Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
22 changes: 20 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,30 @@
# LoginRadius Python SDK Change Log

# Version 11.0.0
Released on **August 11,2020**
## Enhancements:
- Added a parameter isWeb in "RefreshAccessToken" API.
- Added a parameter SocialAppName in "getAccessTokenByFacebookAccessToken, getAccessTokenByTwitterAccessToken,
getAccessTokenByGoogleAccessToken, getAccessTokenByLinkedinAccessToken, getAccessTokenByAppleIdCode,
getAccessTokenByGoogleAuthCode" Native Social login APIs.

## Added new multiple APIs for better user experience:
- Added linkSocialIdentites(POST) API.
- Added linkSocialIdentitiesByPing(POST) API.
- Added getAccessTokenByAppleIdCode API.
- Added getAccessTokenByWeChatCode API.

## Removed APIs:
- linkSocialIdentity API(PUT)
- getSocialIdentity API(GET)

# Version 10.0.1
Release on **Oct 24,2019**
Released on **Oct 24,2019**
## Enhancements
- Fixed the pip installation issue

# Version 10.0.0
Release on **September 30,2019**
Released on **September 30,2019**

## Enhancements
This full version release includes major breaking changes with several improvements and optimizations :
Expand Down
6 changes: 3 additions & 3 deletions Demo/LoginRadius/api/account/account_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -477,10 +477,10 @@ def remove_email(self, email, uid, fields=''):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def refresh_access_token_by_refresh_token(self, refresh__token):
"""This API is used to refresh an access_token via it's associated refresh_token.
"""This API is used to refresh an access token via it's associated refresh token.

Args:
refresh__token: LoginRadius refresh_token
refresh__token: LoginRadius refresh token

Returns:
Response containing Definition of Complete Token data
Expand All @@ -502,7 +502,7 @@ def revoke_refresh_token(self, refresh__token):
"""The Revoke Refresh Access Token API is used to revoke a refresh token or the Provider Access Token, revoking an existing refresh token will invalidate the refresh token but the associated access token will work until the expiry.

Args:
refresh__token: LoginRadius refresh_token
refresh__token: LoginRadius refresh token

Returns:
Response containing Definition of Delete Request
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ def get_registration_data(self, type, limit=None, parent_id=None,
return self._lr_object.execute("GET", resource_path, query_parameters, None)

def add_registration_data(self, registration_data_create_model_list):
"""This API allows you to fill data into a dropdown list which you have created for user Registeration. For more details on how to use this API please see our Custom Registration Data Overview
"""This API allows you to fill data into a dropdown list which you have created for user Registration. For more details on how to use this API please see our Custom Registration Data Overview

Args:
registration_data_create_model_list: Model Class containing Definition of List of Registration Data
Expand Down
12 changes: 6 additions & 6 deletions Demo/LoginRadius/api/advanced/multifactorauthentication_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ def __init__(self, lr_object):
self._lr_object = lr_object

def mfa_configure_by_access_token(self, access_token, sms_template2_f_a=None):
"""This API is used to configure the Multi-factor authentication after login by using the access_token when MFA is set as optional on the LoginRadius site.
"""This API is used to configure the Multi-factor authentication after login by using the access token when MFA is set as optional on the LoginRadius site.

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -126,7 +126,7 @@ def mfa_update_phone_number_by_token(self, access_token, phone_no2_f_a, sms_temp
return self._lr_object.execute("PUT", resource_path, query_parameters, body_parameters)

def mfa_reset_google_auth_by_token(self, access_token, googleauthenticator):
"""This API Resets the Google Authenticator configurations on a given account via the access_token
"""This API Resets the Google Authenticator configurations on a given account via the access token

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -151,7 +151,7 @@ def mfa_reset_google_auth_by_token(self, access_token, googleauthenticator):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def mfa_reset_sms_auth_by_token(self, access_token, otpauthenticator):
"""This API resets the SMS Authenticator configurations on a given account via the access_token.
"""This API resets the SMS Authenticator configurations on a given account via the access token.

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -176,7 +176,7 @@ def mfa_reset_sms_auth_by_token(self, access_token, otpauthenticator):
return self._lr_object.execute("DELETE", resource_path, query_parameters, body_parameters)

def mfa_backup_code_by_access_token(self, access_token):
"""This API is used to get a set of backup codes via access_token to allow the user login on a site that has Multi-factor Authentication enabled in the event that the user does not have a secondary factor available. We generate 10 codes, each code can only be consumed once. If any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
"""This API is used to get a set of backup codes via access token to allow the user login on a site that has Multi-factor Authentication enabled in the event that the user does not have a secondary factor available. We generate 10 codes, each code can only be consumed once. If any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand All @@ -197,7 +197,7 @@ def mfa_backup_code_by_access_token(self, access_token):
return self._lr_object.execute("GET", resource_path, query_parameters, None)

def mfa_reset_backup_code_by_access_token(self, access_token):
"""API is used to reset the backup codes on a given account via the access_token. This API call will generate 10 new codes, each code can only be consumed once
"""API is used to reset the backup codes on a given account via the access token. This API call will generate 10 new codes, each code can only be consumed once

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -428,7 +428,7 @@ def mfa_validate_google_auth_code(self, google_authenticator_code, second_factor
return self._lr_object.execute("PUT", resource_path, query_parameters, body_parameters)

def mfa_validate_backup_code(self, multi_factor_auth_model_by_backup_code, second_factor_authentication_token, fields=''):
"""This API is used to validate the backup code provided by the user and if valid, we return an access_token allowing the user to login incases where Multi-factor authentication (MFA) is enabled and the secondary factor is unavailable. When a user initially downloads the Backup codes, We generate 10 codes, each code can only be consumed once. if any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically
"""This API is used to validate the backup code provided by the user and if valid, we return an access token allowing the user to login incases where Multi-factor authentication (MFA) is enabled and the secondary factor is unavailable. When a user initially downloads the Backup codes, We generate 10 codes, each code can only be consumed once. if any user attempts to go over the number of invalid login attempts configured in the Dashboard then the account gets blocked automatically

Args:
multi_factor_auth_model_by_backup_code: Model Class containing Definition of payload for MultiFactorAuth By BackupCode API
Expand Down
4 changes: 2 additions & 2 deletions Demo/LoginRadius/api/advanced/reauthentication_api.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ def __init__(self, lr_object):
self._lr_object = lr_object

def mfa_re_authenticate(self, access_token, sms_template2_f_a=None):
"""This API is used to trigger the Multi-Factor Autentication workflow for the provided access_token
"""This API is used to trigger the Multi-Factor Autentication workflow for the provided access token

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down Expand Up @@ -61,7 +61,7 @@ def mfa_re_authenticate_by_otp(self, access_token, reauth_by_otp_model):
return self._lr_object.execute("PUT", resource_path, query_parameters, reauth_by_otp_model)

def mfa_re_authenticate_by_backup_code(self, access_token, reauth_by_backup_code_model):
"""This API is used to re-authenticate by set of backup codes via access_token on the site that has Multi-factor authentication enabled in re-authentication for the user that does not have the device
"""This API is used to re-authenticate by set of backup codes via access token on the site that has Multi-factor authentication enabled in re-authentication for the user that does not have the device

Args:
access_token: Uniquely generated identifier key by LoginRadius that is activated after successful authentication.
Expand Down
Loading