FINBOURNE Access Management API
Project description
finbourne-access-sdk
FINBOURNE Technology
This Python package is automatically generated by the OpenAPI Generator project:
- API version: 0.0.3548
- Package version: 2.0.22
- Build package: org.openapitools.codegen.languages.PythonClientCodegen For more information, please visit https://www.finbourne.com
Requirements.
Python 3.7+
Installation & Usage
pip install
If the python package is hosted on a repository, you can install directly using:
pip install git+https://github.com/finbourne/finbourne-access-sdk-python.git
(you may need to run pip
with root permission: sudo pip install git+https://github.com/finbourne/finbourne-access-sdk-python.git
)
Then import the package:
import finbourne_access
Setuptools
Install via Setuptools.
python setup.py install --user
(or sudo python setup.py install
to install the package for all users)
Then import the package:
import finbourne_access
Tests
Execute pytest
to run the tests.
Getting Started
Please follow the installation procedure and then run the following:
import time
import finbourne_access
from finbourne_access.rest import ApiException
from pprint import pprint
from finbourne_access import (
ApiClientFactory,
ApplicationMetadataApi,
EnvironmentVariablesConfigurationLoader,
SecretsFileConfigurationLoader,
ArgsConfigurationLoader
)
# Use the finbourne_access ApiClientFactory to build Api instances with a configured api client
# By default this will read config from environment variables
# Then from a secrets.json file found in the current working directory
api_client_factory = ApiClientFactory()
# The ApiClientFactory can be passed an iterable of configuration loaders to read configuration from
api_url = "https://fbn-prd.lusid.com/access"
# Path to a secrets.json file containing authentication credentials
# See https://support.lusid.com/knowledgebase/article/KA-01667/en-us
# for a detailed guide to setting up the SDK make authenticated calls to LUSID APIs
secrets_path = os.getenv("FBN_SECRETS_PATH")
app_name="LusidJupyterNotebook"
config_loaders = [
EnvironmentVariablesConfigurationLoader(),
SecretsFileConfigurationLoader(api_secrets_file=secrets_path),
ArgsConfigurationLoader(api_url=api_url, app_name=app_name)
]
api_client_factory = ApiClientFactory(config_loaders=config_loaders)
# The client must configure the authentication and authorization parameters
# in accordance with the API server security policy.
# Enter a context with an instance of the ApiClientFactory to ensure the connection pool is closed after use
async with api_client_factory:
# Create an instance of the API class
api_instance = finbourne_access.ApplicationMetadataApi(api_client)
try:
# [EARLY ACCESS] ListAccessControlledResources: Get resources available for access control
api_response = await api_instance.list_access_controlled_resources()
print("The response of ApplicationMetadataApi->list_access_controlled_resources:\n")
pprint(api_response)
except ApiException as e:
print("Exception when calling ApplicationMetadataApi->list_access_controlled_resources: %s\n" % e)
Documentation for API Endpoints
All URIs are relative to https://fbn-prd.lusid.com/access
Class | Method | HTTP request | Description |
---|---|---|---|
ApplicationMetadataApi | list_access_controlled_resources | GET /api/metadata/access/resources | [EARLY ACCESS] ListAccessControlledResources: Get resources available for access control |
PoliciesApi | add_to_policy_collection | POST /api/policycollections/{code}/add | [EARLY ACCESS] AddToPolicyCollection: Add To PolicyCollection |
PoliciesApi | create_policy | POST /api/policies | [EARLY ACCESS] CreatePolicy: Create Policy |
PoliciesApi | create_policy_collection | POST /api/policycollections | [EARLY ACCESS] CreatePolicyCollection: Create PolicyCollection |
PoliciesApi | delete_policy | DELETE /api/policies/{code} | [EARLY ACCESS] DeletePolicy: Delete Policy |
PoliciesApi | delete_policy_collection | DELETE /api/policycollections/{code} | [EARLY ACCESS] DeletePolicyCollection: Delete PolicyCollection |
PoliciesApi | evaluate | POST /api/me | [EARLY ACCESS] Evaluate: Run one or more evaluations |
PoliciesApi | get_own_policies | GET /api/me | GetOwnPolicies: Get policies of requesting user |
PoliciesApi | get_policy | GET /api/policies/{code} | [EARLY ACCESS] GetPolicy: Get Policy |
PoliciesApi | get_policy_collection | GET /api/policycollections/{code} | [EARLY ACCESS] GetPolicyCollection: Get PolicyCollection |
PoliciesApi | list_policies | GET /api/policies | [EARLY ACCESS] ListPolicies: List Policies |
PoliciesApi | list_policy_collections | GET /api/policycollections | [EARLY ACCESS] ListPolicyCollections: List PolicyCollections |
PoliciesApi | page_policies | GET /api/policies/page | [EARLY ACCESS] PagePolicies: Page Policies |
PoliciesApi | page_policy_collections | GET /api/policycollections/page | [EARLY ACCESS] PagePolicyCollections: Page PolicyCollections |
PoliciesApi | remove_from_policy_collection | POST /api/policycollections/{code}/remove | [EARLY ACCESS] RemoveFromPolicyCollection: Remove From PolicyCollection |
PoliciesApi | update_policy | PUT /api/policies/{code} | [EARLY ACCESS] UpdatePolicy: Update Policy |
PoliciesApi | update_policy_collection | PUT /api/policycollections/{code} | [EARLY ACCESS] UpdatePolicyCollection: Update PolicyCollection |
RolesApi | add_policy_collection_to_role | POST /api/roles/{scope}/{code}/policycollections | [EARLY ACCESS] AddPolicyCollectionToRole: Add policy collections to a role |
RolesApi | create_role | POST /api/roles | [EARLY ACCESS] CreateRole: Create Role |
RolesApi | delete_role | DELETE /api/roles/{code} | [EARLY ACCESS] DeleteRole: Delete Role |
RolesApi | get_role | GET /api/roles/{code} | [EARLY ACCESS] GetRole: Get Role |
RolesApi | list_roles | GET /api/roles | [EARLY ACCESS] ListRoles: List Roles |
RolesApi | remove_policy_collection_from_role | DELETE /api/roles/{scope}/{code}/policycollections/{policycollectionscope}/{policycollectioncode} | [EARLY ACCESS] RemovePolicyCollectionFromRole: Remove policy collection from role |
RolesApi | update_role | PUT /api/roles/{code} | [EARLY ACCESS] UpdateRole: Update Role |
UserRolesApi | add_policy_collection_to_user_role | POST /api/userroles/{userid}/policycollections | [EXPERIMENTAL] AddPolicyCollectionToUserRole: Add a policy collection to a user-role |
UserRolesApi | add_policy_to_user_role | POST /api/userroles/{userid}/policies | [EXPERIMENTAL] AddPolicyToUserRole: Add a policy to a user-role |
UserRolesApi | create_user_role | POST /api/userroles | [EXPERIMENTAL] CreateUserRole: Create a user-role |
UserRolesApi | delete_user_role | DELETE /api/userroles/{userid} | [EXPERIMENTAL] DeleteUserRole: Delete a user-role |
UserRolesApi | get_user_role | GET /api/userroles/{userid} | [EXPERIMENTAL] GetUserRole: Get a user-role |
UserRolesApi | list_user_roles | GET /api/userroles | [EXPERIMENTAL] ListUserRoles: List user-roles |
UserRolesApi | remove_policy_collection_from_user_role | DELETE /api/userroles/{userid}/policycollections/{policyCollectionScope}/{policyCollectionCode} | [EXPERIMENTAL] RemovePolicyCollectionFromUserRole: Remove a policy collection from a user-role |
UserRolesApi | remove_policy_from_user_role | DELETE /api/userroles/{userid}/policies/{policyScope}/{policyCode} | [EXPERIMENTAL] RemovePolicyFromUserRole: Remove a policy from a user-role |
UserRolesApi | update_user_role | POST /api/userroles/{userid}/update | [EXPERIMENTAL] UpdateUserRole: Update a user-role |
Documentation For Models
- AccessControlledAction
- AccessControlledResource
- ActionId
- AddPolicyCollectionToRoleRequest
- AddPolicyToRoleRequest
- AddToPolicyCollectionRequest
- AsAtPredicateContract
- AsAtRangeForSpec
- AsAtRelative
- AttachedPolicyDefinitionResponse
- DateQuality
- DateUnit
- EffectiveDateHasQuality
- EffectiveDateRelative
- EffectiveRange
- EntitlementMetadata
- EvaluationRequest
- EvaluationResponse
- EvaluationResult
- ForSpec
- Grant
- HowSpec
- IdSelectorDefinition
- IdentifierPartSchema
- IfExpression
- IfFeatureChainExpression
- IfIdentityClaimExpression
- IfIdentityScopeExpression
- IfRequestHeaderExpression
- KeyValuePairOfStringToString
- Link
- LusidProblemDetails
- LusidValidationProblemDetails
- MatchAllSelectorDefinition
- MetadataExpression
- MetadataSelectorDefinition
- NonTransitiveSupervisorRoleResource
- Operator
- PointInTimeSpecification
- PolicyCollectionCreationRequest
- PolicyCollectionId
- PolicyCollectionResponse
- PolicyCollectionUpdateRequest
- PolicyCreationRequest
- PolicyId
- PolicyIdRoleResource
- PolicyResponse
- PolicySelectorDefinition
- PolicyType
- PolicyUpdateRequest
- RelativeToDateTime
- RemoveFromPolicyCollectionRequest
- RequestDetails
- RequestedActionKey
- ResourceDetails
- ResourceListOfAccessControlledResource
- ResourceListOfPolicyCollectionResponse
- ResourceListOfPolicyResponse
- ResourceListOfUserRoleResponse
- RoleCreationRequest
- RoleId
- RoleResourceRequest
- RoleResponse
- RoleUpdateRequest
- SelectorDefinition
- TextOperator
- UserRoleCreationRequest
- UserRoleResponse
- UserRoleUpdateRequest
- WhenSpec
Documentation For Authorization
Authentication schemes defined for the API:
oauth2
- Type: OAuth
- Flow: implicit
- Authorization URL: https://lusid.okta.com/oauth2/default/v1/authorize
- Scopes: N/A
Author
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for finbourne_access_sdk-2.0.22.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 030e4058d676bb25945e60fcc7c82fd3bb3442430a976a738bf374065a2c4347 |
|
MD5 | ac993f599aafc1c77162abbdc44a1077 |
|
BLAKE2b-256 | f2dcfd30723485994214cc2bd7d35fa80d20a695996430a7aad30167838c15d7 |
Hashes for finbourne_access_sdk-2.0.22-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e907c81b4f202b088805f52b8af168fd35185e305cf612c3540b986b189e3cf2 |
|
MD5 | e05d6d217e33b821eb9caff23caf26f5 |
|
BLAKE2b-256 | 38e653d8340d9cd78122bf98d2eecd36b4c2e7cfc19b32ea30234f9b8d91df3b |