Skip to main content

OidcVpAdapterBackend

Project description

affinidi_tdk_login_configuration_client

No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)

For more information, please visit www.affinidi.com

Documentation is available at https://docs.affinidi.com/dev-tools/affinidi-tdk/clients/login-configuration/

Requirements.

Python 3.7+

Installation & Usage

pip install

If the python package is hosted on a repository, you can install directly using:

pip install affinidi_tdk_login_configuration_client

Then import the package:

import affinidi_tdk_login_configuration_client

Setuptools

Install via Setuptools.

python setup.py install --user

Then import the package:

import affinidi_tdk_login_configuration_client

Tests

Execute pytest to run the tests.

Getting Started

Please follow the installation procedure and then run the following:

import time
import affinidi_tdk_login_configuration_client
from affinidi_tdk_login_configuration_client.rest import ApiException
from pprint import pprint

# Defining the host is optional and defaults to https://apse1.api.affinidi.io/vpa
# See configuration.py for a list of all supported configuration parameters.
configuration = affinidi_tdk_login_configuration_client.Configuration(
    host = "https://apse1.api.affinidi.io/vpa"
)

# The client must configure the authentication and authorization parameters
# in accordance with the API server security policy.
# Examples for each auth method are provided below, use the example that
# satisfies your auth use case.

# Configure API key authorization: ProjectTokenAuth
configuration.api_key['ProjectTokenAuth'] = os.environ["API_KEY"]

# Configure a hook to auto-refresh API key for your personal access token (PAT), if expired
import affinidi_tdk_auth_provider

stats = {
  apiGatewayUrl,
  keyId,
  passphrase,
  privateKey,
  projectId,
  tokenEndpoint,
  tokenId,
}
authProvider = affinidi_tdk_auth_provider.AuthProvider(stats)
configuration.refresh_api_key_hook = lambda api_client: authProvider.fetch_project_scoped_token()

# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
# configuration.api_key_prefix['ProjectTokenAuth'] = 'Bearer'


# Enter a context with an instance of the API client
with affinidi_tdk_login_configuration_client.ApiClient(configuration) as api_client:
    # Create an instance of the API class
    api_instance = affinidi_tdk_login_configuration_client.AllowListApi(api_client)
    group_names_input = affinidi_tdk_login_configuration_client.GroupNamesInput() # GroupNamesInput | List of group names as input (optional)

    try:
        api_instance.allow_groups(group_names_input=group_names_input)
    except ApiException as e:
        print("Exception when calling AllowListApi->allow_groups: %s\n" % e)

Documentation for API Endpoints

All URIs are relative to https://apse1.api.affinidi.io/vpa

Class Method HTTP request Description
AllowListApi allow_groups POST /v1/allow-list/groups/add
AllowListApi disallow_groups POST /v1/allow-list/groups/remove
AllowListApi list_allowed_groups GET /v1/allow-list/groups
ConfigurationApi create_login_configurations POST /v1/login/configurations Create a new login configuration
ConfigurationApi delete_login_configurations_by_id DELETE /v1/login/configurations/{configurationId} Delete login configurations by ID
ConfigurationApi get_client_metadata_by_client_id GET /v1/login/configurations/metadata/{clientId} Get Client Metadata By OAuth 2.0 Client ID
ConfigurationApi get_login_configurations_by_id GET /v1/login/configurations/{configurationId} Get login configuration by ID
ConfigurationApi list_login_configurations GET /v1/login/configurations List login configurations
ConfigurationApi update_login_configurations_by_id PATCH /v1/login/configurations/{configurationId} Update login configurations by ID
DenyListApi block_groups POST /v1/deny-list/groups/add
DenyListApi block_users POST /v1/deny-list/users/add
DenyListApi list_blocked_groups GET /v1/deny-list/groups
DenyListApi list_blocked_users GET /v1/deny-list/users
DenyListApi unblock_groups POST /v1/deny-list/groups/remove
DenyListApi unblock_users POST /v1/deny-list/users/remove
GroupApi add_user_to_group POST /v1/groups/{groupName}/users
GroupApi create_group POST /v1/groups
GroupApi delete_group DELETE /v1/groups/{groupName}
GroupApi get_group_by_id GET /v1/groups/{groupName}
GroupApi list_group_user_mappings GET /v1/groups/{groupName}/users
GroupApi list_groups GET /v1/groups
GroupApi remove_user_from_group DELETE /v1/groups/{groupName}/users
IdpApi v1_login_project_project_id_oauth2_auth_get GET /v1/login/project/{projectId}/oauth2/auth OAuth 2.0 Authorize Endpoint
IdpApi v1_login_project_project_id_oauth2_revoke_post POST /v1/login/project/{projectId}/oauth2/revoke Revoke OAuth 2.0 Access or Refresh Token
IdpApi v1_login_project_project_id_oauth2_sessions_logout_get GET /v1/login/project/{projectId}/oauth2/sessions/logout OpenID Connect Front- and Back-channel Enabled Logout
IdpApi v1_login_project_project_id_oauth2_token_post POST /v1/login/project/{projectId}/oauth2/token The OAuth 2.0 Token Endpoint
IdpApi v1_login_project_project_id_userinfo_get GET /v1/login/project/{projectId}/userinfo OpenID Connect Userinfo
IdpApi v1_login_project_project_id_well_known_jwks_json_get GET /v1/login/project/{projectId}/.well-known/jwks.json Discover Well-Known JSON Web Keys
IdpApi v1_login_project_project_id_well_known_openid_configuration_get GET /v1/login/project/{projectId}/.well-known/openid-configuration OpenID Connect Discovery

Documentation For Models

Documentation For Authorization

Authentication schemes defined for the API:

AwsSigV4

  • Type: API key
  • API key parameter name: Authorization
  • Location: HTTP header

ApiKey

  • Type: API key
  • API key parameter name: x-api-key
  • Location: HTTP header

bearerAuth

  • Type: Bearer authentication (JWT)

ConsumerTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

UserTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

ProjectTokenAuth

  • Type: API key
  • API key parameter name: authorization
  • Location: HTTP header

Author

info@affinidi.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file affinidi_tdk_login_configuration_client-1.59.0.tar.gz.

File metadata

File hashes

Hashes for affinidi_tdk_login_configuration_client-1.59.0.tar.gz
Algorithm Hash digest
SHA256 321cc2442361d94e92c57f9a700cdaf3963589bdfaf946ef6070e7eb463a0832
MD5 8c22868236e413ec3626949fb85c0218
BLAKE2b-256 f53101d5f1cd6bcdfcf4b3a77587218359959ce981870047927007b4f830d094

See more details on using hashes here.

File details

Details for the file affinidi_tdk_login_configuration_client-1.59.0-py3-none-any.whl.

File metadata

File hashes

Hashes for affinidi_tdk_login_configuration_client-1.59.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b052a8ad64b90498df8f231a767165e1c59c5223c2d7b63ee570981024354e6c
MD5 c701b97f58a0b5b91f46845ff510f16d
BLAKE2b-256 501b7a3fe2991f02c41029460241418e5439f656f6e86965a8e7e0782ce08787

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page