2020.2.0 • Published 4 years ago

reltio-oauth-api-beta v2020.2.0

Weekly downloads
-
License
Unlicense
Repository
-
Last release
4 years ago

authentication_ap_is

AuthenticationApIs - JavaScript client for authentication_ap_is The Reltio Authentication APIs perform authentication operations for a user.Customers use the Reltio Auth API to get the access token to access their tenant. The access token permits the customer to request protected information by calling other Reltio Platform APIs. It is implemented by using the OAuth2 protocol.If your tenant is configured to use SSO, you must obtain an access token from your SSO Auth server. Since the third-party access tokens aren't known to the Reltio Auth server, some modifications must be made to the default configuration. This SDK is automatically generated by the OpenAPI Generator project:

  • API version: 2020.2.0.0.1-SNAPSHOT
  • Package version: 2020.2.0.0.1-SNAPSHOT
  • Build package: org.openapitools.codegen.languages.JavascriptClientCodegen For more information, please visit http://www.reltio.com

Installation

For Node.js

npm

To publish the library as a npm, please follow the procedure in "Publishing npm packages".

Then install it via:

npm install authentication_ap_is --save

Finally, you need to build the module:

npm run build
Local development

To use the library locally without publishing to a remote npm registry, first install the dependencies by changing into the directory containing package.json (and this README). Let's call this JAVASCRIPT_CLIENT_DIR. Then run:

npm install

Next, link it globally in npm with the following, also from JAVASCRIPT_CLIENT_DIR:

npm link

To use the link you just defined in your project, switch to the directory you want to use your authentication_ap_is from, and run:

npm link /path/to/<JAVASCRIPT_CLIENT_DIR>

Finally, you need to build the module:

npm run build

git

If the library is hosted at a git repository, e.g.https://github.com/GIT_USER_ID/GIT_REPO_ID then install it via:

    npm install GIT_USER_ID/GIT_REPO_ID --save

For browser

The library also works in the browser environment via npm and browserify. After following the above steps with Node.js and installing browserify with npm install -g browserify, perform the following (assuming main.js is your entry file):

browserify main.js > bundle.js

Then include bundle.js in the HTML pages.

Webpack Configuration

Using Webpack you may encounter the following error: "Module not found: Error: Cannot resolve module", most certainly you should disable AMD loader. Add/merge the following section to your webpack config:

module: {
  rules: [
    {
      parser: {
        amd: false
      }
    }
  ]
}

Getting Started

Please follow the installation instruction and execute the following JS code:

var AuthenticationApIs = require('authentication_ap_is');

var defaultClient = AuthenticationApIs.ApiClient.instance;
// Configure OAuth2 access token for authorization: reltio_auth
var reltio_auth = defaultClient.authentications['reltio_auth'];
reltio_auth.accessToken = "YOUR ACCESS TOKEN"

var api = new AuthenticationApIs.CheckAccessTokenApi()
var token = "token_example"; // {String} 
var opts = {
  'serviceId': "serviceId_example", // {String} 
  'tenantId': "tenantId_example" // {String} 
};
var callback = function(error, data, response) {
  if (error) {
    console.error(error);
  } else {
    console.log('API called successfully. Returned data: ' + data);
  }
};
api.getAuthorizationInfo(token, opts, callback);

Documentation for API Endpoints

All URIs are relative to http://localhost

ClassMethodHTTP requestDescription
AuthenticationApIs.CheckAccessTokenApigetAuthorizationInfoPOST /oauth/checkToken
AuthenticationApIs.ComReltioAuthDbSyncupControllerDBSyncupControllerApigetSyncStatusGET /admin/*/sync/status
AuthenticationApIs.ComReltioAuthRestV2controllersGlobalRolePermissionControllerV2ApigetByRoleNameGET /oauth/*/roles/permissions/v2/{roleName}
AuthenticationApIs.CustomerRolePermissionsApicallDeleteDELETE /oauth/*/customers/{customerId}/roles/permissions/{roleName}
AuthenticationApIs.CustomerRolePermissionsApicreatePOST /oauth/*/customers/{customerId}/roles/permissionsThis API creates permissions for the existing customer-specific roles.
AuthenticationApIs.CustomerRolePermissionsApigetAllGET /oauth/*/customers/{customerId}/roles/permissionsThis API request returns the details of all the roles and permissions configured for a customer, based on the Customer ID mentioned in the request.
AuthenticationApIs.CustomerRolePermissionsApigetByRoleNameGET /oauth/*/customers/{customerId}/roles/permissions/{roleName}This API returns all the permissions configured for the specified role under the particular customer.
AuthenticationApIs.CustomerRolePermissionsApioverridePUT /oauth/*/customers/{customerId}/roles/permissions/{roleName}This API request overrides the permissions of a customer specific role permissions object specified in the request body.
AuthenticationApIs.CustomersApiaddCustomerSpecificRolesPOST /oauth/*/customers/{id}/rolesThis API allows you to add customer specific roles.
AuthenticationApIs.CustomersApicreateCustomersPOST /oauth/*/customersThis API request creates a customer record based on the details provided in the request body.
AuthenticationApIs.CustomersApicreateGroupsPOST /oauth/*/customers/{customerId}/groupsThis API creates the groups with the tenant specific roles configured for the customer.
AuthenticationApIs.CustomersApicreateSSOConfigurationForTenantPUT /oauth/*/customers/{id}/externalProviderConfig/{tenant}
AuthenticationApIs.CustomersApideleteCustomerDELETE /oauth/*/customers/{id}
AuthenticationApIs.CustomersApideleteGroupDELETE /oauth/*/customers/{customerId}/groups/{groupId}This API request deletes the group for the specified customer.
AuthenticationApIs.CustomersApideleteSSOConfigurationForTenantDELETE /oauth/*/customers/{id}/externalProviderConfig/{tenant}
AuthenticationApIs.CustomersApideleteShieldConfigDELETE /oauth/*/customers/{id}/shieldConfig
AuthenticationApIs.CustomersApigetCustomerGET /oauth/*/customers/{id}This API request displays the details of the customer based on the Customer ID provided in the request body.
AuthenticationApIs.CustomersApigetCustomersGET /oauth/*/customersThis API allows to to get Customers API.
AuthenticationApIs.CustomersApigetGroupGET /oauth/*/customers/{customerId}/groups/{groupId}This API request displays the details of a Group for a specific customer, based on the Group ID and Customer ID mentioned in the request.
AuthenticationApIs.CustomersApigetGroupsGET /oauth/*/customers/{customerId}/groupsThis API creates the groups with the tenant specific roles configured for the customer. The request body must be an array with group details.
AuthenticationApIs.CustomersApigetSSOConfigurationForTenantGET /oauth/*/customers/{id}/externalProviderConfig/{tenant}
AuthenticationApIs.CustomersApigetShieldConfigGET /oauth/*/customers/{id}/shieldConfig
AuthenticationApIs.CustomersApigetUsersForCustomerGET /oauth/*/customers/{id}/usersThis API request allows you to display the details of all the users belonging to a specific customer specified in the request body.
AuthenticationApIs.CustomersApiupdateCustomerPUT /oauth/*/customers/{id}This API request allows you to modify the customer's details, based on the Customer ID specified in the request body.
AuthenticationApIs.CustomersApiupdateCustomerPasswordPolicyPUT /oauth/*/customers/{id}/passwordPolicy
AuthenticationApIs.CustomersApiupdateCustomerSpecificRolesPUT /oauth/*/customers/{id}/rolesThis API request updates the customer-specific roles to the list of roles sent in the body.
AuthenticationApIs.CustomersApiupdateGroupPUT /oauth/*/customers/{customerId}/groups/{groupId}API request updates the group with the JSON object send in the request body.
AuthenticationApIs.CustomersApiupdateShieldConfigPUT /oauth/*/customers/{id}/shieldConfig
AuthenticationApIs.GlobalRolePermissionsApigetAllGET /oauth/*/roles/permissions
AuthenticationApIs.GlobalRolePermissionsApigetByRoleNameGET /oauth/*/roles/permissions/{roleName}This API returns the permissions JSON of the System role sent in the request.
AuthenticationApIs.ReltioServiceApigetAllReltioServicesGET /oauth/*/reltioservices
AuthenticationApIs.ReltioServiceApigetReltioServiceByIDGET /oauth/*/reltioservices/{serviceId}
AuthenticationApIs.RevokeTokenApirevokeTokenPOST /oauth/revokeThis API request is used to revoke an access or refresh token and the data associated with it.
AuthenticationApIs.UsersApiaddUserExternalTokensPOST /oauth/*/users/{username}/externalTokensThis API request is used to add an external token for the user specified in the request.
AuthenticationApIs.UsersApiaddUsersToCollectionPOST /oauth/*/usersThis API request creates a user as specified in the request body. You can specify the roles and tenants by using the userPermissions property.
AuthenticationApIs.UsersApideleteUserDELETE /oauth/*/users/{username}This API deletes the users.
AuthenticationApIs.UsersApigetCustomerForUserGET /oauth/*/users/customers
AuthenticationApIs.UsersApigetExternalTokensGET /oauth/*/users/{username}/externalTokensThis API returns the external tokens for the specified username.
AuthenticationApIs.UsersApigetGroupsForUserGET /oauth/*/users/{username}/groups
AuthenticationApIs.UsersApigetUsersGET /oauth/*/usersThis API fetches the list of users.
AuthenticationApIs.UsersApigetUsersByGroupGET /oauth/*/users/groups/{groupId}
AuthenticationApIs.UsersApilistTokensForUserGET /oauth/users/{user}/tokens
AuthenticationApIs.UsersApiremoveExternalTokenDELETE /oauth/*/users/{username}/externalTokens/{systemId}
AuthenticationApIs.UsersApiresetPasswordPOST /oauth/*/users/_resetPasswordThis API allows changing of the user password using temporary reset link.
AuthenticationApIs.UsersApirevokeTokensPUT /oauth/*/users/{username}/revoketokens
AuthenticationApIs.UsersApisendResetPasswordLinkPOST /oauth/*/users/_sendResetPasswordLinkThis API requests for a temporary password link.
AuthenticationApIs.UsersApiupdateUserPUT /oauth/*/users/{username}This API overrides the users completely with the data sent in the request body.
AuthenticationApIs.UsersApiupdateUserEmailPUT /oauth/*/users/{username}/email
AuthenticationApIs.UsersApiupdateUserEntityIdPUT /oauth/*/users/{username}/entityThis API request is used to update an entity associated with a user.
AuthenticationApIs.UsersApiupdateUserExternalTokenPUT /oauth/*/users/{username}/externalTokens/{systemId}
AuthenticationApIs.UsersApiupdateUserGroupsPUT /oauth/*/users/{username}/groups
AuthenticationApIs.UsersApiupdateUserPasswordPUT /oauth/*/users/{username}/passwordThis API updates the password for the specified username.
AuthenticationApIs.UsersApiupdateUserRolesPUT /oauth/*/users/{username}/tenantRoles
AuthenticationApIs.UsersApiupdateUserRolesRemovedPUT /oauth/*/users/{username}/roles
AuthenticationApIs.UsersApiupdateUserTenantsRemovedPUT /oauth/*/users/{username}/tenants
AuthenticationApIs.UsersApiupdateUser_0PUT /oauth/*/users/{username}/_unlock
AuthenticationApIs.UsersApiviewUserGET /oauth/*/users/{username}This API request displays the details of a particular user, based on the User Name specified in the request body.
AuthenticationApIs.UsersApiviewUsersForTenantGET /oauth/*/users/permissions/tenant/{tenantId}
AuthenticationApIs.UsersApiviewUsersForTenant_0GET /oauth/*/users/tenant/{tenantId}This API request displays the list of all the users for a tenant, based on the Tenant ID specified in the request body.

Documentation for Models

Documentation for Authorization

reltio_auth

  • Type: OAuth
  • Flow: password
  • Authorization URL:
  • Scopes:
    • write: Grant write-only access
    • read: Grant read-only access
2020.2.0

4 years ago