Socket
Socket
Sign inDemoInstall

stytch

Package Overview
Dependencies
Maintainers
20
Versions
157
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

stytch - npm Package Compare versions

Comparing version 10.0.2 to 10.1.0

2

dist/b2b/sessions.js

@@ -89,3 +89,3 @@ "use strict";

* if their Member Session contains a Role, assigned
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate
* permissions.

@@ -92,0 +92,0 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's

{
"name": "stytch",
"version": "10.0.2",
"version": "10.1.0",
"description": "A wrapper for the Stytch API",

@@ -5,0 +5,0 @@ "types": "./types/lib/index.d.ts",

@@ -151,2 +151,20 @@ import { DiscoveredOrganization } from "./discovery";

rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[];
/**
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted
* values are:
*
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used.
*
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication.
* This setting does not apply to Members with `is_breakglass` set to `true`.
*
*/
mfa_methods?: string;
/**
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to
* `RESTRICTED`.
* The list's accepted values are: `sms_otp` and `totp`.
*
*/
allowed_mfa_methods?: string[];
}

@@ -153,0 +171,0 @@ export interface B2BDiscoveryOrganizationsCreateResponse {

@@ -451,3 +451,19 @@ import { Authorization } from "../shared/method_options";

rbac_email_implicit_role_assignments?: EmailImplicitRoleAssignment[];
/**
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted
* values are:
*
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used.
*
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication.
* This setting does not apply to Members with `is_breakglass` set to `true`.
*
*/
mfa_methods?: string;
/**
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to
* `RESTRICTED`.
* The list's accepted values are: `sms_otp` and `totp`.
*
*/
allowed_mfa_methods?: string[];

@@ -720,3 +736,27 @@ }

rbac_email_implicit_role_assignments?: string[];
/**
* The setting that controls which mfa methods can be used by Members of an Organization. The accepted
* values are:
*
* `ALL_ALLOWED` – the default setting which allows all authentication methods to be used.
*
* `RESTRICTED` – only methods that comply with `allowed_auth_methods` can be used for authentication.
* This setting does not apply to Members with `is_breakglass` set to `true`.
*
*
* If this field is provided and a session header is passed into the request, the Member Session must have
* permission to perform the `update.settings.allowed-auth-methods` action on the `stytch.organization`
* Resource.
*/
mfa_methods?: string;
/**
* An array of allowed mfa authentication methods. This list is enforced when `mfa_methods` is set to
* `RESTRICTED`.
* The list's accepted values are: `sms_otp` and `totp`.
*
*
* If this field is provided and a session header is passed into the request, the Member Session must have
* permission to perform the `update.settings.allowed-mfa-methods` action on the `stytch.organization`
* Resource.
*/
allowed_mfa_methods?: string[];

@@ -723,0 +763,0 @@ }

@@ -103,3 +103,3 @@ import { AuthenticationFactor, JWK } from "../b2c/sessions";

* their Member Session contains a Role, assigned
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate
* permissions.

@@ -363,3 +363,3 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's

* if their Member Session contains a Role, assigned
* [explicitly or implicitly](https://github.com/docs/b2b/guides/rbac/role-assignment), with adequate
* [explicitly or implicitly](https://stytch.com/docs/b2b/guides/rbac/role-assignment), with adequate
* permissions.

@@ -366,0 +366,0 @@ * In addition, the `organization_id` passed in the authorization check must match the Member's

@@ -125,3 +125,3 @@ import { fetchConfig } from "../shared";

* Note that these values will vary based on the OAuth provider in question, e.g. `id_token` is only
* returned by OIDC complaint identity providers.
* returned by OIDC compliant identity providers.
*/

@@ -128,0 +128,0 @@ provider_values: OAuthProviderValues;

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc