Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
341 changes: 253 additions & 88 deletions reference.md

Large diffs are not rendered by default.

2 changes: 2 additions & 0 deletions src/auth0/management/branding/phone/templates/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -260,6 +260,7 @@ def test(
Destination of the testing phone notification

delivery_method : typing.Optional[PhoneProviderDeliveryMethodEnum]
Medium to use to send the notification

request_options : typing.Optional[RequestOptions]
Request-specific configuration.
Expand Down Expand Up @@ -572,6 +573,7 @@ async def test(
Destination of the testing phone notification

delivery_method : typing.Optional[PhoneProviderDeliveryMethodEnum]
Medium to use to send the notification

request_options : typing.Optional[RequestOptions]
Request-specific configuration.
Expand Down
2 changes: 2 additions & 0 deletions src/auth0/management/branding/phone/templates/raw_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -625,6 +625,7 @@ def test(
Destination of the testing phone notification

delivery_method : typing.Optional[PhoneProviderDeliveryMethodEnum]
Medium to use to send the notification

request_options : typing.Optional[RequestOptions]
Request-specific configuration.
Expand Down Expand Up @@ -1311,6 +1312,7 @@ async def test(
Destination of the testing phone notification

delivery_method : typing.Optional[PhoneProviderDeliveryMethodEnum]
Medium to use to send the notification

request_options : typing.Optional[RequestOptions]
Request-specific configuration.
Expand Down
10 changes: 10 additions & 0 deletions src/auth0/management/clients/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -288,6 +288,7 @@ def create(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand Down Expand Up @@ -677,6 +678,7 @@ def update(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand All @@ -699,8 +701,10 @@ def update(
URLs that are valid to redirect to after logout from Auth0

jwt_configuration : typing.Optional[ClientJwtConfiguration]
An object that holds settings related to how JWTs are created

encryption_key : typing.Optional[ClientEncryptionKey]
The client's encryption key

sso : typing.Optional[bool]
<code>true</code> to use Auth0 instead of the IdP to do Single Sign On, <code>false</code> otherwise (default: <code>false</code>)
Expand Down Expand Up @@ -745,6 +749,7 @@ def update(
client_metadata : typing.Optional[ClientMetadata]

mobile : typing.Optional[ClientMobile]
Configuration related to native mobile apps

initiate_login_uri : typing.Optional[str]
Initiate login uri, must be https
Expand Down Expand Up @@ -1157,6 +1162,7 @@ async def create(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand Down Expand Up @@ -1570,6 +1576,7 @@ async def update(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand All @@ -1592,8 +1599,10 @@ async def update(
URLs that are valid to redirect to after logout from Auth0

jwt_configuration : typing.Optional[ClientJwtConfiguration]
An object that holds settings related to how JWTs are created

encryption_key : typing.Optional[ClientEncryptionKey]
The client's encryption key

sso : typing.Optional[bool]
<code>true</code> to use Auth0 instead of the IdP to do Single Sign On, <code>false</code> otherwise (default: <code>false</code>)
Expand Down Expand Up @@ -1638,6 +1647,7 @@ async def update(
client_metadata : typing.Optional[ClientMetadata]

mobile : typing.Optional[ClientMobile]
Configuration related to native mobile apps

initiate_login_uri : typing.Optional[str]
Initiate login uri, must be https
Expand Down
10 changes: 10 additions & 0 deletions src/auth0/management/clients/raw_client.py
Original file line number Diff line number Diff line change
Expand Up @@ -334,6 +334,7 @@ def create(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand Down Expand Up @@ -930,6 +931,7 @@ def update(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand All @@ -952,8 +954,10 @@ def update(
URLs that are valid to redirect to after logout from Auth0

jwt_configuration : typing.Optional[ClientJwtConfiguration]
An object that holds settings related to how JWTs are created

encryption_key : typing.Optional[ClientEncryptionKey]
The client's encryption key

sso : typing.Optional[bool]
<code>true</code> to use Auth0 instead of the IdP to do Single Sign On, <code>false</code> otherwise (default: <code>false</code>)
Expand Down Expand Up @@ -998,6 +1002,7 @@ def update(
client_metadata : typing.Optional[ClientMetadata]

mobile : typing.Optional[ClientMobile]
Configuration related to native mobile apps

initiate_login_uri : typing.Optional[str]
Initiate login uri, must be https
Expand Down Expand Up @@ -1597,6 +1602,7 @@ async def create(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand Down Expand Up @@ -2195,6 +2201,7 @@ async def update(
oidc_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]

oidc_backchannel_logout : typing.Optional[ClientOidcBackchannelLogoutSettings]
Configuration for OIDC backchannel logout (deprecated, in favor of oidc_logout)

session_transfer : typing.Optional[ClientSessionTransferConfiguration]

Expand All @@ -2217,8 +2224,10 @@ async def update(
URLs that are valid to redirect to after logout from Auth0

jwt_configuration : typing.Optional[ClientJwtConfiguration]
An object that holds settings related to how JWTs are created

encryption_key : typing.Optional[ClientEncryptionKey]
The client's encryption key

sso : typing.Optional[bool]
<code>true</code> to use Auth0 instead of the IdP to do Single Sign On, <code>false</code> otherwise (default: <code>false</code>)
Expand Down Expand Up @@ -2263,6 +2272,7 @@ async def update(
client_metadata : typing.Optional[ClientMetadata]

mobile : typing.Optional[ClientMobile]
Configuration related to native mobile apps

initiate_login_uri : typing.Optional[str]
Initiate login uri, must be https
Expand Down
36 changes: 18 additions & 18 deletions src/auth0/management/connections/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -38,9 +38,9 @@ def __init__(self, *, client_wrapper: SyncClientWrapper):
self._raw_client = RawConnectionsClient(client_wrapper=client_wrapper)
self._client_wrapper = client_wrapper
self._directory_provisioning: typing.Optional[DirectoryProvisioningClient] = None
self._scim_configuration: typing.Optional[ScimConfigurationClient] = None
self._clients: typing.Optional[ClientsClient] = None
self._keys: typing.Optional[KeysClient] = None
self._scim_configuration: typing.Optional[ScimConfigurationClient] = None
self._users: typing.Optional[UsersClient] = None

@property
Expand Down Expand Up @@ -431,6 +431,14 @@ def directory_provisioning(self):
self._directory_provisioning = DirectoryProvisioningClient(client_wrapper=self._client_wrapper)
return self._directory_provisioning

@property
def scim_configuration(self):
if self._scim_configuration is None:
from .scim_configuration.client import ScimConfigurationClient # noqa: E402

self._scim_configuration = ScimConfigurationClient(client_wrapper=self._client_wrapper)
return self._scim_configuration

@property
def clients(self):
if self._clients is None:
Expand All @@ -447,14 +455,6 @@ def keys(self):
self._keys = KeysClient(client_wrapper=self._client_wrapper)
return self._keys

@property
def scim_configuration(self):
if self._scim_configuration is None:
from .scim_configuration.client import ScimConfigurationClient # noqa: E402

self._scim_configuration = ScimConfigurationClient(client_wrapper=self._client_wrapper)
return self._scim_configuration

@property
def users(self):
if self._users is None:
Expand All @@ -469,9 +469,9 @@ def __init__(self, *, client_wrapper: AsyncClientWrapper):
self._raw_client = AsyncRawConnectionsClient(client_wrapper=client_wrapper)
self._client_wrapper = client_wrapper
self._directory_provisioning: typing.Optional[AsyncDirectoryProvisioningClient] = None
self._scim_configuration: typing.Optional[AsyncScimConfigurationClient] = None
self._clients: typing.Optional[AsyncClientsClient] = None
self._keys: typing.Optional[AsyncKeysClient] = None
self._scim_configuration: typing.Optional[AsyncScimConfigurationClient] = None
self._users: typing.Optional[AsyncUsersClient] = None

@property
Expand Down Expand Up @@ -911,6 +911,14 @@ def directory_provisioning(self):
self._directory_provisioning = AsyncDirectoryProvisioningClient(client_wrapper=self._client_wrapper)
return self._directory_provisioning

@property
def scim_configuration(self):
if self._scim_configuration is None:
from .scim_configuration.client import AsyncScimConfigurationClient # noqa: E402

self._scim_configuration = AsyncScimConfigurationClient(client_wrapper=self._client_wrapper)
return self._scim_configuration

@property
def clients(self):
if self._clients is None:
Expand All @@ -927,14 +935,6 @@ def keys(self):
self._keys = AsyncKeysClient(client_wrapper=self._client_wrapper)
return self._keys

@property
def scim_configuration(self):
if self._scim_configuration is None:
from .scim_configuration.client import AsyncScimConfigurationClient # noqa: E402

self._scim_configuration = AsyncScimConfigurationClient(client_wrapper=self._client_wrapper)
return self._scim_configuration

@property
def users(self):
if self._users is None:
Expand Down
90 changes: 90 additions & 0 deletions src/auth0/management/connections/keys/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@
from ...core.client_wrapper import AsyncClientWrapper, SyncClientWrapper
from ...core.request_options import RequestOptions
from ...types.connection_key import ConnectionKey
from ...types.post_connection_keys_request_content import PostConnectionKeysRequestContent
from ...types.post_connections_keys_response_content import PostConnectionsKeysResponseContent
from ...types.rotate_connection_keys_request_content import RotateConnectionKeysRequestContent
from ...types.rotate_connections_keys_response_content import RotateConnectionsKeysResponseContent
from .raw_client import AsyncRawKeysClient, RawKeysClient
Expand Down Expand Up @@ -59,6 +61,46 @@ def get(self, id: str, *, request_options: typing.Optional[RequestOptions] = Non
_response = self._raw_client.get(id, request_options=request_options)
return _response.data

def create(
self,
id: str,
*,
request: typing.Optional[PostConnectionKeysRequestContent] = None,
request_options: typing.Optional[RequestOptions] = None,
) -> PostConnectionsKeysResponseContent:
"""
Provision initial connection keys for Okta or OIDC connection strategies. This endpoint allows you to create keys before configuring the connection to use Private Key JWT authentication, enabling zero-downtime transitions.

Parameters
----------
id : str
ID of the connection

request : typing.Optional[PostConnectionKeysRequestContent]

request_options : typing.Optional[RequestOptions]
Request-specific configuration.

Returns
-------
PostConnectionsKeysResponseContent
Connection keys successfully created.

Examples
--------
from auth0 import Auth0, PostConnectionKeysRequestContent

client = Auth0(
token="YOUR_TOKEN",
)
client.connections.keys.create(
id="id",
request=PostConnectionKeysRequestContent(),
)
"""
_response = self._raw_client.create(id, request=request, request_options=request_options)
return _response.data

def rotate(
self,
id: str,
Expand Down Expand Up @@ -156,6 +198,54 @@ async def main() -> None:
_response = await self._raw_client.get(id, request_options=request_options)
return _response.data

async def create(
self,
id: str,
*,
request: typing.Optional[PostConnectionKeysRequestContent] = None,
request_options: typing.Optional[RequestOptions] = None,
) -> PostConnectionsKeysResponseContent:
"""
Provision initial connection keys for Okta or OIDC connection strategies. This endpoint allows you to create keys before configuring the connection to use Private Key JWT authentication, enabling zero-downtime transitions.

Parameters
----------
id : str
ID of the connection

request : typing.Optional[PostConnectionKeysRequestContent]

request_options : typing.Optional[RequestOptions]
Request-specific configuration.

Returns
-------
PostConnectionsKeysResponseContent
Connection keys successfully created.

Examples
--------
import asyncio

from auth0 import AsyncAuth0, PostConnectionKeysRequestContent

client = AsyncAuth0(
token="YOUR_TOKEN",
)


async def main() -> None:
await client.connections.keys.create(
id="id",
request=PostConnectionKeysRequestContent(),
)


asyncio.run(main())
"""
_response = await self._raw_client.create(id, request=request, request_options=request_options)
return _response.data

async def rotate(
self,
id: str,
Expand Down
Loading
Loading