>;
349
318
  /**
350
319
  * cancel mfa
351
320
  * @param options
352
321
  * @returns
353
322
  */
354
- cancelMFA(options: {
355
- exchange_id: string;
356
- reason: string;
357
- type: string;
358
- }): Promise<unknown>;
323
+ cancelMFA(options: CancelMFARequest): Promise<any>;
359
324
  /**
360
325
  * passwordless login
361
326
  * @param options
362
327
  */
363
- passwordlessLogin(options: PhysicalVerificationLoginRequest): void;
328
+ passwordlessLogin(options: PasswordlessLoginRequest): void;
364
329
  /**
365
330
  * get user consent details
366
331
  * @param options
367
332
  * @returns
368
333
  */
369
- getConsentDetails(options: {
370
- consent_id: string;
371
- consent_version_id: string;
372
- sub: string;
373
- }): Promise<unknown>;
334
+ getConsentDetails(options: GetConsentDetailsRequest): Promise<any>;
374
335
  /**
375
336
  * accept consent
376
337
  * @param options
377
338
  * @returns
378
339
  */
379
- acceptConsent(options: IConsentAcceptEntity): Promise<unknown>;
340
+ acceptConsent(options: AcceptConsentRequest): Promise<any>;
380
341
  /**
381
342
  * get scope consent details
382
343
  * @param options
383
344
  * @returns
384
345
  */
385
- loginPrecheck(options: {
386
- track_id: string;
387
- locale: string;
388
- }): Promise<unknown>;
346
+ loginPrecheck(options: LoginPrecheckRequest): Promise<any>;
389
347
  /**
390
348
  * get scope consent version details
391
349
  * @param options
392
350
  * @returns
393
351
  */
394
- getConsentVersionDetails(options: {
395
- consentid: string;
396
- locale: string;
397
- access_token: string;
398
- }): Promise<unknown>;
352
+ getConsentVersionDetails(options: GetConsentVersionDetailsRequest): Promise<any>;
399
353
  /**
400
354
  * accept scope Consent
401
355
  * @param options
402
356
  * @returns
403
357
  */
404
- acceptScopeConsent(options: {
405
- client_id: string;
406
- sub: string;
407
- scopes: string[];
408
- }): Promise<unknown>;
358
+ acceptScopeConsent(options: AcceptScopeConsentRequest): Promise<any>;
409
359
  /**
410
360
  * accept claim Consent
411
361
  * @param options
412
362
  * @returns
413
363
  */
414
- acceptClaimConsent(options: {
415
- client_id: string;
416
- sub: string;
417
- accepted_claims: string[];
418
- }): Promise<unknown>;
364
+ acceptClaimConsent(options: AcceptClaimConsentRequest): Promise<any>;
419
365
  /**
420
366
  * revoke claim Consent
421
367
  * @param options
422
368
  * @returns
423
369
  */
424
- revokeClaimConsent(options: {
425
- client_id: string;
426
- sub: string;
427
- revoked_claims: string[];
428
- }): Promise<unknown>;
370
+ revokeClaimConsent(options: RevokeClaimConsentRequest): Promise<any>;
429
371
  /**
430
372
  * get Deduplication details
431
373
  * @param options
432
374
  * @returns
433
375
  */
434
- getDeduplicationDetails(options: {
435
- trackId: string;
436
- }): Promise<unknown>;
376
+ getDeduplicationDetails(options: GetDeduplicationDetailsRequest): Promise<any>;
437
377
  /**
438
378
  * deduplication login
439
379
  * @param options
440
380
  */
441
- deduplicationLogin(options: {
442
- trackId: string;
443
- requestId: string;
444
- sub: string;
445
- }): void;
381
+ deduplicationLogin(options: DeduplicationLoginRequest): void;
446
382
  /**
447
383
  * register Deduplication
448
384
  * @param options
449
385
  * @returns
450
386
  */
451
- registerDeduplication(options: {
452
- trackId: string;
453
- }): Promise<unknown>;
387
+ registerDeduplication(options: RegisterDeduplicationRequest): Promise<any>;
454
388
  /**
455
- * accepts any as the request
456
389
  * consent continue login
457
390
  * @param options
458
391
  */
459
- consentContinue(options: {
460
- client_id: string;
461
- consent_refs: string[];
462
- sub: string;
463
- scopes: string[];
464
- matcher: any;
465
- track_id: string;
466
- }): void;
392
+ consentContinue(options: LoginPrecheckRequest): void;
467
393
  /**
468
394
  * mfa continue login
395
+ * options: PhysicalVerificationLoginRequest is not needed anymore. It is now DEPRECATED and will be removed in the next major release
469
396
  * @param options
470
397
  */
471
- mfaContinue(options: PhysicalVerificationLoginRequest & {
472
- track_id: string;
473
- }): void;
398
+ mfaContinue(options: MfaContinueRequest): void;
474
399
  /**
475
400
  * change password continue
476
401
  * @param options
477
402
  */
478
- firstTimeChangePassword(options: IChangePasswordEntity): void;
403
+ firstTimeChangePassword(options: FirstTimeChangePasswordRequest): void;
479
404
  /**
480
405
  * change password
481
406
  * @param options
482
407
  * @param access_token
483
408
  * @returns
484
409
  */
485
- changePassword(options: ChangePasswordEntity, access_token: string): Promise<unknown>;
410
+ changePassword(options: ChangePasswordRequest, access_token: string): Promise<any>;
486
411
  /**
487
412
  * update profile
488
413
  * @param options
@@ -490,7 +415,7 @@ export declare class WebAuth {
490
415
  * @param sub
491
416
  * @returns
492
417
  */
493
- updateProfile(options: UserEntity, access_token: string, sub: string): Promise<unknown>;
418
+ updateProfile(options: CidaasUser, access_token: string, sub: string): Promise<any>;
494
419
  /**
495
420
  * To get user activities, call **getUserActivities()**.
496
421
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/346141453781e-get-user-activities for more details.
@@ -511,43 +436,52 @@ export declare class WebAuth {
511
436
  * });
512
437
  * ```
513
438
  */
514
- getUserActivities(options: IUserActivityPayloadEntity, accessToken: string): Promise<unknown>;
439
+ getUserActivities(options: GetUserActivitiesRequest, accessToken: string): Promise<any>;
440
+ /**
441
+ * To run predefined action after enrollment, call userActionOnEnrollment()
442
+ * @param options
443
+ * @param trackId
444
+ * @example
445
+ * ```js
446
+ * const options = {
447
+ * action: 'predefined action'
448
+ * };
449
+ * cidaas.userActionOnEnrollment(options, 'trackId');
450
+ */
451
+ userActionOnEnrollment(options: UserActionOnEnrollmentRequest, trackId: string): Promise<any>;
515
452
  /**
516
453
  * @param access_token
517
454
  * @returns
518
455
  */
519
- getAllVerificationList(access_token: string): Promise<unknown>;
456
+ getAllVerificationList(access_token: string): Promise<any>;
520
457
  /**
521
458
  * initiate link accoount
522
459
  * @param options
523
460
  * @param access_token
524
461
  * @returns
525
462
  */
526
- initiateLinkAccount(options: IUserLinkEntity, access_token: string): Promise<unknown>;
463
+ initiateLinkAccount(options: InitiateLinkAccountRequest, access_token: string): Promise<any>;
527
464
  /**
528
465
  * complete link accoount
529
466
  * @param options
530
467
  * @param access_token
531
468
  * @returns
532
469
  */
533
- completeLinkAccount(options: {
534
- code?: string;
535
- link_request_id?: string;
536
- }, access_token: string): Promise<unknown>;
470
+ completeLinkAccount(options: CompleteLinkAccountRequest, access_token: string): Promise<any>;
537
471
  /**
538
472
  * get linked users
539
473
  * @param access_token
540
474
  * @param sub
541
475
  * @returns
542
476
  */
543
- getLinkedUsers(access_token: string, sub: string): Promise<unknown>;
477
+ getLinkedUsers(access_token: string, sub: string): Promise<any>;
544
478
  /**
545
479
  * unlink accoount
546
480
  * @param access_token
547
481
  * @param identityId
548
482
  * @returns
549
483
  */
550
- unlinkAccount(access_token: string, identityId: string): Promise<unknown>;
484
+ unlinkAccount(access_token: string, identityId: string): Promise<any>;
551
485
  /**
552
486
  * To change profile image, call **updateProfileImage()**.
553
487
  * @example
@@ -565,56 +499,40 @@ export declare class WebAuth {
565
499
  * });
566
500
  * ```
567
501
  */
568
- updateProfileImage(options: {
569
- image_key: string;
570
- photo: any;
571
- filename: string;
572
- }, access_token: string): Promise<unknown>;
502
+ updateProfileImage(options: UpdateProfileImageRequest, access_token: string): Promise<any>;
573
503
  /**
574
504
  * enrollVerification
575
505
  * @param options
576
506
  * @returns
577
507
  */
578
- initiateEnrollment(options: {
579
- verification_type: string;
580
- deviceInfo?: {
581
- deviceId: string;
582
- location: {
583
- lat: string;
584
- lon: string;
585
- };
586
- };
587
- }, accessToken: string): Promise<unknown>;
508
+ initiateEnrollment(options: InitiateEnrollmentRequest, accessToken: string): Promise<any>;
588
509
  /**
589
510
  * update the status of notification
590
511
  * @param status_id
591
512
  * @returns
592
513
  */
593
- getEnrollmentStatus(status_id: string, accessToken: string): Promise<unknown>;
514
+ getEnrollmentStatus(status_id: string, accessToken: string): Promise<any>;
594
515
  /**
595
516
  * enrollVerification
596
517
  * @param options
597
518
  * @returns
598
519
  */
599
- enrollVerification(options: IEnrollVerificationSetupRequestEntity): Promise<unknown>;
520
+ enrollVerification(options: EnrollVerificationRequest): Promise<any>;
600
521
  /**
601
522
  * checkVerificationTypeConfigured
602
523
  * @param options
603
524
  * @returns
604
525
  */
605
- checkVerificationTypeConfigured(options: IConfiguredListRequestEntity): Promise<unknown>;
526
+ checkVerificationTypeConfigured(options: CheckVerificationTypeConfiguredRequest): Promise<any>;
606
527
  /**
607
528
  * deleteUserAccount
608
529
  * @param options
609
530
  * @returns
610
531
  */
611
- deleteUserAccount(options: {
612
- access_token: string;
613
- sub: string;
614
- }): Promise<unknown>;
532
+ deleteUserAccount(options: DeleteUserAccountRequest): Promise<any>;
615
533
  /**
616
534
  * getMissingFields
617
- * @param trackId - required. If only trackId is given, it will get missing fields from cidaas after succesfull registration using default provider
535
+ * @param trackId - required. If only trackId is given, it will get missing fields from cidaas after succesful registration using default provider
618
536
  * @param useSocialProvider - optional. If given, it will get missing fields from social provider after successful registration using social provider
619
537
  *
620
538
  * @example
@@ -633,32 +551,23 @@ export declare class WebAuth {
633
551
  */
634
552
  getMissingFields(trackId: string, useSocialProvider?: {
635
553
  requestId: string;
636
- }): Promise<unknown>;
554
+ }): Promise<any>;
637
555
  /**
638
556
  * progressiveRegistration
639
557
  * @param options
640
558
  * @param headers
641
559
  * @returns
642
560
  */
643
- progressiveRegistration(options: IUserEntity, headers: {
644
- requestId: string;
645
- trackId: string;
646
- acceptlanguage: string;
647
- }): Promise<unknown>;
561
+ progressiveRegistration(options: CidaasUser, headers: ProgressiveRegistrationHeader): Promise<any>;
648
562
  /**
649
563
  * loginAfterRegister
650
564
  * @param options
651
565
  */
652
- loginAfterRegister(options: {
653
- device_id: string;
654
- dc?: string;
655
- rememberMe: boolean;
656
- trackId: string;
657
- }): void;
566
+ loginAfterRegister(options: LoginAfterRegisterRequest): void;
658
567
  /**
659
568
  * device code flow - initiate
660
569
  */
661
- initiateDeviceCode(clientId?: string): Promise<unknown>;
570
+ initiateDeviceCode(clientId?: string): Promise<any>;
662
571
  /**
663
572
  * device code flow - verify
664
573
  * @param code
@@ -669,7 +578,7 @@ export declare class WebAuth {
669
578
  * @param options
670
579
  * @returns
671
580
  */
672
- userCheckExists(options: FindUserEntity): Promise<unknown>;
581
+ userCheckExists(options: UserCheckExistsRequest): Promise<any>;
673
582
  /**
674
583
  * To set accept language
675
584
  * @param acceptLanguage
@@ -680,13 +589,37 @@ export declare class WebAuth {
680
589
  * @param options
681
590
  * @returns
682
591
  */
683
- initiateMFA(options: IInitVerificationAuthenticationRequestEntity, accessToken?: string): Promise<unknown>;
592
+ initiateMFA(options: InitiateMFARequest, accessToken?: string): Promise<any>;
684
593
  /**
685
594
  * authenticate mfa
686
595
  * @param options
687
596
  * @returns
688
597
  */
689
- authenticateMFA(options: IAuthVerificationAuthenticationRequestEntity): Promise<unknown>;
598
+ authenticateMFA(options: AuthenticateMFARequest): Promise<any>;
599
+ /**
600
+ * initiate verification
601
+ * @param options
602
+ * @returns
603
+ */
604
+ initiateVerification(options: InitiateVerificationRequest, trackId: string, method: string): Promise<any>;
605
+ /**
606
+ * configure verification
607
+ * @param options
608
+ * @returns
609
+ */
610
+ configureVerification(options: ConfigureVerificationRequest, method: string): Promise<any>;
611
+ /**
612
+ * configure friendly name
613
+ * @param options
614
+ * @returns
615
+ */
616
+ configureFriendlyName(options: ConfigureFriendlyNameRequest, trackId: string, method: string): Promise<any>;
617
+ /**
618
+ * login as guest
619
+ * @param requestId
620
+ * @returns
621
+ */
622
+ actionGuestLogin(requestId: string): void;
690
623
  /**
691
624
  * offline token check
692
625
  */