Comparing version 10.0.2 to 10.1.0
@@ -89,3 +89,3 @@ "use strict"; | ||
* if their Member Session contains a Role, assigned | ||
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* permissions. | ||
@@ -92,0 +92,0 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's |
{ | ||
"name": "stytch", | ||
"version": "10.0.2", | ||
"version": "10.1.0", | ||
"description": "A wrapper for the Stytch API", | ||
@@ -5,0 +5,0 @@ "types": "./types/lib/index.d.ts", |
@@ -151,2 +151,20 @@ import { DiscoveredOrganization } from "./discovery"; | ||
rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; | ||
/** | ||
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted | ||
* values are: | ||
* | ||
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. | ||
* | ||
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. | ||
* This setting does not apply to Members with `is_breakglass` set to `true`. | ||
* | ||
*/ | ||
mfa_methods?: string; | ||
/** | ||
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to | ||
* `RESTRICTED`. | ||
* The list's accepted values are: `sms_otp` and `totp`. | ||
* | ||
*/ | ||
allowed_mfa_methods?: string[]; | ||
} | ||
@@ -153,0 +171,0 @@ export interface B2BDiscoveryOrganizationsCreateResponse { |
@@ -451,3 +451,19 @@ import { Authorization } from "../shared/method_options"; | ||
rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[]; | ||
/** | ||
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted | ||
* values are: | ||
* | ||
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. | ||
* | ||
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. | ||
* This setting does not apply to Members with `is_breakglass` set to `true`. | ||
* | ||
*/ | ||
mfa_methods?: string; | ||
/** | ||
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to | ||
* `RESTRICTED`. | ||
* The list's accepted values are: `sms_otp` and `totp`. | ||
* | ||
*/ | ||
allowed_mfa_methods?: string[]; | ||
@@ -720,3 +736,27 @@ } | ||
rbac_email_implicit_role_assignments?: string[]; | ||
/** | ||
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted | ||
* values are: | ||
* | ||
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used. | ||
* | ||
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication. | ||
* This setting does not apply to Members with `is_breakglass` set to `true`. | ||
* | ||
* | ||
* If this field is provided and a session header is passed into the request, the Member Session must have | ||
* permission to perform the `update.settings.allowed-auth-methods` action on the `stytch.organization` | ||
* Resource. | ||
*/ | ||
mfa_methods?: string; | ||
/** | ||
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to | ||
* `RESTRICTED`. | ||
* The list's accepted values are: `sms_otp` and `totp`. | ||
* | ||
* | ||
* If this field is provided and a session header is passed into the request, the Member Session must have | ||
* permission to perform the `update.settings.allowed-mfa-methods` action on the `stytch.organization` | ||
* Resource. | ||
*/ | ||
allowed_mfa_methods?: string[]; | ||
@@ -723,0 +763,0 @@ } |
@@ -103,3 +103,3 @@ import { AuthenticationFactor, JWK } from "../b2c/sessions"; | ||
* their Member Session contains a Role, assigned | ||
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* permissions. | ||
@@ -363,3 +363,3 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's | ||
* if their Member Session contains a Role, assigned | ||
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate | ||
* permissions. | ||
@@ -366,0 +366,0 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's |
@@ -125,3 +125,3 @@ import { fetchConfig } from "../shared"; | ||
* Note that these values will vary based on the OAuth provider in question, e.g. `id_token` is only | ||
* returned by OIDC complaint identity providers. | ||
* returned by OIDC compliant identity providers. | ||
*/ | ||
@@ -128,0 +128,0 @@ provider_values: OAuthProviderValues; |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
657060
14218