From ef3e87031e04c77dc795e8a4aed6d6199a547b63 Mon Sep 17 00:00:00 2001 From: ollie-stytch Date: Tue, 2 Jan 2024 16:31:35 -0600 Subject: [PATCH] bump version --- dist/b2b/sessions.js | 2 +- lib/b2b/discovery_organizations.ts | 18 ++++++++++ lib/b2b/organizations.ts | 40 ++++++++++++++++++++++ lib/b2b/sessions.ts | 4 +-- lib/b2c/oauth.ts | 2 +- types/lib/b2b/discovery_organizations.d.ts | 18 ++++++++++ types/lib/b2b/organizations.d.ts | 40 ++++++++++++++++++++++ types/lib/b2b/sessions.d.ts | 4 +-- types/lib/b2c/oauth.d.ts | 2 +- 9 files changed, 123 insertions(+), 7 deletions(-) diff --git a/dist/b2b/sessions.js b/dist/b2b/sessions.js index d5c1fb9b..f78b7bdb 100644 --- a/dist/b2b/sessions.js +++ b/dist/b2b/sessions.js @@ -86,7 +86,7 @@ class Sessions { * If an `authorization_check` object is passed in, this method will also check if the Member is authorized * to perform the given action on the given Resource in the specified Organization. A Member is authorized * if their Member Session contains a Role, assigned - * [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate + * [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate * permissions. * In addition, the `organization_id` passed in the authorization check must match the Member's * Organization. diff --git a/lib/b2b/discovery_organizations.ts b/lib/b2b/discovery_organizations.ts index ab6680d1..71bf0a02 100644 --- a/lib/b2b/discovery_organizations.ts +++ b/lib/b2b/discovery_organizations.ts @@ -164,6 +164,24 @@ export interface B2BDiscoveryOrganizationsCreateRequest { * for more information about role assignment. */ rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + */ + mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + */ + allowed_mfa_methods?: string[]; } // Response type for `discovery.organizations.create`. diff --git a/lib/b2b/organizations.ts b/lib/b2b/organizations.ts index 78defa2d..680c3d09 100644 --- a/lib/b2b/organizations.ts +++ b/lib/b2b/organizations.ts @@ -499,7 +499,23 @@ export interface B2BOrganizationsCreateRequest { * for more information about role assignment. */ rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + */ mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + */ allowed_mfa_methods?: string[]; } @@ -786,7 +802,31 @@ export interface B2BOrganizationsUpdateRequest { * permission to perform the `update.settings.implicit-roles` action on the `stytch.organization` Resource. */ rbac_email_implicit_role_assignments?: string[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + * + * If this field is provided and a session header is passed into the request, the Member Session must have + * permission to perform the `update.settings.allowed-auth-methods` action on the `stytch.organization` + * Resource. + */ mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + * + * If this field is provided and a session header is passed into the request, the Member Session must have + * permission to perform the `update.settings.allowed-mfa-methods` action on the `stytch.organization` + * Resource. + */ allowed_mfa_methods?: string[]; } diff --git a/lib/b2b/sessions.ts b/lib/b2b/sessions.ts index 03c2fb37..d1a023e6 100644 --- a/lib/b2b/sessions.ts +++ b/lib/b2b/sessions.ts @@ -122,7 +122,7 @@ export interface B2BSessionsAuthenticateRequest { * authorized to perform the given action on the given Resource in the specified Organization. A Member * is authorized if * their Member Session contains a Role, assigned - * [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate + * [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate * permissions. * In addition, the `organization_id` passed in the authorization check must match the Member's * Organization. @@ -456,7 +456,7 @@ export class Sessions { * If an `authorization_check` object is passed in, this method will also check if the Member is authorized * to perform the given action on the given Resource in the specified Organization. A Member is authorized * if their Member Session contains a Role, assigned - * [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate + * [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate * permissions. * In addition, the `organization_id` passed in the authorization check must match the Member's * Organization. diff --git a/lib/b2c/oauth.ts b/lib/b2c/oauth.ts index 68b50a91..5ac7af5c 100644 --- a/lib/b2c/oauth.ts +++ b/lib/b2c/oauth.ts @@ -149,7 +149,7 @@ export interface OAuthAuthenticateResponse { * provider's API for a given user. * * Note that these values will vary based on the OAuth provider in question, e.g. `id_token` is only - * returned by OIDC complaint identity providers. + * returned by OIDC compliant identity providers. */ provider_values: OAuthProviderValues; /** diff --git a/types/lib/b2b/discovery_organizations.d.ts b/types/lib/b2b/discovery_organizations.d.ts index 151bd935..6666e665 100644 --- a/types/lib/b2b/discovery_organizations.d.ts +++ b/types/lib/b2b/discovery_organizations.d.ts @@ -148,6 +148,24 @@ export interface B2BDiscoveryOrganizationsCreateRequest { * for more information about role assignment. */ rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + */ + mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + */ + allowed_mfa_methods?: string[]; } export interface B2BDiscoveryOrganizationsCreateResponse { /** diff --git a/types/lib/b2b/organizations.d.ts b/types/lib/b2b/organizations.d.ts index 66d978f8..53ab62d2 100644 --- a/types/lib/b2b/organizations.d.ts +++ b/types/lib/b2b/organizations.d.ts @@ -448,7 +448,23 @@ export interface B2BOrganizationsCreateRequest { * for more information about role assignment. */ rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + */ mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + */ allowed_mfa_methods?: string[]; } export interface B2BOrganizationsCreateResponse { @@ -716,7 +732,31 @@ export interface B2BOrganizationsUpdateRequest { * permission to perform the `update.settings.implicit-roles` action on the `stytch.organization` Resource. */ rbac_email_implicit_role_assignments?: string[]; + /** + * The setting that controls which mfa methods can be used by Members of an Organization. The accepted + * values are: + * + * `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. + * + * `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. + * This setting does not apply to Members with `is_breakglass` set to `true`. + * + * + * If this field is provided and a session header is passed into the request, the Member Session must have + * permission to perform the `update.settings.allowed-auth-methods` action on the `stytch.organization` + * Resource. + */ mfa_methods?: string; + /** + * An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to + * `RESTRICTED`. + * The list's accepted values are: `sms_otp` and `totp`. + * + * + * If this field is provided and a session header is passed into the request, the Member Session must have + * permission to perform the `update.settings.allowed-mfa-methods` action on the `stytch.organization` + * Resource. + */ allowed_mfa_methods?: string[]; } export interface B2BOrganizationsUpdateResponse { diff --git a/types/lib/b2b/sessions.d.ts b/types/lib/b2b/sessions.d.ts index 55277616..1eea7225 100644 --- a/types/lib/b2b/sessions.d.ts +++ b/types/lib/b2b/sessions.d.ts @@ -100,7 +100,7 @@ export interface B2BSessionsAuthenticateRequest { * authorized to perform the given action on the given Resource in the specified Organization. A Member * is authorized if * their Member Session contains a Role, assigned - * [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate + * [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate * permissions. * In addition, the `organization_id` passed in the authorization check must match the Member's * Organization. @@ -359,7 +359,7 @@ export declare class Sessions { * If an `authorization_check` object is passed in, this method will also check if the Member is authorized * to perform the given action on the given Resource in the specified Organization. A Member is authorized * if their Member Session contains a Role, assigned - * [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate + * [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate * permissions. * In addition, the `organization_id` passed in the authorization check must match the Member's * Organization. diff --git a/types/lib/b2c/oauth.d.ts b/types/lib/b2c/oauth.d.ts index e72a0299..b9b2f312 100644 --- a/types/lib/b2c/oauth.d.ts +++ b/types/lib/b2c/oauth.d.ts @@ -122,7 +122,7 @@ export interface OAuthAuthenticateResponse { * provider's API for a given user. * * Note that these values will vary based on the OAuth provider in question, e.g. `id_token` is only - * returned by OIDC complaint identity providers. + * returned by OIDC compliant identity providers. */ provider_values: OAuthProviderValues; /**