Skip to main content

OidcVpAdapterBackend

Project description

affinidi_tdk_login_configuration_client

No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)

For more information, please visit https://github.com/affinidi/affinidi-tdk

Documentation is available at https://docs.affinidi.com/dev-tools/affinidi-tdk/clients/login-configuration/

Requirements.

Python 3.7+

Installation & Usage

pip install

If the python package is hosted on a repository, you can install directly using:

pip install affinidi_tdk_login_configuration_client

Then import the package:

import affinidi_tdk_login_configuration_client

Setuptools

Install via Setuptools.

python setup.py install --user

Then import the package:

import affinidi_tdk_login_configuration_client

Tests

Execute pytest to run the tests.

Getting Started

Please follow the installation procedure and then run the following:

import time
import affinidi_tdk_login_configuration_client
from affinidi_tdk_login_configuration_client.rest import ApiException
from pprint import pprint

# Defining the host is optional and defaults to https://apse1.api.affinidi.io/vpa
# See configuration.py for a list of all supported configuration parameters.
configuration = affinidi_tdk_login_configuration_client.Configuration(
    host = "https://apse1.api.affinidi.io/vpa"
)

# The client must configure the authentication and authorization parameters
# in accordance with the API server security policy.
# Examples for each auth method are provided below, use the example that
# satisfies your auth use case.

# Configure API key authorization: ProjectTokenAuth
configuration.api_key['ProjectTokenAuth'] = os.environ["API_KEY"]

# Configure a hook to auto-refresh API key for your personal access token (PAT), if expired
import affinidi_tdk_auth_provider

stats = {
  apiGatewayUrl,
  keyId,
  passphrase,
  privateKey,
  projectId,
  tokenEndpoint,
  tokenId,
}
authProvider = affinidi_tdk_auth_provider.AuthProvider(stats)
configuration.refresh_api_key_hook = lambda api_client: authProvider.fetch_project_scoped_token()

# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
# configuration.api_key_prefix['ProjectTokenAuth'] = 'Bearer'


# Enter a context with an instance of the API client
with affinidi_tdk_login_configuration_client.ApiClient(configuration) as api_client:
    # Create an instance of the API class
    api_instance = affinidi_tdk_login_configuration_client.AllowListApi(api_client)
    group_names_input = affinidi_tdk_login_configuration_client.GroupNamesInput() # GroupNamesInput | List of group names as input (optional)

    try:
        api_instance.allow_groups(group_names_input=group_names_input)
    except ApiException as e:
        print("Exception when calling AllowListApi->allow_groups: %s\n" % e)

Documentation for API Endpoints

All URIs are relative to https://apse1.api.affinidi.io/vpa

Class Method HTTP request Description
AllowListApi allow_groups POST /v1/allow-list/groups/add
AllowListApi disallow_groups POST /v1/allow-list/groups/remove
AllowListApi list_allowed_groups GET /v1/allow-list/groups
ConfigurationApi create_login_configurations POST /v1/login/configurations Create a new login configuration
ConfigurationApi delete_login_configurations_by_id DELETE /v1/login/configurations/{configurationId} Delete login configurations by ID
ConfigurationApi get_client_metadata_by_client_id GET /v1/login/configurations/metadata/{clientId} Get Client Metadata By OAuth 2.0 Client ID
ConfigurationApi get_login_configurations_by_id GET /v1/login/configurations/{configurationId} Get login configuration by ID
ConfigurationApi list_login_configurations GET /v1/login/configurations List login configurations
ConfigurationApi update_login_configurations_by_id PATCH /v1/login/configurations/{configurationId} Update login configurations by ID
DenyListApi block_groups POST /v1/deny-list/groups/add
DenyListApi block_users POST /v1/deny-list/users/add
DenyListApi list_blocked_groups GET /v1/deny-list/groups
DenyListApi list_blocked_users GET /v1/deny-list/users
DenyListApi unblock_groups POST /v1/deny-list/groups/remove
DenyListApi unblock_users POST /v1/deny-list/users/remove
GroupApi add_user_to_group POST /v1/groups/{groupName}/users
GroupApi create_group POST /v1/groups
GroupApi delete_group DELETE /v1/groups/{groupName}
GroupApi get_group_by_id GET /v1/groups/{groupName}
GroupApi list_group_user_mappings GET /v1/groups/{groupName}/users
GroupApi list_groups GET /v1/groups
GroupApi remove_user_from_group DELETE /v1/groups/{groupName}/users
IdpApi v1_login_project_project_id_oauth2_auth_get GET /v1/login/project/{projectId}/oauth2/auth OAuth 2.0 Authorize Endpoint
IdpApi v1_login_project_project_id_oauth2_revoke_post POST /v1/login/project/{projectId}/oauth2/revoke Revoke OAuth 2.0 Access or Refresh Token
IdpApi v1_login_project_project_id_oauth2_sessions_logout_get GET /v1/login/project/{projectId}/oauth2/sessions/logout OpenID Connect Front- and Back-channel Enabled Logout
IdpApi v1_login_project_project_id_oauth2_token_post POST /v1/login/project/{projectId}/oauth2/token The OAuth 2.0 Token Endpoint
IdpApi v1_login_project_project_id_userinfo_get GET /v1/login/project/{projectId}/userinfo OpenID Connect Userinfo
IdpApi v1_login_project_project_id_well_known_jwks_json_get GET /v1/login/project/{projectId}/.well-known/jwks.json Discover Well-Known JSON Web Keys
IdpApi v1_login_project_project_id_well_known_openid_configuration_get GET /v1/login/project/{projectId}/.well-known/openid-configuration OpenID Connect Discovery

Documentation For Models

Documentation For Authorization

Authentication schemes defined for the API:

AwsSigV4

  • Type: API key
  • API key parameter name: Authorization
  • Location: HTTP header

ApiKey

  • Type: API key
  • API key parameter name: x-api-key
  • Location: HTTP header

bearerAuth

  • Type: Bearer authentication (JWT)

ConsumerTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

UserTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

ProjectTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

Author

info@affinidi.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file affinidi_tdk_login_configuration_client-1.34.0.tar.gz.

File metadata

File hashes

Hashes for affinidi_tdk_login_configuration_client-1.34.0.tar.gz
Algorithm Hash digest
SHA256 f6ecc211f86ba33b2d4183ab42c3f09d212234ed6871969f089b8d9d60f78b35
MD5 b2b429a7c97cae92c609f82dc30bc2e8
BLAKE2b-256 b5c219f31d5cb2aa248cfd958765512d3f9d59b44053bdd3939cc26ceb4a4549

See more details on using hashes here.

File details

Details for the file affinidi_tdk_login_configuration_client-1.34.0-py3-none-any.whl.

File metadata

File hashes

Hashes for affinidi_tdk_login_configuration_client-1.34.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d57f063dacdbfee774f2f75fe7ae0c4d065504e48c6b75b307587c64ea2d178f
MD5 b03594c54c6dae9d49854f1e63da171e
BLAKE2b-256 9109ee1202010c32700ba926c48da1b9b8a4aab2c335bf8d63003eed630460ea

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page