diff --git a/reference.md b/reference.md index f2a777fa..3ebab326 100644 --- a/reference.md +++ b/reference.md @@ -11969,7 +11969,7 @@ client.self_service_profiles.create(
-**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] +**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`]
@@ -12227,7 +12227,7 @@ client.self_service_profiles.update(
-**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] +**allowed_strategies:** `typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]]` — List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`]
@@ -16427,7 +16427,7 @@ client.actions.triggers.list() ## Actions Modules Versions -
client.actions.modules.versions.list(...) -> AsyncHttpResponse[GetActionModuleVersionsResponseContent] +
client.actions.modules.versions.list(...) -> AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent]
@@ -16459,9 +16459,16 @@ from auth0 import Auth0 client = Auth0( token="YOUR_TOKEN", ) -client.actions.modules.versions.list( +response = client.actions.modules.versions.list( id="id", + page=1, + per_page=1, ) +for item in response: + yield item +# alternatively, you can paginate page-by-page +for page in response.iter_pages(): + yield page ```
@@ -16485,6 +16492,22 @@ client.actions.modules.versions.list(
+**page:** `typing.Optional[int]` — Use this field to request a specific page of the list results. + +
+
+ +
+
+ +**per_page:** `typing.Optional[int]` — The maximum number of results to be returned by the server in a single response. 20 by default. + +
+
+ +
+
+ **request_options:** `typing.Optional[RequestOptions]` — Request-specific configuration.
diff --git a/src/auth0/management/actions/client.py b/src/auth0/management/actions/client.py index 1918d1d7..3d0db9e2 100644 --- a/src/auth0/management/actions/client.py +++ b/src/auth0/management/actions/client.py @@ -127,14 +127,14 @@ def list( def create( self, *, - name: str = "my-action", + name: str, supported_triggers: typing.Sequence[ActionTrigger], - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, - deploy: typing.Optional[bool] = False, + deploy: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateActionResponseContent: """ @@ -274,11 +274,11 @@ def update( self, id: str, *, - name: typing.Optional[str] = "my-action", + name: typing.Optional[str] = OMIT, supported_triggers: typing.Optional[typing.Sequence[ActionTrigger]] = OMIT, - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -551,14 +551,14 @@ async def main() -> None: async def create( self, *, - name: str = "my-action", + name: str, supported_triggers: typing.Sequence[ActionTrigger], - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, - deploy: typing.Optional[bool] = False, + deploy: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateActionResponseContent: """ @@ -724,11 +724,11 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "my-action", + name: typing.Optional[str] = OMIT, supported_triggers: typing.Optional[typing.Sequence[ActionTrigger]] = OMIT, - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/actions/modules/versions/client.py b/src/auth0/management/actions/modules/versions/client.py index e7e4aca7..a6baf2e8 100644 --- a/src/auth0/management/actions/modules/versions/client.py +++ b/src/auth0/management/actions/modules/versions/client.py @@ -3,7 +3,9 @@ import typing from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper +from ....core.pagination import AsyncPager, SyncPager from ....core.request_options import RequestOptions +from ....types.action_module_version import ActionModuleVersion from ....types.create_action_module_version_response_content import CreateActionModuleVersionResponseContent from ....types.get_action_module_version_response_content import GetActionModuleVersionResponseContent from ....types.get_action_module_versions_response_content import GetActionModuleVersionsResponseContent @@ -26,8 +28,13 @@ def with_raw_response(self) -> RawVersionsClient: return self._raw_client def list( - self, id: str, *, request_options: typing.Optional[RequestOptions] = None - ) -> GetActionModuleVersionsResponseContent: + self, + id: str, + *, + page: typing.Optional[int] = 0, + per_page: typing.Optional[int] = 50, + request_options: typing.Optional[RequestOptions] = None, + ) -> SyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent]: """ List all published versions of a specific Actions Module. @@ -36,12 +43,18 @@ def list( id : str The unique ID of the module. + page : typing.Optional[int] + Use this field to request a specific page of the list results. + + per_page : typing.Optional[int] + The maximum number of results to be returned by the server in a single response. 20 by default. + request_options : typing.Optional[RequestOptions] Request-specific configuration. Returns ------- - GetActionModuleVersionsResponseContent + SyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent] The module versions were retrieved. Examples @@ -51,12 +64,18 @@ def list( client = Auth0( token="YOUR_TOKEN", ) - client.actions.modules.versions.list( + response = client.actions.modules.versions.list( id="id", + page=1, + per_page=1, ) + for item in response: + yield item + # alternatively, you can paginate page-by-page + for page in response.iter_pages(): + yield page """ - _response = self._raw_client.list(id, request_options=request_options) - return _response.data + return self._raw_client.list(id, page=page, per_page=per_page, request_options=request_options) def create( self, id: str, *, request_options: typing.Optional[RequestOptions] = None @@ -145,8 +164,13 @@ def with_raw_response(self) -> AsyncRawVersionsClient: return self._raw_client async def list( - self, id: str, *, request_options: typing.Optional[RequestOptions] = None - ) -> GetActionModuleVersionsResponseContent: + self, + id: str, + *, + page: typing.Optional[int] = 0, + per_page: typing.Optional[int] = 50, + request_options: typing.Optional[RequestOptions] = None, + ) -> AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent]: """ List all published versions of a specific Actions Module. @@ -155,12 +179,18 @@ async def list( id : str The unique ID of the module. + page : typing.Optional[int] + Use this field to request a specific page of the list results. + + per_page : typing.Optional[int] + The maximum number of results to be returned by the server in a single response. 20 by default. + request_options : typing.Optional[RequestOptions] Request-specific configuration. Returns ------- - GetActionModuleVersionsResponseContent + AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent] The module versions were retrieved. Examples @@ -175,15 +205,22 @@ async def list( async def main() -> None: - await client.actions.modules.versions.list( + response = await client.actions.modules.versions.list( id="id", + page=1, + per_page=1, ) + async for item in response: + yield item + + # alternatively, you can paginate page-by-page + async for page in response.iter_pages(): + yield page asyncio.run(main()) """ - _response = await self._raw_client.list(id, request_options=request_options) - return _response.data + return await self._raw_client.list(id, page=page, per_page=per_page, request_options=request_options) async def create( self, id: str, *, request_options: typing.Optional[RequestOptions] = None diff --git a/src/auth0/management/actions/modules/versions/raw_client.py b/src/auth0/management/actions/modules/versions/raw_client.py index 601d329e..00f01d0a 100644 --- a/src/auth0/management/actions/modules/versions/raw_client.py +++ b/src/auth0/management/actions/modules/versions/raw_client.py @@ -7,6 +7,7 @@ from ....core.client_wrapper import AsyncClientWrapper, SyncClientWrapper from ....core.http_response import AsyncHttpResponse, HttpResponse from ....core.jsonable_encoder import jsonable_encoder +from ....core.pagination import AsyncPager, SyncPager from ....core.pydantic_utilities import parse_obj_as from ....core.request_options import RequestOptions from ....errors.bad_request_error import BadRequestError @@ -16,6 +17,7 @@ from ....errors.precondition_failed_error import PreconditionFailedError from ....errors.too_many_requests_error import TooManyRequestsError from ....errors.unauthorized_error import UnauthorizedError +from ....types.action_module_version import ActionModuleVersion from ....types.create_action_module_version_response_content import CreateActionModuleVersionResponseContent from ....types.get_action_module_version_response_content import GetActionModuleVersionResponseContent from ....types.get_action_module_versions_response_content import GetActionModuleVersionsResponseContent @@ -26,8 +28,13 @@ def __init__(self, *, client_wrapper: SyncClientWrapper): self._client_wrapper = client_wrapper def list( - self, id: str, *, request_options: typing.Optional[RequestOptions] = None - ) -> HttpResponse[GetActionModuleVersionsResponseContent]: + self, + id: str, + *, + page: typing.Optional[int] = 0, + per_page: typing.Optional[int] = 50, + request_options: typing.Optional[RequestOptions] = None, + ) -> SyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent]: """ List all published versions of a specific Actions Module. @@ -36,29 +43,49 @@ def list( id : str The unique ID of the module. + page : typing.Optional[int] + Use this field to request a specific page of the list results. + + per_page : typing.Optional[int] + The maximum number of results to be returned by the server in a single response. 20 by default. + request_options : typing.Optional[RequestOptions] Request-specific configuration. Returns ------- - HttpResponse[GetActionModuleVersionsResponseContent] + SyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent] The module versions were retrieved. """ + page = page if page is not None else 0 + _response = self._client_wrapper.httpx_client.request( f"actions/modules/{jsonable_encoder(id)}/versions", method="GET", + params={ + "page": page, + "per_page": per_page, + }, request_options=request_options, ) try: if 200 <= _response.status_code < 300: - _data = typing.cast( + _parsed_response = typing.cast( GetActionModuleVersionsResponseContent, parse_obj_as( type_=GetActionModuleVersionsResponseContent, # type: ignore object_=_response.json(), ), ) - return HttpResponse(response=_response, data=_data) + _items = _parsed_response.versions + _has_next = True + _get_next = lambda: self.list( + id, + page=page + len(_items or []), + per_page=per_page, + request_options=request_options, + ) + return SyncPager(has_next=_has_next, items=_items, get_next=_get_next, response=_parsed_response) if _response.status_code == 400: raise BadRequestError( headers=dict(_response.headers), @@ -327,8 +354,13 @@ def __init__(self, *, client_wrapper: AsyncClientWrapper): self._client_wrapper = client_wrapper async def list( - self, id: str, *, request_options: typing.Optional[RequestOptions] = None - ) -> AsyncHttpResponse[GetActionModuleVersionsResponseContent]: + self, + id: str, + *, + page: typing.Optional[int] = 0, + per_page: typing.Optional[int] = 50, + request_options: typing.Optional[RequestOptions] = None, + ) -> AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent]: """ List all published versions of a specific Actions Module. @@ -337,29 +369,52 @@ async def list( id : str The unique ID of the module. + page : typing.Optional[int] + Use this field to request a specific page of the list results. + + per_page : typing.Optional[int] + The maximum number of results to be returned by the server in a single response. 20 by default. + request_options : typing.Optional[RequestOptions] Request-specific configuration. Returns ------- - AsyncHttpResponse[GetActionModuleVersionsResponseContent] + AsyncPager[ActionModuleVersion, GetActionModuleVersionsResponseContent] The module versions were retrieved. """ + page = page if page is not None else 0 + _response = await self._client_wrapper.httpx_client.request( f"actions/modules/{jsonable_encoder(id)}/versions", method="GET", + params={ + "page": page, + "per_page": per_page, + }, request_options=request_options, ) try: if 200 <= _response.status_code < 300: - _data = typing.cast( + _parsed_response = typing.cast( GetActionModuleVersionsResponseContent, parse_obj_as( type_=GetActionModuleVersionsResponseContent, # type: ignore object_=_response.json(), ), ) - return AsyncHttpResponse(response=_response, data=_data) + _items = _parsed_response.versions + _has_next = True + + async def _get_next(): + return await self.list( + id, + page=page + len(_items or []), + per_page=per_page, + request_options=request_options, + ) + + return AsyncPager(has_next=_has_next, items=_items, get_next=_get_next, response=_parsed_response) if _response.status_code == 400: raise BadRequestError( headers=dict(_response.headers), diff --git a/src/auth0/management/actions/raw_client.py b/src/auth0/management/actions/raw_client.py index 08c3c1dd..f63d793e 100644 --- a/src/auth0/management/actions/raw_client.py +++ b/src/auth0/management/actions/raw_client.py @@ -168,14 +168,14 @@ def list( def create( self, *, - name: str = "my-action", + name: str, supported_triggers: typing.Sequence[ActionTrigger], - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, - deploy: typing.Optional[bool] = False, + deploy: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateActionResponseContent]: """ @@ -491,11 +491,11 @@ def update( self, id: str, *, - name: typing.Optional[str] = "my-action", + name: typing.Optional[str] = OMIT, supported_triggers: typing.Optional[typing.Sequence[ActionTrigger]] = OMIT, - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -946,14 +946,14 @@ async def _get_next(): async def create( self, *, - name: str = "my-action", + name: str, supported_triggers: typing.Sequence[ActionTrigger], - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, - deploy: typing.Optional[bool] = False, + deploy: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateActionResponseContent]: """ @@ -1269,11 +1269,11 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "my-action", + name: typing.Optional[str] = OMIT, supported_triggers: typing.Optional[typing.Sequence[ActionTrigger]] = OMIT, - code: typing.Optional[str] = "module.exports = () => {}", + code: typing.Optional[str] = OMIT, dependencies: typing.Optional[typing.Sequence[ActionVersionDependency]] = OMIT, - runtime: typing.Optional[str] = "node22", + runtime: typing.Optional[str] = OMIT, secrets: typing.Optional[typing.Sequence[ActionSecretRequest]] = OMIT, modules: typing.Optional[typing.Sequence[ActionModuleReference]] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/attack_protection/breached_password_detection/client.py b/src/auth0/management/attack_protection/breached_password_detection/client.py index 2cbd5b26..24fb9fcf 100644 --- a/src/auth0/management/attack_protection/breached_password_detection/client.py +++ b/src/auth0/management/attack_protection/breached_password_detection/client.py @@ -68,7 +68,7 @@ def get( def update( self, *, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, shields: typing.Optional[typing.Sequence[BreachedPasswordDetectionShieldsEnum]] = OMIT, admin_notification_frequency: typing.Optional[ typing.Sequence[BreachedPasswordDetectionAdminNotificationFrequencyEnum] @@ -179,7 +179,7 @@ async def main() -> None: async def update( self, *, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, shields: typing.Optional[typing.Sequence[BreachedPasswordDetectionShieldsEnum]] = OMIT, admin_notification_frequency: typing.Optional[ typing.Sequence[BreachedPasswordDetectionAdminNotificationFrequencyEnum] diff --git a/src/auth0/management/attack_protection/breached_password_detection/raw_client.py b/src/auth0/management/attack_protection/breached_password_detection/raw_client.py index 2c13d773..da45825a 100644 --- a/src/auth0/management/attack_protection/breached_password_detection/raw_client.py +++ b/src/auth0/management/attack_protection/breached_password_detection/raw_client.py @@ -106,7 +106,7 @@ def get( def update( self, *, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, shields: typing.Optional[typing.Sequence[BreachedPasswordDetectionShieldsEnum]] = OMIT, admin_notification_frequency: typing.Optional[ typing.Sequence[BreachedPasswordDetectionAdminNotificationFrequencyEnum] @@ -297,7 +297,7 @@ async def get( async def update( self, *, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, shields: typing.Optional[typing.Sequence[BreachedPasswordDetectionShieldsEnum]] = OMIT, admin_notification_frequency: typing.Optional[ typing.Sequence[BreachedPasswordDetectionAdminNotificationFrequencyEnum] diff --git a/src/auth0/management/attack_protection/brute_force_protection/client.py b/src/auth0/management/attack_protection/brute_force_protection/client.py index 2ccdacb5..3aaab7a9 100644 --- a/src/auth0/management/attack_protection/brute_force_protection/client.py +++ b/src/auth0/management/attack_protection/brute_force_protection/client.py @@ -62,7 +62,7 @@ def update( shields: typing.Optional[typing.Sequence[BruteForceProtectionShieldsEnum]] = OMIT, allowlist: typing.Optional[typing.Sequence[str]] = OMIT, mode: typing.Optional[BruteForceProtectionModeEnum] = OMIT, - max_attempts: typing.Optional[int] = 10, + max_attempts: typing.Optional[int] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateBruteForceSettingsResponseContent: """ @@ -171,7 +171,7 @@ async def update( shields: typing.Optional[typing.Sequence[BruteForceProtectionShieldsEnum]] = OMIT, allowlist: typing.Optional[typing.Sequence[str]] = OMIT, mode: typing.Optional[BruteForceProtectionModeEnum] = OMIT, - max_attempts: typing.Optional[int] = 10, + max_attempts: typing.Optional[int] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateBruteForceSettingsResponseContent: """ diff --git a/src/auth0/management/attack_protection/brute_force_protection/raw_client.py b/src/auth0/management/attack_protection/brute_force_protection/raw_client.py index 529f0818..66882537 100644 --- a/src/auth0/management/attack_protection/brute_force_protection/raw_client.py +++ b/src/auth0/management/attack_protection/brute_force_protection/raw_client.py @@ -101,7 +101,7 @@ def update( shields: typing.Optional[typing.Sequence[BruteForceProtectionShieldsEnum]] = OMIT, allowlist: typing.Optional[typing.Sequence[str]] = OMIT, mode: typing.Optional[BruteForceProtectionModeEnum] = OMIT, - max_attempts: typing.Optional[int] = 10, + max_attempts: typing.Optional[int] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdateBruteForceSettingsResponseContent]: """ @@ -288,7 +288,7 @@ async def update( shields: typing.Optional[typing.Sequence[BruteForceProtectionShieldsEnum]] = OMIT, allowlist: typing.Optional[typing.Sequence[str]] = OMIT, mode: typing.Optional[BruteForceProtectionModeEnum] = OMIT, - max_attempts: typing.Optional[int] = 10, + max_attempts: typing.Optional[int] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdateBruteForceSettingsResponseContent]: """ diff --git a/src/auth0/management/branding/phone/templates/client.py b/src/auth0/management/branding/phone/templates/client.py index cf5b1e75..12044d72 100644 --- a/src/auth0/management/branding/phone/templates/client.py +++ b/src/auth0/management/branding/phone/templates/client.py @@ -73,7 +73,7 @@ def create( self, *, type: typing.Optional[PhoneTemplateNotificationTypeEnum] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, content: typing.Optional[PhoneTemplateContent] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreatePhoneTemplateResponseContent: @@ -171,7 +171,7 @@ def update( id: str, *, content: typing.Optional[PartialPhoneTemplateContent] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdatePhoneTemplateResponseContent: """ @@ -343,7 +343,7 @@ async def create( self, *, type: typing.Optional[PhoneTemplateNotificationTypeEnum] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, content: typing.Optional[PhoneTemplateContent] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreatePhoneTemplateResponseContent: @@ -465,7 +465,7 @@ async def update( id: str, *, content: typing.Optional[PartialPhoneTemplateContent] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdatePhoneTemplateResponseContent: """ diff --git a/src/auth0/management/branding/phone/templates/raw_client.py b/src/auth0/management/branding/phone/templates/raw_client.py index 934f40e4..55608872 100644 --- a/src/auth0/management/branding/phone/templates/raw_client.py +++ b/src/auth0/management/branding/phone/templates/raw_client.py @@ -126,7 +126,7 @@ def create( self, *, type: typing.Optional[PhoneTemplateNotificationTypeEnum] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, content: typing.Optional[PhoneTemplateContent] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreatePhoneTemplateResponseContent]: @@ -411,7 +411,7 @@ def update( id: str, *, content: typing.Optional[PartialPhoneTemplateContent] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdatePhoneTemplateResponseContent]: """ @@ -810,7 +810,7 @@ async def create( self, *, type: typing.Optional[PhoneTemplateNotificationTypeEnum] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, content: typing.Optional[PhoneTemplateContent] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreatePhoneTemplateResponseContent]: @@ -1097,7 +1097,7 @@ async def update( id: str, *, content: typing.Optional[PartialPhoneTemplateContent] = OMIT, - disabled: typing.Optional[bool] = False, + disabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdatePhoneTemplateResponseContent]: """ diff --git a/src/auth0/management/client.py b/src/auth0/management/client.py index aacc314c..60e53e55 100644 --- a/src/auth0/management/client.py +++ b/src/auth0/management/client.py @@ -72,6 +72,9 @@ class Auth0: + tenant_domain : typing.Optional[str] + Server URL variable for 'tenantDomain'. Defaults to '{TENANT}.auth0.com'. + token : typing.Union[str, typing.Callable[[], str]] headers : typing.Optional[typing.Dict[str, str]] Additional headers to send with every request. @@ -99,6 +102,7 @@ def __init__( *, base_url: typing.Optional[str] = None, environment: Auth0Environment = Auth0Environment.DEFAULT, + tenant_domain: typing.Optional[str] = None, token: typing.Union[str, typing.Callable[[], str]], headers: typing.Optional[typing.Dict[str, str]] = None, timeout: typing.Optional[float] = None, @@ -108,6 +112,9 @@ def __init__( _defaulted_timeout = ( timeout if timeout is not None else 60 if httpx_client is None else httpx_client.timeout.read ) + if tenant_domain is not None: + _tenant_domain = tenant_domain if tenant_domain is not None else "{TENANT}.auth0.com" + base_url = "https://{tenantDomain}/api/v2".format(tenantDomain=_tenant_domain) self._client_wrapper = SyncClientWrapper( base_url=_get_base_url(base_url=base_url, environment=environment), token=token, @@ -526,6 +533,9 @@ class AsyncAuth0: + tenant_domain : typing.Optional[str] + Server URL variable for 'tenantDomain'. Defaults to '{TENANT}.auth0.com'. + token : typing.Union[str, typing.Callable[[], str]] headers : typing.Optional[typing.Dict[str, str]] Additional headers to send with every request. @@ -553,6 +563,7 @@ def __init__( *, base_url: typing.Optional[str] = None, environment: Auth0Environment = Auth0Environment.DEFAULT, + tenant_domain: typing.Optional[str] = None, token: typing.Union[str, typing.Callable[[], str]], headers: typing.Optional[typing.Dict[str, str]] = None, timeout: typing.Optional[float] = None, @@ -562,6 +573,9 @@ def __init__( _defaulted_timeout = ( timeout if timeout is not None else 60 if httpx_client is None else httpx_client.timeout.read ) + if tenant_domain is not None: + _tenant_domain = tenant_domain if tenant_domain is not None else "{TENANT}.auth0.com" + base_url = "https://{tenantDomain}/api/v2".format(tenantDomain=_tenant_domain) self._client_wrapper = AsyncClientWrapper( base_url=_get_base_url(base_url=base_url, environment=environment), token=token, diff --git a/src/auth0/management/client_grants/client.py b/src/auth0/management/client_grants/client.py index aca0aefd..cf086bb4 100644 --- a/src/auth0/management/client_grants/client.py +++ b/src/auth0/management/client_grants/client.py @@ -120,7 +120,7 @@ def create( client_id: str, audience: str, organization_usage: typing.Optional[ClientGrantOrganizationUsageEnum] = OMIT, - allow_any_organization: typing.Optional[bool] = False, + allow_any_organization: typing.Optional[bool] = OMIT, scope: typing.Optional[typing.Sequence[str]] = OMIT, subject_type: typing.Optional[ClientGrantSubjectTypeEnum] = OMIT, authorization_details_types: typing.Optional[typing.Sequence[str]] = OMIT, @@ -426,7 +426,7 @@ async def create( client_id: str, audience: str, organization_usage: typing.Optional[ClientGrantOrganizationUsageEnum] = OMIT, - allow_any_organization: typing.Optional[bool] = False, + allow_any_organization: typing.Optional[bool] = OMIT, scope: typing.Optional[typing.Sequence[str]] = OMIT, subject_type: typing.Optional[ClientGrantSubjectTypeEnum] = OMIT, authorization_details_types: typing.Optional[typing.Sequence[str]] = OMIT, diff --git a/src/auth0/management/client_grants/raw_client.py b/src/auth0/management/client_grants/raw_client.py index c50a88b7..aa134dce 100644 --- a/src/auth0/management/client_grants/raw_client.py +++ b/src/auth0/management/client_grants/raw_client.py @@ -155,7 +155,7 @@ def create( client_id: str, audience: str, organization_usage: typing.Optional[ClientGrantOrganizationUsageEnum] = OMIT, - allow_any_organization: typing.Optional[bool] = False, + allow_any_organization: typing.Optional[bool] = OMIT, scope: typing.Optional[typing.Sequence[str]] = OMIT, subject_type: typing.Optional[ClientGrantSubjectTypeEnum] = OMIT, authorization_details_types: typing.Optional[typing.Sequence[str]] = OMIT, @@ -710,7 +710,7 @@ async def create( client_id: str, audience: str, organization_usage: typing.Optional[ClientGrantOrganizationUsageEnum] = OMIT, - allow_any_organization: typing.Optional[bool] = False, + allow_any_organization: typing.Optional[bool] = OMIT, scope: typing.Optional[typing.Sequence[str]] = OMIT, subject_type: typing.Optional[ClientGrantSubjectTypeEnum] = OMIT, authorization_details_types: typing.Optional[typing.Sequence[str]] = OMIT, diff --git a/src/auth0/management/clients/client.py b/src/auth0/management/clients/client.py index 427f39aa..22a5b0ec 100644 --- a/src/auth0/management/clients/client.py +++ b/src/auth0/management/clients/client.py @@ -215,14 +215,14 @@ def create( allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, grant_types: typing.Optional[typing.Sequence[str]] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, jwt_configuration: typing.Optional[ClientJwtConfiguration] = OMIT, encryption_key: typing.Optional[ClientEncryptionKey] = OMIT, sso: typing.Optional[bool] = OMIT, - cross_origin_authentication: typing.Optional[bool] = False, + cross_origin_authentication: typing.Optional[bool] = OMIT, cross_origin_loc: typing.Optional[str] = OMIT, sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, @@ -240,8 +240,8 @@ def create( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientCreateAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithPublicKey] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -611,10 +611,10 @@ def update( sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodOrNullEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, custom_login_page: typing.Optional[str] = OMIT, custom_login_page_preview: typing.Optional[str] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -630,8 +630,8 @@ def update( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorPatchEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithCredentialId] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -1084,14 +1084,14 @@ async def create( allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, grant_types: typing.Optional[typing.Sequence[str]] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, jwt_configuration: typing.Optional[ClientJwtConfiguration] = OMIT, encryption_key: typing.Optional[ClientEncryptionKey] = OMIT, sso: typing.Optional[bool] = OMIT, - cross_origin_authentication: typing.Optional[bool] = False, + cross_origin_authentication: typing.Optional[bool] = OMIT, cross_origin_loc: typing.Optional[str] = OMIT, sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, @@ -1109,8 +1109,8 @@ async def create( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientCreateAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithPublicKey] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -1504,10 +1504,10 @@ async def update( sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodOrNullEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, custom_login_page: typing.Optional[str] = OMIT, custom_login_page_preview: typing.Optional[str] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -1523,8 +1523,8 @@ async def update( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorPatchEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithCredentialId] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/clients/credentials/client.py b/src/auth0/management/clients/credentials/client.py index f9c5eeac..39d5a4ee 100644 --- a/src/auth0/management/clients/credentials/client.py +++ b/src/auth0/management/clients/credentials/client.py @@ -72,11 +72,11 @@ def create( client_id: str, *, credential_type: ClientCredentialTypeEnum, - name: typing.Optional[str] = "", + name: typing.Optional[str] = OMIT, subject_dn: typing.Optional[str] = OMIT, - pem: typing.Optional[str] = "-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n", + pem: typing.Optional[str] = OMIT, alg: typing.Optional[PublicKeyCredentialAlgorithmEnum] = OMIT, - parse_expiry_from_cert: typing.Optional[bool] = False, + parse_expiry_from_cert: typing.Optional[bool] = OMIT, expires_at: typing.Optional[dt.datetime] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> PostClientCredentialResponseContent: @@ -358,11 +358,11 @@ async def create( client_id: str, *, credential_type: ClientCredentialTypeEnum, - name: typing.Optional[str] = "", + name: typing.Optional[str] = OMIT, subject_dn: typing.Optional[str] = OMIT, - pem: typing.Optional[str] = "-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n", + pem: typing.Optional[str] = OMIT, alg: typing.Optional[PublicKeyCredentialAlgorithmEnum] = OMIT, - parse_expiry_from_cert: typing.Optional[bool] = False, + parse_expiry_from_cert: typing.Optional[bool] = OMIT, expires_at: typing.Optional[dt.datetime] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> PostClientCredentialResponseContent: diff --git a/src/auth0/management/clients/credentials/raw_client.py b/src/auth0/management/clients/credentials/raw_client.py index e65ffe02..7890284a 100644 --- a/src/auth0/management/clients/credentials/raw_client.py +++ b/src/auth0/management/clients/credentials/raw_client.py @@ -120,11 +120,11 @@ def create( client_id: str, *, credential_type: ClientCredentialTypeEnum, - name: typing.Optional[str] = "", + name: typing.Optional[str] = OMIT, subject_dn: typing.Optional[str] = OMIT, - pem: typing.Optional[str] = "-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n", + pem: typing.Optional[str] = OMIT, alg: typing.Optional[PublicKeyCredentialAlgorithmEnum] = OMIT, - parse_expiry_from_cert: typing.Optional[bool] = False, + parse_expiry_from_cert: typing.Optional[bool] = OMIT, expires_at: typing.Optional[dt.datetime] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[PostClientCredentialResponseContent]: @@ -656,11 +656,11 @@ async def create( client_id: str, *, credential_type: ClientCredentialTypeEnum, - name: typing.Optional[str] = "", + name: typing.Optional[str] = OMIT, subject_dn: typing.Optional[str] = OMIT, - pem: typing.Optional[str] = "-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n", + pem: typing.Optional[str] = OMIT, alg: typing.Optional[PublicKeyCredentialAlgorithmEnum] = OMIT, - parse_expiry_from_cert: typing.Optional[bool] = False, + parse_expiry_from_cert: typing.Optional[bool] = OMIT, expires_at: typing.Optional[dt.datetime] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[PostClientCredentialResponseContent]: diff --git a/src/auth0/management/clients/raw_client.py b/src/auth0/management/clients/raw_client.py index 90b64daa..5e36643a 100644 --- a/src/auth0/management/clients/raw_client.py +++ b/src/auth0/management/clients/raw_client.py @@ -261,14 +261,14 @@ def create( allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, grant_types: typing.Optional[typing.Sequence[str]] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, jwt_configuration: typing.Optional[ClientJwtConfiguration] = OMIT, encryption_key: typing.Optional[ClientEncryptionKey] = OMIT, sso: typing.Optional[bool] = OMIT, - cross_origin_authentication: typing.Optional[bool] = False, + cross_origin_authentication: typing.Optional[bool] = OMIT, cross_origin_loc: typing.Optional[str] = OMIT, sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, @@ -286,8 +286,8 @@ def create( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientCreateAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithPublicKey] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -864,10 +864,10 @@ def update( sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodOrNullEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, custom_login_page: typing.Optional[str] = OMIT, custom_login_page_preview: typing.Optional[str] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -883,8 +883,8 @@ def update( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorPatchEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithCredentialId] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -1524,14 +1524,14 @@ async def create( allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, grant_types: typing.Optional[typing.Sequence[str]] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, jwt_configuration: typing.Optional[ClientJwtConfiguration] = OMIT, encryption_key: typing.Optional[ClientEncryptionKey] = OMIT, sso: typing.Optional[bool] = OMIT, - cross_origin_authentication: typing.Optional[bool] = False, + cross_origin_authentication: typing.Optional[bool] = OMIT, cross_origin_loc: typing.Optional[str] = OMIT, sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, @@ -1549,8 +1549,8 @@ async def create( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientCreateAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithPublicKey] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, @@ -2129,10 +2129,10 @@ async def update( sso_disabled: typing.Optional[bool] = OMIT, custom_login_page_on: typing.Optional[bool] = OMIT, token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodOrNullEnum] = OMIT, - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = False, + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = OMIT, app_type: typing.Optional[ClientAppTypeEnum] = OMIT, - is_first_party: typing.Optional[bool] = True, - oidc_conformant: typing.Optional[bool] = False, + is_first_party: typing.Optional[bool] = OMIT, + oidc_conformant: typing.Optional[bool] = OMIT, custom_login_page: typing.Optional[str] = OMIT, custom_login_page_preview: typing.Optional[str] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -2148,8 +2148,8 @@ async def update( organization_require_behavior: typing.Optional[ClientOrganizationRequireBehaviorPatchEnum] = OMIT, organization_discovery_methods: typing.Optional[typing.Sequence[ClientOrganizationDiscoveryEnum]] = OMIT, client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = OMIT, - require_pushed_authorization_requests: typing.Optional[bool] = False, - require_proof_of_possession: typing.Optional[bool] = False, + require_pushed_authorization_requests: typing.Optional[bool] = OMIT, + require_proof_of_possession: typing.Optional[bool] = OMIT, signed_request_object: typing.Optional[ClientSignedRequestObjectWithCredentialId] = OMIT, compliance_level: typing.Optional[ClientComplianceLevelEnum] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/core/http_response.py b/src/auth0/management/core/http_response.py index 2479747e..00bb1096 100644 --- a/src/auth0/management/core/http_response.py +++ b/src/auth0/management/core/http_response.py @@ -9,7 +9,7 @@ class BaseHttpResponse: - """Minimalist HTTP response wrapper that exposes response headers.""" + """Minimalist HTTP response wrapper that exposes response headers and status code.""" _response: httpx.Response @@ -20,6 +20,10 @@ def __init__(self, response: httpx.Response): def headers(self) -> Dict[str, str]: return dict(self._response.headers) + @property + def status_code(self) -> int: + return self._response.status_code + class HttpResponse(Generic[T], BaseHttpResponse): """HTTP response wrapper that exposes response headers and data.""" diff --git a/src/auth0/management/core/pydantic_utilities.py b/src/auth0/management/core/pydantic_utilities.py index 12dc057b..789081b0 100644 --- a/src/auth0/management/core/pydantic_utilities.py +++ b/src/auth0/management/core/pydantic_utilities.py @@ -3,10 +3,34 @@ # nopycln: file import datetime as dt import inspect +import json +import logging from collections import defaultdict -from typing import Any, Callable, ClassVar, Dict, List, Mapping, Optional, Set, Tuple, Type, TypeVar, Union, cast +from dataclasses import asdict +from typing import ( + TYPE_CHECKING, + Any, + Callable, + ClassVar, + Dict, + List, + Mapping, + Optional, + Set, + Tuple, + Type, + TypeVar, + Union, + cast, +) import pydantic +import typing_extensions + +_logger = logging.getLogger(__name__) + +if TYPE_CHECKING: + from .http_sse._models import ServerSentEvent IS_PYDANTIC_V2 = pydantic.VERSION.startswith("2.") @@ -37,6 +61,181 @@ Model = TypeVar("Model", bound=pydantic.BaseModel) +def _get_discriminator_and_variants(type_: Type[Any]) -> Tuple[Optional[str], Optional[List[Type[Any]]]]: + """ + Extract the discriminator field name and union variants from a discriminated union type. + Supports Annotated[Union[...], Field(discriminator=...)] patterns. + Returns (discriminator, variants) or (None, None) if not a discriminated union. + """ + origin = typing_extensions.get_origin(type_) + + if origin is typing_extensions.Annotated: + args = typing_extensions.get_args(type_) + if len(args) >= 2: + inner_type = args[0] + # Check annotations for discriminator + discriminator = None + for annotation in args[1:]: + if hasattr(annotation, "discriminator"): + discriminator = getattr(annotation, "discriminator", None) + break + + if discriminator: + inner_origin = typing_extensions.get_origin(inner_type) + if inner_origin is Union: + variants = list(typing_extensions.get_args(inner_type)) + return discriminator, variants + return None, None + + +def _get_field_annotation(model: Type[Any], field_name: str) -> Optional[Type[Any]]: + """Get the type annotation of a field from a Pydantic model.""" + if IS_PYDANTIC_V2: + fields = getattr(model, "model_fields", {}) + field_info = fields.get(field_name) + if field_info: + return cast(Optional[Type[Any]], field_info.annotation) + else: + fields = getattr(model, "__fields__", {}) + field_info = fields.get(field_name) + if field_info: + return cast(Optional[Type[Any]], field_info.outer_type_) + return None + + +def _find_variant_by_discriminator( + variants: List[Type[Any]], + discriminator: str, + discriminator_value: Any, +) -> Optional[Type[Any]]: + """Find the union variant that matches the discriminator value.""" + for variant in variants: + if not (inspect.isclass(variant) and issubclass(variant, pydantic.BaseModel)): + continue + + disc_annotation = _get_field_annotation(variant, discriminator) + if disc_annotation and is_literal_type(disc_annotation): + literal_args = get_args(disc_annotation) + if literal_args and literal_args[0] == discriminator_value: + return variant + return None + + +def _is_string_type(type_: Type[Any]) -> bool: + """Check if a type is str or Optional[str].""" + if type_ is str: + return True + + origin = typing_extensions.get_origin(type_) + if origin is Union: + args = typing_extensions.get_args(type_) + # Optional[str] = Union[str, None] + non_none_args = [a for a in args if a is not type(None)] + if len(non_none_args) == 1 and non_none_args[0] is str: + return True + + return False + + +def parse_sse_obj(sse: "ServerSentEvent", type_: Type[T]) -> T: + """ + Parse a ServerSentEvent into the appropriate type. + + Handles two scenarios based on where the discriminator field is located: + + 1. Data-level discrimination: The discriminator (e.g., 'type') is inside the 'data' payload. + The union describes the data content, not the SSE envelope. + -> Returns: json.loads(data) parsed into the type + + Example: ChatStreamResponse with discriminator='type' + Input: ServerSentEvent(event="message", data='{"type": "content-delta", ...}', id="") + Output: ContentDeltaEvent (parsed from data, SSE envelope stripped) + + 2. Event-level discrimination: The discriminator (e.g., 'event') is at the SSE event level. + The union describes the full SSE event structure. + -> Returns: SSE envelope with 'data' field JSON-parsed only if the variant expects non-string + + Example: JobStreamResponse with discriminator='event' + Input: ServerSentEvent(event="ERROR", data='{"code": "FAILED", ...}', id="123") + Output: JobStreamResponse_Error with data as ErrorData object + + But for variants where data is str (like STATUS_UPDATE): + Input: ServerSentEvent(event="STATUS_UPDATE", data='{"status": "processing"}', id="1") + Output: JobStreamResponse_StatusUpdate with data as string (not parsed) + + Args: + sse: The ServerSentEvent object to parse + type_: The target discriminated union type + + Returns: + The parsed object of type T + + Note: + This function is only available in SDK contexts where http_sse module exists. + """ + sse_event = asdict(sse) + discriminator, variants = _get_discriminator_and_variants(type_) + + if discriminator is None or variants is None: + # Not a discriminated union - parse the data field as JSON + data_value = sse_event.get("data") + if isinstance(data_value, str) and data_value: + try: + parsed_data = json.loads(data_value) + return parse_obj_as(type_, parsed_data) + except json.JSONDecodeError as e: + _logger.warning( + "Failed to parse SSE data field as JSON: %s, data: %s", + e, + data_value[:100] if len(data_value) > 100 else data_value, + ) + return parse_obj_as(type_, sse_event) + + data_value = sse_event.get("data") + + # Check if discriminator is at the top level (event-level discrimination) + if discriminator in sse_event: + # Case 2: Event-level discrimination + # Find the matching variant to check if 'data' field needs JSON parsing + disc_value = sse_event.get(discriminator) + matching_variant = _find_variant_by_discriminator(variants, discriminator, disc_value) + + if matching_variant is not None: + # Check what type the variant expects for 'data' + data_type = _get_field_annotation(matching_variant, "data") + if data_type is not None and not _is_string_type(data_type): + # Variant expects non-string data - parse JSON + if isinstance(data_value, str) and data_value: + try: + parsed_data = json.loads(data_value) + new_object = dict(sse_event) + new_object["data"] = parsed_data + return parse_obj_as(type_, new_object) + except json.JSONDecodeError as e: + _logger.warning( + "Failed to parse SSE data field as JSON for event-level discrimination: %s, data: %s", + e, + data_value[:100] if len(data_value) > 100 else data_value, + ) + # Either no matching variant, data is string type, or JSON parse failed + return parse_obj_as(type_, sse_event) + + else: + # Case 1: Data-level discrimination + # The discriminator is inside the data payload - extract and parse data only + if isinstance(data_value, str) and data_value: + try: + parsed_data = json.loads(data_value) + return parse_obj_as(type_, parsed_data) + except json.JSONDecodeError as e: + _logger.warning( + "Failed to parse SSE data field as JSON for data-level discrimination: %s, data: %s", + e, + data_value[:100] if len(data_value) > 100 else data_value, + ) + return parse_obj_as(type_, sse_event) + + def parse_obj_as(type_: Type[T], object_: Any) -> T: # convert_and_respect_annotation_metadata is required for TypedDict aliasing. # diff --git a/src/auth0/management/email_templates/client.py b/src/auth0/management/email_templates/client.py index 2384dbf3..8c204426 100644 --- a/src/auth0/management/email_templates/client.py +++ b/src/auth0/management/email_templates/client.py @@ -35,10 +35,10 @@ def create( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -147,10 +147,10 @@ def set( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -231,10 +231,10 @@ def update( *, template: typing.Optional[EmailTemplateNameEnum] = OMIT, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -329,10 +329,10 @@ async def create( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -457,10 +457,10 @@ async def set( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -549,10 +549,10 @@ async def update( *, template: typing.Optional[EmailTemplateNameEnum] = OMIT, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/email_templates/raw_client.py b/src/auth0/management/email_templates/raw_client.py index 03eb2307..9509ffdc 100644 --- a/src/auth0/management/email_templates/raw_client.py +++ b/src/auth0/management/email_templates/raw_client.py @@ -34,10 +34,10 @@ def create( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -261,10 +261,10 @@ def set( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -408,10 +408,10 @@ def update( *, template: typing.Optional[EmailTemplateNameEnum] = OMIT, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -559,10 +559,10 @@ async def create( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -786,10 +786,10 @@ async def set( *, template: EmailTemplateNameEnum, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, @@ -933,10 +933,10 @@ async def update( *, template: typing.Optional[EmailTemplateNameEnum] = OMIT, body: typing.Optional[str] = OMIT, - from_: typing.Optional[str] = "sender@auth0.com", + from_: typing.Optional[str] = OMIT, result_url: typing.Optional[str] = OMIT, subject: typing.Optional[str] = OMIT, - syntax: typing.Optional[str] = "liquid", + syntax: typing.Optional[str] = OMIT, url_lifetime_in_seconds: typing.Optional[float] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, enabled: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/emails/provider/client.py b/src/auth0/management/emails/provider/client.py index 01b1c782..c5da2861 100644 --- a/src/auth0/management/emails/provider/client.py +++ b/src/auth0/management/emails/provider/client.py @@ -79,7 +79,7 @@ def create( *, name: EmailProviderNameEnum, credentials: EmailProviderCredentialsSchema, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, default_from_address: typing.Optional[str] = OMIT, settings: typing.Optional[EmailSpecificProviderSettingsWithAdditionalProperties] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -364,7 +364,7 @@ async def create( *, name: EmailProviderNameEnum, credentials: EmailProviderCredentialsSchema, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, default_from_address: typing.Optional[str] = OMIT, settings: typing.Optional[EmailSpecificProviderSettingsWithAdditionalProperties] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/emails/provider/raw_client.py b/src/auth0/management/emails/provider/raw_client.py index 8baccbad..ac074a0b 100644 --- a/src/auth0/management/emails/provider/raw_client.py +++ b/src/auth0/management/emails/provider/raw_client.py @@ -142,7 +142,7 @@ def create( *, name: EmailProviderNameEnum, credentials: EmailProviderCredentialsSchema, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, default_from_address: typing.Optional[str] = OMIT, settings: typing.Optional[EmailSpecificProviderSettingsWithAdditionalProperties] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -670,7 +670,7 @@ async def create( *, name: EmailProviderNameEnum, credentials: EmailProviderCredentialsSchema, - enabled: typing.Optional[bool] = True, + enabled: typing.Optional[bool] = OMIT, default_from_address: typing.Optional[str] = OMIT, settings: typing.Optional[EmailSpecificProviderSettingsWithAdditionalProperties] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/guardian/factors/phone/client.py b/src/auth0/management/guardian/factors/phone/client.py index 578df7ce..da291fbd 100644 --- a/src/auth0/management/guardian/factors/phone/client.py +++ b/src/auth0/management/guardian/factors/phone/client.py @@ -146,10 +146,10 @@ def get_twilio_provider( def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderPhoneTwilioResponseContent: """ @@ -287,8 +287,8 @@ def get_templates( def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorPhoneTemplatesResponseContent: """ @@ -466,10 +466,10 @@ async def main() -> None: async def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderPhoneTwilioResponseContent: """ @@ -639,8 +639,8 @@ async def main() -> None: async def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorPhoneTemplatesResponseContent: """ diff --git a/src/auth0/management/guardian/factors/phone/raw_client.py b/src/auth0/management/guardian/factors/phone/raw_client.py index e0be8456..150eef98 100644 --- a/src/auth0/management/guardian/factors/phone/raw_client.py +++ b/src/auth0/management/guardian/factors/phone/raw_client.py @@ -281,10 +281,10 @@ def get_twilio_provider( def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[SetGuardianFactorsProviderPhoneTwilioResponseContent]: """ @@ -595,8 +595,8 @@ def get_templates( def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[SetGuardianFactorPhoneTemplatesResponseContent]: """ @@ -918,10 +918,10 @@ async def get_twilio_provider( async def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[SetGuardianFactorsProviderPhoneTwilioResponseContent]: """ @@ -1232,8 +1232,8 @@ async def get_templates( async def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[SetGuardianFactorPhoneTemplatesResponseContent]: """ diff --git a/src/auth0/management/guardian/factors/push_notification/client.py b/src/auth0/management/guardian/factors/push_notification/client.py index 7d8c9f0f..88d5e902 100644 --- a/src/auth0/management/guardian/factors/push_notification/client.py +++ b/src/auth0/management/guardian/factors/push_notification/client.py @@ -331,11 +331,11 @@ def get_sns_provider( def set_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderPushNotificationSnsResponseContent: """ @@ -383,11 +383,11 @@ def set_sns_provider( def update_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateGuardianFactorsProviderPushNotificationSnsResponseContent: """ @@ -846,11 +846,11 @@ async def main() -> None: async def set_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderPushNotificationSnsResponseContent: """ @@ -906,11 +906,11 @@ async def main() -> None: async def update_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateGuardianFactorsProviderPushNotificationSnsResponseContent: """ diff --git a/src/auth0/management/guardian/factors/push_notification/raw_client.py b/src/auth0/management/guardian/factors/push_notification/raw_client.py index e3e4f4a7..ce2a84fc 100644 --- a/src/auth0/management/guardian/factors/push_notification/raw_client.py +++ b/src/auth0/management/guardian/factors/push_notification/raw_client.py @@ -692,11 +692,11 @@ def get_sns_provider( def set_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[SetGuardianFactorsProviderPushNotificationSnsResponseContent]: """ @@ -789,11 +789,11 @@ def set_sns_provider( def update_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdateGuardianFactorsProviderPushNotificationSnsResponseContent]: """ @@ -1675,11 +1675,11 @@ async def get_sns_provider( async def set_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[SetGuardianFactorsProviderPushNotificationSnsResponseContent]: """ @@ -1772,11 +1772,11 @@ async def set_sns_provider( async def update_sns_provider( self, *, - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL", - aws_region: typing.Optional[str] = "us-west-1", + aws_access_key_id: typing.Optional[str] = OMIT, + aws_secret_access_key: typing.Optional[str] = OMIT, + aws_region: typing.Optional[str] = OMIT, sns_apns_platform_application_arn: typing.Optional[str] = OMIT, - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP", + sns_gcm_platform_application_arn: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdateGuardianFactorsProviderPushNotificationSnsResponseContent]: """ diff --git a/src/auth0/management/guardian/factors/sms/client.py b/src/auth0/management/guardian/factors/sms/client.py index 23822a4c..ae22af14 100644 --- a/src/auth0/management/guardian/factors/sms/client.py +++ b/src/auth0/management/guardian/factors/sms/client.py @@ -69,10 +69,10 @@ def get_twilio_provider( def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderSmsTwilioResponseContent: """ @@ -220,8 +220,8 @@ def get_templates( def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorSmsTemplatesResponseContent: """ @@ -321,10 +321,10 @@ async def main() -> None: async def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorsProviderSmsTwilioResponseContent: """ @@ -504,8 +504,8 @@ async def main() -> None: async def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> SetGuardianFactorSmsTemplatesResponseContent: """ diff --git a/src/auth0/management/guardian/factors/sms/raw_client.py b/src/auth0/management/guardian/factors/sms/raw_client.py index 2975abcd..f6d0bccc 100644 --- a/src/auth0/management/guardian/factors/sms/raw_client.py +++ b/src/auth0/management/guardian/factors/sms/raw_client.py @@ -105,10 +105,10 @@ def get_twilio_provider( def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[SetGuardianFactorsProviderSmsTwilioResponseContent]: """ @@ -429,8 +429,8 @@ def get_templates( def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[SetGuardianFactorSmsTemplatesResponseContent]: """ @@ -594,10 +594,10 @@ async def get_twilio_provider( async def set_twilio_provider( self, *, - from_: typing.Optional[str] = "+1223323", - messaging_service_sid: typing.Optional[str] = "5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq", - auth_token: typing.Optional[str] = "zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU", - sid: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40", + from_: typing.Optional[str] = OMIT, + messaging_service_sid: typing.Optional[str] = OMIT, + auth_token: typing.Optional[str] = OMIT, + sid: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[SetGuardianFactorsProviderSmsTwilioResponseContent]: """ @@ -918,8 +918,8 @@ async def get_templates( async def set_templates( self, *, - enrollment_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment.", - verification_message: str = "{{code}} is your verification code for {{tenant.friendly_name}}", + enrollment_message: str, + verification_message: str, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[SetGuardianFactorSmsTemplatesResponseContent]: """ diff --git a/src/auth0/management/hooks/client.py b/src/auth0/management/hooks/client.py index f345ba5e..88cac8da 100644 --- a/src/auth0/management/hooks/client.py +++ b/src/auth0/management/hooks/client.py @@ -115,10 +115,10 @@ def list( def create( self, *, - name: str = "my-hook", - script: str = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", + name: str, + script: str, trigger_id: HookTriggerIdEnum, - enabled: typing.Optional[bool] = False, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateHookResponseContent: @@ -242,11 +242,9 @@ def update( self, id: str, *, - name: typing.Optional[str] = "my-hook", - script: typing.Optional[ - str - ] = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", - enabled: typing.Optional[bool] = False, + name: typing.Optional[str] = OMIT, + script: typing.Optional[str] = OMIT, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateHookResponseContent: @@ -404,10 +402,10 @@ async def main() -> None: async def create( self, *, - name: str = "my-hook", - script: str = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", + name: str, + script: str, trigger_id: HookTriggerIdEnum, - enabled: typing.Optional[bool] = False, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateHookResponseContent: @@ -555,11 +553,9 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "my-hook", - script: typing.Optional[ - str - ] = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", - enabled: typing.Optional[bool] = False, + name: typing.Optional[str] = OMIT, + script: typing.Optional[str] = OMIT, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateHookResponseContent: diff --git a/src/auth0/management/hooks/raw_client.py b/src/auth0/management/hooks/raw_client.py index 6937c2e9..3d02c29b 100644 --- a/src/auth0/management/hooks/raw_client.py +++ b/src/auth0/management/hooks/raw_client.py @@ -173,10 +173,10 @@ def list( def create( self, *, - name: str = "my-hook", - script: str = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", + name: str, + script: str, trigger_id: HookTriggerIdEnum, - enabled: typing.Optional[bool] = False, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateHookResponseContent]: @@ -469,11 +469,9 @@ def update( self, id: str, *, - name: typing.Optional[str] = "my-hook", - script: typing.Optional[ - str - ] = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", - enabled: typing.Optional[bool] = False, + name: typing.Optional[str] = OMIT, + script: typing.Optional[str] = OMIT, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdateHookResponseContent]: @@ -749,10 +747,10 @@ async def _get_next(): async def create( self, *, - name: str = "my-hook", - script: str = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", + name: str, + script: str, trigger_id: HookTriggerIdEnum, - enabled: typing.Optional[bool] = False, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateHookResponseContent]: @@ -1047,11 +1045,9 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "my-hook", - script: typing.Optional[ - str - ] = "module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };", - enabled: typing.Optional[bool] = False, + name: typing.Optional[str] = OMIT, + script: typing.Optional[str] = OMIT, + enabled: typing.Optional[bool] = OMIT, dependencies: typing.Optional[HookDependencies] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdateHookResponseContent]: diff --git a/src/auth0/management/jobs/users_exports/client.py b/src/auth0/management/jobs/users_exports/client.py index 9422fba4..36aff63f 100644 --- a/src/auth0/management/jobs/users_exports/client.py +++ b/src/auth0/management/jobs/users_exports/client.py @@ -31,9 +31,9 @@ def with_raw_response(self) -> RawUsersExportsClient: def create( self, *, - connection_id: typing.Optional[str] = "con_0000000000000001", + connection_id: typing.Optional[str] = OMIT, format: typing.Optional[JobFileFormatEnum] = OMIT, - limit: typing.Optional[int] = 5, + limit: typing.Optional[int] = OMIT, fields: typing.Optional[typing.Sequence[CreateExportUsersFields]] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateExportUsersResponseContent: @@ -94,9 +94,9 @@ def with_raw_response(self) -> AsyncRawUsersExportsClient: async def create( self, *, - connection_id: typing.Optional[str] = "con_0000000000000001", + connection_id: typing.Optional[str] = OMIT, format: typing.Optional[JobFileFormatEnum] = OMIT, - limit: typing.Optional[int] = 5, + limit: typing.Optional[int] = OMIT, fields: typing.Optional[typing.Sequence[CreateExportUsersFields]] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateExportUsersResponseContent: diff --git a/src/auth0/management/jobs/users_exports/raw_client.py b/src/auth0/management/jobs/users_exports/raw_client.py index 76a1d195..4a8dee63 100644 --- a/src/auth0/management/jobs/users_exports/raw_client.py +++ b/src/auth0/management/jobs/users_exports/raw_client.py @@ -28,9 +28,9 @@ def __init__(self, *, client_wrapper: SyncClientWrapper): def create( self, *, - connection_id: typing.Optional[str] = "con_0000000000000001", + connection_id: typing.Optional[str] = OMIT, format: typing.Optional[JobFileFormatEnum] = OMIT, - limit: typing.Optional[int] = 5, + limit: typing.Optional[int] = OMIT, fields: typing.Optional[typing.Sequence[CreateExportUsersFields]] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateExportUsersResponseContent]: @@ -142,9 +142,9 @@ def __init__(self, *, client_wrapper: AsyncClientWrapper): async def create( self, *, - connection_id: typing.Optional[str] = "con_0000000000000001", + connection_id: typing.Optional[str] = OMIT, format: typing.Optional[JobFileFormatEnum] = OMIT, - limit: typing.Optional[int] = 5, + limit: typing.Optional[int] = OMIT, fields: typing.Optional[typing.Sequence[CreateExportUsersFields]] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateExportUsersResponseContent]: diff --git a/src/auth0/management/jobs/verification_email/client.py b/src/auth0/management/jobs/verification_email/client.py index 2006db4c..ec38a3f8 100644 --- a/src/auth0/management/jobs/verification_email/client.py +++ b/src/auth0/management/jobs/verification_email/client.py @@ -30,10 +30,10 @@ def with_raw_response(self) -> RawVerificationEmailClient: def create( self, *, - user_id: str = "google-oauth2|1234", + user_id: str, client_id: typing.Optional[str] = OMIT, identity: typing.Optional[Identity] = OMIT, - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + organization_id: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateVerificationEmailResponseContent: """ @@ -101,10 +101,10 @@ def with_raw_response(self) -> AsyncRawVerificationEmailClient: async def create( self, *, - user_id: str = "google-oauth2|1234", + user_id: str, client_id: typing.Optional[str] = OMIT, identity: typing.Optional[Identity] = OMIT, - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + organization_id: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateVerificationEmailResponseContent: """ diff --git a/src/auth0/management/jobs/verification_email/raw_client.py b/src/auth0/management/jobs/verification_email/raw_client.py index b4626abd..2176079a 100644 --- a/src/auth0/management/jobs/verification_email/raw_client.py +++ b/src/auth0/management/jobs/verification_email/raw_client.py @@ -27,10 +27,10 @@ def __init__(self, *, client_wrapper: SyncClientWrapper): def create( self, *, - user_id: str = "google-oauth2|1234", + user_id: str, client_id: typing.Optional[str] = OMIT, identity: typing.Optional[Identity] = OMIT, - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + organization_id: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateVerificationEmailResponseContent]: """ @@ -143,10 +143,10 @@ def __init__(self, *, client_wrapper: AsyncClientWrapper): async def create( self, *, - user_id: str = "google-oauth2|1234", + user_id: str, client_id: typing.Optional[str] = OMIT, identity: typing.Optional[Identity] = OMIT, - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + organization_id: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateVerificationEmailResponseContent]: """ diff --git a/src/auth0/management/organizations/client.py b/src/auth0/management/organizations/client.py index 1bf89735..9e2233cf 100644 --- a/src/auth0/management/organizations/client.py +++ b/src/auth0/management/organizations/client.py @@ -122,8 +122,8 @@ def list( def create( self, *, - name: str = "organization-1", - display_name: typing.Optional[str] = "Acme Users", + name: str, + display_name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, enabled_connections: typing.Optional[typing.Sequence[ConnectionForOrganization]] = OMIT, @@ -282,8 +282,8 @@ def update( self, id: str, *, - display_name: typing.Optional[str] = "Acme Users", - name: typing.Optional[str] = "organization-1", + display_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -481,8 +481,8 @@ async def main() -> None: async def create( self, *, - name: str = "organization-1", - display_name: typing.Optional[str] = "Acme Users", + name: str, + display_name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, enabled_connections: typing.Optional[typing.Sequence[ConnectionForOrganization]] = OMIT, @@ -673,8 +673,8 @@ async def update( self, id: str, *, - display_name: typing.Optional[str] = "Acme Users", - name: typing.Optional[str] = "organization-1", + display_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, diff --git a/src/auth0/management/organizations/invitations/client.py b/src/auth0/management/organizations/invitations/client.py index f084ca37..7bb250fa 100644 --- a/src/auth0/management/organizations/invitations/client.py +++ b/src/auth0/management/organizations/invitations/client.py @@ -121,13 +121,13 @@ def create( *, inviter: OrganizationInvitationInviter, invitee: OrganizationInvitationInvitee, - client_id: str = "AaiyAPdpYdesoKnqjj8HJqRn4T5titww", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: str, + connection_id: typing.Optional[str] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, ttl_sec: typing.Optional[int] = OMIT, roles: typing.Optional[typing.Sequence[str]] = OMIT, - send_invitation_email: typing.Optional[bool] = True, + send_invitation_email: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateOrganizationInvitationResponseContent: """ @@ -399,13 +399,13 @@ async def create( *, inviter: OrganizationInvitationInviter, invitee: OrganizationInvitationInvitee, - client_id: str = "AaiyAPdpYdesoKnqjj8HJqRn4T5titww", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: str, + connection_id: typing.Optional[str] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, ttl_sec: typing.Optional[int] = OMIT, roles: typing.Optional[typing.Sequence[str]] = OMIT, - send_invitation_email: typing.Optional[bool] = True, + send_invitation_email: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateOrganizationInvitationResponseContent: """ diff --git a/src/auth0/management/organizations/invitations/raw_client.py b/src/auth0/management/organizations/invitations/raw_client.py index d2ead0b3..accf6221 100644 --- a/src/auth0/management/organizations/invitations/raw_client.py +++ b/src/auth0/management/organizations/invitations/raw_client.py @@ -184,13 +184,13 @@ def create( *, inviter: OrganizationInvitationInviter, invitee: OrganizationInvitationInvitee, - client_id: str = "AaiyAPdpYdesoKnqjj8HJqRn4T5titww", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: str, + connection_id: typing.Optional[str] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, ttl_sec: typing.Optional[int] = OMIT, roles: typing.Optional[typing.Sequence[str]] = OMIT, - send_invitation_email: typing.Optional[bool] = True, + send_invitation_email: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateOrganizationInvitationResponseContent]: """ @@ -670,13 +670,13 @@ async def create( *, inviter: OrganizationInvitationInviter, invitee: OrganizationInvitationInvitee, - client_id: str = "AaiyAPdpYdesoKnqjj8HJqRn4T5titww", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: str, + connection_id: typing.Optional[str] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, ttl_sec: typing.Optional[int] = OMIT, roles: typing.Optional[typing.Sequence[str]] = OMIT, - send_invitation_email: typing.Optional[bool] = True, + send_invitation_email: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateOrganizationInvitationResponseContent]: """ diff --git a/src/auth0/management/organizations/raw_client.py b/src/auth0/management/organizations/raw_client.py index 5936f620..6173657e 100644 --- a/src/auth0/management/organizations/raw_client.py +++ b/src/auth0/management/organizations/raw_client.py @@ -166,8 +166,8 @@ def list( def create( self, *, - name: str = "organization-1", - display_name: typing.Optional[str] = "Acme Users", + name: str, + display_name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, enabled_connections: typing.Optional[typing.Sequence[ConnectionForOrganization]] = OMIT, @@ -553,8 +553,8 @@ def update( self, id: str, *, - display_name: typing.Optional[str] = "Acme Users", - name: typing.Optional[str] = "organization-1", + display_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, @@ -804,8 +804,8 @@ async def _get_next(): async def create( self, *, - name: str = "organization-1", - display_name: typing.Optional[str] = "Acme Users", + name: str, + display_name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, enabled_connections: typing.Optional[typing.Sequence[ConnectionForOrganization]] = OMIT, @@ -1193,8 +1193,8 @@ async def update( self, id: str, *, - display_name: typing.Optional[str] = "Acme Users", - name: typing.Optional[str] = "organization-1", + display_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, branding: typing.Optional[OrganizationBranding] = OMIT, metadata: typing.Optional[OrganizationMetadata] = OMIT, token_quota: typing.Optional[UpdateTokenQuota] = OMIT, diff --git a/src/auth0/management/prompts/rendering/client.py b/src/auth0/management/prompts/rendering/client.py index 1d1027d1..33f6e849 100644 --- a/src/auth0/management/prompts/rendering/client.py +++ b/src/auth0/management/prompts/rendering/client.py @@ -208,8 +208,8 @@ def update( *, rendering_mode: typing.Optional[AculRenderingModeEnum] = OMIT, context_configuration: typing.Optional[AculContextConfiguration] = OMIT, - default_head_tags_disabled: typing.Optional[bool] = False, - use_page_template: typing.Optional[bool] = False, + default_head_tags_disabled: typing.Optional[bool] = OMIT, + use_page_template: typing.Optional[bool] = OMIT, head_tags: typing.Optional[typing.Sequence[AculHeadTag]] = OMIT, filters: typing.Optional[AculFilters] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -484,8 +484,8 @@ async def update( *, rendering_mode: typing.Optional[AculRenderingModeEnum] = OMIT, context_configuration: typing.Optional[AculContextConfiguration] = OMIT, - default_head_tags_disabled: typing.Optional[bool] = False, - use_page_template: typing.Optional[bool] = False, + default_head_tags_disabled: typing.Optional[bool] = OMIT, + use_page_template: typing.Optional[bool] = OMIT, head_tags: typing.Optional[typing.Sequence[AculHeadTag]] = OMIT, filters: typing.Optional[AculFilters] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/prompts/rendering/raw_client.py b/src/auth0/management/prompts/rendering/raw_client.py index ff869a58..bfab2ac4 100644 --- a/src/auth0/management/prompts/rendering/raw_client.py +++ b/src/auth0/management/prompts/rendering/raw_client.py @@ -409,8 +409,8 @@ def update( *, rendering_mode: typing.Optional[AculRenderingModeEnum] = OMIT, context_configuration: typing.Optional[AculContextConfiguration] = OMIT, - default_head_tags_disabled: typing.Optional[bool] = False, - use_page_template: typing.Optional[bool] = False, + default_head_tags_disabled: typing.Optional[bool] = OMIT, + use_page_template: typing.Optional[bool] = OMIT, head_tags: typing.Optional[typing.Sequence[AculHeadTag]] = OMIT, filters: typing.Optional[AculFilters] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -921,8 +921,8 @@ async def update( *, rendering_mode: typing.Optional[AculRenderingModeEnum] = OMIT, context_configuration: typing.Optional[AculContextConfiguration] = OMIT, - default_head_tags_disabled: typing.Optional[bool] = False, - use_page_template: typing.Optional[bool] = False, + default_head_tags_disabled: typing.Optional[bool] = OMIT, + use_page_template: typing.Optional[bool] = OMIT, head_tags: typing.Optional[typing.Sequence[AculHeadTag]] = OMIT, filters: typing.Optional[AculFilters] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/rules/client.py b/src/auth0/management/rules/client.py index 03ead716..e8ad8446 100644 --- a/src/auth0/management/rules/client.py +++ b/src/auth0/management/rules/client.py @@ -107,10 +107,10 @@ def list( def create( self, *, - name: str = "my-rule", - script: str = "function (user, context, callback) {\n callback(null, user, context);\n}", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + name: str, + script: str, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateRuleResponseContent: """ @@ -239,10 +239,10 @@ def update( self, id: str, *, - script: typing.Optional[str] = "function (user, context, callback) {\n callback(null, user, context);\n}", - name: typing.Optional[str] = "my-rule", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + script: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateRuleResponseContent: """ @@ -390,10 +390,10 @@ async def main() -> None: async def create( self, *, - name: str = "my-rule", - script: str = "function (user, context, callback) {\n callback(null, user, context);\n}", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + name: str, + script: str, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateRuleResponseContent: """ @@ -546,10 +546,10 @@ async def update( self, id: str, *, - script: typing.Optional[str] = "function (user, context, callback) {\n callback(null, user, context);\n}", - name: typing.Optional[str] = "my-rule", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + script: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateRuleResponseContent: """ diff --git a/src/auth0/management/rules/raw_client.py b/src/auth0/management/rules/raw_client.py index 199217e7..47a35543 100644 --- a/src/auth0/management/rules/raw_client.py +++ b/src/auth0/management/rules/raw_client.py @@ -171,10 +171,10 @@ def list( def create( self, *, - name: str = "my-rule", - script: str = "function (user, context, callback) {\n callback(null, user, context);\n}", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + name: str, + script: str, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateRuleResponseContent]: """ @@ -475,10 +475,10 @@ def update( self, id: str, *, - script: typing.Optional[str] = "function (user, context, callback) {\n callback(null, user, context);\n}", - name: typing.Optional[str] = "my-rule", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + script: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdateRuleResponseContent]: """ @@ -754,10 +754,10 @@ async def _get_next(): async def create( self, *, - name: str = "my-rule", - script: str = "function (user, context, callback) {\n callback(null, user, context);\n}", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + name: str, + script: str, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateRuleResponseContent]: """ @@ -1060,10 +1060,10 @@ async def update( self, id: str, *, - script: typing.Optional[str] = "function (user, context, callback) {\n callback(null, user, context);\n}", - name: typing.Optional[str] = "my-rule", - order: typing.Optional[float] = 2.0, - enabled: typing.Optional[bool] = True, + script: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + order: typing.Optional[float] = OMIT, + enabled: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdateRuleResponseContent]: """ diff --git a/src/auth0/management/rules_configs/client.py b/src/auth0/management/rules_configs/client.py index 0a53e9c4..c5b4d432 100644 --- a/src/auth0/management/rules_configs/client.py +++ b/src/auth0/management/rules_configs/client.py @@ -56,7 +56,7 @@ def list(self, *, request_options: typing.Optional[RequestOptions] = None) -> ty return _response.data def set( - self, key: str, *, value: str = "MY_RULES_CONFIG_VALUE", request_options: typing.Optional[RequestOptions] = None + self, key: str, *, value: str, request_options: typing.Optional[RequestOptions] = None ) -> SetRulesConfigResponseContent: """ Sets a rules config variable. @@ -175,7 +175,7 @@ async def main() -> None: return _response.data async def set( - self, key: str, *, value: str = "MY_RULES_CONFIG_VALUE", request_options: typing.Optional[RequestOptions] = None + self, key: str, *, value: str, request_options: typing.Optional[RequestOptions] = None ) -> SetRulesConfigResponseContent: """ Sets a rules config variable. diff --git a/src/auth0/management/rules_configs/raw_client.py b/src/auth0/management/rules_configs/raw_client.py index 038d95a9..508344aa 100644 --- a/src/auth0/management/rules_configs/raw_client.py +++ b/src/auth0/management/rules_configs/raw_client.py @@ -95,7 +95,7 @@ def list( raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) def set( - self, key: str, *, value: str = "MY_RULES_CONFIG_VALUE", request_options: typing.Optional[RequestOptions] = None + self, key: str, *, value: str, request_options: typing.Optional[RequestOptions] = None ) -> HttpResponse[SetRulesConfigResponseContent]: """ Sets a rules config variable. @@ -315,7 +315,7 @@ async def list( raise ApiError(status_code=_response.status_code, headers=dict(_response.headers), body=_response_json) async def set( - self, key: str, *, value: str = "MY_RULES_CONFIG_VALUE", request_options: typing.Optional[RequestOptions] = None + self, key: str, *, value: str, request_options: typing.Optional[RequestOptions] = None ) -> AsyncHttpResponse[SetRulesConfigResponseContent]: """ Sets a rules config variable. diff --git a/src/auth0/management/self_service_profiles/client.py b/src/auth0/management/self_service_profiles/client.py index 836b07ee..f3dd0145 100644 --- a/src/auth0/management/self_service_profiles/client.py +++ b/src/auth0/management/self_service_profiles/client.py @@ -124,7 +124,7 @@ def create( branding : typing.Optional[SelfServiceProfileBrandingProperties] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[typing.Sequence[SelfServiceProfileUserAttribute]] List of attributes to be mapped that will be shown to the user during the SS-SSO flow. @@ -253,7 +253,7 @@ def update( branding : typing.Optional[SelfServiceProfileBranding] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[SelfServiceProfileUserAttributes] @@ -412,7 +412,7 @@ async def create( branding : typing.Optional[SelfServiceProfileBrandingProperties] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[typing.Sequence[SelfServiceProfileUserAttribute]] List of attributes to be mapped that will be shown to the user during the SS-SSO flow. @@ -565,7 +565,7 @@ async def update( branding : typing.Optional[SelfServiceProfileBranding] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[SelfServiceProfileUserAttributes] diff --git a/src/auth0/management/self_service_profiles/raw_client.py b/src/auth0/management/self_service_profiles/raw_client.py index 548245d9..df566fe1 100644 --- a/src/auth0/management/self_service_profiles/raw_client.py +++ b/src/auth0/management/self_service_profiles/raw_client.py @@ -174,7 +174,7 @@ def create( branding : typing.Optional[SelfServiceProfileBrandingProperties] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[typing.Sequence[SelfServiceProfileUserAttribute]] List of attributes to be mapped that will be shown to the user during the SS-SSO flow. @@ -511,7 +511,7 @@ def update( branding : typing.Optional[SelfServiceProfileBranding] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[SelfServiceProfileUserAttributes] @@ -772,7 +772,7 @@ async def create( branding : typing.Optional[SelfServiceProfileBrandingProperties] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[typing.Sequence[SelfServiceProfileUserAttribute]] List of attributes to be mapped that will be shown to the user during the SS-SSO flow. @@ -1111,7 +1111,7 @@ async def update( branding : typing.Optional[SelfServiceProfileBranding] allowed_strategies : typing.Optional[typing.Sequence[SelfServiceProfileAllowedStrategyEnum]] - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] user_attributes : typing.Optional[SelfServiceProfileUserAttributes] diff --git a/src/auth0/management/tenants/settings/client.py b/src/auth0/management/tenants/settings/client.py index 55108d7d..29fd0a87 100644 --- a/src/auth0/management/tenants/settings/client.py +++ b/src/auth0/management/tenants/settings/client.py @@ -86,33 +86,33 @@ def update( change_password: typing.Optional[TenantSettingsPasswordPage] = OMIT, device_flow: typing.Optional[TenantSettingsDeviceFlow] = OMIT, guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = OMIT, - default_audience: typing.Optional[str] = "", - default_directory: typing.Optional[str] = "", + default_audience: typing.Optional[str] = OMIT, + default_directory: typing.Optional[str] = OMIT, error_page: typing.Optional[TenantSettingsErrorPage] = OMIT, default_token_quota: typing.Optional[DefaultTokenQuota] = OMIT, flags: typing.Optional[TenantSettingsFlags] = OMIT, - friendly_name: typing.Optional[str] = "My Company", - picture_url: typing.Optional[str] = "https://mycompany.org/logo.png", - support_email: typing.Optional[str] = "support@mycompany.org", - support_url: typing.Optional[str] = "https://mycompany.org/support", + friendly_name: typing.Optional[str] = OMIT, + picture_url: typing.Optional[str] = OMIT, + support_email: typing.Optional[str] = OMIT, + support_url: typing.Optional[str] = OMIT, allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, - session_lifetime: typing.Optional[int] = 168, - idle_session_lifetime: typing.Optional[int] = 72, - ephemeral_session_lifetime: typing.Optional[int] = 72, - idle_ephemeral_session_lifetime: typing.Optional[int] = 24, - sandbox_version: typing.Optional[str] = "22", + session_lifetime: typing.Optional[int] = OMIT, + idle_session_lifetime: typing.Optional[int] = OMIT, + ephemeral_session_lifetime: typing.Optional[int] = OMIT, + idle_ephemeral_session_lifetime: typing.Optional[int] = OMIT, + sandbox_version: typing.Optional[str] = OMIT, legacy_sandbox_version: typing.Optional[str] = OMIT, default_redirection_uri: typing.Optional[str] = OMIT, enabled_locales: typing.Optional[typing.Sequence[TenantSettingsSupportedLocalesEnum]] = OMIT, session_cookie: typing.Optional[SessionCookieSchema] = OMIT, sessions: typing.Optional[TenantSettingsSessions] = OMIT, oidc_logout: typing.Optional[TenantOidcLogoutSettings] = OMIT, - customize_mfa_in_postlogin_action: typing.Optional[bool] = False, - allow_organization_name_in_authentication_api: typing.Optional[bool] = False, + customize_mfa_in_postlogin_action: typing.Optional[bool] = OMIT, + allow_organization_name_in_authentication_api: typing.Optional[bool] = OMIT, acr_values_supported: typing.Optional[typing.Sequence[str]] = OMIT, mtls: typing.Optional[TenantSettingsMtls] = OMIT, - pushed_authorization_requests_supported: typing.Optional[bool] = False, - authorization_response_iss_parameter_supported: typing.Optional[bool] = False, + pushed_authorization_requests_supported: typing.Optional[bool] = OMIT, + authorization_response_iss_parameter_supported: typing.Optional[bool] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, resource_parameter_profile: typing.Optional[TenantSettingsResourceParameterProfile] = OMIT, enable_ai_guide: typing.Optional[bool] = OMIT, @@ -346,33 +346,33 @@ async def update( change_password: typing.Optional[TenantSettingsPasswordPage] = OMIT, device_flow: typing.Optional[TenantSettingsDeviceFlow] = OMIT, guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = OMIT, - default_audience: typing.Optional[str] = "", - default_directory: typing.Optional[str] = "", + default_audience: typing.Optional[str] = OMIT, + default_directory: typing.Optional[str] = OMIT, error_page: typing.Optional[TenantSettingsErrorPage] = OMIT, default_token_quota: typing.Optional[DefaultTokenQuota] = OMIT, flags: typing.Optional[TenantSettingsFlags] = OMIT, - friendly_name: typing.Optional[str] = "My Company", - picture_url: typing.Optional[str] = "https://mycompany.org/logo.png", - support_email: typing.Optional[str] = "support@mycompany.org", - support_url: typing.Optional[str] = "https://mycompany.org/support", + friendly_name: typing.Optional[str] = OMIT, + picture_url: typing.Optional[str] = OMIT, + support_email: typing.Optional[str] = OMIT, + support_url: typing.Optional[str] = OMIT, allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, - session_lifetime: typing.Optional[int] = 168, - idle_session_lifetime: typing.Optional[int] = 72, - ephemeral_session_lifetime: typing.Optional[int] = 72, - idle_ephemeral_session_lifetime: typing.Optional[int] = 24, - sandbox_version: typing.Optional[str] = "22", + session_lifetime: typing.Optional[int] = OMIT, + idle_session_lifetime: typing.Optional[int] = OMIT, + ephemeral_session_lifetime: typing.Optional[int] = OMIT, + idle_ephemeral_session_lifetime: typing.Optional[int] = OMIT, + sandbox_version: typing.Optional[str] = OMIT, legacy_sandbox_version: typing.Optional[str] = OMIT, default_redirection_uri: typing.Optional[str] = OMIT, enabled_locales: typing.Optional[typing.Sequence[TenantSettingsSupportedLocalesEnum]] = OMIT, session_cookie: typing.Optional[SessionCookieSchema] = OMIT, sessions: typing.Optional[TenantSettingsSessions] = OMIT, oidc_logout: typing.Optional[TenantOidcLogoutSettings] = OMIT, - customize_mfa_in_postlogin_action: typing.Optional[bool] = False, - allow_organization_name_in_authentication_api: typing.Optional[bool] = False, + customize_mfa_in_postlogin_action: typing.Optional[bool] = OMIT, + allow_organization_name_in_authentication_api: typing.Optional[bool] = OMIT, acr_values_supported: typing.Optional[typing.Sequence[str]] = OMIT, mtls: typing.Optional[TenantSettingsMtls] = OMIT, - pushed_authorization_requests_supported: typing.Optional[bool] = False, - authorization_response_iss_parameter_supported: typing.Optional[bool] = False, + pushed_authorization_requests_supported: typing.Optional[bool] = OMIT, + authorization_response_iss_parameter_supported: typing.Optional[bool] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, resource_parameter_profile: typing.Optional[TenantSettingsResourceParameterProfile] = OMIT, enable_ai_guide: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/tenants/settings/raw_client.py b/src/auth0/management/tenants/settings/raw_client.py index 18384577..d7d30286 100644 --- a/src/auth0/management/tenants/settings/raw_client.py +++ b/src/auth0/management/tenants/settings/raw_client.py @@ -136,33 +136,33 @@ def update( change_password: typing.Optional[TenantSettingsPasswordPage] = OMIT, device_flow: typing.Optional[TenantSettingsDeviceFlow] = OMIT, guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = OMIT, - default_audience: typing.Optional[str] = "", - default_directory: typing.Optional[str] = "", + default_audience: typing.Optional[str] = OMIT, + default_directory: typing.Optional[str] = OMIT, error_page: typing.Optional[TenantSettingsErrorPage] = OMIT, default_token_quota: typing.Optional[DefaultTokenQuota] = OMIT, flags: typing.Optional[TenantSettingsFlags] = OMIT, - friendly_name: typing.Optional[str] = "My Company", - picture_url: typing.Optional[str] = "https://mycompany.org/logo.png", - support_email: typing.Optional[str] = "support@mycompany.org", - support_url: typing.Optional[str] = "https://mycompany.org/support", + friendly_name: typing.Optional[str] = OMIT, + picture_url: typing.Optional[str] = OMIT, + support_email: typing.Optional[str] = OMIT, + support_url: typing.Optional[str] = OMIT, allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, - session_lifetime: typing.Optional[int] = 168, - idle_session_lifetime: typing.Optional[int] = 72, - ephemeral_session_lifetime: typing.Optional[int] = 72, - idle_ephemeral_session_lifetime: typing.Optional[int] = 24, - sandbox_version: typing.Optional[str] = "22", + session_lifetime: typing.Optional[int] = OMIT, + idle_session_lifetime: typing.Optional[int] = OMIT, + ephemeral_session_lifetime: typing.Optional[int] = OMIT, + idle_ephemeral_session_lifetime: typing.Optional[int] = OMIT, + sandbox_version: typing.Optional[str] = OMIT, legacy_sandbox_version: typing.Optional[str] = OMIT, default_redirection_uri: typing.Optional[str] = OMIT, enabled_locales: typing.Optional[typing.Sequence[TenantSettingsSupportedLocalesEnum]] = OMIT, session_cookie: typing.Optional[SessionCookieSchema] = OMIT, sessions: typing.Optional[TenantSettingsSessions] = OMIT, oidc_logout: typing.Optional[TenantOidcLogoutSettings] = OMIT, - customize_mfa_in_postlogin_action: typing.Optional[bool] = False, - allow_organization_name_in_authentication_api: typing.Optional[bool] = False, + customize_mfa_in_postlogin_action: typing.Optional[bool] = OMIT, + allow_organization_name_in_authentication_api: typing.Optional[bool] = OMIT, acr_values_supported: typing.Optional[typing.Sequence[str]] = OMIT, mtls: typing.Optional[TenantSettingsMtls] = OMIT, - pushed_authorization_requests_supported: typing.Optional[bool] = False, - authorization_response_iss_parameter_supported: typing.Optional[bool] = False, + pushed_authorization_requests_supported: typing.Optional[bool] = OMIT, + authorization_response_iss_parameter_supported: typing.Optional[bool] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, resource_parameter_profile: typing.Optional[TenantSettingsResourceParameterProfile] = OMIT, enable_ai_guide: typing.Optional[bool] = OMIT, @@ -504,33 +504,33 @@ async def update( change_password: typing.Optional[TenantSettingsPasswordPage] = OMIT, device_flow: typing.Optional[TenantSettingsDeviceFlow] = OMIT, guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = OMIT, - default_audience: typing.Optional[str] = "", - default_directory: typing.Optional[str] = "", + default_audience: typing.Optional[str] = OMIT, + default_directory: typing.Optional[str] = OMIT, error_page: typing.Optional[TenantSettingsErrorPage] = OMIT, default_token_quota: typing.Optional[DefaultTokenQuota] = OMIT, flags: typing.Optional[TenantSettingsFlags] = OMIT, - friendly_name: typing.Optional[str] = "My Company", - picture_url: typing.Optional[str] = "https://mycompany.org/logo.png", - support_email: typing.Optional[str] = "support@mycompany.org", - support_url: typing.Optional[str] = "https://mycompany.org/support", + friendly_name: typing.Optional[str] = OMIT, + picture_url: typing.Optional[str] = OMIT, + support_email: typing.Optional[str] = OMIT, + support_url: typing.Optional[str] = OMIT, allowed_logout_urls: typing.Optional[typing.Sequence[str]] = OMIT, - session_lifetime: typing.Optional[int] = 168, - idle_session_lifetime: typing.Optional[int] = 72, - ephemeral_session_lifetime: typing.Optional[int] = 72, - idle_ephemeral_session_lifetime: typing.Optional[int] = 24, - sandbox_version: typing.Optional[str] = "22", + session_lifetime: typing.Optional[int] = OMIT, + idle_session_lifetime: typing.Optional[int] = OMIT, + ephemeral_session_lifetime: typing.Optional[int] = OMIT, + idle_ephemeral_session_lifetime: typing.Optional[int] = OMIT, + sandbox_version: typing.Optional[str] = OMIT, legacy_sandbox_version: typing.Optional[str] = OMIT, default_redirection_uri: typing.Optional[str] = OMIT, enabled_locales: typing.Optional[typing.Sequence[TenantSettingsSupportedLocalesEnum]] = OMIT, session_cookie: typing.Optional[SessionCookieSchema] = OMIT, sessions: typing.Optional[TenantSettingsSessions] = OMIT, oidc_logout: typing.Optional[TenantOidcLogoutSettings] = OMIT, - customize_mfa_in_postlogin_action: typing.Optional[bool] = False, - allow_organization_name_in_authentication_api: typing.Optional[bool] = False, + customize_mfa_in_postlogin_action: typing.Optional[bool] = OMIT, + allow_organization_name_in_authentication_api: typing.Optional[bool] = OMIT, acr_values_supported: typing.Optional[typing.Sequence[str]] = OMIT, mtls: typing.Optional[TenantSettingsMtls] = OMIT, - pushed_authorization_requests_supported: typing.Optional[bool] = False, - authorization_response_iss_parameter_supported: typing.Optional[bool] = False, + pushed_authorization_requests_supported: typing.Optional[bool] = OMIT, + authorization_response_iss_parameter_supported: typing.Optional[bool] = OMIT, skip_non_verifiable_callback_uri_confirmation_prompt: typing.Optional[bool] = OMIT, resource_parameter_profile: typing.Optional[TenantSettingsResourceParameterProfile] = OMIT, enable_ai_guide: typing.Optional[bool] = OMIT, diff --git a/src/auth0/management/tickets/client.py b/src/auth0/management/tickets/client.py index b60e4fcc..0c1096d4 100644 --- a/src/auth0/management/tickets/client.py +++ b/src/auth0/management/tickets/client.py @@ -33,9 +33,9 @@ def verify_email( self, *, user_id: str, - result_url: typing.Optional[str] = "http://myapp.com/callback", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + result_url: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[Identity] = OMIT, @@ -100,14 +100,14 @@ def verify_email( def change_password( self, *, - result_url: typing.Optional[str] = "http://myapp.com/callback", + result_url: typing.Optional[str] = OMIT, user_id: typing.Optional[str] = OMIT, - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, + connection_id: typing.Optional[str] = OMIT, email: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, - mark_email_as_verified: typing.Optional[bool] = False, + mark_email_as_verified: typing.Optional[bool] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[ChangePasswordTicketIdentity] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -200,9 +200,9 @@ async def verify_email( self, *, user_id: str, - result_url: typing.Optional[str] = "http://myapp.com/callback", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + result_url: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[Identity] = OMIT, @@ -275,14 +275,14 @@ async def main() -> None: async def change_password( self, *, - result_url: typing.Optional[str] = "http://myapp.com/callback", + result_url: typing.Optional[str] = OMIT, user_id: typing.Optional[str] = OMIT, - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, + connection_id: typing.Optional[str] = OMIT, email: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, - mark_email_as_verified: typing.Optional[bool] = False, + mark_email_as_verified: typing.Optional[bool] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[ChangePasswordTicketIdentity] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/tickets/raw_client.py b/src/auth0/management/tickets/raw_client.py index abbf026f..e94ea6b8 100644 --- a/src/auth0/management/tickets/raw_client.py +++ b/src/auth0/management/tickets/raw_client.py @@ -31,9 +31,9 @@ def verify_email( self, *, user_id: str, - result_url: typing.Optional[str] = "http://myapp.com/callback", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + result_url: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[Identity] = OMIT, @@ -165,14 +165,14 @@ def verify_email( def change_password( self, *, - result_url: typing.Optional[str] = "http://myapp.com/callback", + result_url: typing.Optional[str] = OMIT, user_id: typing.Optional[str] = OMIT, - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, + connection_id: typing.Optional[str] = OMIT, email: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, - mark_email_as_verified: typing.Optional[bool] = False, + mark_email_as_verified: typing.Optional[bool] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[ChangePasswordTicketIdentity] = OMIT, request_options: typing.Optional[RequestOptions] = None, @@ -323,9 +323,9 @@ async def verify_email( self, *, user_id: str, - result_url: typing.Optional[str] = "http://myapp.com/callback", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", + result_url: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[Identity] = OMIT, @@ -457,14 +457,14 @@ async def verify_email( async def change_password( self, *, - result_url: typing.Optional[str] = "http://myapp.com/callback", + result_url: typing.Optional[str] = OMIT, user_id: typing.Optional[str] = OMIT, - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - organization_id: typing.Optional[str] = "org_2eondWoxcMIpaLQc", - connection_id: typing.Optional[str] = "con_0000000000000001", + client_id: typing.Optional[str] = OMIT, + organization_id: typing.Optional[str] = OMIT, + connection_id: typing.Optional[str] = OMIT, email: typing.Optional[str] = OMIT, ttl_sec: typing.Optional[int] = OMIT, - mark_email_as_verified: typing.Optional[bool] = False, + mark_email_as_verified: typing.Optional[bool] = OMIT, include_email_in_redirect: typing.Optional[bool] = OMIT, identity: typing.Optional[ChangePasswordTicketIdentity] = OMIT, request_options: typing.Optional[RequestOptions] = None, diff --git a/src/auth0/management/token_exchange_profiles/client.py b/src/auth0/management/token_exchange_profiles/client.py index d27ce311..fb62916a 100644 --- a/src/auth0/management/token_exchange_profiles/client.py +++ b/src/auth0/management/token_exchange_profiles/client.py @@ -89,7 +89,7 @@ def list( def create( self, *, - name: str = "Token Exchange Profile 1", + name: str, subject_token_type: str, action_id: str, type: TokenExchangeProfileTypeEnum, @@ -215,7 +215,7 @@ def update( self, id: str, *, - name: typing.Optional[str] = "Token Exchange Profile 1", + name: typing.Optional[str] = OMIT, subject_token_type: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> None: @@ -341,7 +341,7 @@ async def main() -> None: async def create( self, *, - name: str = "Token Exchange Profile 1", + name: str, subject_token_type: str, action_id: str, type: TokenExchangeProfileTypeEnum, @@ -491,7 +491,7 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "Token Exchange Profile 1", + name: typing.Optional[str] = OMIT, subject_token_type: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> None: diff --git a/src/auth0/management/token_exchange_profiles/raw_client.py b/src/auth0/management/token_exchange_profiles/raw_client.py index cec1427d..871d0b11 100644 --- a/src/auth0/management/token_exchange_profiles/raw_client.py +++ b/src/auth0/management/token_exchange_profiles/raw_client.py @@ -145,7 +145,7 @@ def list( def create( self, *, - name: str = "Token Exchange Profile 1", + name: str, subject_token_type: str, action_id: str, type: TokenExchangeProfileTypeEnum, @@ -426,7 +426,7 @@ def update( self, id: str, *, - name: typing.Optional[str] = "Token Exchange Profile 1", + name: typing.Optional[str] = OMIT, subject_token_type: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[None]: @@ -652,7 +652,7 @@ async def _get_next(): async def create( self, *, - name: str = "Token Exchange Profile 1", + name: str, subject_token_type: str, action_id: str, type: TokenExchangeProfileTypeEnum, @@ -935,7 +935,7 @@ async def update( self, id: str, *, - name: typing.Optional[str] = "Token Exchange Profile 1", + name: typing.Optional[str] = OMIT, subject_token_type: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[None]: diff --git a/src/auth0/management/types/__init__.py b/src/auth0/management/types/__init__.py index f34405e7..66bd0bdd 100644 --- a/src/auth0/management/types/__init__.py +++ b/src/auth0/management/types/__init__.py @@ -285,6 +285,7 @@ from .connection_authentication_purpose import ConnectionAuthenticationPurpose from .connection_authorization_endpoint import ConnectionAuthorizationEndpoint from .connection_authorization_endpoint_o_auth_2 import ConnectionAuthorizationEndpointOAuth2 + from .connection_base_url_exact import ConnectionBaseUrlExact from .connection_brute_force_protection import ConnectionBruteForceProtection from .connection_calculated_thumbprint_saml import ConnectionCalculatedThumbprintSaml from .connection_certs_ad import ConnectionCertsAd @@ -293,21 +294,36 @@ from .connection_claims_parameter_supported import ConnectionClaimsParameterSupported from .connection_claims_supported import ConnectionClaimsSupported from .connection_client_id import ConnectionClientId + from .connection_client_id_amazon import ConnectionClientIdAmazon from .connection_client_id_azure_ad import ConnectionClientIdAzureAd + from .connection_client_id_bitbucket import ConnectionClientIdBitbucket + from .connection_client_id_exact import ConnectionClientIdExact from .connection_client_id_facebook import ConnectionClientIdFacebook from .connection_client_id_google_apps import ConnectionClientIdGoogleApps from .connection_client_id_google_o_auth_2 import ConnectionClientIdGoogleOAuth2 + from .connection_client_id_line import ConnectionClientIdLine from .connection_client_id_o_auth_2 import ConnectionClientIdOAuth2 from .connection_client_id_oidc import ConnectionClientIdOidc + from .connection_client_id_paypal import ConnectionClientIdPaypal + from .connection_client_id_salesforce import ConnectionClientIdSalesforce + from .connection_client_id_windows_live import ConnectionClientIdWindowsLive from .connection_client_protocol_saml import ConnectionClientProtocolSaml from .connection_client_secret import ConnectionClientSecret + from .connection_client_secret_amazon import ConnectionClientSecretAmazon from .connection_client_secret_azure_ad import ConnectionClientSecretAzureAd + from .connection_client_secret_bitbucket import ConnectionClientSecretBitbucket + from .connection_client_secret_exact import ConnectionClientSecretExact from .connection_client_secret_facebook import ConnectionClientSecretFacebook from .connection_client_secret_google_apps import ConnectionClientSecretGoogleApps from .connection_client_secret_google_o_auth_2 import ConnectionClientSecretGoogleOAuth2 + from .connection_client_secret_line import ConnectionClientSecretLine from .connection_client_secret_o_auth_2 import ConnectionClientSecretOAuth2 from .connection_client_secret_oidc import ConnectionClientSecretOidc + from .connection_client_secret_paypal import ConnectionClientSecretPaypal + from .connection_client_secret_salesforce import ConnectionClientSecretSalesforce + from .connection_client_secret_windows_live import ConnectionClientSecretWindowsLive from .connection_common import ConnectionCommon + from .connection_community_base_url_salesforce import ConnectionCommunityBaseUrlSalesforce from .connection_configuration import ConnectionConfiguration from .connection_connected_accounts_purpose import ConnectionConnectedAccountsPurpose from .connection_connected_accounts_purpose_xaa import ConnectionConnectedAccountsPurposeXaa @@ -365,7 +381,11 @@ from .connection_for_list import ConnectionForList from .connection_for_organization import ConnectionForOrganization from .connection_forward_req_info_sms import ConnectionForwardReqInfoSms + from .connection_freeform_scopes_amazon import ConnectionFreeformScopesAmazon from .connection_freeform_scopes_google_o_auth_2 import ConnectionFreeformScopesGoogleOAuth2 + from .connection_freeform_scopes_paypal import ConnectionFreeformScopesPaypal + from .connection_freeform_scopes_salesforce import ConnectionFreeformScopesSalesforce + from .connection_freeform_scopes_windows_live import ConnectionFreeformScopesWindowsLive from .connection_from_sms import ConnectionFromSms from .connection_gateway_authentication import ConnectionGatewayAuthentication from .connection_gateway_authentication_audience_sms import ConnectionGatewayAuthenticationAudienceSms @@ -476,6 +496,7 @@ from .connection_options_protocol_enum_twitter import ConnectionOptionsProtocolEnumTwitter from .connection_options_renren import ConnectionOptionsRenren from .connection_options_salesforce import ConnectionOptionsSalesforce + from .connection_options_salesforce_community import ConnectionOptionsSalesforceCommunity from .connection_options_saml import ConnectionOptionsSaml from .connection_options_scope_github import ConnectionOptionsScopeGithub from .connection_options_scope_twitter import ConnectionOptionsScopeTwitter @@ -507,6 +528,7 @@ from .connection_ping_federate_base_url import ConnectionPingFederateBaseUrl from .connection_ping_federate_base_url_ping_federate import ConnectionPingFederateBaseUrlPingFederate from .connection_profile import ConnectionProfile + from .connection_profile_bitbucket import ConnectionProfileBitbucket from .connection_profile_config import ConnectionProfileConfig from .connection_profile_enabled_features import ConnectionProfileEnabledFeatures from .connection_profile_id import ConnectionProfileId @@ -678,8 +700,10 @@ from .connection_response_content_yandex_strategy import ConnectionResponseContentYandexStrategy from .connection_response_modes_supported import ConnectionResponseModesSupported from .connection_response_types_supported import ConnectionResponseTypesSupported + from .connection_scope_amazon import ConnectionScopeAmazon from .connection_scope_array import ConnectionScopeArray from .connection_scope_array_facebook import ConnectionScopeArrayFacebook + from .connection_scope_array_windows_live import ConnectionScopeArrayWindowsLive from .connection_scope_azure_ad import ConnectionScopeAzureAd from .connection_scope_facebook import ConnectionScopeFacebook from .connection_scope_google_apps import ConnectionScopeGoogleApps @@ -688,6 +712,8 @@ from .connection_scope_item_google_apps import ConnectionScopeItemGoogleApps from .connection_scope_o_auth_2 import ConnectionScopeOAuth2 from .connection_scope_oidc import ConnectionScopeOidc + from .connection_scope_paypal import ConnectionScopePaypal + from .connection_scope_salesforce import ConnectionScopeSalesforce from .connection_scopes_supported import ConnectionScopesSupported from .connection_scripts_o_auth_2 import ConnectionScriptsOAuth2 from .connection_send_back_channel_nonce import ConnectionSendBackChannelNonce @@ -2691,6 +2717,7 @@ "ConnectionAuthenticationPurpose": ".connection_authentication_purpose", "ConnectionAuthorizationEndpoint": ".connection_authorization_endpoint", "ConnectionAuthorizationEndpointOAuth2": ".connection_authorization_endpoint_o_auth_2", + "ConnectionBaseUrlExact": ".connection_base_url_exact", "ConnectionBruteForceProtection": ".connection_brute_force_protection", "ConnectionCalculatedThumbprintSaml": ".connection_calculated_thumbprint_saml", "ConnectionCertsAd": ".connection_certs_ad", @@ -2699,21 +2726,36 @@ "ConnectionClaimsParameterSupported": ".connection_claims_parameter_supported", "ConnectionClaimsSupported": ".connection_claims_supported", "ConnectionClientId": ".connection_client_id", + "ConnectionClientIdAmazon": ".connection_client_id_amazon", "ConnectionClientIdAzureAd": ".connection_client_id_azure_ad", + "ConnectionClientIdBitbucket": ".connection_client_id_bitbucket", + "ConnectionClientIdExact": ".connection_client_id_exact", "ConnectionClientIdFacebook": ".connection_client_id_facebook", "ConnectionClientIdGoogleApps": ".connection_client_id_google_apps", "ConnectionClientIdGoogleOAuth2": ".connection_client_id_google_o_auth_2", + "ConnectionClientIdLine": ".connection_client_id_line", "ConnectionClientIdOAuth2": ".connection_client_id_o_auth_2", "ConnectionClientIdOidc": ".connection_client_id_oidc", + "ConnectionClientIdPaypal": ".connection_client_id_paypal", + "ConnectionClientIdSalesforce": ".connection_client_id_salesforce", + "ConnectionClientIdWindowsLive": ".connection_client_id_windows_live", "ConnectionClientProtocolSaml": ".connection_client_protocol_saml", "ConnectionClientSecret": ".connection_client_secret", + "ConnectionClientSecretAmazon": ".connection_client_secret_amazon", "ConnectionClientSecretAzureAd": ".connection_client_secret_azure_ad", + "ConnectionClientSecretBitbucket": ".connection_client_secret_bitbucket", + "ConnectionClientSecretExact": ".connection_client_secret_exact", "ConnectionClientSecretFacebook": ".connection_client_secret_facebook", "ConnectionClientSecretGoogleApps": ".connection_client_secret_google_apps", "ConnectionClientSecretGoogleOAuth2": ".connection_client_secret_google_o_auth_2", + "ConnectionClientSecretLine": ".connection_client_secret_line", "ConnectionClientSecretOAuth2": ".connection_client_secret_o_auth_2", "ConnectionClientSecretOidc": ".connection_client_secret_oidc", + "ConnectionClientSecretPaypal": ".connection_client_secret_paypal", + "ConnectionClientSecretSalesforce": ".connection_client_secret_salesforce", + "ConnectionClientSecretWindowsLive": ".connection_client_secret_windows_live", "ConnectionCommon": ".connection_common", + "ConnectionCommunityBaseUrlSalesforce": ".connection_community_base_url_salesforce", "ConnectionConfiguration": ".connection_configuration", "ConnectionConnectedAccountsPurpose": ".connection_connected_accounts_purpose", "ConnectionConnectedAccountsPurposeXaa": ".connection_connected_accounts_purpose_xaa", @@ -2771,7 +2813,11 @@ "ConnectionForList": ".connection_for_list", "ConnectionForOrganization": ".connection_for_organization", "ConnectionForwardReqInfoSms": ".connection_forward_req_info_sms", + "ConnectionFreeformScopesAmazon": ".connection_freeform_scopes_amazon", "ConnectionFreeformScopesGoogleOAuth2": ".connection_freeform_scopes_google_o_auth_2", + "ConnectionFreeformScopesPaypal": ".connection_freeform_scopes_paypal", + "ConnectionFreeformScopesSalesforce": ".connection_freeform_scopes_salesforce", + "ConnectionFreeformScopesWindowsLive": ".connection_freeform_scopes_windows_live", "ConnectionFromSms": ".connection_from_sms", "ConnectionGatewayAuthentication": ".connection_gateway_authentication", "ConnectionGatewayAuthenticationAudienceSms": ".connection_gateway_authentication_audience_sms", @@ -2880,6 +2926,7 @@ "ConnectionOptionsProtocolEnumTwitter": ".connection_options_protocol_enum_twitter", "ConnectionOptionsRenren": ".connection_options_renren", "ConnectionOptionsSalesforce": ".connection_options_salesforce", + "ConnectionOptionsSalesforceCommunity": ".connection_options_salesforce_community", "ConnectionOptionsSaml": ".connection_options_saml", "ConnectionOptionsScopeGithub": ".connection_options_scope_github", "ConnectionOptionsScopeTwitter": ".connection_options_scope_twitter", @@ -2911,6 +2958,7 @@ "ConnectionPingFederateBaseUrl": ".connection_ping_federate_base_url", "ConnectionPingFederateBaseUrlPingFederate": ".connection_ping_federate_base_url_ping_federate", "ConnectionProfile": ".connection_profile", + "ConnectionProfileBitbucket": ".connection_profile_bitbucket", "ConnectionProfileConfig": ".connection_profile_config", "ConnectionProfileEnabledFeatures": ".connection_profile_enabled_features", "ConnectionProfileId": ".connection_profile_id", @@ -3066,8 +3114,10 @@ "ConnectionResponseContentYandexStrategy": ".connection_response_content_yandex_strategy", "ConnectionResponseModesSupported": ".connection_response_modes_supported", "ConnectionResponseTypesSupported": ".connection_response_types_supported", + "ConnectionScopeAmazon": ".connection_scope_amazon", "ConnectionScopeArray": ".connection_scope_array", "ConnectionScopeArrayFacebook": ".connection_scope_array_facebook", + "ConnectionScopeArrayWindowsLive": ".connection_scope_array_windows_live", "ConnectionScopeAzureAd": ".connection_scope_azure_ad", "ConnectionScopeFacebook": ".connection_scope_facebook", "ConnectionScopeGoogleApps": ".connection_scope_google_apps", @@ -3076,6 +3126,8 @@ "ConnectionScopeItemGoogleApps": ".connection_scope_item_google_apps", "ConnectionScopeOAuth2": ".connection_scope_o_auth_2", "ConnectionScopeOidc": ".connection_scope_oidc", + "ConnectionScopePaypal": ".connection_scope_paypal", + "ConnectionScopeSalesforce": ".connection_scope_salesforce", "ConnectionScopesSupported": ".connection_scopes_supported", "ConnectionScriptsOAuth2": ".connection_scripts_o_auth_2", "ConnectionSendBackChannelNonce": ".connection_send_back_channel_nonce", @@ -4941,6 +4993,7 @@ def __dir__(): "ConnectionAuthenticationPurpose", "ConnectionAuthorizationEndpoint", "ConnectionAuthorizationEndpointOAuth2", + "ConnectionBaseUrlExact", "ConnectionBruteForceProtection", "ConnectionCalculatedThumbprintSaml", "ConnectionCertsAd", @@ -4949,21 +5002,36 @@ def __dir__(): "ConnectionClaimsParameterSupported", "ConnectionClaimsSupported", "ConnectionClientId", + "ConnectionClientIdAmazon", "ConnectionClientIdAzureAd", + "ConnectionClientIdBitbucket", + "ConnectionClientIdExact", "ConnectionClientIdFacebook", "ConnectionClientIdGoogleApps", "ConnectionClientIdGoogleOAuth2", + "ConnectionClientIdLine", "ConnectionClientIdOAuth2", "ConnectionClientIdOidc", + "ConnectionClientIdPaypal", + "ConnectionClientIdSalesforce", + "ConnectionClientIdWindowsLive", "ConnectionClientProtocolSaml", "ConnectionClientSecret", + "ConnectionClientSecretAmazon", "ConnectionClientSecretAzureAd", + "ConnectionClientSecretBitbucket", + "ConnectionClientSecretExact", "ConnectionClientSecretFacebook", "ConnectionClientSecretGoogleApps", "ConnectionClientSecretGoogleOAuth2", + "ConnectionClientSecretLine", "ConnectionClientSecretOAuth2", "ConnectionClientSecretOidc", + "ConnectionClientSecretPaypal", + "ConnectionClientSecretSalesforce", + "ConnectionClientSecretWindowsLive", "ConnectionCommon", + "ConnectionCommunityBaseUrlSalesforce", "ConnectionConfiguration", "ConnectionConnectedAccountsPurpose", "ConnectionConnectedAccountsPurposeXaa", @@ -5021,7 +5089,11 @@ def __dir__(): "ConnectionForList", "ConnectionForOrganization", "ConnectionForwardReqInfoSms", + "ConnectionFreeformScopesAmazon", "ConnectionFreeformScopesGoogleOAuth2", + "ConnectionFreeformScopesPaypal", + "ConnectionFreeformScopesSalesforce", + "ConnectionFreeformScopesWindowsLive", "ConnectionFromSms", "ConnectionGatewayAuthentication", "ConnectionGatewayAuthenticationAudienceSms", @@ -5130,6 +5202,7 @@ def __dir__(): "ConnectionOptionsProtocolEnumTwitter", "ConnectionOptionsRenren", "ConnectionOptionsSalesforce", + "ConnectionOptionsSalesforceCommunity", "ConnectionOptionsSaml", "ConnectionOptionsScopeGithub", "ConnectionOptionsScopeTwitter", @@ -5161,6 +5234,7 @@ def __dir__(): "ConnectionPingFederateBaseUrl", "ConnectionPingFederateBaseUrlPingFederate", "ConnectionProfile", + "ConnectionProfileBitbucket", "ConnectionProfileConfig", "ConnectionProfileEnabledFeatures", "ConnectionProfileId", @@ -5316,8 +5390,10 @@ def __dir__(): "ConnectionResponseContentYandexStrategy", "ConnectionResponseModesSupported", "ConnectionResponseTypesSupported", + "ConnectionScopeAmazon", "ConnectionScopeArray", "ConnectionScopeArrayFacebook", + "ConnectionScopeArrayWindowsLive", "ConnectionScopeAzureAd", "ConnectionScopeFacebook", "ConnectionScopeGoogleApps", @@ -5326,6 +5402,8 @@ def __dir__(): "ConnectionScopeItemGoogleApps", "ConnectionScopeOAuth2", "ConnectionScopeOidc", + "ConnectionScopePaypal", + "ConnectionScopeSalesforce", "ConnectionScopesSupported", "ConnectionScriptsOAuth2", "ConnectionSendBackChannelNonce", diff --git a/src/auth0/management/types/action.py b/src/auth0/management/types/action.py index 43126429..98b9fc3e 100644 --- a/src/auth0/management/types/action.py +++ b/src/auth0/management/types/action.py @@ -15,12 +15,12 @@ class Action(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the action. """ - name: typing.Optional[str] = pydantic.Field(default="my-action") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of an action. """ @@ -30,7 +30,7 @@ class Action(UniversalBaseModel): The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. """ - all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=False) + all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=None) """ True if all of an Action's contents have been deployed. """ @@ -45,7 +45,7 @@ class Action(UniversalBaseModel): The time when this action was updated. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of the action. """ @@ -55,7 +55,7 @@ class Action(UniversalBaseModel): The list of third party npm modules, and their versions, that this action depends on. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22`, defaults to `node22` """ @@ -66,7 +66,7 @@ class Action(UniversalBaseModel): """ deployed_version: typing.Optional[ActionDeployedVersion] = None - installed_integration_id: typing.Optional[str] = pydantic.Field(default="7d2bc0c9-c0c2-433a-9f4e-86ef80270aad") + installed_integration_id: typing.Optional[str] = pydantic.Field(default=None) """ installed_integration_id is the fk reference to the InstalledIntegration entity. """ @@ -78,7 +78,7 @@ class Action(UniversalBaseModel): The time when this action was built successfully. """ - deploy: typing.Optional[bool] = pydantic.Field(default=False) + deploy: typing.Optional[bool] = pydantic.Field(default=None) """ True if the action should be deployed after creation. """ diff --git a/src/auth0/management/types/action_base.py b/src/auth0/management/types/action_base.py index 18e8d42a..d83b90ff 100644 --- a/src/auth0/management/types/action_base.py +++ b/src/auth0/management/types/action_base.py @@ -13,12 +13,12 @@ class ActionBase(UniversalBaseModel): The action to which this version belongs. """ - id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the action. """ - name: typing.Optional[str] = pydantic.Field(default="my-action") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of an action. """ @@ -28,7 +28,7 @@ class ActionBase(UniversalBaseModel): The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. """ - all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=False) + all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=None) """ True if all of an Action's contents have been deployed. """ diff --git a/src/auth0/management/types/action_binding.py b/src/auth0/management/types/action_binding.py index 827d2c7b..26e356a1 100644 --- a/src/auth0/management/types/action_binding.py +++ b/src/auth0/management/types/action_binding.py @@ -14,13 +14,13 @@ class ActionBinding(UniversalBaseModel): Binding is the associative entity joining a trigger, and an action together. """ - id: typing.Optional[str] = pydantic.Field(default="4a881e22-0562-4178-bc91-b0f2b321dc13") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of this binding. """ trigger_id: typing.Optional[ActionTriggerTypeEnum] = None - display_name: typing.Optional[str] = pydantic.Field(default="my-action-1") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the binding. """ diff --git a/src/auth0/management/types/action_binding_ref.py b/src/auth0/management/types/action_binding_ref.py index 11af7f27..4843548f 100644 --- a/src/auth0/management/types/action_binding_ref.py +++ b/src/auth0/management/types/action_binding_ref.py @@ -13,7 +13,7 @@ class ActionBindingRef(UniversalBaseModel): """ type: typing.Optional[ActionBindingRefTypeEnum] = None - value: typing.Optional[str] = pydantic.Field(default="my-action") + value: typing.Optional[str] = pydantic.Field(default=None) """ The id or name of an action that is being bound to a trigger. """ diff --git a/src/auth0/management/types/action_binding_with_ref.py b/src/auth0/management/types/action_binding_with_ref.py index 0f689196..c0491dea 100644 --- a/src/auth0/management/types/action_binding_with_ref.py +++ b/src/auth0/management/types/action_binding_with_ref.py @@ -10,7 +10,7 @@ class ActionBindingWithRef(UniversalBaseModel): ref: ActionBindingRef - display_name: typing.Optional[str] = pydantic.Field(default="my-action-1") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the binding. """ diff --git a/src/auth0/management/types/action_deployed_version.py b/src/auth0/management/types/action_deployed_version.py index bb8b5172..205da8cd 100644 --- a/src/auth0/management/types/action_deployed_version.py +++ b/src/auth0/management/types/action_deployed_version.py @@ -19,17 +19,17 @@ class ActionDeployedVersion(UniversalBaseModel): The version of the action that is currently deployed. """ - id: typing.Optional[str] = pydantic.Field(default="12a3b9e6-06e6-4a29-96bf-90c82fe79a0d") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique id of an action version. """ - action_id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + action_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the action to which this version belongs. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of this specific version of the action. """ @@ -39,12 +39,12 @@ class ActionDeployedVersion(UniversalBaseModel): The list of third party npm modules, and their versions, that this specific version depends on. """ - deployed: typing.Optional[bool] = pydantic.Field(default=True) + deployed: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if this specific version is the currently one deployed. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22` """ @@ -55,7 +55,7 @@ class ActionDeployedVersion(UniversalBaseModel): """ status: typing.Optional[ActionVersionBuildStatusEnum] = None - number: typing.Optional[float] = pydantic.Field(default=1.0) + number: typing.Optional[float] = pydantic.Field(default=None) """ The index of this version in list of versions for the action. """ diff --git a/src/auth0/management/types/action_execution_result.py b/src/auth0/management/types/action_execution_result.py index f50720fb..9ccb3280 100644 --- a/src/auth0/management/types/action_execution_result.py +++ b/src/auth0/management/types/action_execution_result.py @@ -13,7 +13,7 @@ class ActionExecutionResult(UniversalBaseModel): Captures the results of a single action being executed. """ - action_name: typing.Optional[str] = pydantic.Field(default="my-action") + action_name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the action that was executed. """ diff --git a/src/auth0/management/types/action_secret_request.py b/src/auth0/management/types/action_secret_request.py index b02248c0..7a54fc20 100644 --- a/src/auth0/management/types/action_secret_request.py +++ b/src/auth0/management/types/action_secret_request.py @@ -7,12 +7,12 @@ class ActionSecretRequest(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="mySecret") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the particular secret, e.g. API_KEY. """ - value: typing.Optional[str] = pydantic.Field(default="mySecretValue") + value: typing.Optional[str] = pydantic.Field(default=None) """ The value of the particular secret, e.g. secret123. A secret's value can only be set upon creation. A secret's value will never be returned by the API. """ diff --git a/src/auth0/management/types/action_secret_response.py b/src/auth0/management/types/action_secret_response.py index d32646c5..77a20c03 100644 --- a/src/auth0/management/types/action_secret_response.py +++ b/src/auth0/management/types/action_secret_response.py @@ -8,7 +8,7 @@ class ActionSecretResponse(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="mySecret") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the particular secret, e.g. API_KEY. """ diff --git a/src/auth0/management/types/action_version.py b/src/auth0/management/types/action_version.py index 686318d7..4fe446d4 100644 --- a/src/auth0/management/types/action_version.py +++ b/src/auth0/management/types/action_version.py @@ -15,17 +15,17 @@ class ActionVersion(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="12a3b9e6-06e6-4a29-96bf-90c82fe79a0d") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique id of an action version. """ - action_id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + action_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the action to which this version belongs. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of this specific version of the action. """ @@ -35,12 +35,12 @@ class ActionVersion(UniversalBaseModel): The list of third party npm modules, and their versions, that this specific version depends on. """ - deployed: typing.Optional[bool] = pydantic.Field(default=True) + deployed: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if this specific version is the currently one deployed. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22` """ @@ -51,7 +51,7 @@ class ActionVersion(UniversalBaseModel): """ status: typing.Optional[ActionVersionBuildStatusEnum] = None - number: typing.Optional[float] = pydantic.Field(default=1.0) + number: typing.Optional[float] = pydantic.Field(default=None) """ The index of this version in list of versions for the action. """ diff --git a/src/auth0/management/types/acul_configs_item.py b/src/auth0/management/types/acul_configs_item.py index 8fde40e2..0dccffdc 100644 --- a/src/auth0/management/types/acul_configs_item.py +++ b/src/auth0/management/types/acul_configs_item.py @@ -17,12 +17,12 @@ class AculConfigsItem(UniversalBaseModel): screen: ScreenGroupNameEnum rendering_mode: typing.Optional[AculRenderingModeEnum] = None context_configuration: typing.Optional[AculContextConfiguration] = None - default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=False) + default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Override Universal Login default head tags """ - use_page_template: typing.Optional[bool] = pydantic.Field(default=False) + use_page_template: typing.Optional[bool] = pydantic.Field(default=None) """ Use page template with ACUL """ diff --git a/src/auth0/management/types/breached_password_detection_stage.py b/src/auth0/management/types/breached_password_detection_stage.py index 966a6dd6..e808b1f5 100644 --- a/src/auth0/management/types/breached_password_detection_stage.py +++ b/src/auth0/management/types/breached_password_detection_stage.py @@ -12,11 +12,15 @@ class BreachedPasswordDetectionStage(UniversalBaseModel): pre_user_registration: typing_extensions.Annotated[ - typing.Optional[BreachedPasswordDetectionPreUserRegistrationStage], FieldMetadata(alias="pre-user-registration") - ] = pydantic.Field(alias="pre-user-registration", default=None) + typing.Optional[BreachedPasswordDetectionPreUserRegistrationStage], + FieldMetadata(alias="pre-user-registration"), + pydantic.Field(alias="pre-user-registration"), + ] = None pre_change_password: typing_extensions.Annotated[ - typing.Optional[BreachedPasswordDetectionPreChangePasswordStage], FieldMetadata(alias="pre-change-password") - ] = pydantic.Field(alias="pre-change-password", default=None) + typing.Optional[BreachedPasswordDetectionPreChangePasswordStage], + FieldMetadata(alias="pre-change-password"), + pydantic.Field(alias="pre-change-password"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/certificate_subject_dn_credential.py b/src/auth0/management/types/certificate_subject_dn_credential.py index 10ae949b..583aa182 100644 --- a/src/auth0/management/types/certificate_subject_dn_credential.py +++ b/src/auth0/management/types/certificate_subject_dn_credential.py @@ -9,7 +9,7 @@ class CertificateSubjectDnCredential(UniversalBaseModel): credential_type: CertificateSubjectDnCredentialTypeEnum - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name for a credential. """ @@ -19,9 +19,7 @@ class CertificateSubjectDnCredential(UniversalBaseModel): Subject Distinguished Name. Mutually exclusive with `pem` property. Applies to `cert_subject_dn` credential type. """ - pem: typing.Optional[str] = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIBIjANBg...\r\n-----END CERTIFICATE-----\r\n" - ) + pem: typing.Optional[str] = pydantic.Field(default=None) """ PEM-formatted X509 certificate. Must be JSON escaped. Mutually exclusive with `subject_dn` property. """ diff --git a/src/auth0/management/types/change_password_ticket_identity.py b/src/auth0/management/types/change_password_ticket_identity.py index 36ab8b97..c69290a2 100644 --- a/src/auth0/management/types/change_password_ticket_identity.py +++ b/src/auth0/management/types/change_password_ticket_identity.py @@ -12,7 +12,7 @@ class ChangePasswordTicketIdentity(UniversalBaseModel): The user's identity. If you set this value, you must also send the user_id parameter. """ - user_id: str = pydantic.Field(default="5457edea1b8f22891a000004") + user_id: str = pydantic.Field() """ user_id of the identity. """ diff --git a/src/auth0/management/types/change_password_ticket_response_content.py b/src/auth0/management/types/change_password_ticket_response_content.py index e171b4d6..ffebd8fd 100644 --- a/src/auth0/management/types/change_password_ticket_response_content.py +++ b/src/auth0/management/types/change_password_ticket_response_content.py @@ -7,9 +7,7 @@ class ChangePasswordTicketResponseContent(UniversalBaseModel): - ticket: str = pydantic.Field( - default="https://login.auth0.com/lo/reset?client_id=nsaPS2p3cargoFy82WT7betaOPOt3qSh&tenant=mdocs&bewit=bmNlR01CcDNOUE1GeXVzODJXVDdyY1RUT1BPdDNxU2hcMTQzMDY2MjE4MVxuRTcxM0RSeUNlbEpzUUJmaFVaS3A1NEdJbWFzSUZMYzRTdEFtY2NMMXhZPVx7ImVtYWloojoiZGFtaWtww2NoQGhvdG1haWwuY29tIiwidGVuYW50IjoiZHNjaGVua2tjwWFuIiwiY2xpZW50X2lkIjoibmNlR01CcDNOUE1GeXVzODJXVDdyY1RUT1BPiiqxU2giLCJjb25uZWN0aW9uIjoiRGFtaWmsdiwicmVzdWx0VXJsIjoiIn0" - ) + ticket: str = pydantic.Field() """ URL representing the ticket. """ diff --git a/src/auth0/management/types/client.py b/src/auth0/management/types/client.py index 01a79888..6978f47b 100644 --- a/src/auth0/management/types/client.py +++ b/src/auth0/management/types/client.py @@ -33,36 +33,35 @@ class Client(UniversalBaseModel): - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this client. """ - tenant: typing.Optional[str] = pydantic.Field(default="") + tenant: typing.Optional[str] = pydantic.Field(default=None) """ Name of the tenant this client belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="My application") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this client (min length: 1 character, does not allow `<` or `>`). """ - description: typing.Optional[str] = pydantic.Field(default="") + description: typing.Optional[str] = pydantic.Field(default=None) """ Free text description of this client (max length: 140 characters). """ - global_: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="global")] = pydantic.Field( - alias="global", default=False - ) - """ - Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false). - """ - - client_secret: typing.Optional[str] = pydantic.Field( - default="MG_TNT2ver-SylNat-_VeMmd-4m0Waba0jr1troztBniSChEw0glxEmgEi2Kw40H" - ) + global_: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="global"), + pydantic.Field( + alias="global", + description="Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false).", + ), + ] = None + client_secret: typing.Optional[str] = pydantic.Field(default=None) """ Client secret (which you must not make public). """ @@ -73,12 +72,12 @@ class Client(UniversalBaseModel): URL of the logo to display for this client. Recommended size is 150x150 pixels. """ - is_first_party: typing.Optional[bool] = pydantic.Field(default=False) + is_first_party: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client a first party client (true) or not (false). """ - oidc_conformant: typing.Optional[bool] = pydantic.Field(default=False) + oidc_conformant: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false). """ @@ -123,12 +122,12 @@ class Client(UniversalBaseModel): jwt_configuration: typing.Optional[ClientJwtConfiguration] = None signing_keys: typing.Optional[ClientSigningKeys] = None encryption_key: typing.Optional[ClientEncryptionKey] = None - sso: typing.Optional[bool] = pydantic.Field(default=False) + sso: typing.Optional[bool] = pydantic.Field(default=None) """ Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). """ - sso_disabled: typing.Optional[bool] = pydantic.Field(default=False) + sso_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether Single Sign On is disabled (true) or enabled (true). Defaults to true. """ @@ -143,29 +142,29 @@ class Client(UniversalBaseModel): URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page. """ - custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=True) + custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=None) """ Whether a custom login page is to be used (true) or the default provided login page (false). """ - custom_login_page: typing.Optional[str] = pydantic.Field(default="") + custom_login_page: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. """ - custom_login_page_preview: typing.Optional[str] = pydantic.Field(default="") + custom_login_page_preview: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. (Used on Previews) """ - form_template: typing.Optional[str] = pydantic.Field(default="") + form_template: typing.Optional[str] = pydantic.Field(default=None) """ HTML form template to be used for WS-Federation. """ addons: typing.Optional[ClientAddons] = None token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = None - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=False) + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=None) """ If true, trust that the IP specified in the `auth0-forwarded-for` header is the end-user's IP for brute-force-protection on token endpoint. """ @@ -189,12 +188,12 @@ class Client(UniversalBaseModel): """ client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = None - require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=False) + require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Pushed Authorization Requests mandatory for this client """ - require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=False) + require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Proof-of-Possession mandatory for this client """ diff --git a/src/auth0/management/types/client_addon_azure_blob.py b/src/auth0/management/types/client_addon_azure_blob.py index 489e2b36..bc10a0d2 100644 --- a/src/auth0/management/types/client_addon_azure_blob.py +++ b/src/auth0/management/types/client_addon_azure_blob.py @@ -13,46 +13,45 @@ class ClientAddonAzureBlob(UniversalBaseModel): Azure Blob Storage addon configuration. """ - account_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="accountName")] = ( - pydantic.Field(alias="accountName", default=None) - ) - """ - Your Azure storage account name. Usually first segment in your Azure storage URL. e.g. `https://acme-org.blob.core.windows.net` would be the account name `acme-org`. - """ - - storage_access_key: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="storageAccessKey")] = ( - pydantic.Field(alias="storageAccessKey", default=None) - ) - """ - Access key associated with this storage account. - """ - - container_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="containerName")] = ( - pydantic.Field(alias="containerName", default=None) - ) - """ - Container to request a token for. e.g. `my-container`. - """ - - blob_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="blobName")] = pydantic.Field( - alias="blobName", default=None - ) - """ - Entity to request a token for. e.g. `my-blob`. If blank the computed SAS will apply to the entire storage container. - """ - + account_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="accountName"), + pydantic.Field( + alias="accountName", + description="Your Azure storage account name. Usually first segment in your Azure storage URL. e.g. `https://acme-org.blob.core.windows.net` would be the account name `acme-org`.", + ), + ] = None + storage_access_key: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="storageAccessKey"), + pydantic.Field(alias="storageAccessKey", description="Access key associated with this storage account."), + ] = None + container_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="containerName"), + pydantic.Field(alias="containerName", description="Container to request a token for. e.g. `my-container`."), + ] = None + blob_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="blobName"), + pydantic.Field( + alias="blobName", + description="Entity to request a token for. e.g. `my-blob`. If blank the computed SAS will apply to the entire storage container.", + ), + ] = None expiration: typing.Optional[int] = pydantic.Field(default=None) """ Expiration in minutes for the generated token (default of 5 minutes). """ - signed_identifier: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="signedIdentifier")] = ( - pydantic.Field(alias="signedIdentifier", default=None) - ) - """ - Shared access policy identifier defined in your storage account resource. - """ - + signed_identifier: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="signedIdentifier"), + pydantic.Field( + alias="signedIdentifier", + description="Shared access policy identifier defined in your storage account resource.", + ), + ] = None blob_read: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if the issued token has permission to read the content, properties, metadata and block list. Use the blob as the source of a copy operation. diff --git a/src/auth0/management/types/client_addon_azure_sb.py b/src/auth0/management/types/client_addon_azure_sb.py index d175b2c7..9a1df56b 100644 --- a/src/auth0/management/types/client_addon_azure_sb.py +++ b/src/auth0/management/types/client_addon_azure_sb.py @@ -18,27 +18,23 @@ class ClientAddonAzureSb(UniversalBaseModel): Your Azure Service Bus namespace. Usually the first segment of your Service Bus URL (e.g. `https://acme-org.servicebus.windows.net` would be `acme-org`). """ - sas_key_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="sasKeyName")] = pydantic.Field( - alias="sasKeyName", default=None - ) - """ - Your shared access policy name defined in your Service Bus entity. - """ - - sas_key: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="sasKey")] = pydantic.Field( - alias="sasKey", default=None - ) - """ - Primary Key associated with your shared access policy. - """ - - entity_path: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="entityPath")] = pydantic.Field( - alias="entityPath", default=None - ) - """ - Entity you want to request a token for. e.g. `my-queue`.' - """ - + sas_key_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="sasKeyName"), + pydantic.Field( + alias="sasKeyName", description="Your shared access policy name defined in your Service Bus entity." + ), + ] = None + sas_key: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="sasKey"), + pydantic.Field(alias="sasKey", description="Primary Key associated with your shared access policy."), + ] = None + entity_path: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="entityPath"), + pydantic.Field(alias="entityPath", description="Entity you want to request a token for. e.g. `my-queue`.'"), + ] = None expiration: typing.Optional[int] = pydantic.Field(default=None) """ Optional expiration in minutes for the generated token. Defaults to 5 minutes. diff --git a/src/auth0/management/types/client_addon_layer.py b/src/auth0/management/types/client_addon_layer.py index 67a40fbf..4ba4a297 100644 --- a/src/auth0/management/types/client_addon_layer.py +++ b/src/auth0/management/types/client_addon_layer.py @@ -13,25 +13,21 @@ class ClientAddonLayer(UniversalBaseModel): Layer addon configuration. """ - provider_id: typing_extensions.Annotated[str, FieldMetadata(alias="providerId")] = pydantic.Field( - alias="providerId" - ) - """ - Provider ID of your Layer account - """ - - key_id: typing_extensions.Annotated[str, FieldMetadata(alias="keyId")] = pydantic.Field(alias="keyId") - """ - Authentication Key identifier used to sign the Layer token. - """ - - private_key: typing_extensions.Annotated[str, FieldMetadata(alias="privateKey")] = pydantic.Field( - alias="privateKey" - ) - """ - Private key for signing the Layer token. - """ - + provider_id: typing_extensions.Annotated[ + str, + FieldMetadata(alias="providerId"), + pydantic.Field(alias="providerId", description="Provider ID of your Layer account"), + ] + key_id: typing_extensions.Annotated[ + str, + FieldMetadata(alias="keyId"), + pydantic.Field(alias="keyId", description="Authentication Key identifier used to sign the Layer token."), + ] + private_key: typing_extensions.Annotated[ + str, + FieldMetadata(alias="privateKey"), + pydantic.Field(alias="privateKey", description="Private key for signing the Layer token."), + ] principal: typing.Optional[str] = pydantic.Field(default=None) """ Name of the property used as the unique user id in Layer. If not specified `user_id` is used. diff --git a/src/auth0/management/types/client_addon_salesforce_api.py b/src/auth0/management/types/client_addon_salesforce_api.py index cbbac432..15faf2bd 100644 --- a/src/auth0/management/types/client_addon_salesforce_api.py +++ b/src/auth0/management/types/client_addon_salesforce_api.py @@ -23,13 +23,11 @@ class ClientAddonSalesforceApi(UniversalBaseModel): Name of the property in the user object that maps to a Salesforce username. e.g. `email`. """ - community_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="communityName")] = ( - pydantic.Field(alias="communityName", default=None) - ) - """ - Community name. - """ - + community_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="communityName"), + pydantic.Field(alias="communityName", description="Community name."), + ] = None community_url_section: typing.Optional[str] = pydantic.Field(default=None) """ Community url section. diff --git a/src/auth0/management/types/client_addon_salesforce_sandbox_api.py b/src/auth0/management/types/client_addon_salesforce_sandbox_api.py index 6773a151..a70e1284 100644 --- a/src/auth0/management/types/client_addon_salesforce_sandbox_api.py +++ b/src/auth0/management/types/client_addon_salesforce_sandbox_api.py @@ -23,13 +23,11 @@ class ClientAddonSalesforceSandboxApi(UniversalBaseModel): Name of the property in the user object that maps to a Salesforce username. e.g. `email`. """ - community_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="communityName")] = ( - pydantic.Field(alias="communityName", default=None) - ) - """ - Community name. - """ - + community_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="communityName"), + pydantic.Field(alias="communityName", description="Community name."), + ] = None community_url_section: typing.Optional[str] = pydantic.Field(default=None) """ Community url section. diff --git a/src/auth0/management/types/client_addon_saml.py b/src/auth0/management/types/client_addon_saml.py index 75a3e719..930c26a8 100644 --- a/src/auth0/management/types/client_addon_saml.py +++ b/src/auth0/management/types/client_addon_saml.py @@ -17,41 +17,45 @@ class ClientAddonSaml(UniversalBaseModel): mappings: typing.Optional[ClientAddonSamlMapping] = None audience: typing.Optional[str] = None recipient: typing.Optional[str] = None - create_upn_claim: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="createUpnClaim")] = ( - pydantic.Field(alias="createUpnClaim", default=None) - ) + create_upn_claim: typing_extensions.Annotated[ + typing.Optional[bool], FieldMetadata(alias="createUpnClaim"), pydantic.Field(alias="createUpnClaim") + ] = None map_unknown_claims_as_is: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="mapUnknownClaimsAsIs") - ] = pydantic.Field(alias="mapUnknownClaimsAsIs", default=None) + typing.Optional[bool], FieldMetadata(alias="mapUnknownClaimsAsIs"), pydantic.Field(alias="mapUnknownClaimsAsIs") + ] = None passthrough_claims_with_no_mapping: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="passthroughClaimsWithNoMapping") - ] = pydantic.Field(alias="passthroughClaimsWithNoMapping", default=None) - map_identities: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="mapIdentities")] = ( - pydantic.Field(alias="mapIdentities", default=None) - ) + typing.Optional[bool], + FieldMetadata(alias="passthroughClaimsWithNoMapping"), + pydantic.Field(alias="passthroughClaimsWithNoMapping"), + ] = None + map_identities: typing_extensions.Annotated[ + typing.Optional[bool], FieldMetadata(alias="mapIdentities"), pydantic.Field(alias="mapIdentities") + ] = None signature_algorithm: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="signatureAlgorithm") - ] = pydantic.Field(alias="signatureAlgorithm", default=None) - digest_algorithm: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="digestAlgorithm")] = ( - pydantic.Field(alias="digestAlgorithm", default=None) - ) + typing.Optional[str], FieldMetadata(alias="signatureAlgorithm"), pydantic.Field(alias="signatureAlgorithm") + ] = None + digest_algorithm: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="digestAlgorithm"), pydantic.Field(alias="digestAlgorithm") + ] = None issuer: typing.Optional[str] = None destination: typing.Optional[str] = None - lifetime_in_seconds: typing_extensions.Annotated[typing.Optional[int], FieldMetadata(alias="lifetimeInSeconds")] = ( - pydantic.Field(alias="lifetimeInSeconds", default=None) - ) - sign_response: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="signResponse")] = ( - pydantic.Field(alias="signResponse", default=None) - ) + lifetime_in_seconds: typing_extensions.Annotated[ + typing.Optional[int], FieldMetadata(alias="lifetimeInSeconds"), pydantic.Field(alias="lifetimeInSeconds") + ] = None + sign_response: typing_extensions.Annotated[ + typing.Optional[bool], FieldMetadata(alias="signResponse"), pydantic.Field(alias="signResponse") + ] = None name_identifier_format: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="nameIdentifierFormat") - ] = pydantic.Field(alias="nameIdentifierFormat", default=None) + typing.Optional[str], FieldMetadata(alias="nameIdentifierFormat"), pydantic.Field(alias="nameIdentifierFormat") + ] = None name_identifier_probes: typing_extensions.Annotated[ - typing.Optional[typing.List[str]], FieldMetadata(alias="nameIdentifierProbes") - ] = pydantic.Field(alias="nameIdentifierProbes", default=None) + typing.Optional[typing.List[str]], + FieldMetadata(alias="nameIdentifierProbes"), + pydantic.Field(alias="nameIdentifierProbes"), + ] = None authn_context_class_ref: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="authnContextClassRef") - ] = pydantic.Field(alias="authnContextClassRef", default=None) + typing.Optional[str], FieldMetadata(alias="authnContextClassRef"), pydantic.Field(alias="authnContextClassRef") + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/client_addon_sapapi.py b/src/auth0/management/types/client_addon_sapapi.py index 8815230c..a619a631 100644 --- a/src/auth0/management/types/client_addon_sapapi.py +++ b/src/auth0/management/types/client_addon_sapapi.py @@ -18,38 +18,40 @@ class ClientAddonSapapi(UniversalBaseModel): If activated in the OAuth 2.0 client configuration (transaction SOAUTH2) the SAML attribute client_id must be set and equal the client_id form parameter of the access token request. """ - username_attribute: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="usernameAttribute")] = ( - pydantic.Field(alias="usernameAttribute", default=None) - ) - """ - Name of the property in the user object that maps to a SAP username. e.g. `email`. - """ - - token_endpoint_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="tokenEndpointUrl")] = ( - pydantic.Field(alias="tokenEndpointUrl", default=None) - ) - """ - Your SAP OData server OAuth2 token endpoint URL. - """ - + username_attribute: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="usernameAttribute"), + pydantic.Field( + alias="usernameAttribute", + description="Name of the property in the user object that maps to a SAP username. e.g. `email`.", + ), + ] = None + token_endpoint_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="tokenEndpointUrl"), + pydantic.Field(alias="tokenEndpointUrl", description="Your SAP OData server OAuth2 token endpoint URL."), + ] = None scope: typing.Optional[str] = pydantic.Field(default=None) """ Requested scope for SAP APIs. """ - service_password: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="servicePassword")] = ( - pydantic.Field(alias="servicePassword", default=None) - ) - """ - Service account password to use to authenticate API calls to the token endpoint. - """ - + service_password: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="servicePassword"), + pydantic.Field( + alias="servicePassword", + description="Service account password to use to authenticate API calls to the token endpoint.", + ), + ] = None name_identifier_format: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="nameIdentifierFormat") - ] = pydantic.Field(alias="nameIdentifierFormat", default=None) - """ - NameID element of the Subject which can be used to express the user's identity. Defaults to `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified`. - """ + typing.Optional[str], + FieldMetadata(alias="nameIdentifierFormat"), + pydantic.Field( + alias="nameIdentifierFormat", + description="NameID element of the Subject which can be used to express the user's identity. Defaults to `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified`.", + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/client_addon_zendesk.py b/src/auth0/management/types/client_addon_zendesk.py index 47144b34..444fb841 100644 --- a/src/auth0/management/types/client_addon_zendesk.py +++ b/src/auth0/management/types/client_addon_zendesk.py @@ -13,12 +13,14 @@ class ClientAddonZendesk(UniversalBaseModel): Zendesk SSO configuration. """ - account_name: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="accountName")] = ( - pydantic.Field(alias="accountName", default=None) - ) - """ - Zendesk account name usually first segment in your Zendesk URL. e.g. `https://acme-org.zendesk.com` would be `acme-org`. - """ + account_name: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="accountName"), + pydantic.Field( + alias="accountName", + description="Zendesk account name usually first segment in your Zendesk URL. e.g. `https://acme-org.zendesk.com` would be `acme-org`.", + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/client_addons.py b/src/auth0/management/types/client_addons.py index e377fcc1..54400dbe 100644 --- a/src/auth0/management/types/client_addons.py +++ b/src/auth0/management/types/client_addons.py @@ -58,9 +58,9 @@ class ClientAddons(UniversalBaseModel): egnyte: typing.Optional[ClientAddonEgnyte] = None firebase: typing.Optional[ClientAddonFirebase] = None newrelic: typing.Optional[ClientAddonNewRelic] = None - office_365: typing_extensions.Annotated[typing.Optional[ClientAddonOffice365], FieldMetadata(alias="office365")] = ( - pydantic.Field(alias="office365", default=None) - ) + office_365: typing_extensions.Annotated[ + typing.Optional[ClientAddonOffice365], FieldMetadata(alias="office365"), pydantic.Field(alias="office365") + ] = None salesforce: typing.Optional[ClientAddonSalesforce] = None salesforce_api: typing.Optional[ClientAddonSalesforceApi] = None salesforce_sandbox_api: typing.Optional[ClientAddonSalesforceSandboxApi] = None diff --git a/src/auth0/management/types/client_credential.py b/src/auth0/management/types/client_credential.py index 14a34f17..73d20e0a 100644 --- a/src/auth0/management/types/client_credential.py +++ b/src/auth0/management/types/client_credential.py @@ -12,17 +12,17 @@ class ClientCredential(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="cred_1m7sfABoNTTKYwTQ8qt6tX") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the credential. Generated on creation. """ - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name given to the credential by the user. """ - kid: typing.Optional[str] = pydantic.Field(default="IZSSTECp...") + kid: typing.Optional[str] = pydantic.Field(default=None) """ The key identifier of the credential, generated on creation. """ @@ -34,13 +34,11 @@ class ClientCredential(UniversalBaseModel): The X509 certificate's Subject Distinguished Name """ - thumbprint_sha_256: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="thumbprint_sha256")] = ( - pydantic.Field(alias="thumbprint_sha256", default=None) - ) - """ - The X509 certificate's SHA256 thumbprint - """ - + thumbprint_sha_256: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="thumbprint_sha256"), + pydantic.Field(alias="thumbprint_sha256", description="The X509 certificate's SHA256 thumbprint"), + ] = None created_at: typing.Optional[dt.datetime] = pydantic.Field(default=None) """ The ISO 8601 formatted date the credential was created. diff --git a/src/auth0/management/types/client_jwt_configuration.py b/src/auth0/management/types/client_jwt_configuration.py index 550665c4..c622db7f 100644 --- a/src/auth0/management/types/client_jwt_configuration.py +++ b/src/auth0/management/types/client_jwt_configuration.py @@ -13,12 +13,12 @@ class ClientJwtConfiguration(UniversalBaseModel): Configuration related to JWTs for the client. """ - lifetime_in_seconds: typing.Optional[int] = pydantic.Field(default=36000) + lifetime_in_seconds: typing.Optional[int] = pydantic.Field(default=None) """ Number of seconds the JWT will be valid for (affects `exp` claim). """ - secret_encoded: typing.Optional[bool] = pydantic.Field(default=True) + secret_encoded: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the client secret is base64 encoded (true) or unencoded (false). """ diff --git a/src/auth0/management/types/client_mobile_android.py b/src/auth0/management/types/client_mobile_android.py index f6af7741..7f44c213 100644 --- a/src/auth0/management/types/client_mobile_android.py +++ b/src/auth0/management/types/client_mobile_android.py @@ -13,17 +13,19 @@ class ClientMobileAndroid(UniversalBaseModel): Android native app configuration. """ - app_package_name: typing.Optional[str] = pydantic.Field(default="") + app_package_name: typing.Optional[str] = pydantic.Field(default=None) """ App package name found in AndroidManifest.xml. """ sha_256_cert_fingerprints: typing_extensions.Annotated[ - typing.Optional[typing.List[str]], FieldMetadata(alias="sha256_cert_fingerprints") - ] = pydantic.Field(alias="sha256_cert_fingerprints", default=None) - """ - SHA256 fingerprints of the app's signing certificate. Multiple fingerprints can be used to support different versions of your app, such as debug and production builds. - """ + typing.Optional[typing.List[str]], + FieldMetadata(alias="sha256_cert_fingerprints"), + pydantic.Field( + alias="sha256_cert_fingerprints", + description="SHA256 fingerprints of the app's signing certificate. Multiple fingerprints can be used to support different versions of your app, such as debug and production builds.", + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/client_mobilei_os.py b/src/auth0/management/types/client_mobilei_os.py index 72f7792d..4c971ff4 100644 --- a/src/auth0/management/types/client_mobilei_os.py +++ b/src/auth0/management/types/client_mobilei_os.py @@ -11,12 +11,12 @@ class ClientMobileiOs(UniversalBaseModel): iOS native app configuration. """ - team_id: typing.Optional[str] = pydantic.Field(default="") + team_id: typing.Optional[str] = pydantic.Field(default=None) """ Identifier assigned to the Apple account that signs and uploads the app to the store. """ - app_bundle_identifier: typing.Optional[str] = pydantic.Field(default="") + app_bundle_identifier: typing.Optional[str] = pydantic.Field(default=None) """ Assigned by developer to the app as its unique identifier inside the store. Usually this is a reverse domain plus the app name, e.g. `com.you.MyApp`. """ diff --git a/src/auth0/management/types/client_refresh_token_configuration.py b/src/auth0/management/types/client_refresh_token_configuration.py index 67b1b620..f6e1d5b6 100644 --- a/src/auth0/management/types/client_refresh_token_configuration.py +++ b/src/auth0/management/types/client_refresh_token_configuration.py @@ -16,7 +16,7 @@ class ClientRefreshTokenConfiguration(UniversalBaseModel): rotation_type: RefreshTokenRotationTypeEnum expiration_type: RefreshTokenExpirationTypeEnum - leeway: typing.Optional[int] = pydantic.Field(default=0) + leeway: typing.Optional[int] = pydantic.Field(default=None) """ Period in seconds where the previous refresh token can be exchanged without triggering breach detection """ @@ -36,7 +36,7 @@ class ClientRefreshTokenConfiguration(UniversalBaseModel): Period (in seconds) for which refresh tokens will remain valid without use """ - infinite_idle_token_lifetime: typing.Optional[bool] = pydantic.Field(default=False) + infinite_idle_token_lifetime: typing.Optional[bool] = pydantic.Field(default=None) """ Prevents tokens from expiring without use when `true` (takes precedence over `idle_token_lifetime` values) """ diff --git a/src/auth0/management/types/client_session_transfer_configuration.py b/src/auth0/management/types/client_session_transfer_configuration.py index d85556b8..a7dee7f1 100644 --- a/src/auth0/management/types/client_session_transfer_configuration.py +++ b/src/auth0/management/types/client_session_transfer_configuration.py @@ -15,12 +15,12 @@ class ClientSessionTransferConfiguration(UniversalBaseModel): Native to Web SSO Configuration """ - can_create_session_transfer_token: typing.Optional[bool] = pydantic.Field(default=False) + can_create_session_transfer_token: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether an app can issue a Session Transfer Token through Token Exchange. If set to 'false', the app will not be able to issue a Session Transfer Token. Usually configured in the native application. Default value is `false`. """ - enforce_cascade_revocation: typing.Optional[bool] = pydantic.Field(default=True) + enforce_cascade_revocation: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether revoking the parent Refresh Token that initiated a Native to Web flow and was used to issue a Session Transfer Token should trigger a cascade revocation affecting its dependent child entities. Usually configured in the native application. Default value is `true`, applicable only in Native to Web SSO context. """ @@ -33,12 +33,12 @@ class ClientSessionTransferConfiguration(UniversalBaseModel): """ enforce_device_binding: typing.Optional[ClientSessionTransferDeviceBindingEnum] = None - allow_refresh_token: typing.Optional[bool] = pydantic.Field(default=False) + allow_refresh_token: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether Refresh Tokens are allowed to be issued when authenticating with a Session Transfer Token. Usually configured in the web application. Default value is `false`. """ - enforce_online_refresh_tokens: typing.Optional[bool] = pydantic.Field(default=True) + enforce_online_refresh_tokens: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether Refresh Tokens created during a Native to Web session are tied to that session's lifetime. This determines if such refresh tokens should be automatically revoked when their corresponding sessions are. Usually configured in the web application. Default value is `true`, applicable only in Native to Web SSO context. """ diff --git a/src/auth0/management/types/client_signed_request_object_with_credential_id.py b/src/auth0/management/types/client_signed_request_object_with_credential_id.py index 185aa3e4..b5da1749 100644 --- a/src/auth0/management/types/client_signed_request_object_with_credential_id.py +++ b/src/auth0/management/types/client_signed_request_object_with_credential_id.py @@ -12,7 +12,7 @@ class ClientSignedRequestObjectWithCredentialId(UniversalBaseModel): JWT-secured Authorization Requests (JAR) settings. """ - required: typing.Optional[bool] = pydantic.Field(default=False) + required: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether the JAR requests are mandatory """ diff --git a/src/auth0/management/types/client_signed_request_object_with_public_key.py b/src/auth0/management/types/client_signed_request_object_with_public_key.py index d0ce9240..85d94255 100644 --- a/src/auth0/management/types/client_signed_request_object_with_public_key.py +++ b/src/auth0/management/types/client_signed_request_object_with_public_key.py @@ -12,7 +12,7 @@ class ClientSignedRequestObjectWithPublicKey(UniversalBaseModel): JWT-secured Authorization Requests (JAR) settings. """ - required: typing.Optional[bool] = pydantic.Field(default=False) + required: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates whether the JAR requests are mandatory """ diff --git a/src/auth0/management/types/client_signing_key.py b/src/auth0/management/types/client_signing_key.py index 2ea9a4d2..aabc1b9b 100644 --- a/src/auth0/management/types/client_signing_key.py +++ b/src/auth0/management/types/client_signing_key.py @@ -9,19 +9,17 @@ class ClientSigningKey(UniversalBaseModel): - pkcs_7: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="pkcs7")] = pydantic.Field( - alias="pkcs7", default="" - ) - """ - Signing certificate public key and chain in PKCS#7 (.P7B) format. - """ - - cert: typing.Optional[str] = pydantic.Field(default="") + pkcs_7: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="pkcs7"), + pydantic.Field(alias="pkcs7", description="Signing certificate public key and chain in PKCS#7 (.P7B) format."), + ] = None + cert: typing.Optional[str] = pydantic.Field(default=None) """ Signing certificate public key in X.509 (.CER) format. """ - subject: typing.Optional[str] = pydantic.Field(default="") + subject: typing.Optional[str] = pydantic.Field(default=None) """ Subject name for this certificate in the format `/CN={domain}`. """ diff --git a/src/auth0/management/types/connection_base_url_exact.py b/src/auth0/management/types/connection_base_url_exact.py new file mode 100644 index 00000000..0bbc43a9 --- /dev/null +++ b/src/auth0/management/types/connection_base_url_exact.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_https_url_with_http_fallback import ConnectionHttpsUrlWithHttpFallback + +ConnectionBaseUrlExact = ConnectionHttpsUrlWithHttpFallback diff --git a/src/auth0/management/types/connection_client_id_amazon.py b/src/auth0/management/types/connection_client_id_amazon.py new file mode 100644 index 00000000..001b8331 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_amazon.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_id import ConnectionClientId + +ConnectionClientIdAmazon = ConnectionClientId diff --git a/src/auth0/management/types/connection_client_id_bitbucket.py b/src/auth0/management/types/connection_client_id_bitbucket.py new file mode 100644 index 00000000..5b488809 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_bitbucket.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientIdBitbucket = str diff --git a/src/auth0/management/types/connection_client_id_exact.py b/src/auth0/management/types/connection_client_id_exact.py new file mode 100644 index 00000000..1d53dc14 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_exact.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_id import ConnectionClientId + +ConnectionClientIdExact = ConnectionClientId diff --git a/src/auth0/management/types/connection_client_id_line.py b/src/auth0/management/types/connection_client_id_line.py new file mode 100644 index 00000000..93af3bc0 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_line.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientIdLine = str diff --git a/src/auth0/management/types/connection_client_id_paypal.py b/src/auth0/management/types/connection_client_id_paypal.py new file mode 100644 index 00000000..6e717c82 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_paypal.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_id import ConnectionClientId + +ConnectionClientIdPaypal = ConnectionClientId diff --git a/src/auth0/management/types/connection_client_id_salesforce.py b/src/auth0/management/types/connection_client_id_salesforce.py new file mode 100644 index 00000000..853058c1 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_salesforce.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientIdSalesforce = str diff --git a/src/auth0/management/types/connection_client_id_windows_live.py b/src/auth0/management/types/connection_client_id_windows_live.py new file mode 100644 index 00000000..f6b4a273 --- /dev/null +++ b/src/auth0/management/types/connection_client_id_windows_live.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientIdWindowsLive = str diff --git a/src/auth0/management/types/connection_client_secret_amazon.py b/src/auth0/management/types/connection_client_secret_amazon.py new file mode 100644 index 00000000..ee960d5d --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_amazon.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_secret import ConnectionClientSecret + +ConnectionClientSecretAmazon = ConnectionClientSecret diff --git a/src/auth0/management/types/connection_client_secret_bitbucket.py b/src/auth0/management/types/connection_client_secret_bitbucket.py new file mode 100644 index 00000000..ca9d1162 --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_bitbucket.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_secret import ConnectionClientSecret + +ConnectionClientSecretBitbucket = ConnectionClientSecret diff --git a/src/auth0/management/types/connection_client_secret_exact.py b/src/auth0/management/types/connection_client_secret_exact.py new file mode 100644 index 00000000..ce958668 --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_exact.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_secret import ConnectionClientSecret + +ConnectionClientSecretExact = ConnectionClientSecret diff --git a/src/auth0/management/types/connection_client_secret_line.py b/src/auth0/management/types/connection_client_secret_line.py new file mode 100644 index 00000000..15759291 --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_line.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientSecretLine = str diff --git a/src/auth0/management/types/connection_client_secret_paypal.py b/src/auth0/management/types/connection_client_secret_paypal.py new file mode 100644 index 00000000..577b8782 --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_paypal.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_secret import ConnectionClientSecret + +ConnectionClientSecretPaypal = ConnectionClientSecret diff --git a/src/auth0/management/types/connection_client_secret_salesforce.py b/src/auth0/management/types/connection_client_secret_salesforce.py new file mode 100644 index 00000000..53107f13 --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_salesforce.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionClientSecretSalesforce = str diff --git a/src/auth0/management/types/connection_client_secret_windows_live.py b/src/auth0/management/types/connection_client_secret_windows_live.py new file mode 100644 index 00000000..d1dcf06a --- /dev/null +++ b/src/auth0/management/types/connection_client_secret_windows_live.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_client_secret import ConnectionClientSecret + +ConnectionClientSecretWindowsLive = ConnectionClientSecret diff --git a/src/auth0/management/types/connection_community_base_url_salesforce.py b/src/auth0/management/types/connection_community_base_url_salesforce.py new file mode 100644 index 00000000..26417875 --- /dev/null +++ b/src/auth0/management/types/connection_community_base_url_salesforce.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_https_url_with_http_fallback import ConnectionHttpsUrlWithHttpFallback + +ConnectionCommunityBaseUrlSalesforce = ConnectionHttpsUrlWithHttpFallback diff --git a/src/auth0/management/types/connection_connected_accounts_purpose_xaa.py b/src/auth0/management/types/connection_connected_accounts_purpose_xaa.py index 3200f236..f25136be 100644 --- a/src/auth0/management/types/connection_connected_accounts_purpose_xaa.py +++ b/src/auth0/management/types/connection_connected_accounts_purpose_xaa.py @@ -11,7 +11,7 @@ class ConnectionConnectedAccountsPurposeXaa(UniversalBaseModel): Configure the purpose of a connection to be used for connected accounts and Token Vault. """ - cross_app_access: typing.Optional[bool] = False + cross_app_access: typing.Optional[bool] = None active: bool if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/connection_email_email.py b/src/auth0/management/types/connection_email_email.py index 26796ffb..a9c3e9f7 100644 --- a/src/auth0/management/types/connection_email_email.py +++ b/src/auth0/management/types/connection_email_email.py @@ -18,9 +18,9 @@ class ConnectionEmailEmail(UniversalBaseModel): """ body: typing.Optional[ConnectionEmailBodyEmail] = None - from_: typing_extensions.Annotated[typing.Optional[ConnectionEmailFromEmail], FieldMetadata(alias="from")] = ( - pydantic.Field(alias="from", default=None) - ) + from_: typing_extensions.Annotated[ + typing.Optional[ConnectionEmailFromEmail], FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] = None subject: typing.Optional[ConnectionEmailSubjectEmail] = None syntax: typing.Optional[ConnectionEmailEmailSyntax] = pydantic.Field(default=None) """ diff --git a/src/auth0/management/types/connection_for_list.py b/src/auth0/management/types/connection_for_list.py index 30a66830..5ff824d1 100644 --- a/src/auth0/management/types/connection_for_list.py +++ b/src/auth0/management/types/connection_for_list.py @@ -11,7 +11,7 @@ class ConnectionForList(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="My connection") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the connection """ @@ -22,12 +22,12 @@ class ConnectionForList(UniversalBaseModel): """ options: typing.Optional[ConnectionOptions] = None - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The connection's identifier """ - strategy: typing.Optional[str] = pydantic.Field(default="auth0") + strategy: typing.Optional[str] = pydantic.Field(default=None) """ The type of the connection, related to the identity provider """ diff --git a/src/auth0/management/types/connection_freeform_scopes_amazon.py b/src/auth0/management/types/connection_freeform_scopes_amazon.py new file mode 100644 index 00000000..ce80224e --- /dev/null +++ b/src/auth0/management/types/connection_freeform_scopes_amazon.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionFreeformScopesAmazon = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_freeform_scopes_paypal.py b/src/auth0/management/types/connection_freeform_scopes_paypal.py new file mode 100644 index 00000000..a63cbbd1 --- /dev/null +++ b/src/auth0/management/types/connection_freeform_scopes_paypal.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionFreeformScopesPaypal = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_freeform_scopes_salesforce.py b/src/auth0/management/types/connection_freeform_scopes_salesforce.py new file mode 100644 index 00000000..b71312cc --- /dev/null +++ b/src/auth0/management/types/connection_freeform_scopes_salesforce.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionFreeformScopesSalesforce = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_freeform_scopes_windows_live.py b/src/auth0/management/types/connection_freeform_scopes_windows_live.py new file mode 100644 index 00000000..86edb3c7 --- /dev/null +++ b/src/auth0/management/types/connection_freeform_scopes_windows_live.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionFreeformScopesWindowsLive = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_gateway_authentication.py b/src/auth0/management/types/connection_gateway_authentication.py index b4b9781f..9ac591f3 100644 --- a/src/auth0/management/types/connection_gateway_authentication.py +++ b/src/auth0/management/types/connection_gateway_authentication.py @@ -34,11 +34,12 @@ class ConnectionGatewayAuthentication(UniversalBaseModel): """ secret_base_64_encoded: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="secret_base64_encoded") - ] = pydantic.Field(alias="secret_base64_encoded", default=None) - """ - Set to true if the provided secret is base64 encoded. - """ + typing.Optional[bool], + FieldMetadata(alias="secret_base64_encoded"), + pydantic.Field( + alias="secret_base64_encoded", description="Set to true if the provided secret is base64 encoded." + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/connection_gateway_authentication_sms.py b/src/auth0/management/types/connection_gateway_authentication_sms.py index 0591618e..62b37bc7 100644 --- a/src/auth0/management/types/connection_gateway_authentication_sms.py +++ b/src/auth0/management/types/connection_gateway_authentication_sms.py @@ -24,12 +24,10 @@ class ConnectionGatewayAuthenticationSms(UniversalBaseModel): """ secret_base_64_encoded: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="secret_base64_encoded") - ] = pydantic.Field(alias="secret_base64_encoded", default=False) - """ - Set to true if the secret is base64-url-encoded - """ - + typing.Optional[bool], + FieldMetadata(alias="secret_base64_encoded"), + pydantic.Field(alias="secret_base64_encoded", description="Set to true if the secret is base64-url-encoded"), + ] = None subject: typing.Optional[ConnectionGatewayAuthenticationSubjectSms] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/connection_key.py b/src/auth0/management/types/connection_key.py index 645966f7..0e8da96a 100644 --- a/src/auth0/management/types/connection_key.py +++ b/src/auth0/management/types/connection_key.py @@ -13,21 +13,17 @@ class ConnectionKey(UniversalBaseModel): The key id of the signing key """ - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ The public certificate of the signing key """ - pkcs: typing.Optional[str] = pydantic.Field( - default="-----BEGIN PKCS7-----\r\nMIIDPA....t8xAA==\r\n-----END PKCS7-----" - ) + pkcs: typing.Optional[str] = pydantic.Field(default=None) """ The public certificate of the signing key in pkcs7 format """ - current: typing.Optional[bool] = pydantic.Field(default=True) + current: typing.Optional[bool] = pydantic.Field(default=None) """ True if the key is the the current key """ @@ -47,12 +43,12 @@ class ConnectionKey(UniversalBaseModel): The date and time when the key became the current key """ - fingerprint: str = pydantic.Field(default="CC:FB:DD:D8:9A:B5:DE:1B:F0:CC:36:D2:99:59:21:12:03:DD:A8:25") + fingerprint: str = pydantic.Field() """ The cert fingerprint """ - thumbprint: str = pydantic.Field(default="CCFBDDD89AB5DE1BF0CC36D29959211203DDA825") + thumbprint: str = pydantic.Field() """ The cert thumbprint """ diff --git a/src/auth0/management/types/connection_options_ad.py b/src/auth0/management/types/connection_options_ad.py index f43827e4..556e4689 100644 --- a/src/auth0/management/types/connection_options_ad.py +++ b/src/auth0/management/types/connection_options_ad.py @@ -27,23 +27,26 @@ class ConnectionOptionsAd(ConnectionOptionsCommon): Options for the 'ad' connection """ - agent_ip: typing_extensions.Annotated[typing.Optional[ConnectionAgentIpad], FieldMetadata(alias="agentIP")] = ( - pydantic.Field(alias="agentIP", default=None) - ) + agent_ip: typing_extensions.Annotated[ + typing.Optional[ConnectionAgentIpad], FieldMetadata(alias="agentIP"), pydantic.Field(alias="agentIP") + ] = None agent_mode: typing_extensions.Annotated[ - typing.Optional[ConnectionAgentModeAd], FieldMetadata(alias="agentMode") - ] = pydantic.Field(alias="agentMode", default=None) + typing.Optional[ConnectionAgentModeAd], FieldMetadata(alias="agentMode"), pydantic.Field(alias="agentMode") + ] = None agent_version: typing_extensions.Annotated[ - typing.Optional[ConnectionAgentVersionAd], FieldMetadata(alias="agentVersion") - ] = pydantic.Field(alias="agentVersion", default=None) + typing.Optional[ConnectionAgentVersionAd], + FieldMetadata(alias="agentVersion"), + pydantic.Field(alias="agentVersion"), + ] = None brute_force_protection: typing.Optional[ConnectionBruteForceProtection] = None - cert_auth: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="certAuth")] = pydantic.Field( - alias="certAuth", default=None - ) - """ - Enables client SSL certificate authentication for the AD connector, requiring HTTPS on the sign-in endpoint - """ - + cert_auth: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="certAuth"), + pydantic.Field( + alias="certAuth", + description="Enables client SSL certificate authentication for the AD connector, requiring HTTPS on the sign-in endpoint", + ), + ] = None certs: typing.Optional[ConnectionCertsAd] = None disable_cache: typing.Optional[bool] = pydantic.Field(default=None) """ @@ -58,15 +61,17 @@ class ConnectionOptionsAd(ConnectionOptionsCommon): domain_aliases: typing.Optional[ConnectionDomainAliasesAd] = None icon_url: typing.Optional[ConnectionIconUrl] = None ips: typing.Optional[ConnectionIpsAd] = None - kerberos: typing.Optional[bool] = pydantic.Field(default=False) + kerberos: typing.Optional[bool] = pydantic.Field(default=None) """ Enables Windows Integrated Authentication (Kerberos) for seamless SSO when users authenticate from within the corporate network IP ranges """ set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None sign_in_endpoint: typing_extensions.Annotated[ - typing.Optional[ConnectionSignInEndpointAd], FieldMetadata(alias="signInEndpoint") - ] = pydantic.Field(alias="signInEndpoint", default=None) + typing.Optional[ConnectionSignInEndpointAd], + FieldMetadata(alias="signInEndpoint"), + pydantic.Field(alias="signInEndpoint"), + ] = None tenant_domain: typing.Optional[ConnectionTenantDomainAd] = None thumbprints: typing.Optional[ConnectionThumbprintsAd] = None upstream_params: typing.Optional[ConnectionUpstreamParams] = None diff --git a/src/auth0/management/types/connection_options_adfs.py b/src/auth0/management/types/connection_options_adfs.py index 7f6cf9f2..1bf1e501 100644 --- a/src/auth0/management/types/connection_options_adfs.py +++ b/src/auth0/management/types/connection_options_adfs.py @@ -29,23 +29,28 @@ class ConnectionOptionsAdfs(ConnectionOptionsCommon): """ domain_aliases: typing.Optional[ConnectionDomainAliases] = None - entity_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="entityId")] = pydantic.Field( - alias="entityId", default=None - ) - """ - The entity identifier (Issuer) for the ADFS Service Provider. When not provided, defaults to 'urn:auth0:{tenant}:{connection}'. - """ - + entity_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="entityId"), + pydantic.Field( + alias="entityId", + description="The entity identifier (Issuer) for the ADFS Service Provider. When not provided, defaults to 'urn:auth0:{tenant}:{connection}'.", + ), + ] = None fed_metadata_xml: typing_extensions.Annotated[ - typing.Optional[ConnectionMetadataXmlAdfs], FieldMetadata(alias="fedMetadataXml") - ] = pydantic.Field(alias="fedMetadataXml", default=None) + typing.Optional[ConnectionMetadataXmlAdfs], + FieldMetadata(alias="fedMetadataXml"), + pydantic.Field(alias="fedMetadataXml"), + ] = None icon_url: typing.Optional[ConnectionIconUrlAdfs] = None prev_thumbprints: typing.Optional[ConnectionThumbprints] = None set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None should_trust_email_verified_connection: typing.Optional[ConnectionShouldTrustEmailVerifiedConnectionEnum] = None sign_in_endpoint: typing_extensions.Annotated[ - typing.Optional[ConnectionSignInEndpointAdfs], FieldMetadata(alias="signInEndpoint") - ] = pydantic.Field(alias="signInEndpoint", default=None) + typing.Optional[ConnectionSignInEndpointAdfs], + FieldMetadata(alias="signInEndpoint"), + pydantic.Field(alias="signInEndpoint"), + ] = None tenant_domain: typing.Optional[ConnectionTenantDomain] = None thumbprints: typing.Optional[ConnectionThumbprints] = None upstream_params: typing.Optional[ConnectionUpstreamParamsAdfs] = None diff --git a/src/auth0/management/types/connection_options_amazon.py b/src/auth0/management/types/connection_options_amazon.py index f3e97fd4..833fc88c 100644 --- a/src/auth0/management/types/connection_options_amazon.py +++ b/src/auth0/management/types/connection_options_amazon.py @@ -4,14 +4,37 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_amazon import ConnectionClientIdAmazon +from .connection_client_secret_amazon import ConnectionClientSecretAmazon +from .connection_freeform_scopes_amazon import ConnectionFreeformScopesAmazon +from .connection_options_common import ConnectionOptionsCommon +from .connection_scope_amazon import ConnectionScopeAmazon +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum +from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsAmazon(ConnectionOptionsOAuth2Common): +class ConnectionOptionsAmazon(ConnectionOptionsCommon): """ Options for the 'amazon' connection """ + client_id: typing.Optional[ConnectionClientIdAmazon] = None + client_secret: typing.Optional[ConnectionClientSecretAmazon] = None + freeform_scopes: typing.Optional[ConnectionFreeformScopesAmazon] = None + postal_code: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the user's postal code from Amazon during authentication. This adds the 'postal_code' scope to the authorization request. + """ + + profile: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the user's basic profile information (name, email, user ID) from Amazon during authentication. This scope is always enabled for Amazon connections. + """ + + scope: typing.Optional[ConnectionScopeAmazon] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + upstream_params: typing.Optional[ConnectionUpstreamParams] = None + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_auth_0.py b/src/auth0/management/types/connection_options_auth_0.py index 3694f8c5..92fef990 100644 --- a/src/auth0/management/types/connection_options_auth_0.py +++ b/src/auth0/management/types/connection_options_auth_0.py @@ -40,20 +40,26 @@ class ConnectionOptionsAuth0(ConnectionOptionsCommon): brute_force_protection: typing.Optional[ConnectionBruteForceProtection] = None configuration: typing.Optional[ConnectionConfiguration] = None custom_scripts: typing_extensions.Annotated[ - typing.Optional[ConnectionCustomScripts], FieldMetadata(alias="customScripts") - ] = pydantic.Field(alias="customScripts", default=None) + typing.Optional[ConnectionCustomScripts], + FieldMetadata(alias="customScripts"), + pydantic.Field(alias="customScripts"), + ] = None disable_self_service_change_password: typing.Optional[ConnectionDisableSelfServiceChangePassword] = None disable_signup: typing.Optional[ConnectionDisableSignup] = None enable_script_context: typing.Optional[ConnectionEnableScriptContext] = None enabled_database_customization: typing_extensions.Annotated[ - typing.Optional[ConnectionEnabledDatabaseCustomization], FieldMetadata(alias="enabledDatabaseCustomization") - ] = pydantic.Field(alias="enabledDatabaseCustomization", default=None) + typing.Optional[ConnectionEnabledDatabaseCustomization], + FieldMetadata(alias="enabledDatabaseCustomization"), + pydantic.Field(alias="enabledDatabaseCustomization"), + ] = None import_mode: typing.Optional[ConnectionImportMode] = None mfa: typing.Optional[ConnectionMfa] = None passkey_options: typing.Optional[ConnectionPasskeyOptions] = None password_policy: typing_extensions.Annotated[ - typing.Optional[ConnectionPasswordPolicyEnum], FieldMetadata(alias="passwordPolicy") - ] = pydantic.Field(alias="passwordPolicy", default=None) + typing.Optional[ConnectionPasswordPolicyEnum], + FieldMetadata(alias="passwordPolicy"), + pydantic.Field(alias="passwordPolicy"), + ] = None password_complexity_options: typing.Optional[ConnectionPasswordComplexityOptions] = None password_dictionary: typing.Optional[ConnectionPasswordDictionaryOptions] = None password_history: typing.Optional[ConnectionPasswordHistoryOptions] = None diff --git a/src/auth0/management/types/connection_options_azure_ad.py b/src/auth0/management/types/connection_options_azure_ad.py index f673bf31..e818caee 100644 --- a/src/auth0/management/types/connection_options_azure_ad.py +++ b/src/auth0/management/types/connection_options_azure_ad.py @@ -152,7 +152,7 @@ class ConnectionOptionsAzureAd(ConnectionOptionsCommon): When false, prevents storing the user's full name from Azure AD. When true (default), full name is persisted in the user profile. """ - ext_nested_groups: typing.Optional[bool] = pydantic.Field(default=False) + ext_nested_groups: typing.Optional[bool] = pydantic.Field(default=None) """ When true, stores all groups the user is member of, including transitive group memberships (groups within groups). When false (default), only direct group memberships are included. """ @@ -229,12 +229,13 @@ class ConnectionOptionsAzureAd(ConnectionOptionsCommon): """ ext_telephone_number: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="ext_telephoneNumber") - ] = pydantic.Field(alias="ext_telephoneNumber", default=None) - """ - When false, prevents storing the user's telephone number from Azure AD. When true (default), telephone number is persisted in the user profile. - """ - + typing.Optional[bool], + FieldMetadata(alias="ext_telephoneNumber"), + pydantic.Field( + alias="ext_telephoneNumber", + description="When false, prevents storing the user's telephone number from Azure AD. When true (default), telephone number is persisted in the user profile.", + ), + ] = None ext_tenantid: typing.Optional[bool] = pydantic.Field(default=None) """ When false, prevents storing the user's Azure AD tenant ID. When true (default), tenant ID is persisted. Useful for identifying which Azure AD organization the user belongs to. @@ -269,8 +270,8 @@ class ConnectionOptionsAzureAd(ConnectionOptionsCommon): should_trust_email_verified_connection: typing.Optional[ConnectionShouldTrustEmailVerifiedConnectionEnum] = None tenant_domain: typing.Optional[ConnectionTenantDomainAzureAdOne] = None tenant_id: typing_extensions.Annotated[ - typing.Optional[ConnectionTenantIdAzureAd], FieldMetadata(alias="tenantId") - ] = pydantic.Field(alias="tenantId", default=None) + typing.Optional[ConnectionTenantIdAzureAd], FieldMetadata(alias="tenantId"), pydantic.Field(alias="tenantId") + ] = None thumbprints: typing.Optional[ConnectionThumbprints] = None upstream_params: typing.Optional[ConnectionUpstreamParams] = None use_wsfed: typing.Optional[bool] = pydantic.Field(default=None) @@ -279,8 +280,10 @@ class ConnectionOptionsAzureAd(ConnectionOptionsCommon): """ use_common_endpoint: typing_extensions.Annotated[ - typing.Optional[ConnectionUseCommonEndpointAzureAd], FieldMetadata(alias="useCommonEndpoint") - ] = pydantic.Field(alias="useCommonEndpoint", default=None) + typing.Optional[ConnectionUseCommonEndpointAzureAd], + FieldMetadata(alias="useCommonEndpoint"), + pydantic.Field(alias="useCommonEndpoint"), + ] = None userid_attribute: typing.Optional[ConnectionUseridAttributeAzureAd] = None waad_protocol: typing.Optional[ConnectionWaadProtocol] = None diff --git a/src/auth0/management/types/connection_options_bitbucket.py b/src/auth0/management/types/connection_options_bitbucket.py index 7031987c..6aa1aa3b 100644 --- a/src/auth0/management/types/connection_options_bitbucket.py +++ b/src/auth0/management/types/connection_options_bitbucket.py @@ -4,14 +4,26 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_bitbucket import ConnectionClientIdBitbucket +from .connection_client_secret_bitbucket import ConnectionClientSecretBitbucket +from .connection_options_common import ConnectionOptionsCommon +from .connection_profile_bitbucket import ConnectionProfileBitbucket +from .connection_scope_array import ConnectionScopeArray +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum -class ConnectionOptionsBitbucket(ConnectionOptionsOAuth2Common): +class ConnectionOptionsBitbucket(ConnectionOptionsCommon): """ Options for the 'bitbucket' connection """ + client_id: typing.Optional[ConnectionClientIdBitbucket] = None + client_secret: typing.Optional[ConnectionClientSecretBitbucket] = None + freeform_scopes: typing.Optional[ConnectionScopeArray] = None + profile: typing.Optional[ConnectionProfileBitbucket] = None + scope: typing.Optional[ConnectionScopeArray] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_common_saml.py b/src/auth0/management/types/connection_options_common_saml.py index 5e30d5b9..7a21e742 100644 --- a/src/auth0/management/types/connection_options_common_saml.py +++ b/src/auth0/management/types/connection_options_common_saml.py @@ -30,30 +30,42 @@ class ConnectionOptionsCommonSaml(UniversalBaseModel): cert: typing.Optional[ConnectionSigningCertificateDerSaml] = None decryption_key: typing_extensions.Annotated[ - typing.Optional[ConnectionDecryptionKeySaml], FieldMetadata(alias="decryptionKey") - ] = pydantic.Field(alias="decryptionKey", default=None) + typing.Optional[ConnectionDecryptionKeySaml], + FieldMetadata(alias="decryptionKey"), + pydantic.Field(alias="decryptionKey"), + ] = None digest_algorithm: typing_extensions.Annotated[ - typing.Optional[ConnectionDigestAlgorithmSaml], FieldMetadata(alias="digestAlgorithm") - ] = pydantic.Field(alias="digestAlgorithm", default=None) + typing.Optional[ConnectionDigestAlgorithmSaml], + FieldMetadata(alias="digestAlgorithm"), + pydantic.Field(alias="digestAlgorithm"), + ] = None domain_aliases: typing.Optional[ConnectionDomainAliasesSaml] = None - entity_id: typing_extensions.Annotated[typing.Optional[ConnectionEntityIdSaml], FieldMetadata(alias="entityId")] = ( - pydantic.Field(alias="entityId", default=None) - ) + entity_id: typing_extensions.Annotated[ + typing.Optional[ConnectionEntityIdSaml], FieldMetadata(alias="entityId"), pydantic.Field(alias="entityId") + ] = None icon_url: typing.Optional[ConnectionIconUrlSaml] = None idpinitiated: typing.Optional[ConnectionOptionsIdpinitiatedSaml] = None protocol_binding: typing_extensions.Annotated[ - typing.Optional[ConnectionProtocolBindingSaml], FieldMetadata(alias="protocolBinding") - ] = pydantic.Field(alias="protocolBinding", default=None) + typing.Optional[ConnectionProtocolBindingSaml], + FieldMetadata(alias="protocolBinding"), + pydantic.Field(alias="protocolBinding"), + ] = None set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None sign_in_endpoint: typing_extensions.Annotated[ - typing.Optional[ConnectionSignInEndpointSaml], FieldMetadata(alias="signInEndpoint") - ] = pydantic.Field(alias="signInEndpoint", default=None) + typing.Optional[ConnectionSignInEndpointSaml], + FieldMetadata(alias="signInEndpoint"), + pydantic.Field(alias="signInEndpoint"), + ] = None sign_saml_request: typing_extensions.Annotated[ - typing.Optional[ConnectionSignSamlRequestSaml], FieldMetadata(alias="signSAMLRequest") - ] = pydantic.Field(alias="signSAMLRequest", default=None) + typing.Optional[ConnectionSignSamlRequestSaml], + FieldMetadata(alias="signSAMLRequest"), + pydantic.Field(alias="signSAMLRequest"), + ] = None signature_algorithm: typing_extensions.Annotated[ - typing.Optional[ConnectionSignatureAlgorithmSaml], FieldMetadata(alias="signatureAlgorithm") - ] = pydantic.Field(alias="signatureAlgorithm", default=None) + typing.Optional[ConnectionSignatureAlgorithmSaml], + FieldMetadata(alias="signatureAlgorithm"), + pydantic.Field(alias="signatureAlgorithm"), + ] = None tenant_domain: typing.Optional[ConnectionTenantDomainSaml] = None thumbprints: typing.Optional[ConnectionThumbprintsSaml] = None upstream_params: typing.Optional[ConnectionUpstreamParams] = None diff --git a/src/auth0/management/types/connection_options_email.py b/src/auth0/management/types/connection_options_email.py index e03242e0..0404798c 100644 --- a/src/auth0/management/types/connection_options_email.py +++ b/src/auth0/management/types/connection_options_email.py @@ -20,8 +20,10 @@ class ConnectionOptionsEmail(ConnectionOptionsCommon): """ auth_params: typing_extensions.Annotated[ - typing.Optional[ConnectionAuthParamsEmail], FieldMetadata(alias="authParams") - ] = pydantic.Field(alias="authParams", default=None) + typing.Optional[ConnectionAuthParamsEmail], + FieldMetadata(alias="authParams"), + pydantic.Field(alias="authParams"), + ] = None brute_force_protection: ConnectionBruteForceProtection disable_signup: typing.Optional[ConnectionDisableSignup] = None email: ConnectionEmailEmail diff --git a/src/auth0/management/types/connection_options_exact.py b/src/auth0/management/types/connection_options_exact.py index d7bc3b53..4e060feb 100644 --- a/src/auth0/management/types/connection_options_exact.py +++ b/src/auth0/management/types/connection_options_exact.py @@ -3,15 +3,35 @@ import typing import pydantic +import typing_extensions from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from ..core.serialization import FieldMetadata +from .connection_base_url_exact import ConnectionBaseUrlExact +from .connection_client_id_exact import ConnectionClientIdExact +from .connection_client_secret_exact import ConnectionClientSecretExact +from .connection_options_common import ConnectionOptionsCommon +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum +from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsExact(ConnectionOptionsOAuth2Common): +class ConnectionOptionsExact(ConnectionOptionsCommon): """ Options for the 'exact' connection """ + base_url: typing_extensions.Annotated[ + typing.Optional[ConnectionBaseUrlExact], FieldMetadata(alias="baseUrl"), pydantic.Field(alias="baseUrl") + ] = None + client_id: typing.Optional[ConnectionClientIdExact] = None + client_secret: typing.Optional[ConnectionClientSecretExact] = None + profile: typing.Optional[bool] = pydantic.Field(default=None) + """ + Enables retrieval of basic profile attributes from Exact Online including name, username, picture, email, gender, and language. + """ + + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + upstream_params: typing.Optional[ConnectionUpstreamParams] = None + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_facebook.py b/src/auth0/management/types/connection_options_facebook.py index 944be8c4..dec3601f 100644 --- a/src/auth0/management/types/connection_options_facebook.py +++ b/src/auth0/management/types/connection_options_facebook.py @@ -24,207 +24,207 @@ class ConnectionOptionsFacebook(ConnectionOptionsCommon): upstream_params: typing.Optional[ConnectionUpstreamParamsFacebook] = None scope: typing.Optional[ConnectionScopeFacebook] = None set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None - ads_management: typing.Optional[bool] = pydantic.Field(default=False) + ads_management: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to both read and manage ads for ad accounts you own or have been granted access to by the owner. By default, your app may only access ad accounts owned by admins of the app when in developer mode. """ - ads_read: typing.Optional[bool] = pydantic.Field(default=False) + ads_read: typing.Optional[bool] = pydantic.Field(default=None) """ Grants access to the Ads Insights API to pull ads report information for ad accounts you own or have been granted access to by the owner of other ad accounts. """ - allow_context_profile_field: typing.Optional[bool] = pydantic.Field(default=False) + allow_context_profile_field: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to a social context. Deprecated on April 30th, 2019. """ - business_management: typing.Optional[bool] = pydantic.Field(default=False) + business_management: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to read and write with the Business Manager API. """ - email: typing.Optional[bool] = pydantic.Field(default=False) + email: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a person's primary email address. """ - groups_access_member_info: typing.Optional[bool] = pydantic.Field(default=False) + groups_access_member_info: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to publicly available group member information. """ - leads_retrieval: typing.Optional[bool] = pydantic.Field(default=False) + leads_retrieval: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to retrieve all the information captured within a lead. """ - manage_notifications: typing.Optional[bool] = pydantic.Field(default=False) + manage_notifications: typing.Optional[bool] = pydantic.Field(default=None) """ Enables your app to read a person's notifications and mark them as read. This permission does not let you send notifications to a person. Deprecated in Graph API v2.3. """ - manage_pages: typing.Optional[bool] = pydantic.Field(default=False) + manage_pages: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to retrieve Page Access Tokens for the Pages and Apps that the person administers. Apps need both manage_pages and publish_pages to be able to publish as a Page. """ - pages_manage_cta: typing.Optional[bool] = pydantic.Field(default=False) + pages_manage_cta: typing.Optional[bool] = pydantic.Field(default=None) """ Allows the app to perform POST and DELETE operations on endpoints used for managing a Page's Call To Action buttons. """ - pages_manage_instant_articles: typing.Optional[bool] = pydantic.Field(default=False) + pages_manage_instant_articles: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to manage Instant Articles on behalf of Facebook Pages administered by people using your app. """ - pages_messaging: typing.Optional[bool] = pydantic.Field(default=False) + pages_messaging: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to send and receive messages through a Facebook Page. """ - pages_messaging_phone_number: typing.Optional[bool] = pydantic.Field(default=False) + pages_messaging_phone_number: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to use the phone number messaging feature. """ - pages_messaging_subscriptions: typing.Optional[bool] = pydantic.Field(default=False) + pages_messaging_subscriptions: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to send messages using Facebook Pages at any time after the first user interaction. Your app may only send advertising or promotional content through sponsored messages or within 24 hours of user interaction. """ - pages_show_list: typing.Optional[bool] = pydantic.Field(default=False) + pages_show_list: typing.Optional[bool] = pydantic.Field(default=None) """ Grants access to show the list of the Pages that a person manages. """ - public_profile: typing.Optional[bool] = pydantic.Field(default=True) + public_profile: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to a user's public profile information including id, first_name, last_name, middle_name, name, name_format, picture, and short_name. This is the most basic permission and is required by Facebook. """ - publish_actions: typing.Optional[bool] = pydantic.Field(default=False) + publish_actions: typing.Optional[bool] = pydantic.Field(default=None) """ Allows your app to publish to the Open Graph using Built-in Actions, Achievements, Scores, or Custom Actions. Deprecated on August 1st, 2018. """ - publish_pages: typing.Optional[bool] = pydantic.Field(default=False) + publish_pages: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to publish posts, comments, and like Pages managed by a person using your app. Your app must also have manage_pages to publish as a Page. """ - publish_to_groups: typing.Optional[bool] = pydantic.Field(default=False) + publish_to_groups: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to post content into a group on behalf of a user who has granted the app this permission. """ - publish_video: typing.Optional[bool] = pydantic.Field(default=False) + publish_video: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to publish live videos to the app User's timeline. """ - read_audience_network_insights: typing.Optional[bool] = pydantic.Field(default=False) + read_audience_network_insights: typing.Optional[bool] = pydantic.Field(default=None) """ Grants read-only access to the Audience Network Insights data for Apps the person owns. """ - read_insights: typing.Optional[bool] = pydantic.Field(default=False) + read_insights: typing.Optional[bool] = pydantic.Field(default=None) """ Grants read-only access to the Insights data for Pages, Apps, and web domains the person owns. """ - read_mailbox: typing.Optional[bool] = pydantic.Field(default=False) + read_mailbox: typing.Optional[bool] = pydantic.Field(default=None) """ Provides the ability to read the messages in a person's Facebook Inbox through the inbox edge and the thread node. Deprecated in Graph API v2.3. """ - read_page_mailboxes: typing.Optional[bool] = pydantic.Field(default=False) + read_page_mailboxes: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to read from the Page Inboxes of the Pages managed by a person. This permission is often used alongside the manage_pages permission. """ - read_stream: typing.Optional[bool] = pydantic.Field(default=False) + read_stream: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to read the posts in a person's News Feed, or the posts on their Profile. Deprecated in Graph API v2.3. """ - user_age_range: typing.Optional[bool] = pydantic.Field(default=False) + user_age_range: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a person's age range. """ - user_birthday: typing.Optional[bool] = pydantic.Field(default=False) + user_birthday: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a person's birthday. """ - user_events: typing.Optional[bool] = pydantic.Field(default=False) + user_events: typing.Optional[bool] = pydantic.Field(default=None) """ Grants read-only access to the Events a person is a host of or has RSVPed to. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ - user_friends: typing.Optional[bool] = pydantic.Field(default=False) + user_friends: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a list of friends that also use said app. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ - user_gender: typing.Optional[bool] = pydantic.Field(default=False) + user_gender: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a person's gender. """ - user_groups: typing.Optional[bool] = pydantic.Field(default=False) + user_groups: typing.Optional[bool] = pydantic.Field(default=None) """ Enables your app to read the Groups a person is a member of through the groups edge on the User object. Deprecated in Graph API v2.3. """ - user_hometown: typing.Optional[bool] = pydantic.Field(default=False) + user_hometown: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access a person's hometown location set in their User Profile. """ - user_likes: typing.Optional[bool] = pydantic.Field(default=False) + user_likes: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access the list of all Facebook Pages that a person has liked. """ - user_link: typing.Optional[bool] = pydantic.Field(default=False) + user_link: typing.Optional[bool] = pydantic.Field(default=None) """ Grants permission to access the Facebook Profile URL of the user of your app. """ - user_location: typing.Optional[bool] = pydantic.Field(default=False) + user_location: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to a person's current city through the location field on the User object. The current city is set by a person on their Profile. """ - user_managed_groups: typing.Optional[bool] = pydantic.Field(default=False) + user_managed_groups: typing.Optional[bool] = pydantic.Field(default=None) """ Enables your app to read the Groups a person is an admin of through the groups edge on the User object. Deprecated in Graph API v3.0. """ - user_photos: typing.Optional[bool] = pydantic.Field(default=False) + user_photos: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to the photos a person has uploaded or been tagged in. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ - user_posts: typing.Optional[bool] = pydantic.Field(default=False) + user_posts: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to the posts on a person's Timeline including their own posts, posts they are tagged in, and posts other people make on their Timeline. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ - user_status: typing.Optional[bool] = pydantic.Field(default=False) + user_status: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to a person's statuses. These are posts on Facebook which don't include links, videos or photos. Deprecated in Graph API v2.3. """ - user_tagged_places: typing.Optional[bool] = pydantic.Field(default=False) + user_tagged_places: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to the Places a person has been tagged at in photos, videos, statuses and links. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ - user_videos: typing.Optional[bool] = pydantic.Field(default=False) + user_videos: typing.Optional[bool] = pydantic.Field(default=None) """ Provides access to the videos a person has uploaded or been tagged in. This permission is restricted to a limited set of partners and usage requires prior approval by Facebook. """ diff --git a/src/auth0/management/types/connection_options_git_hub.py b/src/auth0/management/types/connection_options_git_hub.py index 16fcf946..ec43dd9d 100644 --- a/src/auth0/management/types/connection_options_git_hub.py +++ b/src/auth0/management/types/connection_options_git_hub.py @@ -24,102 +24,102 @@ class ConnectionOptionsGitHub(ConnectionOptionsCommon): scope: typing.Optional[ConnectionOptionsScopeGithub] = None set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None upstream_params: typing.Optional[ConnectionUpstreamParams] = None - admin_org: typing.Optional[bool] = pydantic.Field(default=False) + admin_org: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the GitHub admin:org scope so Auth0 can fully manage organizations, teams, and memberships on behalf of the user. """ - admin_public_key: typing.Optional[bool] = pydantic.Field(default=False) + admin_public_key: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the admin:public_key scope to allow creating, updating, and deleting the user's SSH public keys. """ - admin_repo_hook: typing.Optional[bool] = pydantic.Field(default=False) + admin_repo_hook: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the admin:repo_hook scope so Auth0 can read, write, ping, and delete repository webhooks. """ - delete_repo: typing.Optional[bool] = pydantic.Field(default=False) + delete_repo: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the delete_repo scope so the user can remove repositories they administer while signing in through Auth0. """ - email: typing.Optional[bool] = pydantic.Field(default=False) + email: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the user:email scope so Auth0 pulls addresses from GitHub's /user/emails endpoint and populates the profile. """ - follow: typing.Optional[bool] = pydantic.Field(default=False) + follow: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the user:follow scope to allow following or unfollowing GitHub users for the signed-in account. """ - gist: typing.Optional[bool] = pydantic.Field(default=False) + gist: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the gist scope so the application can create or update gists on behalf of the user. """ - notifications: typing.Optional[bool] = pydantic.Field(default=False) + notifications: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the notifications scope to read GitHub inbox notifications; repo also implicitly grants this access. """ - profile: typing.Optional[bool] = pydantic.Field(default=True) + profile: typing.Optional[bool] = pydantic.Field(default=None) """ Controls the GitHub read:user call that returns the user's basic profile (name, avatar, profile URL) and is on by default for successful logins. """ - public_repo: typing.Optional[bool] = pydantic.Field(default=False) + public_repo: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the public_repo scope for read and write operations on public repositories, deployments, and statuses. """ - read_org: typing.Optional[bool] = pydantic.Field(default=False) + read_org: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the read:org scope so Auth0 can view organizations, teams, and membership lists without making changes. """ - read_public_key: typing.Optional[bool] = pydantic.Field(default=False) + read_public_key: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the read:public_key scope so Auth0 can list and inspect the user's SSH public keys. """ - read_repo_hook: typing.Optional[bool] = pydantic.Field(default=False) + read_repo_hook: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the read:repo_hook scope to read and ping repository webhooks. """ - read_user: typing.Optional[bool] = pydantic.Field(default=False) + read_user: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the read:user scope to load extended profile information, implicitly covering user:email and user:follow. """ - repo: typing.Optional[bool] = pydantic.Field(default=False) + repo: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the repo scope for read and write access to both public and private repositories, deployments, and statuses. """ - repo_deployment: typing.Optional[bool] = pydantic.Field(default=False) + repo_deployment: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the repo_deployment scope in order to read and write deployment statuses for repositories. """ - repo_status: typing.Optional[bool] = pydantic.Field(default=False) + repo_status: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the repo:status scope to manage commit statuses on public and private repositories. """ - write_org: typing.Optional[bool] = pydantic.Field(default=False) + write_org: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the write:org scope so Auth0 can change whether organization memberships are publicized. """ - write_public_key: typing.Optional[bool] = pydantic.Field(default=False) + write_public_key: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the write:public_key scope to create or update SSH public keys for the user. """ - write_repo_hook: typing.Optional[bool] = pydantic.Field(default=False) + write_repo_hook: typing.Optional[bool] = pydantic.Field(default=None) """ Requests the write:repo_hook scope so Auth0 can read, create, update, and ping repository webhooks. """ diff --git a/src/auth0/management/types/connection_options_google_apps.py b/src/auth0/management/types/connection_options_google_apps.py index cdf99d0c..d9dcdb84 100644 --- a/src/auth0/management/types/connection_options_google_apps.py +++ b/src/auth0/management/types/connection_options_google_apps.py @@ -34,7 +34,7 @@ class ConnectionOptionsGoogleApps(ConnectionOptionsCommon): admin_access_token: typing.Optional[ConnectionAdminAccessTokenGoogleApps] = None admin_access_token_expiresin: typing.Optional[ConnectionAdminAccessTokenExpiresInGoogleApps] = None admin_refresh_token: typing.Optional[ConnectionAdminRefreshTokenGoogleApps] = None - allow_setting_login_scopes: typing.Optional[bool] = pydantic.Field(default=False) + allow_setting_login_scopes: typing.Optional[bool] = pydantic.Field(default=None) """ When true, allows customization of OAuth scopes requested during user login. Custom scopes are appended to the mandatory email and profile scopes. When false or omitted, only the default email and profile scopes are used. This property is automatically enabled when Token Vault or Connected Accounts features are activated. """ @@ -44,14 +44,14 @@ class ConnectionOptionsGoogleApps(ConnectionOptionsCommon): client_secret: typing.Optional[ConnectionClientSecretGoogleApps] = None domain: typing.Optional[ConnectionDomainGoogleApps] = None domain_aliases: typing.Optional[ConnectionDomainAliases] = None - email: typing.Optional[bool] = pydantic.Field(default=True) + email: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the OAuth flow requests the `email` scope. """ ext_agreed_terms: typing.Optional[ConnectionExtAgreedTermsGoogleApps] = None ext_groups: typing.Optional[ConnectionExtGroupsGoogleApps] = None - ext_groups_extended: typing.Optional[bool] = pydantic.Field(default=True) + ext_groups_extended: typing.Optional[bool] = pydantic.Field(default=None) """ Controls whether enriched group entries include `id`, `email`, `name` (true) or only the group name (false); can only be set when `ext_groups` is true. """ @@ -61,12 +61,12 @@ class ConnectionOptionsGoogleApps(ConnectionOptionsCommon): federated_connections_access_tokens: typing.Optional[ConnectionFederatedConnectionsAccessTokens] = None handle_login_from_social: typing.Optional[ConnectionHandleLoginFromSocialGoogleApps] = None icon_url: typing.Optional[ConnectionIconUrlGoogleApps] = None - map_user_id_to_id: typing.Optional[bool] = pydantic.Field(default=False) + map_user_id_to_id: typing.Optional[bool] = pydantic.Field(default=None) """ Determines how Auth0 generates the user_id for Google Workspace users. When false (default), the user's email address is used. When true, Google's stable numeric user ID is used instead, which persists even if the user's email changes. This setting can only be configured when creating the connection and cannot be changed afterward. """ - profile: typing.Optional[bool] = pydantic.Field(default=True) + profile: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the OAuth flow requests the `profile` scope. """ diff --git a/src/auth0/management/types/connection_options_line.py b/src/auth0/management/types/connection_options_line.py index aa56965e..ff1ea5f4 100644 --- a/src/auth0/management/types/connection_options_line.py +++ b/src/auth0/management/types/connection_options_line.py @@ -4,14 +4,35 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_line import ConnectionClientIdLine +from .connection_client_secret_line import ConnectionClientSecretLine +from .connection_options_common import ConnectionOptionsCommon +from .connection_scope_array import ConnectionScopeArray +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum +from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsLine(ConnectionOptionsOAuth2Common): +class ConnectionOptionsLine(ConnectionOptionsCommon): """ Options for the 'line' connection """ + client_id: typing.Optional[ConnectionClientIdLine] = None + client_secret: typing.Optional[ConnectionClientSecretLine] = None + freeform_scopes: typing.Optional[ConnectionScopeArray] = None + scope: typing.Optional[ConnectionScopeArray] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + upstream_params: typing.Optional[ConnectionUpstreamParams] = None + email: typing.Optional[bool] = pydantic.Field(default=None) + """ + Permission to request the user's email address from LINE. When enabled, adds the 'email' scope to OAuth requests. Note: LINE requires special approval to access user email addresses. + """ + + profile: typing.Optional[bool] = pydantic.Field(default=None) + """ + Permission to request the user's basic profile information from LINE. When enabled, adds the 'profile' scope to OAuth requests. LINE requires this scope to retrieve user display name, profile picture, and status message. + """ + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_o_auth_2.py b/src/auth0/management/types/connection_options_o_auth_2.py index f8b6a2c6..8c7a5d49 100644 --- a/src/auth0/management/types/connection_options_o_auth_2.py +++ b/src/auth0/management/types/connection_options_o_auth_2.py @@ -29,26 +29,36 @@ class ConnectionOptionsOAuth2(ConnectionOptionsCommon): """ auth_params: typing_extensions.Annotated[ - typing.Optional[ConnectionAuthParamsOAuth2], FieldMetadata(alias="authParams") - ] = pydantic.Field(alias="authParams", default=None) + typing.Optional[ConnectionAuthParamsOAuth2], + FieldMetadata(alias="authParams"), + pydantic.Field(alias="authParams"), + ] = None auth_params_map: typing_extensions.Annotated[ - typing.Optional[ConnectionAuthParamsMap], FieldMetadata(alias="authParamsMap") - ] = pydantic.Field(alias="authParamsMap", default=None) + typing.Optional[ConnectionAuthParamsMap], + FieldMetadata(alias="authParamsMap"), + pydantic.Field(alias="authParamsMap"), + ] = None authorization_url: typing_extensions.Annotated[ - typing.Optional[ConnectionAuthorizationEndpointOAuth2], FieldMetadata(alias="authorizationURL") - ] = pydantic.Field(alias="authorizationURL", default=None) + typing.Optional[ConnectionAuthorizationEndpointOAuth2], + FieldMetadata(alias="authorizationURL"), + pydantic.Field(alias="authorizationURL"), + ] = None client_id: typing.Optional[ConnectionClientIdOAuth2] = None client_secret: typing.Optional[ConnectionClientSecretOAuth2] = None custom_headers: typing_extensions.Annotated[ - typing.Optional[ConnectionCustomHeadersOAuth2], FieldMetadata(alias="customHeaders") - ] = pydantic.Field(alias="customHeaders", default=None) - fields_map: typing_extensions.Annotated[typing.Optional[ConnectionFieldsMap], FieldMetadata(alias="fieldsMap")] = ( - pydantic.Field(alias="fieldsMap", default=None) - ) + typing.Optional[ConnectionCustomHeadersOAuth2], + FieldMetadata(alias="customHeaders"), + pydantic.Field(alias="customHeaders"), + ] = None + fields_map: typing_extensions.Annotated[ + typing.Optional[ConnectionFieldsMap], FieldMetadata(alias="fieldsMap"), pydantic.Field(alias="fieldsMap") + ] = None icon_url: typing.Optional[ConnectionIconUrl] = None logout_url: typing_extensions.Annotated[ - typing.Optional[ConnectionEndSessionEndpointOAuth2], FieldMetadata(alias="logoutUrl") - ] = pydantic.Field(alias="logoutUrl", default=None) + typing.Optional[ConnectionEndSessionEndpointOAuth2], + FieldMetadata(alias="logoutUrl"), + pydantic.Field(alias="logoutUrl"), + ] = None pkce_enabled: typing.Optional[bool] = pydantic.Field(default=None) """ When true, enables Proof Key for Code Exchange (PKCE) for the authorization code flow. PKCE provides additional security by preventing authorization code interception attacks. @@ -58,15 +68,19 @@ class ConnectionOptionsOAuth2(ConnectionOptionsCommon): scripts: typing.Optional[ConnectionScriptsOAuth2] = None set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None token_url: typing_extensions.Annotated[ - typing.Optional[ConnectionTokenEndpointOAuth2], FieldMetadata(alias="tokenURL") - ] = pydantic.Field(alias="tokenURL", default=None) + typing.Optional[ConnectionTokenEndpointOAuth2], + FieldMetadata(alias="tokenURL"), + pydantic.Field(alias="tokenURL"), + ] = None upstream_params: typing.Optional[ConnectionUpstreamParams] = None use_oauth_spec_scope: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="useOauthSpecScope") - ] = pydantic.Field(alias="useOauthSpecScope", default=None) - """ - When true, uses space-delimited scopes (per OAuth 2.0 spec) instead of comma-delimited when calling the identity provider's authorization endpoint. Only relevant when using the connection_scope parameter. See https://auth0.com/docs/authenticate/identity-providers/adding-scopes-for-an-external-idp#pass-scopes-to-authorize-endpoint - """ + typing.Optional[bool], + FieldMetadata(alias="useOauthSpecScope"), + pydantic.Field( + alias="useOauthSpecScope", + description="When true, uses space-delimited scopes (per OAuth 2.0 spec) instead of comma-delimited when calling the identity provider's authorization endpoint. Only relevant when using the connection_scope parameter. See https://auth0.com/docs/authenticate/identity-providers/adding-scopes-for-an-external-idp#pass-scopes-to-authorize-endpoint", + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/connection_options_paypal.py b/src/auth0/management/types/connection_options_paypal.py index 161bae1e..e33240b1 100644 --- a/src/auth0/management/types/connection_options_paypal.py +++ b/src/auth0/management/types/connection_options_paypal.py @@ -4,14 +4,44 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_paypal import ConnectionClientIdPaypal +from .connection_client_secret_paypal import ConnectionClientSecretPaypal +from .connection_freeform_scopes_paypal import ConnectionFreeformScopesPaypal +from .connection_options_common import ConnectionOptionsCommon +from .connection_scope_paypal import ConnectionScopePaypal +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum -class ConnectionOptionsPaypal(ConnectionOptionsOAuth2Common): +class ConnectionOptionsPaypal(ConnectionOptionsCommon): """ Options for the 'paypal' and 'paypal-sandbox' connections """ + client_id: typing.Optional[ConnectionClientIdPaypal] = None + client_secret: typing.Optional[ConnectionClientSecretPaypal] = None + freeform_scopes: typing.Optional[ConnectionFreeformScopesPaypal] = None + scope: typing.Optional[ConnectionScopePaypal] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + address: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the 'address' scope from PayPal to access the user's address information. + """ + + email: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the 'email' scope from PayPal to access the user's email address. + """ + + phone: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the 'phone' scope from PayPal to access the user's phone number. + """ + + profile: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests the 'profile' scope from PayPal to access basic profile information including first name, last name, date of birth, time zone, locale, and language. This scope is always enabled by the system. + """ + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_ping_federate.py b/src/auth0/management/types/connection_options_ping_federate.py index 5eee471c..fd584cc2 100644 --- a/src/auth0/management/types/connection_options_ping_federate.py +++ b/src/auth0/management/types/connection_options_ping_federate.py @@ -18,11 +18,15 @@ class ConnectionOptionsPingFederate(ConnectionOptionsCommonSaml, ConnectionOptio """ ping_federate_base_url: typing_extensions.Annotated[ - ConnectionPingFederateBaseUrl, FieldMetadata(alias="pingFederateBaseUrl") - ] = pydantic.Field(alias="pingFederateBaseUrl") + ConnectionPingFederateBaseUrl, + FieldMetadata(alias="pingFederateBaseUrl"), + pydantic.Field(alias="pingFederateBaseUrl"), + ] signing_cert: typing_extensions.Annotated[ - typing.Optional[ConnectionSigningCertificatePemPingFederate], FieldMetadata(alias="signingCert") - ] = pydantic.Field(alias="signingCert", default=None) + typing.Optional[ConnectionSigningCertificatePemPingFederate], + FieldMetadata(alias="signingCert"), + pydantic.Field(alias="signingCert"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/connection_options_salesforce.py b/src/auth0/management/types/connection_options_salesforce.py index 6f2965da..6136a2f7 100644 --- a/src/auth0/management/types/connection_options_salesforce.py +++ b/src/auth0/management/types/connection_options_salesforce.py @@ -4,24 +4,32 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_salesforce import ConnectionClientIdSalesforce +from .connection_client_secret_salesforce import ConnectionClientSecretSalesforce +from .connection_freeform_scopes_salesforce import ConnectionFreeformScopesSalesforce +from .connection_options_common import ConnectionOptionsCommon +from .connection_scope_salesforce import ConnectionScopeSalesforce +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum +from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsSalesforce(ConnectionOptionsOAuth2Common): +class ConnectionOptionsSalesforce(ConnectionOptionsCommon): """ Options for the salesforce family of connections (salesforce, salesforce-sandbox, salesforce-community) """ - community_base_url: typing.Optional[str] = pydantic.Field(default=None) - """ - The base URL of the Salesforce Community. Required for salesforce-community connections to specify which community site to authenticate against. - """ - + client_id: typing.Optional[ConnectionClientIdSalesforce] = None + client_secret: typing.Optional[ConnectionClientSecretSalesforce] = None + freeform_scopes: typing.Optional[ConnectionFreeformScopesSalesforce] = None profile: typing.Optional[bool] = pydantic.Field(default=None) """ - When enabled, requests the profile scope from Salesforce to access user profile information. + When enabled, requests the Salesforce profile scope to retrieve basic user information including user_id, organization_id, username, display_name, email, status, photos, and URLs. """ + scope: typing.Optional[ConnectionScopeSalesforce] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None + upstream_params: typing.Optional[ConnectionUpstreamParams] = None + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/connection_options_salesforce_community.py b/src/auth0/management/types/connection_options_salesforce_community.py new file mode 100644 index 00000000..29f025d5 --- /dev/null +++ b/src/auth0/management/types/connection_options_salesforce_community.py @@ -0,0 +1,25 @@ +# This file was auto-generated by Fern from our API Definition. + +import typing + +import pydantic +from ..core.pydantic_utilities import IS_PYDANTIC_V2 +from .connection_community_base_url_salesforce import ConnectionCommunityBaseUrlSalesforce +from .connection_options_salesforce import ConnectionOptionsSalesforce + + +class ConnectionOptionsSalesforceCommunity(ConnectionOptionsSalesforce): + """ + Options for the 'salesforce-community' connection + """ + + community_base_url: typing.Optional[ConnectionCommunityBaseUrlSalesforce] = None + + if IS_PYDANTIC_V2: + model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 + else: + + class Config: + frozen = True + smart_union = True + extra = pydantic.Extra.allow diff --git a/src/auth0/management/types/connection_options_saml.py b/src/auth0/management/types/connection_options_saml.py index 70db90bf..65215c58 100644 --- a/src/auth0/management/types/connection_options_saml.py +++ b/src/auth0/management/types/connection_options_saml.py @@ -32,39 +32,54 @@ class ConnectionOptionsSaml(ConnectionOptionsCommonSaml, ConnectionOptionsCommon debug: typing.Optional[ConnectionDebugSaml] = None deflate: typing.Optional[ConnectionOptionsDeflateSaml] = None destination_url: typing_extensions.Annotated[ - typing.Optional[ConnectionDestinationUrlSaml], FieldMetadata(alias="destinationUrl") - ] = pydantic.Field(alias="destinationUrl", default=None) - disable_signout: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="disableSignout")] = ( - pydantic.Field(alias="disableSignout", default=None) - ) - """ - When true, disables sending SAML logout requests (SingleLogoutService) to the identity provider during user sign-out. The user will be logged out of Auth0 but will remain logged into the identity provider. Defaults to false (federated logout enabled). - """ - + typing.Optional[ConnectionDestinationUrlSaml], + FieldMetadata(alias="destinationUrl"), + pydantic.Field(alias="destinationUrl"), + ] = None + disable_signout: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="disableSignout"), + pydantic.Field( + alias="disableSignout", + description="When true, disables sending SAML logout requests (SingleLogoutService) to the identity provider during user sign-out. The user will be logged out of Auth0 but will remain logged into the identity provider. Defaults to false (federated logout enabled).", + ), + ] = None fields_map: typing_extensions.Annotated[ - typing.Optional[ConnectionFieldsMapSaml], FieldMetadata(alias="fieldsMap") - ] = pydantic.Field(alias="fieldsMap", default=None) + typing.Optional[ConnectionFieldsMapSaml], FieldMetadata(alias="fieldsMap"), pydantic.Field(alias="fieldsMap") + ] = None global_token_revocation_jwt_iss: typing.Optional[ConnectionGlobalTokenRevocationJwtIssSaml] = None global_token_revocation_jwt_sub: typing.Optional[ConnectionGlobalTokenRevocationJwtSubSaml] = None metadata_url: typing_extensions.Annotated[ - typing.Optional[ConnectionMetadataUrlSaml], FieldMetadata(alias="metadataUrl") - ] = pydantic.Field(alias="metadataUrl", default=None) + typing.Optional[ConnectionMetadataUrlSaml], + FieldMetadata(alias="metadataUrl"), + pydantic.Field(alias="metadataUrl"), + ] = None metadata_xml: typing_extensions.Annotated[ - typing.Optional[ConnectionMetadataXmlSaml], FieldMetadata(alias="metadataXml") - ] = pydantic.Field(alias="metadataXml", default=None) + typing.Optional[ConnectionMetadataXmlSaml], + FieldMetadata(alias="metadataXml"), + pydantic.Field(alias="metadataXml"), + ] = None recipient_url: typing_extensions.Annotated[ - typing.Optional[ConnectionRecipientUrlSaml], FieldMetadata(alias="recipientUrl") - ] = pydantic.Field(alias="recipientUrl", default=None) + typing.Optional[ConnectionRecipientUrlSaml], + FieldMetadata(alias="recipientUrl"), + pydantic.Field(alias="recipientUrl"), + ] = None request_template: typing_extensions.Annotated[ - typing.Optional[ConnectionRequestTemplateSaml], FieldMetadata(alias="requestTemplate") - ] = pydantic.Field(alias="requestTemplate", default=None) + typing.Optional[ConnectionRequestTemplateSaml], + FieldMetadata(alias="requestTemplate"), + pydantic.Field(alias="requestTemplate"), + ] = None signing_cert: typing_extensions.Annotated[ - typing.Optional[ConnectionSigningCertSaml], FieldMetadata(alias="signingCert") - ] = pydantic.Field(alias="signingCert", default=None) + typing.Optional[ConnectionSigningCertSaml], + FieldMetadata(alias="signingCert"), + pydantic.Field(alias="signingCert"), + ] = None signing_key: typing.Optional[ConnectionSigningKeySaml] = None sign_out_endpoint: typing_extensions.Annotated[ - typing.Optional[ConnectionSignOutEndpointSaml], FieldMetadata(alias="signOutEndpoint") - ] = pydantic.Field(alias="signOutEndpoint", default=None) + typing.Optional[ConnectionSignOutEndpointSaml], + FieldMetadata(alias="signOutEndpoint"), + pydantic.Field(alias="signOutEndpoint"), + ] = None user_id_attribute: typing.Optional[ConnectionUserIdAttributeSaml] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/connection_options_sms.py b/src/auth0/management/types/connection_options_sms.py index e0b480a7..751fab31 100644 --- a/src/auth0/management/types/connection_options_sms.py +++ b/src/auth0/management/types/connection_options_sms.py @@ -33,9 +33,9 @@ class ConnectionOptionsSms(ConnectionOptionsCommon): disable_signup: typing.Optional[ConnectionDisableSignupSms] = None forward_req_info: typing.Optional[ConnectionForwardReqInfoSms] = None - from_: typing_extensions.Annotated[typing.Optional[ConnectionFromSms], FieldMetadata(alias="from")] = ( - pydantic.Field(alias="from", default=None) - ) + from_: typing_extensions.Annotated[ + typing.Optional[ConnectionFromSms], FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] = None gateway_authentication: typing.Optional[ConnectionGatewayAuthenticationSms] = None gateway_url: typing.Optional[ConnectionGatewayUrlSms] = None messaging_service_sid: typing.Optional[ConnectionMessagingServiceSidSms] = None diff --git a/src/auth0/management/types/connection_options_twitter.py b/src/auth0/management/types/connection_options_twitter.py index 530baa7b..608364c6 100644 --- a/src/auth0/management/types/connection_options_twitter.py +++ b/src/auth0/management/types/connection_options_twitter.py @@ -3,9 +3,10 @@ import typing import pydantic -from ..core.pydantic_utilities import IS_PYDANTIC_V2, UniversalBaseModel +from ..core.pydantic_utilities import IS_PYDANTIC_V2 from .connection_options_client_id_twitter import ConnectionOptionsClientIdTwitter from .connection_options_client_secret_twitter import ConnectionOptionsClientSecretTwitter +from .connection_options_common import ConnectionOptionsCommon from .connection_options_protocol_enum_twitter import ConnectionOptionsProtocolEnumTwitter from .connection_options_scope_twitter import ConnectionOptionsScopeTwitter from .connection_scope_array import ConnectionScopeArray @@ -13,7 +14,7 @@ from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsTwitter(UniversalBaseModel): +class ConnectionOptionsTwitter(ConnectionOptionsCommon): """ Options for the 'twitter' connection """ diff --git a/src/auth0/management/types/connection_options_windows_live.py b/src/auth0/management/types/connection_options_windows_live.py index 7cbc1b56..99289768 100644 --- a/src/auth0/management/types/connection_options_windows_live.py +++ b/src/auth0/management/types/connection_options_windows_live.py @@ -4,16 +4,108 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_o_auth_2_common import ConnectionOptionsOAuth2Common +from .connection_client_id_windows_live import ConnectionClientIdWindowsLive +from .connection_client_secret_windows_live import ConnectionClientSecretWindowsLive +from .connection_freeform_scopes_windows_live import ConnectionFreeformScopesWindowsLive +from .connection_options_common import ConnectionOptionsCommon +from .connection_scope_array_windows_live import ConnectionScopeArrayWindowsLive +from .connection_set_user_root_attributes_enum import ConnectionSetUserRootAttributesEnum from .connection_strategy_version_enum_windows_live import ConnectionStrategyVersionEnumWindowsLive +from .connection_upstream_params import ConnectionUpstreamParams -class ConnectionOptionsWindowsLive(ConnectionOptionsOAuth2Common): +class ConnectionOptionsWindowsLive(ConnectionOptionsCommon): """ Options for the 'windowslive' connection """ + client_id: typing.Optional[ConnectionClientIdWindowsLive] = None + client_secret: typing.Optional[ConnectionClientSecretWindowsLive] = None + freeform_scopes: typing.Optional[ConnectionFreeformScopesWindowsLive] = None + scope: typing.Optional[ConnectionScopeArrayWindowsLive] = None + set_user_root_attributes: typing.Optional[ConnectionSetUserRootAttributesEnum] = None strategy_version: typing.Optional[ConnectionStrategyVersionEnumWindowsLive] = None + upstream_params: typing.Optional[ConnectionUpstreamParams] = None + applications: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests access to user's applications. + """ + + applications_create: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests permission to create applications. + """ + + basic: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's basic profile information and contacts list. + """ + + birthday: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's birth day, month, and year. + """ + + calendars: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's calendars and events. + """ + + calendars_update: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read and write access to user's calendars and events. + """ + + contacts_birthday: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to contacts' birth day and birth month. + """ + + contacts_calendars: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's calendars and shared calendars/events from others. + """ + + contacts_create: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests permission to create new contacts in user's address book. + """ + + contacts_photos: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's and shared albums, photos, videos, and audio. + """ + + contacts_skydrive: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to OneDrive files shared by other users. + """ + + directory_accessasuser_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to have the same access to information in the directory as the signed-in user. + """ + + directory_read_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read data in your organization's directory, such as users, groups, and apps. + """ + + directory_readwrite_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read and write data in your organization's directory, such as users and groups. + """ + + emails: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to personal, preferred, and business email addresses. + """ + + events_create: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests permission to create events on user's default calendar. + """ + graph_calendars: typing.Optional[bool] = pydantic.Field(default=None) """ When enabled, requests permission to read the user's calendars. @@ -114,14 +206,114 @@ class ConnectionOptionsWindowsLive(ConnectionOptionsOAuth2Common): When enabled, requests permission to read and write the user's profile. """ + group_read_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read all group properties and memberships. + """ + + group_readwrite_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to create groups, read all group properties and memberships, update group properties and memberships, and delete groups. + """ + + mail_readwrite_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to create, read, update, and delete all mail in all mailboxes. + """ + + mail_send: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to send mail as users in the organization. + """ + + messenger: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests access to user's Windows Live Messenger data. + """ + offline_access: typing.Optional[bool] = pydantic.Field(default=None) """ When enabled, requests a refresh token for offline access. """ + phone_numbers: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to personal, business, and mobile phone numbers. + """ + + photos: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's photos, videos, audio, and albums. + """ + + postal_addresses: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to personal and business postal addresses. + """ + + rolemanagement_read_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read the role-based access control (RBAC) settings for your company's directory. + """ + + rolemanagement_readwrite_directory: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read and write the role-based access control (RBAC) settings for your company's directory. + """ + + share: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests permission to share content with other users. + """ + signin: typing.Optional[bool] = pydantic.Field(default=None) """ - When enabled, requests the signin scope. + When enabled, provides single sign-in behavior for users already signed into their Microsoft account. + """ + + sites_read_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read documents and list items in all SharePoint site collections. + """ + + sites_readwrite_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to create, read, update, and delete documents and list items in all SharePoint site collections. + """ + + skydrive: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to user's files stored on OneDrive. + """ + + skydrive_update: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read and write access to user's OneDrive files. + """ + + team_readbasic_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read the names and descriptions of all teams. + """ + + team_readwrite_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read and write all teams' information and change team membership. + """ + + user_read_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read the full set of profile properties, reports, and managers of all users. + """ + + user_readbasic_all: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, allows the app to read a basic set of profile properties of all users in the directory. + """ + + work_profile: typing.Optional[bool] = pydantic.Field(default=None) + """ + When enabled, requests read access to employer and work position information. """ if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/connection_profile_bitbucket.py b/src/auth0/management/types/connection_profile_bitbucket.py new file mode 100644 index 00000000..da3f5dbd --- /dev/null +++ b/src/auth0/management/types/connection_profile_bitbucket.py @@ -0,0 +1,3 @@ +# This file was auto-generated by Fern from our API Definition. + +ConnectionProfileBitbucket = bool diff --git a/src/auth0/management/types/connection_profile_strategy_overrides.py b/src/auth0/management/types/connection_profile_strategy_overrides.py index bfdfe3e8..0868977a 100644 --- a/src/auth0/management/types/connection_profile_strategy_overrides.py +++ b/src/auth0/management/types/connection_profile_strategy_overrides.py @@ -19,8 +19,10 @@ class ConnectionProfileStrategyOverrides(UniversalBaseModel): adfs: typing.Optional[ConnectionProfileStrategyOverride] = None waad: typing.Optional[ConnectionProfileStrategyOverride] = None google_apps: typing_extensions.Annotated[ - typing.Optional[ConnectionProfileStrategyOverride], FieldMetadata(alias="google-apps") - ] = pydantic.Field(alias="google-apps", default=None) + typing.Optional[ConnectionProfileStrategyOverride], + FieldMetadata(alias="google-apps"), + pydantic.Field(alias="google-apps"), + ] = None okta: typing.Optional[ConnectionProfileStrategyOverride] = None oidc: typing.Optional[ConnectionProfileStrategyOverride] = None samlp: typing.Optional[ConnectionProfileStrategyOverride] = None diff --git a/src/auth0/management/types/connection_properties_options.py b/src/auth0/management/types/connection_properties_options.py index 0a0a74bf..b994bc3b 100644 --- a/src/auth0/management/types/connection_properties_options.py +++ b/src/auth0/management/types/connection_properties_options.py @@ -46,25 +46,27 @@ class ConnectionPropertiesOptions(UniversalBaseModel): """ enabled_database_customization: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="enabledDatabaseCustomization") - ] = pydantic.Field(alias="enabledDatabaseCustomization", default=None) - """ - Set to true to use a legacy user store - """ - + typing.Optional[bool], + FieldMetadata(alias="enabledDatabaseCustomization"), + pydantic.Field(alias="enabledDatabaseCustomization", description="Set to true to use a legacy user store"), + ] = None import_mode: typing.Optional[bool] = pydantic.Field(default=None) """ Enable this if you have a legacy user store and you want to gradually migrate those users to the Auth0 user store """ custom_scripts: typing_extensions.Annotated[ - typing.Optional[ConnectionCustomScripts], FieldMetadata(alias="customScripts") - ] = pydantic.Field(alias="customScripts", default=None) + typing.Optional[ConnectionCustomScripts], + FieldMetadata(alias="customScripts"), + pydantic.Field(alias="customScripts"), + ] = None authentication_methods: typing.Optional[ConnectionAuthenticationMethods] = None passkey_options: typing.Optional[ConnectionPasskeyOptions] = None password_policy: typing_extensions.Annotated[ - typing.Optional[ConnectionPasswordPolicyEnum], FieldMetadata(alias="passwordPolicy") - ] = pydantic.Field(alias="passwordPolicy", default=None) + typing.Optional[ConnectionPasswordPolicyEnum], + FieldMetadata(alias="passwordPolicy"), + pydantic.Field(alias="passwordPolicy"), + ] = None password_complexity_options: typing.Optional[ConnectionPasswordComplexityOptions] = None password_history: typing.Optional[ConnectionPasswordHistoryOptions] = None password_no_personal_info: typing.Optional[ConnectionPasswordNoPersonalInfoOptions] = None diff --git a/src/auth0/management/types/connection_response_content_salesforce_community.py b/src/auth0/management/types/connection_response_content_salesforce_community.py index f211fe27..2d922c82 100644 --- a/src/auth0/management/types/connection_response_content_salesforce_community.py +++ b/src/auth0/management/types/connection_response_content_salesforce_community.py @@ -4,7 +4,7 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_salesforce import ConnectionOptionsSalesforce +from .connection_options_salesforce_community import ConnectionOptionsSalesforceCommunity from .connection_purposes import ConnectionPurposes from .connection_response_common import ConnectionResponseCommon from .connection_response_content_salesforce_community_strategy import ( @@ -18,7 +18,7 @@ class ConnectionResponseContentSalesforceCommunity(ConnectionPurposes, Connectio """ strategy: ConnectionResponseContentSalesforceCommunityStrategy - options: typing.Optional[ConnectionOptionsSalesforce] = None + options: typing.Optional[ConnectionOptionsSalesforceCommunity] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/connection_scope_amazon.py b/src/auth0/management/types/connection_scope_amazon.py new file mode 100644 index 00000000..db2909ee --- /dev/null +++ b/src/auth0/management/types/connection_scope_amazon.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionScopeAmazon = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_scope_array_windows_live.py b/src/auth0/management/types/connection_scope_array_windows_live.py new file mode 100644 index 00000000..26ab4d0c --- /dev/null +++ b/src/auth0/management/types/connection_scope_array_windows_live.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionScopeArrayWindowsLive = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_scope_paypal.py b/src/auth0/management/types/connection_scope_paypal.py new file mode 100644 index 00000000..2491b23e --- /dev/null +++ b/src/auth0/management/types/connection_scope_paypal.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionScopePaypal = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_scope_salesforce.py b/src/auth0/management/types/connection_scope_salesforce.py new file mode 100644 index 00000000..47357fc6 --- /dev/null +++ b/src/auth0/management/types/connection_scope_salesforce.py @@ -0,0 +1,5 @@ +# This file was auto-generated by Fern from our API Definition. + +from .connection_scope_array import ConnectionScopeArray + +ConnectionScopeSalesforce = ConnectionScopeArray diff --git a/src/auth0/management/types/connection_scripts_o_auth_2.py b/src/auth0/management/types/connection_scripts_o_auth_2.py index 64e2081b..1a555a3a 100644 --- a/src/auth0/management/types/connection_scripts_o_auth_2.py +++ b/src/auth0/management/types/connection_scripts_o_auth_2.py @@ -13,19 +13,22 @@ class ConnectionScriptsOAuth2(UniversalBaseModel): Custom scripts to transform user profile data or modify OAuth2 flow behavior """ - fetch_user_profile: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="fetchUserProfile")] = ( - pydantic.Field(alias="fetchUserProfile", default=None) - ) - """ - Custom JavaScript function to retrieve and transform user profile data from the identity provider. Called with the access token and token exchange response. Must return a user profile object. Executed in a sandboxed environment. If not provided, an empty profile object is used. - """ - - get_logout_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="getLogoutUrl")] = ( - pydantic.Field(alias="getLogoutUrl", default=None) - ) - """ - Custom JavaScript function to dynamically construct the logout URL for the identity provider. Called with the request query parameters and must invoke a callback with the logout URL. Only used if 'logoutUrl' is not configured. Executed in a sandboxed environment. - """ + fetch_user_profile: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="fetchUserProfile"), + pydantic.Field( + alias="fetchUserProfile", + description="Custom JavaScript function to retrieve and transform user profile data from the identity provider. Called with the access token and token exchange response. Must return a user profile object. Executed in a sandboxed environment. If not provided, an empty profile object is used.", + ), + ] = None + get_logout_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="getLogoutUrl"), + pydantic.Field( + alias="getLogoutUrl", + description="Custom JavaScript function to dynamically construct the logout URL for the identity provider. Called with the request query parameters and must invoke a callback with the logout URL. Only used if 'logoutUrl' is not configured. Executed in a sandboxed environment.", + ), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_action_response_content.py b/src/auth0/management/types/create_action_response_content.py index 1e3723b1..e66daffe 100644 --- a/src/auth0/management/types/create_action_response_content.py +++ b/src/auth0/management/types/create_action_response_content.py @@ -15,12 +15,12 @@ class CreateActionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the action. """ - name: typing.Optional[str] = pydantic.Field(default="my-action") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of an action. """ @@ -30,7 +30,7 @@ class CreateActionResponseContent(UniversalBaseModel): The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. """ - all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=False) + all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=None) """ True if all of an Action's contents have been deployed. """ @@ -45,7 +45,7 @@ class CreateActionResponseContent(UniversalBaseModel): The time when this action was updated. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of the action. """ @@ -55,7 +55,7 @@ class CreateActionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this action depends on. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22`, defaults to `node22` """ @@ -66,7 +66,7 @@ class CreateActionResponseContent(UniversalBaseModel): """ deployed_version: typing.Optional[ActionDeployedVersion] = None - installed_integration_id: typing.Optional[str] = pydantic.Field(default="7d2bc0c9-c0c2-433a-9f4e-86ef80270aad") + installed_integration_id: typing.Optional[str] = pydantic.Field(default=None) """ installed_integration_id is the fk reference to the InstalledIntegration entity. """ @@ -78,7 +78,7 @@ class CreateActionResponseContent(UniversalBaseModel): The time when this action was built successfully. """ - deploy: typing.Optional[bool] = pydantic.Field(default=False) + deploy: typing.Optional[bool] = pydantic.Field(default=None) """ True if the action should be deployed after creation. """ diff --git a/src/auth0/management/types/create_branding_theme_response_content.py b/src/auth0/management/types/create_branding_theme_response_content.py index 47aaae84..d92bbadc 100644 --- a/src/auth0/management/types/create_branding_theme_response_content.py +++ b/src/auth0/management/types/create_branding_theme_response_content.py @@ -16,20 +16,14 @@ class CreateBrandingThemeResponseContent(UniversalBaseModel): borders: BrandingThemeBorders colors: BrandingThemeColors - display_name: typing_extensions.Annotated[str, FieldMetadata(alias="displayName")] = pydantic.Field( - alias="displayName" - ) - """ - Display Name - """ - + display_name: typing_extensions.Annotated[ + str, FieldMetadata(alias="displayName"), pydantic.Field(alias="displayName", description="Display Name") + ] fonts: BrandingThemeFonts page_background: BrandingThemePageBackground - theme_id: typing_extensions.Annotated[str, FieldMetadata(alias="themeId")] = pydantic.Field(alias="themeId") - """ - Theme Id - """ - + theme_id: typing_extensions.Annotated[ + str, FieldMetadata(alias="themeId"), pydantic.Field(alias="themeId", description="Theme Id") + ] widget: BrandingThemeWidget if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/create_client_response_content.py b/src/auth0/management/types/create_client_response_content.py index 985f1dc5..c08e0de0 100644 --- a/src/auth0/management/types/create_client_response_content.py +++ b/src/auth0/management/types/create_client_response_content.py @@ -33,36 +33,35 @@ class CreateClientResponseContent(UniversalBaseModel): - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this client. """ - tenant: typing.Optional[str] = pydantic.Field(default="") + tenant: typing.Optional[str] = pydantic.Field(default=None) """ Name of the tenant this client belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="My application") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this client (min length: 1 character, does not allow `<` or `>`). """ - description: typing.Optional[str] = pydantic.Field(default="") + description: typing.Optional[str] = pydantic.Field(default=None) """ Free text description of this client (max length: 140 characters). """ - global_: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="global")] = pydantic.Field( - alias="global", default=False - ) - """ - Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false). - """ - - client_secret: typing.Optional[str] = pydantic.Field( - default="MG_TNT2ver-SylNat-_VeMmd-4m0Waba0jr1troztBniSChEw0glxEmgEi2Kw40H" - ) + global_: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="global"), + pydantic.Field( + alias="global", + description="Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false).", + ), + ] = None + client_secret: typing.Optional[str] = pydantic.Field(default=None) """ Client secret (which you must not make public). """ @@ -73,12 +72,12 @@ class CreateClientResponseContent(UniversalBaseModel): URL of the logo to display for this client. Recommended size is 150x150 pixels. """ - is_first_party: typing.Optional[bool] = pydantic.Field(default=False) + is_first_party: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client a first party client (true) or not (false). """ - oidc_conformant: typing.Optional[bool] = pydantic.Field(default=False) + oidc_conformant: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false). """ @@ -123,12 +122,12 @@ class CreateClientResponseContent(UniversalBaseModel): jwt_configuration: typing.Optional[ClientJwtConfiguration] = None signing_keys: typing.Optional[ClientSigningKeys] = None encryption_key: typing.Optional[ClientEncryptionKey] = None - sso: typing.Optional[bool] = pydantic.Field(default=False) + sso: typing.Optional[bool] = pydantic.Field(default=None) """ Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). """ - sso_disabled: typing.Optional[bool] = pydantic.Field(default=False) + sso_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether Single Sign On is disabled (true) or enabled (true). Defaults to true. """ @@ -143,29 +142,29 @@ class CreateClientResponseContent(UniversalBaseModel): URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page. """ - custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=True) + custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=None) """ Whether a custom login page is to be used (true) or the default provided login page (false). """ - custom_login_page: typing.Optional[str] = pydantic.Field(default="") + custom_login_page: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. """ - custom_login_page_preview: typing.Optional[str] = pydantic.Field(default="") + custom_login_page_preview: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. (Used on Previews) """ - form_template: typing.Optional[str] = pydantic.Field(default="") + form_template: typing.Optional[str] = pydantic.Field(default=None) """ HTML form template to be used for WS-Federation. """ addons: typing.Optional[ClientAddons] = None token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = None - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=False) + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=None) """ If true, trust that the IP specified in the `auth0-forwarded-for` header is the end-user's IP for brute-force-protection on token endpoint. """ @@ -189,12 +188,12 @@ class CreateClientResponseContent(UniversalBaseModel): """ client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = None - require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=False) + require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Pushed Authorization Requests mandatory for this client """ - require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=False) + require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Proof-of-Possession mandatory for this client """ diff --git a/src/auth0/management/types/create_connection_request_content_salesforce_community.py b/src/auth0/management/types/create_connection_request_content_salesforce_community.py index 2c6ea5f9..7e6f2f37 100644 --- a/src/auth0/management/types/create_connection_request_content_salesforce_community.py +++ b/src/auth0/management/types/create_connection_request_content_salesforce_community.py @@ -4,7 +4,7 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 -from .connection_options_salesforce import ConnectionOptionsSalesforce +from .connection_options_salesforce_community import ConnectionOptionsSalesforceCommunity from .create_connection_common import CreateConnectionCommon from .create_connection_request_content_salesforce_community_strategy import ( CreateConnectionRequestContentSalesforceCommunityStrategy, @@ -17,7 +17,7 @@ class CreateConnectionRequestContentSalesforceCommunity(CreateConnectionCommon): """ strategy: CreateConnectionRequestContentSalesforceCommunityStrategy - options: typing.Optional[ConnectionOptionsSalesforce] = None + options: typing.Optional[ConnectionOptionsSalesforceCommunity] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_connection_response_content.py b/src/auth0/management/types/create_connection_response_content.py index db2b1383..9c7b18e6 100644 --- a/src/auth0/management/types/create_connection_response_content.py +++ b/src/auth0/management/types/create_connection_response_content.py @@ -11,7 +11,7 @@ class CreateConnectionResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="My connection") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the connection """ @@ -22,12 +22,12 @@ class CreateConnectionResponseContent(UniversalBaseModel): """ options: typing.Optional[ConnectionOptions] = None - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The connection's identifier """ - strategy: typing.Optional[str] = pydantic.Field(default="auth0") + strategy: typing.Optional[str] = pydantic.Field(default=None) """ The type of the connection, related to the identity provider """ diff --git a/src/auth0/management/types/create_custom_domain_response_content.py b/src/auth0/management/types/create_custom_domain_response_content.py index 6905751a..d5debfd6 100644 --- a/src/auth0/management/types/create_custom_domain_response_content.py +++ b/src/auth0/management/types/create_custom_domain_response_content.py @@ -12,22 +12,22 @@ class CreateCustomDomainResponseContent(UniversalBaseModel): - custom_domain_id: str = pydantic.Field(default="cd_0000000000000001") + custom_domain_id: str = pydantic.Field() """ ID of the custom domain. """ - domain: str = pydantic.Field(default="login.mycompany.com") + domain: str = pydantic.Field() """ Domain name. """ - primary: bool = pydantic.Field(default=False) + primary: bool = pydantic.Field() """ Whether this is a primary domain (true) or not (false). """ - is_default: typing.Optional[bool] = pydantic.Field(default=False) + is_default: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this is the default custom domain (true) or not (false). """ @@ -40,7 +40,7 @@ class CreateCustomDomainResponseContent(UniversalBaseModel): The HTTP header to fetch the client's IP address """ - tls_policy: typing.Optional[str] = pydantic.Field(default="recommended") + tls_policy: typing.Optional[str] = pydantic.Field(default=None) """ The TLS version policy """ diff --git a/src/auth0/management/types/create_email_provider_response_content.py b/src/auth0/management/types/create_email_provider_response_content.py index 8d131fd7..090ffa01 100644 --- a/src/auth0/management/types/create_email_provider_response_content.py +++ b/src/auth0/management/types/create_email_provider_response_content.py @@ -9,12 +9,12 @@ class CreateEmailProviderResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="sendgrid") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of the email provider. Can be `mailgun`, `mandrill`, `sendgrid`, `ses`, `sparkpost`, `smtp`, `azure_cs`, `ms365`, or `custom`. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the provider is enabled (true) or disabled (false). """ diff --git a/src/auth0/management/types/create_email_template_response_content.py b/src/auth0/management/types/create_email_template_response_content.py index a06f07c3..7758c090 100644 --- a/src/auth0/management/types/create_email_template_response_content.py +++ b/src/auth0/management/types/create_email_template_response_content.py @@ -16,44 +16,42 @@ class CreateEmailTemplateResponseContent(UniversalBaseModel): Body of the email template. """ - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="sender@auth0.com" - ) - """ - Senders `from` email address. - """ - - result_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="resultUrl")] = pydantic.Field( - alias="resultUrl", default=None - ) - """ - URL to redirect the user to after a successful action. - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field(alias="from", description="Senders `from` email address."), + ] = None + result_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="resultUrl"), + pydantic.Field(alias="resultUrl", description="URL to redirect the user to after a successful action."), + ] = None subject: typing.Optional[str] = pydantic.Field(default=None) """ Subject line of the email. """ - syntax: typing.Optional[str] = pydantic.Field(default="liquid") + syntax: typing.Optional[str] = pydantic.Field(default=None) """ Syntax of the template body. """ url_lifetime_in_seconds: typing_extensions.Annotated[ - typing.Optional[float], FieldMetadata(alias="urlLifetimeInSeconds") - ] = pydantic.Field(alias="urlLifetimeInSeconds", default=None) - """ - Lifetime in seconds that the link within the email will be valid for. - """ - + typing.Optional[float], + FieldMetadata(alias="urlLifetimeInSeconds"), + pydantic.Field( + alias="urlLifetimeInSeconds", + description="Lifetime in seconds that the link within the email will be valid for.", + ), + ] = None include_email_in_redirect: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="includeEmailInRedirect") - ] = pydantic.Field(alias="includeEmailInRedirect", default=None) - """ - Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true. - """ - + typing.Optional[bool], + FieldMetadata(alias="includeEmailInRedirect"), + pydantic.Field( + alias="includeEmailInRedirect", + description="Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true.", + ), + ] = None enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the template is enabled (true) or disabled (false). diff --git a/src/auth0/management/types/create_encryption_key_response_content.py b/src/auth0/management/types/create_encryption_key_response_content.py index 7ee89179..53a00130 100644 --- a/src/auth0/management/types/create_encryption_key_response_content.py +++ b/src/auth0/management/types/create_encryption_key_response_content.py @@ -31,7 +31,7 @@ class CreateEncryptionKeyResponseContent(UniversalBaseModel): Key update timestamp """ - parent_kid: str = pydantic.Field() + parent_kid: typing.Optional[str] = pydantic.Field(default=None) """ ID of parent wrapping key """ diff --git a/src/auth0/management/types/create_export_users_response_content.py b/src/auth0/management/types/create_export_users_response_content.py index 08abb7cc..a8699c29 100644 --- a/src/auth0/management/types/create_export_users_response_content.py +++ b/src/auth0/management/types/create_export_users_response_content.py @@ -9,12 +9,12 @@ class CreateExportUsersResponseContent(UniversalBaseModel): - status: str = pydantic.Field(default="pending") + status: str = pydantic.Field() """ Status of this job. """ - type: str = pydantic.Field(default="users_export") + type: str = pydantic.Field() """ Type of job this is. """ @@ -24,18 +24,18 @@ class CreateExportUsersResponseContent(UniversalBaseModel): When this job was created. """ - id: str = pydantic.Field(default="job_0000000000000001") + id: str = pydantic.Field() """ ID of this job. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ connection_id of the connection from which users will be exported. """ format: typing.Optional[JobFileFormatEnum] = None - limit: typing.Optional[int] = pydantic.Field(default=5) + limit: typing.Optional[int] = pydantic.Field(default=None) """ Limit the number of records. """ diff --git a/src/auth0/management/types/create_guardian_enrollment_ticket_response_content.py b/src/auth0/management/types/create_guardian_enrollment_ticket_response_content.py index a10df488..60f1296c 100644 --- a/src/auth0/management/types/create_guardian_enrollment_ticket_response_content.py +++ b/src/auth0/management/types/create_guardian_enrollment_ticket_response_content.py @@ -7,7 +7,7 @@ class CreateGuardianEnrollmentTicketResponseContent(UniversalBaseModel): - ticket_id: typing.Optional[str] = pydantic.Field(default="u2x2-u2x2-u2x2-u2x2-u2x2-u2x2") + ticket_id: typing.Optional[str] = pydantic.Field(default=None) """ The ticket_id used to identify the enrollment """ diff --git a/src/auth0/management/types/create_hook_response_content.py b/src/auth0/management/types/create_hook_response_content.py index b1e835ba..a011a94e 100644 --- a/src/auth0/management/types/create_hook_response_content.py +++ b/src/auth0/management/types/create_hook_response_content.py @@ -10,31 +10,27 @@ class CreateHookResponseContent(UniversalBaseModel): - trigger_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="triggerId")] = pydantic.Field( - alias="triggerId", default=None - ) - """ - Trigger ID - """ - - id: typing.Optional[str] = pydantic.Field(default="00001") + trigger_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="triggerId"), + pydantic.Field(alias="triggerId", description="Trigger ID"), + ] = None + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this hook. """ - name: typing.Optional[str] = pydantic.Field(default="hook") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this hook. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this hook will be executed (true) or ignored (false). """ - script: typing.Optional[str] = pydantic.Field( - default="module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this hook runs. """ diff --git a/src/auth0/management/types/create_import_users_response_content.py b/src/auth0/management/types/create_import_users_response_content.py index a688e79a..cbf27622 100644 --- a/src/auth0/management/types/create_import_users_response_content.py +++ b/src/auth0/management/types/create_import_users_response_content.py @@ -7,12 +7,12 @@ class CreateImportUsersResponseContent(UniversalBaseModel): - status: str = pydantic.Field(default="pending") + status: str = pydantic.Field() """ Status of this job. """ - type: str = pydantic.Field(default="users_import") + type: str = pydantic.Field() """ Type of job this is. """ @@ -22,12 +22,12 @@ class CreateImportUsersResponseContent(UniversalBaseModel): When this job was created. """ - id: str = pydantic.Field(default="job_0000000000000001") + id: str = pydantic.Field() """ ID of this job. """ - connection_id: str = pydantic.Field(default="con_0000000000000001") + connection_id: str = pydantic.Field() """ connection_id of the connection to which users will be imported. """ diff --git a/src/auth0/management/types/create_log_stream_datadog_request_body.py b/src/auth0/management/types/create_log_stream_datadog_request_body.py index 80cf123a..2feb733f 100644 --- a/src/auth0/management/types/create_log_stream_datadog_request_body.py +++ b/src/auth0/management/types/create_log_stream_datadog_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamDatadogRequestBody(UniversalBaseModel): """ type: LogStreamDatadogEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamDatadogRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamDatadogSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_event_bridge_request_body.py b/src/auth0/management/types/create_log_stream_event_bridge_request_body.py index 9f8b0c27..7d15711c 100644 --- a/src/auth0/management/types/create_log_stream_event_bridge_request_body.py +++ b/src/auth0/management/types/create_log_stream_event_bridge_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamEventBridgeRequestBody(UniversalBaseModel): """ type: LogStreamEventBridgeEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamEventBridgeRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamEventBridgeSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_event_grid_request_body.py b/src/auth0/management/types/create_log_stream_event_grid_request_body.py index 6c5c0ad5..b7607dc4 100644 --- a/src/auth0/management/types/create_log_stream_event_grid_request_body.py +++ b/src/auth0/management/types/create_log_stream_event_grid_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamEventGridRequestBody(UniversalBaseModel): """ type: LogStreamEventGridEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamEventGridRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamEventGridSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_http_request_body.py b/src/auth0/management/types/create_log_stream_http_request_body.py index e49e50f2..b8ef0181 100644 --- a/src/auth0/management/types/create_log_stream_http_request_body.py +++ b/src/auth0/management/types/create_log_stream_http_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamHttpRequestBody(UniversalBaseModel): """ type: LogStreamHttpEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamHttpRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamHttpSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_mixpanel_request_body.py b/src/auth0/management/types/create_log_stream_mixpanel_request_body.py index c62c5b45..3ad4da91 100644 --- a/src/auth0/management/types/create_log_stream_mixpanel_request_body.py +++ b/src/auth0/management/types/create_log_stream_mixpanel_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamMixpanelRequestBody(UniversalBaseModel): """ type: LogStreamMixpanelEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamMixpanelRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamMixpanelSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_segment_request_body.py b/src/auth0/management/types/create_log_stream_segment_request_body.py index 36f99f07..87f5daca 100644 --- a/src/auth0/management/types/create_log_stream_segment_request_body.py +++ b/src/auth0/management/types/create_log_stream_segment_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamSegmentRequestBody(UniversalBaseModel): """ type: LogStreamSegmentEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamSegmentRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamSegmentSinkWriteKey - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_splunk_request_body.py b/src/auth0/management/types/create_log_stream_splunk_request_body.py index 414cc3c0..f4d63f72 100644 --- a/src/auth0/management/types/create_log_stream_splunk_request_body.py +++ b/src/auth0/management/types/create_log_stream_splunk_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamSplunkRequestBody(UniversalBaseModel): """ type: LogStreamSplunkEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamSplunkRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamSplunkSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_log_stream_sumo_request_body.py b/src/auth0/management/types/create_log_stream_sumo_request_body.py index bddd16c3..9fea23d0 100644 --- a/src/auth0/management/types/create_log_stream_sumo_request_body.py +++ b/src/auth0/management/types/create_log_stream_sumo_request_body.py @@ -19,13 +19,11 @@ class CreateLogStreamSumoRequestBody(UniversalBaseModel): """ type: LogStreamSumoEnum - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. @@ -33,12 +31,11 @@ class CreateLogStreamSumoRequestBody(UniversalBaseModel): pii_config: typing.Optional[LogStreamPiiConfig] = None sink: LogStreamSumoSink - start_from: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="startFrom")] = pydantic.Field( - alias="startFrom", default="2021-03-01T19:57:29.532Z" - ) - """ - The optional datetime (ISO 8601) to start streaming logs from - """ + start_from: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="startFrom"), + pydantic.Field(alias="startFrom", description="The optional datetime (ISO 8601) to start streaming logs from"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/create_organization_invitation_response_content.py b/src/auth0/management/types/create_organization_invitation_response_content.py index 7574ef68..640f6739 100644 --- a/src/auth0/management/types/create_organization_invitation_response_content.py +++ b/src/auth0/management/types/create_organization_invitation_response_content.py @@ -12,7 +12,7 @@ class CreateOrganizationInvitationResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="uinv_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the user invitation. """ @@ -24,9 +24,7 @@ class CreateOrganizationInvitationResponseContent(UniversalBaseModel): inviter: typing.Optional[OrganizationInvitationInviter] = None invitee: typing.Optional[OrganizationInvitationInvitee] = None - invitation_url: typing.Optional[str] = pydantic.Field( - default="https://mycompany.org/login?invitation=f81dWWYW6gzGGicxT8Ha0txBkGNcAcYr&organization=org_0000000000000001&organization_name=acme" - ) + invitation_url: typing.Optional[str] = pydantic.Field(default=None) """ The invitation url to be send to the invitee. """ @@ -41,12 +39,12 @@ class CreateOrganizationInvitationResponseContent(UniversalBaseModel): The ISO 8601 formatted timestamp representing the expiration time of the invitation. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ Auth0 client ID. Used to resolve the application's login initiation endpoint. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the connection to force invitee to authenticate with. """ diff --git a/src/auth0/management/types/create_organization_response_content.py b/src/auth0/management/types/create_organization_response_content.py index 281801e2..be7d7b90 100644 --- a/src/auth0/management/types/create_organization_response_content.py +++ b/src/auth0/management/types/create_organization_response_content.py @@ -16,12 +16,12 @@ class CreateOrganizationResponseContent(UniversalBaseModel): Organization identifier. """ - name: typing.Optional[str] = pydantic.Field(default="organization-1") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of this organization. """ - display_name: typing.Optional[str] = pydantic.Field(default="Acme Users") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this organization. """ diff --git a/src/auth0/management/types/create_phone_template_response_content.py b/src/auth0/management/types/create_phone_template_response_content.py index 2a07b97a..d7900dd8 100644 --- a/src/auth0/management/types/create_phone_template_response_content.py +++ b/src/auth0/management/types/create_phone_template_response_content.py @@ -15,7 +15,7 @@ class CreatePhoneTemplateResponseContent(UniversalBaseModel): tenant: typing.Optional[str] = None content: PhoneTemplateContent type: PhoneTemplateNotificationTypeEnum - disabled: bool = pydantic.Field(default=False) + disabled: bool = pydantic.Field() """ Whether the template is enabled (false) or disabled (true). """ diff --git a/src/auth0/management/types/create_public_key_device_credential_response_content.py b/src/auth0/management/types/create_public_key_device_credential_response_content.py index 01784496..1870d982 100644 --- a/src/auth0/management/types/create_public_key_device_credential_response_content.py +++ b/src/auth0/management/types/create_public_key_device_credential_response_content.py @@ -7,7 +7,7 @@ class CreatePublicKeyDeviceCredentialResponseContent(UniversalBaseModel): - id: str = pydantic.Field(default="dcr_0000000000000001") + id: str = pydantic.Field() """ The credential's identifier """ diff --git a/src/auth0/management/types/create_rule_response_content.py b/src/auth0/management/types/create_rule_response_content.py index 84ca700c..2c6a05ac 100644 --- a/src/auth0/management/types/create_rule_response_content.py +++ b/src/auth0/management/types/create_rule_response_content.py @@ -7,34 +7,32 @@ class CreateRuleResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="rule_1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this rule. """ - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this rule. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the rule is enabled (true), or disabled (false). """ - script: typing.Optional[str] = pydantic.Field( - default="function (user, context, callback) {\n callback(null, user, context);\n}" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this rule runs. """ - order: typing.Optional[float] = pydantic.Field(default=1.0) + order: typing.Optional[float] = pydantic.Field(default=None) """ Order that this rule should execute in relative to other rules. Lower-valued rules execute first. """ - stage: typing.Optional[str] = pydantic.Field(default="login_success") + stage: typing.Optional[str] = pydantic.Field(default=None) """ Execution stage of this rule. Can be `login_success`, `login_failure`, or `pre_authorize`. """ diff --git a/src/auth0/management/types/create_self_service_profile_response_content.py b/src/auth0/management/types/create_self_service_profile_response_content.py index 895c4689..07e06b0d 100644 --- a/src/auth0/management/types/create_self_service_profile_response_content.py +++ b/src/auth0/management/types/create_self_service_profile_response_content.py @@ -11,7 +11,7 @@ class CreateSelfServiceProfileResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="ssp_n7SNCL8seoyV1TuSTCnAeo") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the self-service Profile. """ @@ -46,7 +46,7 @@ class CreateSelfServiceProfileResponseContent(UniversalBaseModel): default=None ) """ - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] """ user_attribute_profile_id: typing.Optional[str] = pydantic.Field(default=None) diff --git a/src/auth0/management/types/create_token_exchange_profile_response_content.py b/src/auth0/management/types/create_token_exchange_profile_response_content.py index 04365ebb..3630e8a6 100644 --- a/src/auth0/management/types/create_token_exchange_profile_response_content.py +++ b/src/auth0/management/types/create_token_exchange_profile_response_content.py @@ -14,7 +14,7 @@ class CreateTokenExchangeProfileResponseContent(UniversalBaseModel): The unique ID of the token exchange profile. """ - name: typing.Optional[str] = pydantic.Field(default="Token Exchange Profile 1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this profile. """ diff --git a/src/auth0/management/types/create_user_response_content.py b/src/auth0/management/types/create_user_response_content.py index 3edae1a4..917803a6 100644 --- a/src/auth0/management/types/create_user_response_content.py +++ b/src/auth0/management/types/create_user_response_content.py @@ -11,32 +11,32 @@ class CreateUserResponseContent(UniversalBaseModel): - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ - email_verified: typing.Optional[bool] = pydantic.Field(default=False) + email_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this email address is verified (true) or unverified (false). """ - username: typing.Optional[str] = pydantic.Field(default="johndoe") + username: typing.Optional[str] = pydantic.Field(default=None) """ Username of this user. """ - phone_number: typing.Optional[str] = pydantic.Field(default="+199999999999999") + phone_number: typing.Optional[str] = pydantic.Field(default=None) """ Phone number for this user. Follows the E.164 recommendation. """ - phone_verified: typing.Optional[bool] = pydantic.Field(default=False) + phone_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this phone number has been verified (true) or not (false). """ diff --git a/src/auth0/management/types/create_verifiable_credential_template_response_content.py b/src/auth0/management/types/create_verifiable_credential_template_response_content.py index 3e5bc8a0..db071e60 100644 --- a/src/auth0/management/types/create_verifiable_credential_template_response_content.py +++ b/src/auth0/management/types/create_verifiable_credential_template_response_content.py @@ -9,7 +9,7 @@ class CreateVerifiableCredentialTemplateResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="vct_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the template. """ @@ -19,12 +19,12 @@ class CreateVerifiableCredentialTemplateResponseContent(UniversalBaseModel): The name of the template. """ - type: typing.Optional[str] = pydantic.Field(default="mdl") + type: typing.Optional[str] = pydantic.Field(default=None) """ The type of the template. """ - dialect: typing.Optional[str] = pydantic.Field(default="simplified/1.0") + dialect: typing.Optional[str] = pydantic.Field(default=None) """ The dialect of the template. """ diff --git a/src/auth0/management/types/create_verification_email_response_content.py b/src/auth0/management/types/create_verification_email_response_content.py index 415ca112..618eb395 100644 --- a/src/auth0/management/types/create_verification_email_response_content.py +++ b/src/auth0/management/types/create_verification_email_response_content.py @@ -7,12 +7,12 @@ class CreateVerificationEmailResponseContent(UniversalBaseModel): - status: str = pydantic.Field(default="completed") + status: str = pydantic.Field() """ Status of this job. """ - type: str = pydantic.Field(default="verification_email") + type: str = pydantic.Field() """ Type of job this is. """ @@ -22,7 +22,7 @@ class CreateVerificationEmailResponseContent(UniversalBaseModel): When this job was created. """ - id: str = pydantic.Field(default="job_0000000000000001") + id: str = pydantic.Field() """ ID of this job. """ diff --git a/src/auth0/management/types/custom_domain.py b/src/auth0/management/types/custom_domain.py index 08ab3ebd..1165830f 100644 --- a/src/auth0/management/types/custom_domain.py +++ b/src/auth0/management/types/custom_domain.py @@ -12,31 +12,29 @@ class CustomDomain(UniversalBaseModel): - custom_domain_id: str = pydantic.Field(default="cd_0000000000000001") + custom_domain_id: str = pydantic.Field() """ ID of the custom domain. """ - domain: str = pydantic.Field(default="login.mycompany.com") + domain: str = pydantic.Field() """ Domain name. """ - primary: bool = pydantic.Field(default=False) + primary: bool = pydantic.Field() """ Whether this is a primary domain (true) or not (false). """ - is_default: typing.Optional[bool] = pydantic.Field(default=False) + is_default: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this is the default custom domain (true) or not (false). """ status: CustomDomainStatusFilterEnum type: CustomDomainTypeEnum - origin_domain_name: typing.Optional[str] = pydantic.Field( - default="mycompany_cd_0000000000000001.edge.tenants.auth0.com" - ) + origin_domain_name: typing.Optional[str] = pydantic.Field(default=None) """ Intermediate address. """ @@ -47,7 +45,7 @@ class CustomDomain(UniversalBaseModel): The HTTP header to fetch the client's IP address """ - tls_policy: typing.Optional[str] = pydantic.Field(default="recommended") + tls_policy: typing.Optional[str] = pydantic.Field(default=None) """ The TLS version policy """ diff --git a/src/auth0/management/types/custom_signing_key_jwk.py b/src/auth0/management/types/custom_signing_key_jwk.py index eeb2ae37..f5b3fa2e 100644 --- a/src/auth0/management/types/custom_signing_key_jwk.py +++ b/src/auth0/management/types/custom_signing_key_jwk.py @@ -52,33 +52,24 @@ class CustomSigningKeyJwk(UniversalBaseModel): Y coordinate """ - x_5_u: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="x5u")] = pydantic.Field( - alias="x5u", default=None - ) - """ - X.509 URL - """ - - x_5_c: typing_extensions.Annotated[typing.Optional[typing.List[str]], FieldMetadata(alias="x5c")] = pydantic.Field( - alias="x5c", default=None - ) - """ - X.509 certificate chain - """ - - x_5_t: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="x5t")] = pydantic.Field( - alias="x5t", default=None - ) - """ - X.509 certificate SHA-1 thumbprint - """ - - x_5_t_s_256: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="x5t#S256")] = pydantic.Field( - alias="x5t#S256", default=None - ) - """ - X.509 certificate SHA-256 thumbprint - """ + x_5_u: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="x5u"), pydantic.Field(alias="x5u", description="X.509 URL") + ] = None + x_5_c: typing_extensions.Annotated[ + typing.Optional[typing.List[str]], + FieldMetadata(alias="x5c"), + pydantic.Field(alias="x5c", description="X.509 certificate chain"), + ] = None + x_5_t: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="x5t"), + pydantic.Field(alias="x5t", description="X.509 certificate SHA-1 thumbprint"), + ] = None + x_5_t_s_256: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="x5t#S256"), + pydantic.Field(alias="x5t#S256", description="X.509 certificate SHA-256 thumbprint"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/daily_stats.py b/src/auth0/management/types/daily_stats.py index 0d661a3b..89bd7cd9 100644 --- a/src/auth0/management/types/daily_stats.py +++ b/src/auth0/management/types/daily_stats.py @@ -7,32 +7,32 @@ class DailyStats(UniversalBaseModel): - date: typing.Optional[str] = pydantic.Field(default="2014-01-01T00:00:00.000Z") + date: typing.Optional[str] = pydantic.Field(default=None) """ Date these events occurred in ISO 8601 format. """ - logins: typing.Optional[int] = pydantic.Field(default=100) + logins: typing.Optional[int] = pydantic.Field(default=None) """ Number of logins on this date. """ - signups: typing.Optional[int] = pydantic.Field(default=100) + signups: typing.Optional[int] = pydantic.Field(default=None) """ Number of signups on this date. """ - leaked_passwords: typing.Optional[int] = pydantic.Field(default=100) + leaked_passwords: typing.Optional[int] = pydantic.Field(default=None) """ Number of breached-password detections on this date (subscription required). """ - updated_at: typing.Optional[str] = pydantic.Field(default="2014-01-01T02:00:00.000Z") + updated_at: typing.Optional[str] = pydantic.Field(default=None) """ Date and time this stats entry was last updated in ISO 8601 format. """ - created_at: typing.Optional[str] = pydantic.Field(default="2014-01-01T20:00:00.000Z") + created_at: typing.Optional[str] = pydantic.Field(default=None) """ Approximate date and time the first event occurred in ISO 8601 format. """ diff --git a/src/auth0/management/types/delete_user_identity_response_content_item.py b/src/auth0/management/types/delete_user_identity_response_content_item.py index 7d704d48..84b72bc8 100644 --- a/src/auth0/management/types/delete_user_identity_response_content_item.py +++ b/src/auth0/management/types/delete_user_identity_response_content_item.py @@ -10,28 +10,29 @@ class DeleteUserIdentityResponseContentItem(UniversalBaseModel): - connection: str = pydantic.Field(default="Initial-Connection") + connection: str = pydantic.Field() """ The name of the connection for the identity. """ - user_id: str = pydantic.Field(default="5457edea1b8f22891a000004") + user_id: str = pydantic.Field() """ The unique identifier for the user for the identity. """ - provider: str = pydantic.Field(default="auth0") + provider: str = pydantic.Field() """ The type of identity provider. """ - is_social: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isSocial")] = pydantic.Field( - alias="isSocial", default=None - ) - """ - true if the identity provider is a social provider, falses otherwise - """ - + is_social: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isSocial"), + pydantic.Field( + alias="isSocial", + description="true if the identity provider is a social provider, falses otherwise", + ), + ] = None access_token: typing.Optional[str] = pydantic.Field(default=None) """ IDP access token returned only if scope read:user_idp_tokens is defined @@ -47,9 +48,9 @@ class DeleteUserIdentityResponseContentItem(UniversalBaseModel): IDP refresh token returned only if scope read:user_idp_tokens is defined. """ - profile_data: typing_extensions.Annotated[typing.Optional[UserProfileData], FieldMetadata(alias="profileData")] = ( - pydantic.Field(alias="profileData", default=None) - ) + profile_data: typing_extensions.Annotated[ + typing.Optional[UserProfileData], FieldMetadata(alias="profileData"), pydantic.Field(alias="profileData") + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/deploy_action_response_content.py b/src/auth0/management/types/deploy_action_response_content.py index 8e0983bd..3f8b8064 100644 --- a/src/auth0/management/types/deploy_action_response_content.py +++ b/src/auth0/management/types/deploy_action_response_content.py @@ -15,17 +15,17 @@ class DeployActionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="12a3b9e6-06e6-4a29-96bf-90c82fe79a0d") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique id of an action version. """ - action_id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + action_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the action to which this version belongs. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of this specific version of the action. """ @@ -35,12 +35,12 @@ class DeployActionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this specific version depends on. """ - deployed: typing.Optional[bool] = pydantic.Field(default=True) + deployed: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if this specific version is the currently one deployed. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22` """ @@ -51,7 +51,7 @@ class DeployActionResponseContent(UniversalBaseModel): """ status: typing.Optional[ActionVersionBuildStatusEnum] = None - number: typing.Optional[float] = pydantic.Field(default=1.0) + number: typing.Optional[float] = pydantic.Field(default=None) """ The index of this version in list of versions for the action. """ diff --git a/src/auth0/management/types/deploy_action_version_request_content.py b/src/auth0/management/types/deploy_action_version_request_content.py index c7e278e3..191071c3 100644 --- a/src/auth0/management/types/deploy_action_version_request_content.py +++ b/src/auth0/management/types/deploy_action_version_request_content.py @@ -7,7 +7,7 @@ class DeployActionVersionRequestContent(UniversalBaseModel): - update_draft: typing.Optional[bool] = pydantic.Field(default=False) + update_draft: typing.Optional[bool] = pydantic.Field(default=None) """ True if the draft of the action should be updated with the reverted version. """ diff --git a/src/auth0/management/types/deploy_action_version_response_content.py b/src/auth0/management/types/deploy_action_version_response_content.py index 4737f16f..d6d23711 100644 --- a/src/auth0/management/types/deploy_action_version_response_content.py +++ b/src/auth0/management/types/deploy_action_version_response_content.py @@ -15,17 +15,17 @@ class DeployActionVersionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="12a3b9e6-06e6-4a29-96bf-90c82fe79a0d") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique id of an action version. """ - action_id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + action_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the action to which this version belongs. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of this specific version of the action. """ @@ -35,12 +35,12 @@ class DeployActionVersionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this specific version depends on. """ - deployed: typing.Optional[bool] = pydantic.Field(default=True) + deployed: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if this specific version is the currently one deployed. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22` """ @@ -51,7 +51,7 @@ class DeployActionVersionResponseContent(UniversalBaseModel): """ status: typing.Optional[ActionVersionBuildStatusEnum] = None - number: typing.Optional[float] = pydantic.Field(default=1.0) + number: typing.Optional[float] = pydantic.Field(default=None) """ The index of this version in list of versions for the action. """ diff --git a/src/auth0/management/types/device_credential.py b/src/auth0/management/types/device_credential.py index b0655e64..67e6425c 100644 --- a/src/auth0/management/types/device_credential.py +++ b/src/auth0/management/types/device_credential.py @@ -8,28 +8,28 @@ class DeviceCredential(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="dcr_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this device. """ - device_name: typing.Optional[str] = pydantic.Field(default="iPhone Mobile Safari UI/WKWebView") + device_name: typing.Optional[str] = pydantic.Field(default=None) """ User agent for this device """ - device_id: typing.Optional[str] = pydantic.Field(default="550e8400-e29b-41d4-a716-446655440000") + device_id: typing.Optional[str] = pydantic.Field(default=None) """ Unique identifier for the device. NOTE: This field is generally not populated for refresh_tokens and rotating_refresh_tokens """ type: typing.Optional[DeviceCredentialTypeEnum] = None - user_id: typing.Optional[str] = pydantic.Field(default="usr_5457edea1b8f33391a000004") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ user_id this credential is associated with. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ client_id of the client (application) this credential is for. """ diff --git a/src/auth0/management/types/directory_provisioning_mapping_item.py b/src/auth0/management/types/directory_provisioning_mapping_item.py index 9f76cd99..1cacbf31 100644 --- a/src/auth0/management/types/directory_provisioning_mapping_item.py +++ b/src/auth0/management/types/directory_provisioning_mapping_item.py @@ -9,11 +9,11 @@ class DirectoryProvisioningMappingItem(UniversalBaseModel): - auth_0: typing_extensions.Annotated[str, FieldMetadata(alias="auth0")] = pydantic.Field(alias="auth0") - """ - The field location in the Auth0 schema - """ - + auth_0: typing_extensions.Annotated[ + str, + FieldMetadata(alias="auth0"), + pydantic.Field(alias="auth0", description="The field location in the Auth0 schema"), + ] idp: str = pydantic.Field() """ The field location in the IDP schema diff --git a/src/auth0/management/types/domain_verification_method.py b/src/auth0/management/types/domain_verification_method.py index 9a8344f2..0dce61cc 100644 --- a/src/auth0/management/types/domain_verification_method.py +++ b/src/auth0/management/types/domain_verification_method.py @@ -9,12 +9,12 @@ class DomainVerificationMethod(UniversalBaseModel): name: DomainVerificationMethodNameEnum - record: str = pydantic.Field(default="auth0-domain-verification=...") + record: str = pydantic.Field() """ Value used to verify the domain. """ - domain: typing.Optional[str] = pydantic.Field(default="_cf-custom-hostname.login.mycompany.com") + domain: typing.Optional[str] = pydantic.Field(default=None) """ The name of the txt record for verification """ diff --git a/src/auth0/management/types/email_provider_credentials_schema_access_key_id.py b/src/auth0/management/types/email_provider_credentials_schema_access_key_id.py index 041edbe8..45305d96 100644 --- a/src/auth0/management/types/email_provider_credentials_schema_access_key_id.py +++ b/src/auth0/management/types/email_provider_credentials_schema_access_key_id.py @@ -9,20 +9,16 @@ class EmailProviderCredentialsSchemaAccessKeyId(UniversalBaseModel): - access_key_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="accessKeyId")] = ( - pydantic.Field(alias="accessKeyId", default=None) - ) - """ - AWS Access Key ID. - """ - - secret_access_key: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="secretAccessKey")] = ( - pydantic.Field(alias="secretAccessKey", default=None) - ) - """ - AWS Secret Access Key. - """ - + access_key_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="accessKeyId"), + pydantic.Field(alias="accessKeyId", description="AWS Access Key ID."), + ] = None + secret_access_key: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="secretAccessKey"), + pydantic.Field(alias="secretAccessKey", description="AWS Secret Access Key."), + ] = None region: typing.Optional[str] = pydantic.Field(default=None) """ AWS region. diff --git a/src/auth0/management/types/email_provider_credentials_schema_client_id.py b/src/auth0/management/types/email_provider_credentials_schema_client_id.py index dbc82802..f49eb56e 100644 --- a/src/auth0/management/types/email_provider_credentials_schema_client_id.py +++ b/src/auth0/management/types/email_provider_credentials_schema_client_id.py @@ -9,26 +9,21 @@ class EmailProviderCredentialsSchemaClientId(UniversalBaseModel): - tenant_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="tenantId")] = pydantic.Field( - alias="tenantId", default=None - ) - """ - Microsoft 365 Tenant ID. - """ - - client_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="clientId")] = pydantic.Field( - alias="clientId", default=None - ) - """ - Microsoft 365 Client ID. - """ - - client_secret: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="clientSecret")] = ( - pydantic.Field(alias="clientSecret", default=None) - ) - """ - Microsoft 365 Client Secret. - """ + tenant_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="tenantId"), + pydantic.Field(alias="tenantId", description="Microsoft 365 Tenant ID."), + ] = None + client_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="clientId"), + pydantic.Field(alias="clientId", description="Microsoft 365 Client ID."), + ] = None + client_secret: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="clientSecret"), + pydantic.Field(alias="clientSecret", description="Microsoft 365 Client Secret."), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/email_provider_credentials_schema_connection_string.py b/src/auth0/management/types/email_provider_credentials_schema_connection_string.py index 8f444a32..d37d9387 100644 --- a/src/auth0/management/types/email_provider_credentials_schema_connection_string.py +++ b/src/auth0/management/types/email_provider_credentials_schema_connection_string.py @@ -9,12 +9,11 @@ class EmailProviderCredentialsSchemaConnectionString(UniversalBaseModel): - connection_string: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="connectionString")] = ( - pydantic.Field(alias="connectionString", default=None) - ) - """ - Azure Communication Services Connection String. - """ + connection_string: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="connectionString"), + pydantic.Field(alias="connectionString", description="Azure Communication Services Connection String."), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/encryption_key.py b/src/auth0/management/types/encryption_key.py index 0d0de307..d3fafc55 100644 --- a/src/auth0/management/types/encryption_key.py +++ b/src/auth0/management/types/encryption_key.py @@ -31,7 +31,7 @@ class EncryptionKey(UniversalBaseModel): Key update timestamp """ - parent_kid: str = pydantic.Field() + parent_kid: typing.Optional[str] = pydantic.Field(default=None) """ ID of parent wrapping key """ diff --git a/src/auth0/management/types/flow_action_auth_0_make_call_params.py b/src/auth0/management/types/flow_action_auth_0_make_call_params.py index 9a740b84..158fa7e7 100644 --- a/src/auth0/management/types/flow_action_auth_0_make_call_params.py +++ b/src/auth0/management/types/flow_action_auth_0_make_call_params.py @@ -10,9 +10,9 @@ class FlowActionAuth0MakeCallParams(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default=None - ) + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] = None to: str message: str custom_vars: typing.Optional[FlowActionAuth0MakeCallParamsCustomVars] = None diff --git a/src/auth0/management/types/flow_action_auth_0_send_email_params.py b/src/auth0/management/types/flow_action_auth_0_send_email_params.py index f6bb20f5..b4e9609e 100644 --- a/src/auth0/management/types/flow_action_auth_0_send_email_params.py +++ b/src/auth0/management/types/flow_action_auth_0_send_email_params.py @@ -13,8 +13,8 @@ class FlowActionAuth0SendEmailParams(UniversalBaseModel): from_: typing_extensions.Annotated[ - typing.Optional[FlowActionAuth0SendEmailParamsFrom], FieldMetadata(alias="from") - ] = pydantic.Field(alias="from", default=None) + typing.Optional[FlowActionAuth0SendEmailParamsFrom], FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] = None to: FlowActionAuth0SendEmailParamsTo subject: str body: str diff --git a/src/auth0/management/types/flow_action_auth_0_send_sms_params.py b/src/auth0/management/types/flow_action_auth_0_send_sms_params.py index 5a6cbdbe..115fb0fd 100644 --- a/src/auth0/management/types/flow_action_auth_0_send_sms_params.py +++ b/src/auth0/management/types/flow_action_auth_0_send_sms_params.py @@ -10,9 +10,9 @@ class FlowActionAuth0SendSmsParams(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default=None - ) + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] = None to: str message: str custom_vars: typing.Optional[FlowActionAuth0SendSmsParamsCustomVars] = None diff --git a/src/auth0/management/types/flow_action_flow_boolean_condition_params.py b/src/auth0/management/types/flow_action_flow_boolean_condition_params.py index 168181ed..3b711586 100644 --- a/src/auth0/management/types/flow_action_flow_boolean_condition_params.py +++ b/src/auth0/management/types/flow_action_flow_boolean_condition_params.py @@ -12,9 +12,9 @@ class FlowActionFlowBooleanConditionParams(UniversalBaseModel): then: typing.Optional[typing.List["FlowAction"]] = None - else_: typing_extensions.Annotated[typing.Optional[typing.List["FlowAction"]], FieldMetadata(alias="else")] = ( - pydantic.Field(alias="else", default=None) - ) + else_: typing_extensions.Annotated[ + typing.Optional[typing.List["FlowAction"]], FieldMetadata(alias="else"), pydantic.Field(alias="else") + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/flow_action_json_parse_json_params.py b/src/auth0/management/types/flow_action_json_parse_json_params.py index b65e1544..fc3c889d 100644 --- a/src/auth0/management/types/flow_action_json_parse_json_params.py +++ b/src/auth0/management/types/flow_action_json_parse_json_params.py @@ -9,7 +9,7 @@ class FlowActionJsonParseJsonParams(UniversalBaseModel): - json_: typing_extensions.Annotated[str, FieldMetadata(alias="json")] = pydantic.Field(alias="json") + json_: typing_extensions.Annotated[str, FieldMetadata(alias="json"), pydantic.Field(alias="json")] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/flow_action_sendgrid_send_email_params.py b/src/auth0/management/types/flow_action_sendgrid_send_email_params.py index f220ded2..5eb2a5c1 100644 --- a/src/auth0/management/types/flow_action_sendgrid_send_email_params.py +++ b/src/auth0/management/types/flow_action_sendgrid_send_email_params.py @@ -11,9 +11,9 @@ class FlowActionSendgridSendEmailParams(UniversalBaseModel): connection_id: str - from_: typing_extensions.Annotated[FlowActionSendgridSendEmailParamsPerson, FieldMetadata(alias="from")] = ( - pydantic.Field(alias="from") - ) + from_: typing_extensions.Annotated[ + FlowActionSendgridSendEmailParamsPerson, FieldMetadata(alias="from"), pydantic.Field(alias="from") + ] personalizations: typing.List[typing.Any] if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/flow_action_stripe_address.py b/src/auth0/management/types/flow_action_stripe_address.py index 5249d9fd..c6868eda 100644 --- a/src/auth0/management/types/flow_action_stripe_address.py +++ b/src/auth0/management/types/flow_action_stripe_address.py @@ -9,15 +9,15 @@ class FlowActionStripeAddress(UniversalBaseModel): - line_1: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="line1")] = pydantic.Field( - alias="line1", default=None - ) - line_2: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="line2")] = pydantic.Field( - alias="line2", default=None - ) - postal_code: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="postalCode")] = pydantic.Field( - alias="postalCode", default=None - ) + line_1: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="line1"), pydantic.Field(alias="line1") + ] = None + line_2: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="line2"), pydantic.Field(alias="line2") + ] = None + postal_code: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="postalCode"), pydantic.Field(alias="postalCode") + ] = None city: typing.Optional[str] = None state: typing.Optional[str] = None country: typing.Optional[str] = None diff --git a/src/auth0/management/types/flow_action_twilio_make_call_params.py b/src/auth0/management/types/flow_action_twilio_make_call_params.py index 55b05f99..747b356f 100644 --- a/src/auth0/management/types/flow_action_twilio_make_call_params.py +++ b/src/auth0/management/types/flow_action_twilio_make_call_params.py @@ -10,7 +10,7 @@ class FlowActionTwilioMakeCallParams(UniversalBaseModel): connection_id: str - from_: typing_extensions.Annotated[str, FieldMetadata(alias="from")] = pydantic.Field(alias="from") + from_: typing_extensions.Annotated[str, FieldMetadata(alias="from"), pydantic.Field(alias="from")] to: str payload: str diff --git a/src/auth0/management/types/flow_action_twilio_send_sms_params.py b/src/auth0/management/types/flow_action_twilio_send_sms_params.py index 9119e7d5..0797320b 100644 --- a/src/auth0/management/types/flow_action_twilio_send_sms_params.py +++ b/src/auth0/management/types/flow_action_twilio_send_sms_params.py @@ -10,7 +10,7 @@ class FlowActionTwilioSendSmsParams(UniversalBaseModel): connection_id: str - from_: typing_extensions.Annotated[str, FieldMetadata(alias="from")] = pydantic.Field(alias="from") + from_: typing_extensions.Annotated[str, FieldMetadata(alias="from"), pydantic.Field(alias="from")] to: str message: str diff --git a/src/auth0/management/types/flows_vault_connection_http_api_key_setup.py b/src/auth0/management/types/flows_vault_connection_http_api_key_setup.py index ab624d25..02de9a99 100644 --- a/src/auth0/management/types/flows_vault_connection_http_api_key_setup.py +++ b/src/auth0/management/types/flows_vault_connection_http_api_key_setup.py @@ -14,9 +14,9 @@ class FlowsVaultConnectionHttpApiKeySetup(UniversalBaseModel): type: FlowsVaultConnectionSetupTypeApiKeyEnum name: str value: str - in_: typing_extensions.Annotated[FlowsVaultConnectionHttpApiKeySetupInEnum, FieldMetadata(alias="in")] = ( - pydantic.Field(alias="in") - ) + in_: typing_extensions.Annotated[ + FlowsVaultConnectionHttpApiKeySetupInEnum, FieldMetadata(alias="in"), pydantic.Field(alias="in") + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/form_field_custom_config.py b/src/auth0/management/types/form_field_custom_config.py index 4d42b69a..812969a5 100644 --- a/src/auth0/management/types/form_field_custom_config.py +++ b/src/auth0/management/types/form_field_custom_config.py @@ -11,9 +11,9 @@ class FormFieldCustomConfig(UniversalBaseModel): - schema_: typing_extensions.Annotated[FormFieldCustomConfigSchema, FieldMetadata(alias="schema")] = pydantic.Field( - alias="schema" - ) + schema_: typing_extensions.Annotated[ + FormFieldCustomConfigSchema, FieldMetadata(alias="schema"), pydantic.Field(alias="schema") + ] code: str css: typing.Optional[str] = None params: typing.Optional[FormFieldCustomConfigParams] = None diff --git a/src/auth0/management/types/form_field_file_config.py b/src/auth0/management/types/form_field_file_config.py index 3b7118fb..f3a296b1 100644 --- a/src/auth0/management/types/form_field_file_config.py +++ b/src/auth0/management/types/form_field_file_config.py @@ -15,12 +15,12 @@ class FormFieldFileConfig(UniversalBaseModel): storage: typing.Optional[FormFieldFileConfigStorage] = None categories: typing.Optional[typing.List[FormFieldFileConfigCategoryEnum]] = None extensions: typing.Optional[typing.List[str]] = None - max_size: typing_extensions.Annotated[typing.Optional[int], FieldMetadata(alias="maxSize")] = pydantic.Field( - alias="maxSize", default=None - ) - max_files: typing_extensions.Annotated[typing.Optional[int], FieldMetadata(alias="maxFiles")] = pydantic.Field( - alias="maxFiles", default=None - ) + max_size: typing_extensions.Annotated[ + typing.Optional[int], FieldMetadata(alias="maxSize"), pydantic.Field(alias="maxSize") + ] = None + max_files: typing_extensions.Annotated[ + typing.Optional[int], FieldMetadata(alias="maxFiles"), pydantic.Field(alias="maxFiles") + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/get_action_execution_response_content.py b/src/auth0/management/types/get_action_execution_response_content.py index fa8712f4..cfdf22a1 100644 --- a/src/auth0/management/types/get_action_execution_response_content.py +++ b/src/auth0/management/types/get_action_execution_response_content.py @@ -15,7 +15,7 @@ class GetActionExecutionResponseContent(UniversalBaseModel): The result of a specific execution of a trigger. """ - id: typing.Optional[str] = pydantic.Field(default="c5b35bb1-c67d-40bb-9b0d-700b6fe33dd9") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID identifies this specific execution simulation. These IDs would resemble real executions in production. """ diff --git a/src/auth0/management/types/get_action_module_versions_response_content.py b/src/auth0/management/types/get_action_module_versions_response_content.py index f12718d3..005d3abf 100644 --- a/src/auth0/management/types/get_action_module_versions_response_content.py +++ b/src/auth0/management/types/get_action_module_versions_response_content.py @@ -13,6 +13,21 @@ class GetActionModuleVersionsResponseContent(UniversalBaseModel): A list of ActionsModuleVersion objects. """ + total: typing.Optional[int] = pydantic.Field(default=None) + """ + The total number of versions for this module. + """ + + page: typing.Optional[int] = pydantic.Field(default=None) + """ + The page index of the returned results. + """ + + per_page: typing.Optional[int] = pydantic.Field(default=None) + """ + The number of results requested per page. + """ + if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 else: diff --git a/src/auth0/management/types/get_action_response_content.py b/src/auth0/management/types/get_action_response_content.py index 3657fa8d..aaabb82c 100644 --- a/src/auth0/management/types/get_action_response_content.py +++ b/src/auth0/management/types/get_action_response_content.py @@ -15,12 +15,12 @@ class GetActionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the action. """ - name: typing.Optional[str] = pydantic.Field(default="my-action") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of an action. """ @@ -30,7 +30,7 @@ class GetActionResponseContent(UniversalBaseModel): The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. """ - all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=False) + all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=None) """ True if all of an Action's contents have been deployed. """ @@ -45,7 +45,7 @@ class GetActionResponseContent(UniversalBaseModel): The time when this action was updated. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of the action. """ @@ -55,7 +55,7 @@ class GetActionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this action depends on. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22`, defaults to `node22` """ @@ -66,7 +66,7 @@ class GetActionResponseContent(UniversalBaseModel): """ deployed_version: typing.Optional[ActionDeployedVersion] = None - installed_integration_id: typing.Optional[str] = pydantic.Field(default="7d2bc0c9-c0c2-433a-9f4e-86ef80270aad") + installed_integration_id: typing.Optional[str] = pydantic.Field(default=None) """ installed_integration_id is the fk reference to the InstalledIntegration entity. """ @@ -78,7 +78,7 @@ class GetActionResponseContent(UniversalBaseModel): The time when this action was built successfully. """ - deploy: typing.Optional[bool] = pydantic.Field(default=False) + deploy: typing.Optional[bool] = pydantic.Field(default=None) """ True if the action should be deployed after creation. """ diff --git a/src/auth0/management/types/get_action_version_response_content.py b/src/auth0/management/types/get_action_version_response_content.py index 7b908c80..acdccd00 100644 --- a/src/auth0/management/types/get_action_version_response_content.py +++ b/src/auth0/management/types/get_action_version_response_content.py @@ -15,17 +15,17 @@ class GetActionVersionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="12a3b9e6-06e6-4a29-96bf-90c82fe79a0d") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique id of an action version. """ - action_id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + action_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the action to which this version belongs. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of this specific version of the action. """ @@ -35,12 +35,12 @@ class GetActionVersionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this specific version depends on. """ - deployed: typing.Optional[bool] = pydantic.Field(default=True) + deployed: typing.Optional[bool] = pydantic.Field(default=None) """ Indicates if this specific version is the currently one deployed. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22` """ @@ -51,7 +51,7 @@ class GetActionVersionResponseContent(UniversalBaseModel): """ status: typing.Optional[ActionVersionBuildStatusEnum] = None - number: typing.Optional[float] = pydantic.Field(default=1.0) + number: typing.Optional[float] = pydantic.Field(default=None) """ The index of this version in list of versions for the action. """ diff --git a/src/auth0/management/types/get_acul_response_content.py b/src/auth0/management/types/get_acul_response_content.py index 20393898..59bd3aad 100644 --- a/src/auth0/management/types/get_acul_response_content.py +++ b/src/auth0/management/types/get_acul_response_content.py @@ -28,12 +28,12 @@ class GetAculResponseContent(UniversalBaseModel): rendering_mode: typing.Optional[AculRenderingModeEnum] = None context_configuration: typing.Optional[AculContextConfiguration] = None - default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=False) + default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Override Universal Login default head tags """ - use_page_template: typing.Optional[bool] = pydantic.Field(default=False) + use_page_template: typing.Optional[bool] = pydantic.Field(default=None) """ Use page template with ACUL """ diff --git a/src/auth0/management/types/get_attack_protection_captcha_response_content.py b/src/auth0/management/types/get_attack_protection_captcha_response_content.py index d796d825..7442875e 100644 --- a/src/auth0/management/types/get_attack_protection_captcha_response_content.py +++ b/src/auth0/management/types/get_attack_protection_captcha_response_content.py @@ -31,8 +31,10 @@ class GetAttackProtectionCaptchaResponseContent(UniversalBaseModel): friendly_captcha: typing.Optional[AttackProtectionCaptchaFriendlyCaptchaResponseContent] = None recaptcha_enterprise: typing.Optional[AttackProtectionCaptchaRecaptchaEnterpriseResponseContent] = None recaptcha_v_2: typing_extensions.Annotated[ - typing.Optional[AttackProtectionCaptchaRecaptchaV2ResponseContent], FieldMetadata(alias="recaptcha_v2") - ] = pydantic.Field(alias="recaptcha_v2", default=None) + typing.Optional[AttackProtectionCaptchaRecaptchaV2ResponseContent], + FieldMetadata(alias="recaptcha_v2"), + pydantic.Field(alias="recaptcha_v2"), + ] = None simple_captcha: typing.Optional[AttackProtectionCaptchaSimpleCaptchaResponseContent] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/get_branding_default_theme_response_content.py b/src/auth0/management/types/get_branding_default_theme_response_content.py index c7c43143..4a0aa19a 100644 --- a/src/auth0/management/types/get_branding_default_theme_response_content.py +++ b/src/auth0/management/types/get_branding_default_theme_response_content.py @@ -16,20 +16,14 @@ class GetBrandingDefaultThemeResponseContent(UniversalBaseModel): borders: BrandingThemeBorders colors: BrandingThemeColors - display_name: typing_extensions.Annotated[str, FieldMetadata(alias="displayName")] = pydantic.Field( - alias="displayName" - ) - """ - Display Name - """ - + display_name: typing_extensions.Annotated[ + str, FieldMetadata(alias="displayName"), pydantic.Field(alias="displayName", description="Display Name") + ] fonts: BrandingThemeFonts page_background: BrandingThemePageBackground - theme_id: typing_extensions.Annotated[str, FieldMetadata(alias="themeId")] = pydantic.Field(alias="themeId") - """ - Theme Id - """ - + theme_id: typing_extensions.Annotated[ + str, FieldMetadata(alias="themeId"), pydantic.Field(alias="themeId", description="Theme Id") + ] widget: BrandingThemeWidget if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/get_branding_theme_response_content.py b/src/auth0/management/types/get_branding_theme_response_content.py index 00f66442..97beaf03 100644 --- a/src/auth0/management/types/get_branding_theme_response_content.py +++ b/src/auth0/management/types/get_branding_theme_response_content.py @@ -16,20 +16,14 @@ class GetBrandingThemeResponseContent(UniversalBaseModel): borders: BrandingThemeBorders colors: BrandingThemeColors - display_name: typing_extensions.Annotated[str, FieldMetadata(alias="displayName")] = pydantic.Field( - alias="displayName" - ) - """ - Display Name - """ - + display_name: typing_extensions.Annotated[ + str, FieldMetadata(alias="displayName"), pydantic.Field(alias="displayName", description="Display Name") + ] fonts: BrandingThemeFonts page_background: BrandingThemePageBackground - theme_id: typing_extensions.Annotated[str, FieldMetadata(alias="themeId")] = pydantic.Field(alias="themeId") - """ - Theme Id - """ - + theme_id: typing_extensions.Annotated[ + str, FieldMetadata(alias="themeId"), pydantic.Field(alias="themeId", description="Theme Id") + ] widget: BrandingThemeWidget if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/get_breached_password_detection_settings_response_content.py b/src/auth0/management/types/get_breached_password_detection_settings_response_content.py index 77b6604b..9bdffe95 100644 --- a/src/auth0/management/types/get_breached_password_detection_settings_response_content.py +++ b/src/auth0/management/types/get_breached_password_detection_settings_response_content.py @@ -13,7 +13,7 @@ class GetBreachedPasswordDetectionSettingsResponseContent(UniversalBaseModel): - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether or not breached password detection is active. """ diff --git a/src/auth0/management/types/get_brute_force_settings_response_content.py b/src/auth0/management/types/get_brute_force_settings_response_content.py index 3eb09728..ab9f96d0 100644 --- a/src/auth0/management/types/get_brute_force_settings_response_content.py +++ b/src/auth0/management/types/get_brute_force_settings_response_content.py @@ -26,7 +26,7 @@ class GetBruteForceSettingsResponseContent(UniversalBaseModel): """ mode: typing.Optional[BruteForceProtectionModeEnum] = None - max_attempts: typing.Optional[int] = pydantic.Field(default=10) + max_attempts: typing.Optional[int] = pydantic.Field(default=None) """ Maximum number of unsuccessful attempts. """ diff --git a/src/auth0/management/types/get_client_credential_response_content.py b/src/auth0/management/types/get_client_credential_response_content.py index beb6f86a..d802b2e0 100644 --- a/src/auth0/management/types/get_client_credential_response_content.py +++ b/src/auth0/management/types/get_client_credential_response_content.py @@ -12,17 +12,17 @@ class GetClientCredentialResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="cred_1m7sfABoNTTKYwTQ8qt6tX") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the credential. Generated on creation. """ - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name given to the credential by the user. """ - kid: typing.Optional[str] = pydantic.Field(default="IZSSTECp...") + kid: typing.Optional[str] = pydantic.Field(default=None) """ The key identifier of the credential, generated on creation. """ @@ -34,13 +34,11 @@ class GetClientCredentialResponseContent(UniversalBaseModel): The X509 certificate's Subject Distinguished Name """ - thumbprint_sha_256: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="thumbprint_sha256")] = ( - pydantic.Field(alias="thumbprint_sha256", default=None) - ) - """ - The X509 certificate's SHA256 thumbprint - """ - + thumbprint_sha_256: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="thumbprint_sha256"), + pydantic.Field(alias="thumbprint_sha256", description="The X509 certificate's SHA256 thumbprint"), + ] = None created_at: typing.Optional[dt.datetime] = pydantic.Field(default=None) """ The ISO 8601 formatted date the credential was created. diff --git a/src/auth0/management/types/get_client_response_content.py b/src/auth0/management/types/get_client_response_content.py index d6b1d9db..7f61797d 100644 --- a/src/auth0/management/types/get_client_response_content.py +++ b/src/auth0/management/types/get_client_response_content.py @@ -33,36 +33,35 @@ class GetClientResponseContent(UniversalBaseModel): - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this client. """ - tenant: typing.Optional[str] = pydantic.Field(default="") + tenant: typing.Optional[str] = pydantic.Field(default=None) """ Name of the tenant this client belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="My application") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this client (min length: 1 character, does not allow `<` or `>`). """ - description: typing.Optional[str] = pydantic.Field(default="") + description: typing.Optional[str] = pydantic.Field(default=None) """ Free text description of this client (max length: 140 characters). """ - global_: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="global")] = pydantic.Field( - alias="global", default=False - ) - """ - Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false). - """ - - client_secret: typing.Optional[str] = pydantic.Field( - default="MG_TNT2ver-SylNat-_VeMmd-4m0Waba0jr1troztBniSChEw0glxEmgEi2Kw40H" - ) + global_: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="global"), + pydantic.Field( + alias="global", + description="Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false).", + ), + ] = None + client_secret: typing.Optional[str] = pydantic.Field(default=None) """ Client secret (which you must not make public). """ @@ -73,12 +72,12 @@ class GetClientResponseContent(UniversalBaseModel): URL of the logo to display for this client. Recommended size is 150x150 pixels. """ - is_first_party: typing.Optional[bool] = pydantic.Field(default=False) + is_first_party: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client a first party client (true) or not (false). """ - oidc_conformant: typing.Optional[bool] = pydantic.Field(default=False) + oidc_conformant: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false). """ @@ -123,12 +122,12 @@ class GetClientResponseContent(UniversalBaseModel): jwt_configuration: typing.Optional[ClientJwtConfiguration] = None signing_keys: typing.Optional[ClientSigningKeys] = None encryption_key: typing.Optional[ClientEncryptionKey] = None - sso: typing.Optional[bool] = pydantic.Field(default=False) + sso: typing.Optional[bool] = pydantic.Field(default=None) """ Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). """ - sso_disabled: typing.Optional[bool] = pydantic.Field(default=False) + sso_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether Single Sign On is disabled (true) or enabled (true). Defaults to true. """ @@ -143,29 +142,29 @@ class GetClientResponseContent(UniversalBaseModel): URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page. """ - custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=True) + custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=None) """ Whether a custom login page is to be used (true) or the default provided login page (false). """ - custom_login_page: typing.Optional[str] = pydantic.Field(default="") + custom_login_page: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. """ - custom_login_page_preview: typing.Optional[str] = pydantic.Field(default="") + custom_login_page_preview: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. (Used on Previews) """ - form_template: typing.Optional[str] = pydantic.Field(default="") + form_template: typing.Optional[str] = pydantic.Field(default=None) """ HTML form template to be used for WS-Federation. """ addons: typing.Optional[ClientAddons] = None token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = None - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=False) + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=None) """ If true, trust that the IP specified in the `auth0-forwarded-for` header is the end-user's IP for brute-force-protection on token endpoint. """ @@ -189,12 +188,12 @@ class GetClientResponseContent(UniversalBaseModel): """ client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = None - require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=False) + require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Pushed Authorization Requests mandatory for this client """ - require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=False) + require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Proof-of-Possession mandatory for this client """ diff --git a/src/auth0/management/types/get_connection_response_content.py b/src/auth0/management/types/get_connection_response_content.py index 1eab3bde..68568040 100644 --- a/src/auth0/management/types/get_connection_response_content.py +++ b/src/auth0/management/types/get_connection_response_content.py @@ -11,7 +11,7 @@ class GetConnectionResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="My connection") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the connection """ @@ -22,12 +22,12 @@ class GetConnectionResponseContent(UniversalBaseModel): """ options: typing.Optional[ConnectionOptions] = None - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The connection's identifier """ - strategy: typing.Optional[str] = pydantic.Field(default="auth0") + strategy: typing.Optional[str] = pydantic.Field(default=None) """ The type of the connection, related to the identity provider """ diff --git a/src/auth0/management/types/get_custom_domain_response_content.py b/src/auth0/management/types/get_custom_domain_response_content.py index bb2e8669..e97e02bf 100644 --- a/src/auth0/management/types/get_custom_domain_response_content.py +++ b/src/auth0/management/types/get_custom_domain_response_content.py @@ -12,31 +12,29 @@ class GetCustomDomainResponseContent(UniversalBaseModel): - custom_domain_id: str = pydantic.Field(default="cd_0000000000000001") + custom_domain_id: str = pydantic.Field() """ ID of the custom domain. """ - domain: str = pydantic.Field(default="login.mycompany.com") + domain: str = pydantic.Field() """ Domain name. """ - primary: bool = pydantic.Field(default=False) + primary: bool = pydantic.Field() """ Whether this is a primary domain (true) or not (false). """ - is_default: typing.Optional[bool] = pydantic.Field(default=False) + is_default: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this is the default custom domain (true) or not (false). """ status: CustomDomainStatusFilterEnum type: CustomDomainTypeEnum - origin_domain_name: typing.Optional[str] = pydantic.Field( - default="mycompany_cd_0000000000000001.edge.tenants.auth0.com" - ) + origin_domain_name: typing.Optional[str] = pydantic.Field(default=None) """ Intermediate address. """ @@ -47,7 +45,7 @@ class GetCustomDomainResponseContent(UniversalBaseModel): The HTTP header to fetch the client's IP address """ - tls_policy: typing.Optional[str] = pydantic.Field(default="recommended") + tls_policy: typing.Optional[str] = pydantic.Field(default=None) """ The TLS version policy """ diff --git a/src/auth0/management/types/get_email_provider_response_content.py b/src/auth0/management/types/get_email_provider_response_content.py index 6afdc985..7a4ecc13 100644 --- a/src/auth0/management/types/get_email_provider_response_content.py +++ b/src/auth0/management/types/get_email_provider_response_content.py @@ -9,12 +9,12 @@ class GetEmailProviderResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="sendgrid") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of the email provider. Can be `mailgun`, `mandrill`, `sendgrid`, `ses`, `sparkpost`, `smtp`, `azure_cs`, `ms365`, or `custom`. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the provider is enabled (true) or disabled (false). """ diff --git a/src/auth0/management/types/get_email_template_response_content.py b/src/auth0/management/types/get_email_template_response_content.py index 6415e542..87aacb97 100644 --- a/src/auth0/management/types/get_email_template_response_content.py +++ b/src/auth0/management/types/get_email_template_response_content.py @@ -16,44 +16,42 @@ class GetEmailTemplateResponseContent(UniversalBaseModel): Body of the email template. """ - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="sender@auth0.com" - ) - """ - Senders `from` email address. - """ - - result_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="resultUrl")] = pydantic.Field( - alias="resultUrl", default=None - ) - """ - URL to redirect the user to after a successful action. - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field(alias="from", description="Senders `from` email address."), + ] = None + result_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="resultUrl"), + pydantic.Field(alias="resultUrl", description="URL to redirect the user to after a successful action."), + ] = None subject: typing.Optional[str] = pydantic.Field(default=None) """ Subject line of the email. """ - syntax: typing.Optional[str] = pydantic.Field(default="liquid") + syntax: typing.Optional[str] = pydantic.Field(default=None) """ Syntax of the template body. """ url_lifetime_in_seconds: typing_extensions.Annotated[ - typing.Optional[float], FieldMetadata(alias="urlLifetimeInSeconds") - ] = pydantic.Field(alias="urlLifetimeInSeconds", default=None) - """ - Lifetime in seconds that the link within the email will be valid for. - """ - + typing.Optional[float], + FieldMetadata(alias="urlLifetimeInSeconds"), + pydantic.Field( + alias="urlLifetimeInSeconds", + description="Lifetime in seconds that the link within the email will be valid for.", + ), + ] = None include_email_in_redirect: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="includeEmailInRedirect") - ] = pydantic.Field(alias="includeEmailInRedirect", default=None) - """ - Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true. - """ - + typing.Optional[bool], + FieldMetadata(alias="includeEmailInRedirect"), + pydantic.Field( + alias="includeEmailInRedirect", + description="Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true.", + ), + ] = None enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the template is enabled (true) or disabled (false). diff --git a/src/auth0/management/types/get_encryption_key_response_content.py b/src/auth0/management/types/get_encryption_key_response_content.py index 5ae3b5ff..86fc7778 100644 --- a/src/auth0/management/types/get_encryption_key_response_content.py +++ b/src/auth0/management/types/get_encryption_key_response_content.py @@ -31,7 +31,7 @@ class GetEncryptionKeyResponseContent(UniversalBaseModel): Key update timestamp """ - parent_kid: str = pydantic.Field() + parent_kid: typing.Optional[str] = pydantic.Field(default=None) """ ID of parent wrapping key """ diff --git a/src/auth0/management/types/get_guardian_enrollment_response_content.py b/src/auth0/management/types/get_guardian_enrollment_response_content.py index 4b183e38..af120f51 100644 --- a/src/auth0/management/types/get_guardian_enrollment_response_content.py +++ b/src/auth0/management/types/get_guardian_enrollment_response_content.py @@ -9,23 +9,23 @@ class GetGuardianEnrollmentResponseContent(UniversalBaseModel): - id: str = pydantic.Field(default="dev_0000000000000001") + id: str = pydantic.Field() """ ID for this enrollment. """ status: typing.Optional[GuardianEnrollmentStatus] = None - name: typing.Optional[str] = pydantic.Field(default="iPhone 7") + name: typing.Optional[str] = pydantic.Field(default=None) """ Device name (only for push notification). """ - identifier: typing.Optional[str] = pydantic.Field(default="76dc-a90c-a88c-a90c-a88c-a88c-a90c") + identifier: typing.Optional[str] = pydantic.Field(default=None) """ Device identifier. This is usually the phone identifier. """ - phone_number: typing.Optional[str] = pydantic.Field(default="+1 999999999999") + phone_number: typing.Optional[str] = pydantic.Field(default=None) """ Phone number. """ diff --git a/src/auth0/management/types/get_guardian_factor_phone_templates_response_content.py b/src/auth0/management/types/get_guardian_factor_phone_templates_response_content.py index a5d1e346..9cdd3ecd 100644 --- a/src/auth0/management/types/get_guardian_factor_phone_templates_response_content.py +++ b/src/auth0/management/types/get_guardian_factor_phone_templates_response_content.py @@ -7,16 +7,12 @@ class GetGuardianFactorPhoneTemplatesResponseContent(UniversalBaseModel): - enrollment_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment." - ) + enrollment_message: str = pydantic.Field() """ Message sent to the user when they are invited to enroll with a phone number. """ - verification_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}" - ) + verification_message: str = pydantic.Field() """ Message sent to the user when they are prompted to verify their account. """ diff --git a/src/auth0/management/types/get_guardian_factor_sms_templates_response_content.py b/src/auth0/management/types/get_guardian_factor_sms_templates_response_content.py index cfb101cd..7ca6bc2c 100644 --- a/src/auth0/management/types/get_guardian_factor_sms_templates_response_content.py +++ b/src/auth0/management/types/get_guardian_factor_sms_templates_response_content.py @@ -7,16 +7,12 @@ class GetGuardianFactorSmsTemplatesResponseContent(UniversalBaseModel): - enrollment_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment." - ) + enrollment_message: str = pydantic.Field() """ Message sent to the user when they are invited to enroll with a phone number. """ - verification_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}" - ) + verification_message: str = pydantic.Field() """ Message sent to the user when they are prompted to verify their account. """ diff --git a/src/auth0/management/types/get_guardian_factors_provider_phone_twilio_response_content.py b/src/auth0/management/types/get_guardian_factors_provider_phone_twilio_response_content.py index 3bbcd58b..efc94763 100644 --- a/src/auth0/management/types/get_guardian_factors_provider_phone_twilio_response_content.py +++ b/src/auth0/management/types/get_guardian_factors_provider_phone_twilio_response_content.py @@ -9,24 +9,20 @@ class GetGuardianFactorsProviderPhoneTwilioResponseContent(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="+1223323" - ) - """ - From number - """ - - messaging_service_sid: typing.Optional[str] = pydantic.Field(default="5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq") + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from", description="From number") + ] = None + messaging_service_sid: typing.Optional[str] = pydantic.Field(default=None) """ Copilot SID """ - auth_token: typing.Optional[str] = pydantic.Field(default="zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU") + auth_token: typing.Optional[str] = pydantic.Field(default=None) """ Twilio Authentication token """ - sid: typing.Optional[str] = pydantic.Field(default="wywA2BH4VqTpfywiDuyDAYZL3xQjoO40") + sid: typing.Optional[str] = pydantic.Field(default=None) """ Twilio SID """ diff --git a/src/auth0/management/types/get_guardian_factors_provider_sms_twilio_response_content.py b/src/auth0/management/types/get_guardian_factors_provider_sms_twilio_response_content.py index 67f673a6..6a74c45a 100644 --- a/src/auth0/management/types/get_guardian_factors_provider_sms_twilio_response_content.py +++ b/src/auth0/management/types/get_guardian_factors_provider_sms_twilio_response_content.py @@ -9,24 +9,20 @@ class GetGuardianFactorsProviderSmsTwilioResponseContent(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="+1223323" - ) - """ - From number - """ - - messaging_service_sid: typing.Optional[str] = pydantic.Field(default="5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq") + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from", description="From number") + ] = None + messaging_service_sid: typing.Optional[str] = pydantic.Field(default=None) """ Copilot SID """ - auth_token: typing.Optional[str] = pydantic.Field(default="zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU") + auth_token: typing.Optional[str] = pydantic.Field(default=None) """ Twilio Authentication token """ - sid: typing.Optional[str] = pydantic.Field(default="wywA2BH4VqTpfywiDuyDAYZL3xQjoO40") + sid: typing.Optional[str] = pydantic.Field(default=None) """ Twilio SID """ diff --git a/src/auth0/management/types/get_guardian_factors_provider_sns_response_content.py b/src/auth0/management/types/get_guardian_factors_provider_sns_response_content.py index 3d32f79f..86c57d65 100644 --- a/src/auth0/management/types/get_guardian_factors_provider_sns_response_content.py +++ b/src/auth0/management/types/get_guardian_factors_provider_sns_response_content.py @@ -7,11 +7,11 @@ class GetGuardianFactorsProviderSnsResponseContent(UniversalBaseModel): - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40" - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL" - aws_region: typing.Optional[str] = "us-west-1" + aws_access_key_id: typing.Optional[str] = None + aws_secret_access_key: typing.Optional[str] = None + aws_region: typing.Optional[str] = None sns_apns_platform_application_arn: typing.Optional[str] = None - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP" + sns_gcm_platform_application_arn: typing.Optional[str] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/get_hook_response_content.py b/src/auth0/management/types/get_hook_response_content.py index 9e0b788d..d2ced78d 100644 --- a/src/auth0/management/types/get_hook_response_content.py +++ b/src/auth0/management/types/get_hook_response_content.py @@ -10,31 +10,27 @@ class GetHookResponseContent(UniversalBaseModel): - trigger_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="triggerId")] = pydantic.Field( - alias="triggerId", default=None - ) - """ - Trigger ID - """ - - id: typing.Optional[str] = pydantic.Field(default="00001") + trigger_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="triggerId"), + pydantic.Field(alias="triggerId", description="Trigger ID"), + ] = None + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this hook. """ - name: typing.Optional[str] = pydantic.Field(default="hook") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this hook. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this hook will be executed (true) or ignored (false). """ - script: typing.Optional[str] = pydantic.Field( - default="module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this hook runs. """ diff --git a/src/auth0/management/types/get_job_generic_error_response_content.py b/src/auth0/management/types/get_job_generic_error_response_content.py index 89219e12..11777974 100644 --- a/src/auth0/management/types/get_job_generic_error_response_content.py +++ b/src/auth0/management/types/get_job_generic_error_response_content.py @@ -7,12 +7,12 @@ class GetJobGenericErrorResponseContent(UniversalBaseModel): - status: str = pydantic.Field(default="pending") + status: str = pydantic.Field() """ Status of this job. """ - type: str = pydantic.Field(default="users_import") + type: str = pydantic.Field() """ Type of job this is. """ @@ -22,12 +22,12 @@ class GetJobGenericErrorResponseContent(UniversalBaseModel): When this job was created. """ - id: str = pydantic.Field(default="job_0000000000000001") + id: str = pydantic.Field() """ ID of this job. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ connection_id of the connection this job uses. """ diff --git a/src/auth0/management/types/get_job_response_content.py b/src/auth0/management/types/get_job_response_content.py index 62311d52..b72a1344 100644 --- a/src/auth0/management/types/get_job_response_content.py +++ b/src/auth0/management/types/get_job_response_content.py @@ -9,12 +9,12 @@ class GetJobResponseContent(UniversalBaseModel): - status: str = pydantic.Field(default="pending") + status: str = pydantic.Field() """ Status of this job. """ - type: str = pydantic.Field(default="users_import") + type: str = pydantic.Field() """ Type of job this is. """ @@ -24,12 +24,12 @@ class GetJobResponseContent(UniversalBaseModel): When this job was created. """ - id: str = pydantic.Field(default="job_0000000000000001") + id: str = pydantic.Field() """ ID of this job. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ connection_id of the connection this job uses. """ diff --git a/src/auth0/management/types/get_job_summary.py b/src/auth0/management/types/get_job_summary.py index 2bcaa0df..3cc4533b 100644 --- a/src/auth0/management/types/get_job_summary.py +++ b/src/auth0/management/types/get_job_summary.py @@ -11,22 +11,22 @@ class GetJobSummary(UniversalBaseModel): Job execution summary. """ - failed: typing.Optional[int] = pydantic.Field(default=0) + failed: typing.Optional[int] = pydantic.Field(default=None) """ Number of failed operations. """ - updated: typing.Optional[int] = pydantic.Field(default=0) + updated: typing.Optional[int] = pydantic.Field(default=None) """ Number of updated records. """ - inserted: typing.Optional[int] = pydantic.Field(default=0) + inserted: typing.Optional[int] = pydantic.Field(default=None) """ Number of inserted records. """ - total: typing.Optional[int] = pydantic.Field(default=0) + total: typing.Optional[int] = pydantic.Field(default=None) """ Total number of operations. """ diff --git a/src/auth0/management/types/get_log_response_content.py b/src/auth0/management/types/get_log_response_content.py index 8c91415c..a0dca4d3 100644 --- a/src/auth0/management/types/get_log_response_content.py +++ b/src/auth0/management/types/get_log_response_content.py @@ -14,7 +14,7 @@ class GetLogResponseContent(UniversalBaseModel): date: typing.Optional[LogDate] = None - type: typing.Optional[str] = pydantic.Field(default="sapi") + type: typing.Optional[str] = pydantic.Field(default=None) """ Type of event. """ @@ -34,27 +34,27 @@ class GetLogResponseContent(UniversalBaseModel): ID of the connection the event relates to. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the client (application). """ - client_name: typing.Optional[str] = pydantic.Field(default="My application Name") + client_name: typing.Optional[str] = pydantic.Field(default=None) """ Name of the client (application). """ - ip: typing.Optional[str] = pydantic.Field(default="190.257.209.19") + ip: typing.Optional[str] = pydantic.Field(default=None) """ IP address of the log event source. """ - hostname: typing.Optional[str] = pydantic.Field(default="190.257.209.19") + hostname: typing.Optional[str] = pydantic.Field(default=None) """ Hostname the event applies to. """ - user_id: typing.Optional[str] = pydantic.Field(default="auth0|56c75c4e42b6359e98374bc2") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user involved in the event. """ @@ -69,7 +69,7 @@ class GetLogResponseContent(UniversalBaseModel): API audience the event applies to. """ - scope: typing.Optional[str] = pydantic.Field(default="") + scope: typing.Optional[str] = pydantic.Field(default=None) """ Scope permissions applied to the event. """ @@ -89,13 +89,14 @@ class GetLogResponseContent(UniversalBaseModel): Unique ID of the event. """ - is_mobile: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isMobile")] = pydantic.Field( - alias="isMobile", default=None - ) - """ - Whether the client was a mobile device (true) or desktop/laptop/server (false). - """ - + is_mobile: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isMobile"), + pydantic.Field( + alias="isMobile", + description="Whether the client was a mobile device (true) or desktop/laptop/server (false).", + ), + ] = None details: typing.Optional[LogDetails] = None user_agent: typing.Optional[str] = pydantic.Field(default=None) """ diff --git a/src/auth0/management/types/get_organization_by_name_response_content.py b/src/auth0/management/types/get_organization_by_name_response_content.py index 9d55f2ed..795f0371 100644 --- a/src/auth0/management/types/get_organization_by_name_response_content.py +++ b/src/auth0/management/types/get_organization_by_name_response_content.py @@ -15,12 +15,12 @@ class GetOrganizationByNameResponseContent(UniversalBaseModel): Organization identifier. """ - name: typing.Optional[str] = pydantic.Field(default="organization-1") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of this organization. """ - display_name: typing.Optional[str] = pydantic.Field(default="Acme Users") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this organization. """ diff --git a/src/auth0/management/types/get_organization_invitation_response_content.py b/src/auth0/management/types/get_organization_invitation_response_content.py index 220e0877..f09f4bf8 100644 --- a/src/auth0/management/types/get_organization_invitation_response_content.py +++ b/src/auth0/management/types/get_organization_invitation_response_content.py @@ -12,7 +12,7 @@ class GetOrganizationInvitationResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="uinv_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the user invitation. """ @@ -24,9 +24,7 @@ class GetOrganizationInvitationResponseContent(UniversalBaseModel): inviter: typing.Optional[OrganizationInvitationInviter] = None invitee: typing.Optional[OrganizationInvitationInvitee] = None - invitation_url: typing.Optional[str] = pydantic.Field( - default="https://mycompany.org/login?invitation=f81dWWYW6gzGGicxT8Ha0txBkGNcAcYr&organization=org_0000000000000001&organization_name=acme" - ) + invitation_url: typing.Optional[str] = pydantic.Field(default=None) """ The invitation url to be send to the invitee. """ @@ -41,12 +39,12 @@ class GetOrganizationInvitationResponseContent(UniversalBaseModel): The ISO 8601 formatted timestamp representing the expiration time of the invitation. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ Auth0 client ID. Used to resolve the application's login initiation endpoint. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the connection to force invitee to authenticate with. """ diff --git a/src/auth0/management/types/get_organization_response_content.py b/src/auth0/management/types/get_organization_response_content.py index 9c0dfc8b..0610c6a0 100644 --- a/src/auth0/management/types/get_organization_response_content.py +++ b/src/auth0/management/types/get_organization_response_content.py @@ -15,12 +15,12 @@ class GetOrganizationResponseContent(UniversalBaseModel): Organization identifier. """ - name: typing.Optional[str] = pydantic.Field(default="organization-1") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of this organization. """ - display_name: typing.Optional[str] = pydantic.Field(default="Acme Users") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this organization. """ diff --git a/src/auth0/management/types/get_phone_template_response_content.py b/src/auth0/management/types/get_phone_template_response_content.py index daccab89..04e7c669 100644 --- a/src/auth0/management/types/get_phone_template_response_content.py +++ b/src/auth0/management/types/get_phone_template_response_content.py @@ -15,7 +15,7 @@ class GetPhoneTemplateResponseContent(UniversalBaseModel): tenant: typing.Optional[str] = None content: PhoneTemplateContent type: PhoneTemplateNotificationTypeEnum - disabled: bool = pydantic.Field(default=False) + disabled: bool = pydantic.Field() """ Whether the template is enabled (false) or disabled (true). """ diff --git a/src/auth0/management/types/get_refresh_token_response_content.py b/src/auth0/management/types/get_refresh_token_response_content.py index e6f43ea7..e7596db0 100644 --- a/src/auth0/management/types/get_refresh_token_response_content.py +++ b/src/auth0/management/types/get_refresh_token_response_content.py @@ -17,7 +17,7 @@ class GetRefreshTokenResponseContent(UniversalBaseModel): The ID of the refresh token """ - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ diff --git a/src/auth0/management/types/get_rule_response_content.py b/src/auth0/management/types/get_rule_response_content.py index a39a4dc3..62836d2c 100644 --- a/src/auth0/management/types/get_rule_response_content.py +++ b/src/auth0/management/types/get_rule_response_content.py @@ -7,34 +7,32 @@ class GetRuleResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="rule_1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this rule. """ - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this rule. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the rule is enabled (true), or disabled (false). """ - script: typing.Optional[str] = pydantic.Field( - default="function (user, context, callback) {\n callback(null, user, context);\n}" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this rule runs. """ - order: typing.Optional[float] = pydantic.Field(default=1.0) + order: typing.Optional[float] = pydantic.Field(default=None) """ Order that this rule should execute in relative to other rules. Lower-valued rules execute first. """ - stage: typing.Optional[str] = pydantic.Field(default="login_success") + stage: typing.Optional[str] = pydantic.Field(default=None) """ Execution stage of this rule. Can be `login_success`, `login_failure`, or `pre_authorize`. """ diff --git a/src/auth0/management/types/get_self_service_profile_response_content.py b/src/auth0/management/types/get_self_service_profile_response_content.py index 27b4da7a..4aa7e689 100644 --- a/src/auth0/management/types/get_self_service_profile_response_content.py +++ b/src/auth0/management/types/get_self_service_profile_response_content.py @@ -11,7 +11,7 @@ class GetSelfServiceProfileResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="ssp_n7SNCL8seoyV1TuSTCnAeo") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the self-service Profile. """ @@ -46,7 +46,7 @@ class GetSelfServiceProfileResponseContent(UniversalBaseModel): default=None ) """ - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] """ user_attribute_profile_id: typing.Optional[str] = pydantic.Field(default=None) diff --git a/src/auth0/management/types/get_signing_keys_response_content.py b/src/auth0/management/types/get_signing_keys_response_content.py index f01bf2c9..8234cc48 100644 --- a/src/auth0/management/types/get_signing_keys_response_content.py +++ b/src/auth0/management/types/get_signing_keys_response_content.py @@ -10,26 +10,22 @@ class GetSigningKeysResponseContent(UniversalBaseModel): - kid: str = pydantic.Field(default="21hi274Rp02112mgkUGma") + kid: str = pydantic.Field() """ The key id of the signing key """ - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ The public certificate of the signing key """ - pkcs_7: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="pkcs7")] = pydantic.Field( - alias="pkcs7", default="-----BEGIN PKCS7-----\r\nMIIDPA....t8xAA==\r\n-----END PKCS7-----" - ) - """ - The public certificate of the signing key in pkcs7 format - """ - - current: typing.Optional[bool] = pydantic.Field(default=True) + pkcs_7: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="pkcs7"), + pydantic.Field(alias="pkcs7", description="The public certificate of the signing key in pkcs7 format"), + ] = None + current: typing.Optional[bool] = pydantic.Field(default=None) """ True if the key is the the current key """ @@ -46,12 +42,12 @@ class GetSigningKeysResponseContent(UniversalBaseModel): current_since: typing.Optional[SigningKeysDate] = None current_until: typing.Optional[SigningKeysDate] = None - fingerprint: str = pydantic.Field(default="CC:FB:DD:D8:9A:B5:DE:1B:F0:CC:36:D2:99:59:21:12:03:DD:A8:25") + fingerprint: str = pydantic.Field() """ The cert fingerprint """ - thumbprint: str = pydantic.Field(default="CCFBDDD89AB5DE1BF0CC36D29959211203DDA825") + thumbprint: str = pydantic.Field() """ The cert thumbprint """ diff --git a/src/auth0/management/types/get_tenant_settings_response_content.py b/src/auth0/management/types/get_tenant_settings_response_content.py index f09afca8..d0757977 100644 --- a/src/auth0/management/types/get_tenant_settings_response_content.py +++ b/src/auth0/management/types/get_tenant_settings_response_content.py @@ -21,12 +21,12 @@ class GetTenantSettingsResponseContent(UniversalBaseModel): change_password: typing.Optional[TenantSettingsPasswordPage] = None guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = None - default_audience: typing.Optional[str] = pydantic.Field(default="") + default_audience: typing.Optional[str] = pydantic.Field(default=None) """ Default audience for API authorization. """ - default_directory: typing.Optional[str] = pydantic.Field(default="") + default_directory: typing.Optional[str] = pydantic.Field(default=None) """ Name of connection used for password grants at the `/token`endpoint. The following connection types are supported: LDAP, AD, Database Connections, Passwordless, Windows Azure Active Directory, ADFS. """ @@ -35,22 +35,22 @@ class GetTenantSettingsResponseContent(UniversalBaseModel): device_flow: typing.Optional[TenantSettingsDeviceFlow] = None default_token_quota: typing.Optional[DefaultTokenQuota] = None flags: typing.Optional[TenantSettingsFlags] = None - friendly_name: typing.Optional[str] = pydantic.Field(default="My Company") + friendly_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name for this tenant. """ - picture_url: typing.Optional[str] = pydantic.Field(default="https://mycompany.org/logo.png") + picture_url: typing.Optional[str] = pydantic.Field(default=None) """ URL of logo to be shown for this tenant (recommended size: 150x150) """ - support_email: typing.Optional[str] = pydantic.Field(default="support@mycompany.org") + support_email: typing.Optional[str] = pydantic.Field(default=None) """ End-user support email address. """ - support_url: typing.Optional[str] = pydantic.Field(default="https://mycompany.org/support") + support_url: typing.Optional[str] = pydantic.Field(default=None) """ End-user support URL. """ @@ -60,32 +60,32 @@ class GetTenantSettingsResponseContent(UniversalBaseModel): URLs that are valid to redirect to after logout from Auth0. """ - session_lifetime: typing.Optional[float] = pydantic.Field(default=168.0) + session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours a session will stay valid. """ - idle_session_lifetime: typing.Optional[float] = pydantic.Field(default=72.0) + idle_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours for which a session can be inactive before the user must log in again. """ - ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=72.0) + ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours an ephemeral (non-persistent) session will stay valid. """ - idle_ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=24.0) + idle_ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours for which an ephemeral (non-persistent) session can be inactive before the user must log in again. """ - sandbox_version: typing.Optional[str] = pydantic.Field(default="22") + sandbox_version: typing.Optional[str] = pydantic.Field(default=None) """ Selected sandbox version for the extensibility environment. """ - legacy_sandbox_version: typing.Optional[str] = pydantic.Field(default="") + legacy_sandbox_version: typing.Optional[str] = pydantic.Field(default=None) """ Selected sandbox version for rules and hooks extensibility. """ @@ -108,12 +108,12 @@ class GetTenantSettingsResponseContent(UniversalBaseModel): session_cookie: typing.Optional[SessionCookieSchema] = None sessions: typing.Optional[TenantSettingsSessions] = None oidc_logout: typing.Optional[TenantOidcLogoutSettings] = None - allow_organization_name_in_authentication_api: typing.Optional[bool] = pydantic.Field(default=False) + allow_organization_name_in_authentication_api: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to accept an organization name instead of an ID on auth endpoints """ - customize_mfa_in_postlogin_action: typing.Optional[bool] = pydantic.Field(default=False) + customize_mfa_in_postlogin_action: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to enable flexible factors for MFA in the PostLogin action """ @@ -124,12 +124,12 @@ class GetTenantSettingsResponseContent(UniversalBaseModel): """ mtls: typing.Optional[TenantSettingsMtls] = None - pushed_authorization_requests_supported: typing.Optional[bool] = pydantic.Field(default=False) + pushed_authorization_requests_supported: typing.Optional[bool] = pydantic.Field(default=None) """ Enables the use of Pushed Authorization Requests """ - authorization_response_iss_parameter_supported: typing.Optional[bool] = pydantic.Field(default=False) + authorization_response_iss_parameter_supported: typing.Optional[bool] = pydantic.Field(default=None) """ Supports iss parameter in authorization responses """ diff --git a/src/auth0/management/types/get_token_exchange_profile_response_content.py b/src/auth0/management/types/get_token_exchange_profile_response_content.py index ce9efd36..e03fcd66 100644 --- a/src/auth0/management/types/get_token_exchange_profile_response_content.py +++ b/src/auth0/management/types/get_token_exchange_profile_response_content.py @@ -14,7 +14,7 @@ class GetTokenExchangeProfileResponseContent(UniversalBaseModel): The unique ID of the token exchange profile. """ - name: typing.Optional[str] = pydantic.Field(default="Token Exchange Profile 1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this profile. """ diff --git a/src/auth0/management/types/get_user_response_content.py b/src/auth0/management/types/get_user_response_content.py index 95bfe101..59b00416 100644 --- a/src/auth0/management/types/get_user_response_content.py +++ b/src/auth0/management/types/get_user_response_content.py @@ -11,32 +11,32 @@ class GetUserResponseContent(UniversalBaseModel): - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ - email_verified: typing.Optional[bool] = pydantic.Field(default=False) + email_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this email address is verified (true) or unverified (false). """ - username: typing.Optional[str] = pydantic.Field(default="johndoe") + username: typing.Optional[str] = pydantic.Field(default=None) """ Username of this user. """ - phone_number: typing.Optional[str] = pydantic.Field(default="+199999999999999") + phone_number: typing.Optional[str] = pydantic.Field(default=None) """ Phone number for this user. Follows the E.164 recommendation. """ - phone_verified: typing.Optional[bool] = pydantic.Field(default=False) + phone_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this phone number has been verified (true) or not (false). """ diff --git a/src/auth0/management/types/get_verifiable_credential_template_response_content.py b/src/auth0/management/types/get_verifiable_credential_template_response_content.py index 8ec742af..864524bd 100644 --- a/src/auth0/management/types/get_verifiable_credential_template_response_content.py +++ b/src/auth0/management/types/get_verifiable_credential_template_response_content.py @@ -9,7 +9,7 @@ class GetVerifiableCredentialTemplateResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="vct_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the template. """ @@ -19,12 +19,12 @@ class GetVerifiableCredentialTemplateResponseContent(UniversalBaseModel): The name of the template. """ - type: typing.Optional[str] = pydantic.Field(default="mdl") + type: typing.Optional[str] = pydantic.Field(default=None) """ The type of the template. """ - dialect: typing.Optional[str] = pydantic.Field(default="simplified/1.0") + dialect: typing.Optional[str] = pydantic.Field(default=None) """ The dialect of the template. """ diff --git a/src/auth0/management/types/guardian_factor.py b/src/auth0/management/types/guardian_factor.py index c6278a44..07a64177 100644 --- a/src/auth0/management/types/guardian_factor.py +++ b/src/auth0/management/types/guardian_factor.py @@ -8,12 +8,12 @@ class GuardianFactor(UniversalBaseModel): - enabled: bool = pydantic.Field(default=True) + enabled: bool = pydantic.Field() """ Whether this factor is enabled (true) or disabled (false). """ - trial_expired: typing.Optional[bool] = pydantic.Field(default=True) + trial_expired: typing.Optional[bool] = pydantic.Field(default=None) """ Whether trial limits have been exceeded. """ diff --git a/src/auth0/management/types/hook.py b/src/auth0/management/types/hook.py index a8fe7526..fda94890 100644 --- a/src/auth0/management/types/hook.py +++ b/src/auth0/management/types/hook.py @@ -10,31 +10,27 @@ class Hook(UniversalBaseModel): - trigger_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="triggerId")] = pydantic.Field( - alias="triggerId", default=None - ) - """ - Trigger ID - """ - - id: typing.Optional[str] = pydantic.Field(default="00001") + trigger_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="triggerId"), + pydantic.Field(alias="triggerId", description="Trigger ID"), + ] = None + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this hook. """ - name: typing.Optional[str] = pydantic.Field(default="hook") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this hook. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this hook will be executed (true) or ignored (false). """ - script: typing.Optional[str] = pydantic.Field( - default="module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this hook runs. """ diff --git a/src/auth0/management/types/identity.py b/src/auth0/management/types/identity.py index 66818637..a7fd0700 100644 --- a/src/auth0/management/types/identity.py +++ b/src/auth0/management/types/identity.py @@ -12,7 +12,7 @@ class Identity(UniversalBaseModel): This must be provided to verify primary social, enterprise and passwordless email identities. Also, is needed to verify secondary identities. """ - user_id: str = pydantic.Field(default="5457edea1b8f22891a000004") + user_id: str = pydantic.Field() """ user_id of the identity to be verified. """ diff --git a/src/auth0/management/types/import_encryption_key_response_content.py b/src/auth0/management/types/import_encryption_key_response_content.py index 481c94e7..ae3e26fd 100644 --- a/src/auth0/management/types/import_encryption_key_response_content.py +++ b/src/auth0/management/types/import_encryption_key_response_content.py @@ -31,7 +31,7 @@ class ImportEncryptionKeyResponseContent(UniversalBaseModel): Key update timestamp """ - parent_kid: str = pydantic.Field() + parent_kid: typing.Optional[str] = pydantic.Field(default=None) """ ID of parent wrapping key """ diff --git a/src/auth0/management/types/integration.py b/src/auth0/management/types/integration.py index 0c2310dd..d20c7e18 100644 --- a/src/auth0/management/types/integration.py +++ b/src/auth0/management/types/integration.py @@ -15,29 +15,29 @@ class Integration(UniversalBaseModel): publish. A partner may create one or many of these integrations. """ - id: typing.Optional[str] = pydantic.Field(default="8e9fe2d0-a2fc-4c8c-9e35-dae5afadb70b") + id: typing.Optional[str] = pydantic.Field(default=None) """ id is a system generated GUID. This same ID is designed to be federated in all the applicable localities. """ - catalog_id: typing.Optional[str] = pydantic.Field(default="awesome-auth0-integration") + catalog_id: typing.Optional[str] = pydantic.Field(default=None) """ catalog_id refers to the ID in the marketplace catalog """ - url_slug: typing.Optional[str] = pydantic.Field(default="awesome-auth0-integration-slug") + url_slug: typing.Optional[str] = pydantic.Field(default=None) """ url_slug refers to the url_slug in the marketplace catalog """ - partner_id: typing.Optional[str] = pydantic.Field(default="b8575c12-8d9d-4b5c-b28e-671fe9d39029") + partner_id: typing.Optional[str] = pydantic.Field(default=None) """ partner_id is the foreign key reference to the partner account this integration belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="Example Auth0 integration") + name: typing.Optional[str] = pydantic.Field(default=None) """ name is the integration name, which will be used for display purposes in the marketplace. @@ -46,13 +46,13 @@ class Integration(UniversalBaseModel): characters. Can adjust this easily later. """ - description: typing.Optional[str] = pydantic.Field(default="An awesome Auth0 integration") + description: typing.Optional[str] = pydantic.Field(default=None) """ description adds more text for the integration name -- also relevant for the marketplace listing. """ - short_description: typing.Optional[str] = pydantic.Field(default="Awesome Auth0 integration") + short_description: typing.Optional[str] = pydantic.Field(default=None) """ short_description is the brief description of the integration, which is used for display purposes in cards """ diff --git a/src/auth0/management/types/integration_sem_ver.py b/src/auth0/management/types/integration_sem_ver.py index d5049d8c..669adf1a 100644 --- a/src/auth0/management/types/integration_sem_ver.py +++ b/src/auth0/management/types/integration_sem_ver.py @@ -11,12 +11,12 @@ class IntegrationSemVer(UniversalBaseModel): Semver denotes the major.minor version of an integration release """ - major: typing.Optional[int] = pydantic.Field(default=1) + major: typing.Optional[int] = pydantic.Field(default=None) """ Major is the major number of a semver """ - minor: typing.Optional[int] = pydantic.Field(default=1) + minor: typing.Optional[int] = pydantic.Field(default=None) """ Minior is the minior number of a semver """ diff --git a/src/auth0/management/types/list_action_bindings_paginated_response_content.py b/src/auth0/management/types/list_action_bindings_paginated_response_content.py index f03e793a..d534b26b 100644 --- a/src/auth0/management/types/list_action_bindings_paginated_response_content.py +++ b/src/auth0/management/types/list_action_bindings_paginated_response_content.py @@ -8,17 +8,17 @@ class ListActionBindingsPaginatedResponseContent(UniversalBaseModel): - total: typing.Optional[float] = pydantic.Field(default=1.0) + total: typing.Optional[float] = pydantic.Field(default=None) """ The total result count. """ - page: typing.Optional[float] = pydantic.Field(default=0.0) + page: typing.Optional[float] = pydantic.Field(default=None) """ Page index of the results being returned. First page is 0. """ - per_page: typing.Optional[float] = pydantic.Field(default=20.0) + per_page: typing.Optional[float] = pydantic.Field(default=None) """ Number of results per page. """ diff --git a/src/auth0/management/types/list_action_versions_paginated_response_content.py b/src/auth0/management/types/list_action_versions_paginated_response_content.py index ba82550a..a11c10d9 100644 --- a/src/auth0/management/types/list_action_versions_paginated_response_content.py +++ b/src/auth0/management/types/list_action_versions_paginated_response_content.py @@ -8,17 +8,17 @@ class ListActionVersionsPaginatedResponseContent(UniversalBaseModel): - total: typing.Optional[float] = pydantic.Field(default=1.0) + total: typing.Optional[float] = pydantic.Field(default=None) """ The total result count. """ - page: typing.Optional[float] = pydantic.Field(default=0.0) + page: typing.Optional[float] = pydantic.Field(default=None) """ Page index of the results being returned. First page is 0. """ - per_page: typing.Optional[float] = pydantic.Field(default=20.0) + per_page: typing.Optional[float] = pydantic.Field(default=None) """ Number of results per page. """ diff --git a/src/auth0/management/types/list_actions_paginated_response_content.py b/src/auth0/management/types/list_actions_paginated_response_content.py index d3b26382..2573b82e 100644 --- a/src/auth0/management/types/list_actions_paginated_response_content.py +++ b/src/auth0/management/types/list_actions_paginated_response_content.py @@ -8,17 +8,17 @@ class ListActionsPaginatedResponseContent(UniversalBaseModel): - total: typing.Optional[float] = pydantic.Field(default=1.0) + total: typing.Optional[float] = pydantic.Field(default=None) """ The total result count. """ - page: typing.Optional[float] = pydantic.Field(default=0.0) + page: typing.Optional[float] = pydantic.Field(default=None) """ Page index of the results being returned. First page is 0. """ - per_page: typing.Optional[float] = pydantic.Field(default=20.0) + per_page: typing.Optional[float] = pydantic.Field(default=None) """ Number of results per page. """ diff --git a/src/auth0/management/types/list_aculs_response_content_item.py b/src/auth0/management/types/list_aculs_response_content_item.py index 673a2a7c..a2140402 100644 --- a/src/auth0/management/types/list_aculs_response_content_item.py +++ b/src/auth0/management/types/list_aculs_response_content_item.py @@ -28,12 +28,12 @@ class ListAculsResponseContentItem(UniversalBaseModel): rendering_mode: typing.Optional[AculRenderingModeEnum] = None context_configuration: typing.Optional[AculContextConfiguration] = None - default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=False) + default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Override Universal Login default head tags """ - use_page_template: typing.Optional[bool] = pydantic.Field(default=False) + use_page_template: typing.Optional[bool] = pydantic.Field(default=None) """ Use page template with ACUL """ diff --git a/src/auth0/management/types/list_event_streams_response_content.py b/src/auth0/management/types/list_event_streams_response_content.py index bdfe1718..53be159c 100644 --- a/src/auth0/management/types/list_event_streams_response_content.py +++ b/src/auth0/management/types/list_event_streams_response_content.py @@ -11,8 +11,10 @@ class ListEventStreamsResponseContent(UniversalBaseModel): event_streams: typing_extensions.Annotated[ - typing.Optional[typing.List[EventStreamResponseContent]], FieldMetadata(alias="eventStreams") - ] = pydantic.Field(alias="eventStreams", default=None) + typing.Optional[typing.List[EventStreamResponseContent]], + FieldMetadata(alias="eventStreams"), + pydantic.Field(alias="eventStreams"), + ] = None next: typing.Optional[str] = pydantic.Field(default=None) """ Opaque identifier for use with the from query parameter for the next page of results. diff --git a/src/auth0/management/types/log.py b/src/auth0/management/types/log.py index d54b6f77..f5474df7 100644 --- a/src/auth0/management/types/log.py +++ b/src/auth0/management/types/log.py @@ -14,7 +14,7 @@ class Log(UniversalBaseModel): date: typing.Optional[LogDate] = None - type: typing.Optional[str] = pydantic.Field(default="sapi") + type: typing.Optional[str] = pydantic.Field(default=None) """ Type of event. """ @@ -34,27 +34,27 @@ class Log(UniversalBaseModel): ID of the connection the event relates to. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the client (application). """ - client_name: typing.Optional[str] = pydantic.Field(default="My application Name") + client_name: typing.Optional[str] = pydantic.Field(default=None) """ Name of the client (application). """ - ip: typing.Optional[str] = pydantic.Field(default="190.257.209.19") + ip: typing.Optional[str] = pydantic.Field(default=None) """ IP address of the log event source. """ - hostname: typing.Optional[str] = pydantic.Field(default="190.257.209.19") + hostname: typing.Optional[str] = pydantic.Field(default=None) """ Hostname the event applies to. """ - user_id: typing.Optional[str] = pydantic.Field(default="auth0|56c75c4e42b6359e98374bc2") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user involved in the event. """ @@ -69,7 +69,7 @@ class Log(UniversalBaseModel): API audience the event applies to. """ - scope: typing.Optional[str] = pydantic.Field(default="") + scope: typing.Optional[str] = pydantic.Field(default=None) """ Scope permissions applied to the event. """ @@ -89,13 +89,14 @@ class Log(UniversalBaseModel): Unique ID of the event. """ - is_mobile: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isMobile")] = pydantic.Field( - alias="isMobile", default=None - ) - """ - Whether the client was a mobile device (true) or desktop/laptop/server (false). - """ - + is_mobile: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isMobile"), + pydantic.Field( + alias="isMobile", + description="Whether the client was a mobile device (true) or desktop/laptop/server (false).", + ), + ] = None details: typing.Optional[LogDetails] = None user_agent: typing.Optional[str] = pydantic.Field(default=None) """ diff --git a/src/auth0/management/types/log_location_info.py b/src/auth0/management/types/log_location_info.py index 2965536a..5956d7ca 100644 --- a/src/auth0/management/types/log_location_info.py +++ b/src/auth0/management/types/log_location_info.py @@ -18,13 +18,14 @@ class LogLocationInfo(UniversalBaseModel): Two-letter Alpha-2 ISO 3166-1 country code. """ - country_code_3: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="country_code3")] = ( - pydantic.Field(alias="country_code3", default=None) - ) - """ - Three-letter Alpha-3 ISO 3166-1 country code. - """ - + country_code_3: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="country_code3"), + pydantic.Field( + alias="country_code3", + description='Three-letter Alpha-3 ISO 3166-1 country code.', + ), + ] = None country_name: typing.Optional[str] = pydantic.Field(default=None) """ Full country name in English. diff --git a/src/auth0/management/types/log_security_context.py b/src/auth0/management/types/log_security_context.py index be6abb25..c3367935 100644 --- a/src/auth0/management/types/log_security_context.py +++ b/src/auth0/management/types/log_security_context.py @@ -13,19 +13,16 @@ class LogSecurityContext(UniversalBaseModel): Information about security-related signals. """ - ja_3: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="ja3")] = pydantic.Field( - alias="ja3", default=None - ) - """ - JA3 fingerprint value. - """ - - ja_4: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="ja4")] = pydantic.Field( - alias="ja4", default=None - ) - """ - JA4 fingerprint value. - """ + ja_3: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="ja3"), + pydantic.Field(alias="ja3", description="JA3 fingerprint value."), + ] = None + ja_4: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="ja4"), + pydantic.Field(alias="ja4", description="JA4 fingerprint value."), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_datadog_response_schema.py b/src/auth0/management/types/log_stream_datadog_response_schema.py index c712989d..324c2fb3 100644 --- a/src/auth0/management/types/log_stream_datadog_response_schema.py +++ b/src/auth0/management/types/log_stream_datadog_response_schema.py @@ -26,13 +26,11 @@ class LogStreamDatadogResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamDatadogEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_datadog_sink.py b/src/auth0/management/types/log_stream_datadog_sink.py index 5e91d6d8..41c8d8fa 100644 --- a/src/auth0/management/types/log_stream_datadog_sink.py +++ b/src/auth0/management/types/log_stream_datadog_sink.py @@ -10,16 +10,12 @@ class LogStreamDatadogSink(UniversalBaseModel): - datadog_api_key: typing_extensions.Annotated[str, FieldMetadata(alias="datadogApiKey")] = pydantic.Field( - alias="datadogApiKey" - ) - """ - Datadog API Key - """ - - datadog_region: typing_extensions.Annotated[LogStreamDatadogRegionEnum, FieldMetadata(alias="datadogRegion")] = ( - pydantic.Field(alias="datadogRegion") - ) + datadog_api_key: typing_extensions.Annotated[ + str, FieldMetadata(alias="datadogApiKey"), pydantic.Field(alias="datadogApiKey", description="Datadog API Key") + ] + datadog_region: typing_extensions.Annotated[ + LogStreamDatadogRegionEnum, FieldMetadata(alias="datadogRegion"), pydantic.Field(alias="datadogRegion") + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_event_bridge_response_schema.py b/src/auth0/management/types/log_stream_event_bridge_response_schema.py index e266c6be..b2da9238 100644 --- a/src/auth0/management/types/log_stream_event_bridge_response_schema.py +++ b/src/auth0/management/types/log_stream_event_bridge_response_schema.py @@ -26,13 +26,11 @@ class LogStreamEventBridgeResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamEventBridgeEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_event_bridge_sink.py b/src/auth0/management/types/log_stream_event_bridge_sink.py index 78299e64..489638ac 100644 --- a/src/auth0/management/types/log_stream_event_bridge_sink.py +++ b/src/auth0/management/types/log_stream_event_bridge_sink.py @@ -10,22 +10,17 @@ class LogStreamEventBridgeSink(UniversalBaseModel): - aws_account_id: typing_extensions.Annotated[str, FieldMetadata(alias="awsAccountId")] = pydantic.Field( - alias="awsAccountId" - ) - """ - AWS account ID - """ - - aws_region: typing_extensions.Annotated[LogStreamEventBridgeSinkRegionEnum, FieldMetadata(alias="awsRegion")] = ( - pydantic.Field(alias="awsRegion") - ) + aws_account_id: typing_extensions.Annotated[ + str, FieldMetadata(alias="awsAccountId"), pydantic.Field(alias="awsAccountId", description="AWS account ID") + ] + aws_region: typing_extensions.Annotated[ + LogStreamEventBridgeSinkRegionEnum, FieldMetadata(alias="awsRegion"), pydantic.Field(alias="awsRegion") + ] aws_partner_event_source: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="awsPartnerEventSource") - ] = pydantic.Field(alias="awsPartnerEventSource", default=None) - """ - AWS EventBridge partner event source - """ + typing.Optional[str], + FieldMetadata(alias="awsPartnerEventSource"), + pydantic.Field(alias="awsPartnerEventSource", description="AWS EventBridge partner event source"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_event_grid_response_schema.py b/src/auth0/management/types/log_stream_event_grid_response_schema.py index b2046501..caef71d4 100644 --- a/src/auth0/management/types/log_stream_event_grid_response_schema.py +++ b/src/auth0/management/types/log_stream_event_grid_response_schema.py @@ -26,13 +26,11 @@ class LogStreamEventGridResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamEventGridEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_event_grid_sink.py b/src/auth0/management/types/log_stream_event_grid_sink.py index 2974b5d0..62e21769 100644 --- a/src/auth0/management/types/log_stream_event_grid_sink.py +++ b/src/auth0/management/types/log_stream_event_grid_sink.py @@ -10,29 +10,24 @@ class LogStreamEventGridSink(UniversalBaseModel): - azure_subscription_id: typing_extensions.Annotated[str, FieldMetadata(alias="azureSubscriptionId")] = ( - pydantic.Field(alias="azureSubscriptionId") - ) - """ - Subscription ID - """ - - azure_region: typing_extensions.Annotated[LogStreamEventGridRegionEnum, FieldMetadata(alias="azureRegion")] = ( - pydantic.Field(alias="azureRegion") - ) - azure_resource_group: typing_extensions.Annotated[str, FieldMetadata(alias="azureResourceGroup")] = pydantic.Field( - alias="azureResourceGroup" - ) - """ - Resource Group - """ - - azure_partner_topic: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="azurePartnerTopic")] = ( - pydantic.Field(alias="azurePartnerTopic", default=None) - ) - """ - Partner Topic - """ + azure_subscription_id: typing_extensions.Annotated[ + str, + FieldMetadata(alias="azureSubscriptionId"), + pydantic.Field(alias="azureSubscriptionId", description="Subscription ID"), + ] + azure_region: typing_extensions.Annotated[ + LogStreamEventGridRegionEnum, FieldMetadata(alias="azureRegion"), pydantic.Field(alias="azureRegion") + ] + azure_resource_group: typing_extensions.Annotated[ + str, + FieldMetadata(alias="azureResourceGroup"), + pydantic.Field(alias="azureResourceGroup", description="Resource Group"), + ] + azure_partner_topic: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="azurePartnerTopic"), + pydantic.Field(alias="azurePartnerTopic", description="Partner Topic"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_http_response_schema.py b/src/auth0/management/types/log_stream_http_response_schema.py index 7e7124f7..045c8972 100644 --- a/src/auth0/management/types/log_stream_http_response_schema.py +++ b/src/auth0/management/types/log_stream_http_response_schema.py @@ -26,13 +26,11 @@ class LogStreamHttpResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamHttpEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_http_sink.py b/src/auth0/management/types/log_stream_http_sink.py index c5f791b1..e458ed0c 100644 --- a/src/auth0/management/types/log_stream_http_sink.py +++ b/src/auth0/management/types/log_stream_http_sink.py @@ -11,36 +11,29 @@ class LogStreamHttpSink(UniversalBaseModel): - http_authorization: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="httpAuthorization")] = ( - pydantic.Field(alias="httpAuthorization", default=None) - ) - """ - HTTP Authorization header - """ - + http_authorization: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="httpAuthorization"), + pydantic.Field(alias="httpAuthorization", description="HTTP Authorization header"), + ] = None http_content_format: typing_extensions.Annotated[ - typing.Optional[LogStreamHttpContentFormatEnum], FieldMetadata(alias="httpContentFormat") - ] = pydantic.Field(alias="httpContentFormat", default=None) - http_content_type: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="httpContentType")] = ( - pydantic.Field(alias="httpContentType", default=None) - ) - """ - HTTP Content-Type header - """ - - http_endpoint: typing_extensions.Annotated[str, FieldMetadata(alias="httpEndpoint")] = pydantic.Field( - alias="httpEndpoint" - ) - """ - HTTP endpoint - """ - + typing.Optional[LogStreamHttpContentFormatEnum], + FieldMetadata(alias="httpContentFormat"), + pydantic.Field(alias="httpContentFormat"), + ] = None + http_content_type: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="httpContentType"), + pydantic.Field(alias="httpContentType", description="HTTP Content-Type header"), + ] = None + http_endpoint: typing_extensions.Annotated[ + str, FieldMetadata(alias="httpEndpoint"), pydantic.Field(alias="httpEndpoint", description="HTTP endpoint") + ] http_custom_headers: typing_extensions.Annotated[ - typing.Optional[typing.List[HttpCustomHeader]], FieldMetadata(alias="httpCustomHeaders") - ] = pydantic.Field(alias="httpCustomHeaders", default=None) - """ - custom HTTP headers - """ + typing.Optional[typing.List[HttpCustomHeader]], + FieldMetadata(alias="httpCustomHeaders"), + pydantic.Field(alias="httpCustomHeaders", description="custom HTTP headers"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_mixpanel_response_schema.py b/src/auth0/management/types/log_stream_mixpanel_response_schema.py index 567cbe0d..19cf2148 100644 --- a/src/auth0/management/types/log_stream_mixpanel_response_schema.py +++ b/src/auth0/management/types/log_stream_mixpanel_response_schema.py @@ -26,13 +26,11 @@ class LogStreamMixpanelResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamMixpanelEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_mixpanel_sink.py b/src/auth0/management/types/log_stream_mixpanel_sink.py index 6734c4dd..78691801 100644 --- a/src/auth0/management/types/log_stream_mixpanel_sink.py +++ b/src/auth0/management/types/log_stream_mixpanel_sink.py @@ -10,29 +10,24 @@ class LogStreamMixpanelSink(UniversalBaseModel): - mixpanel_region: typing_extensions.Annotated[LogStreamMixpanelRegionEnum, FieldMetadata(alias="mixpanelRegion")] = ( - pydantic.Field(alias="mixpanelRegion") - ) - mixpanel_project_id: typing_extensions.Annotated[str, FieldMetadata(alias="mixpanelProjectId")] = pydantic.Field( - alias="mixpanelProjectId" - ) - """ - Mixpanel Project Id - """ - + mixpanel_region: typing_extensions.Annotated[ + LogStreamMixpanelRegionEnum, FieldMetadata(alias="mixpanelRegion"), pydantic.Field(alias="mixpanelRegion") + ] + mixpanel_project_id: typing_extensions.Annotated[ + str, + FieldMetadata(alias="mixpanelProjectId"), + pydantic.Field(alias="mixpanelProjectId", description="Mixpanel Project Id"), + ] mixpanel_service_account_username: typing_extensions.Annotated[ - str, FieldMetadata(alias="mixpanelServiceAccountUsername") - ] = pydantic.Field(alias="mixpanelServiceAccountUsername") - """ - Mixpanel Service Account Username - """ - + str, + FieldMetadata(alias="mixpanelServiceAccountUsername"), + pydantic.Field(alias="mixpanelServiceAccountUsername", description="Mixpanel Service Account Username"), + ] mixpanel_service_account_password: typing_extensions.Annotated[ - str, FieldMetadata(alias="mixpanelServiceAccountPassword") - ] = pydantic.Field(alias="mixpanelServiceAccountPassword") - """ - Mixpanel Service Account Password - """ + str, + FieldMetadata(alias="mixpanelServiceAccountPassword"), + pydantic.Field(alias="mixpanelServiceAccountPassword", description="Mixpanel Service Account Password"), + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_mixpanel_sink_patch.py b/src/auth0/management/types/log_stream_mixpanel_sink_patch.py index 3b70075e..329629d4 100644 --- a/src/auth0/management/types/log_stream_mixpanel_sink_patch.py +++ b/src/auth0/management/types/log_stream_mixpanel_sink_patch.py @@ -10,29 +10,24 @@ class LogStreamMixpanelSinkPatch(UniversalBaseModel): - mixpanel_region: typing_extensions.Annotated[LogStreamMixpanelRegionEnum, FieldMetadata(alias="mixpanelRegion")] = ( - pydantic.Field(alias="mixpanelRegion") - ) - mixpanel_project_id: typing_extensions.Annotated[str, FieldMetadata(alias="mixpanelProjectId")] = pydantic.Field( - alias="mixpanelProjectId" - ) - """ - Mixpanel Project Id - """ - + mixpanel_region: typing_extensions.Annotated[ + LogStreamMixpanelRegionEnum, FieldMetadata(alias="mixpanelRegion"), pydantic.Field(alias="mixpanelRegion") + ] + mixpanel_project_id: typing_extensions.Annotated[ + str, + FieldMetadata(alias="mixpanelProjectId"), + pydantic.Field(alias="mixpanelProjectId", description="Mixpanel Project Id"), + ] mixpanel_service_account_username: typing_extensions.Annotated[ - str, FieldMetadata(alias="mixpanelServiceAccountUsername") - ] = pydantic.Field(alias="mixpanelServiceAccountUsername") - """ - Mixpanel Service Account Username - """ - + str, + FieldMetadata(alias="mixpanelServiceAccountUsername"), + pydantic.Field(alias="mixpanelServiceAccountUsername", description="Mixpanel Service Account Username"), + ] mixpanel_service_account_password: typing_extensions.Annotated[ - typing.Optional[str], FieldMetadata(alias="mixpanelServiceAccountPassword") - ] = pydantic.Field(alias="mixpanelServiceAccountPassword", default=None) - """ - Mixpanel Service Account Password - """ + typing.Optional[str], + FieldMetadata(alias="mixpanelServiceAccountPassword"), + pydantic.Field(alias="mixpanelServiceAccountPassword", description="Mixpanel Service Account Password"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_segment_response_schema.py b/src/auth0/management/types/log_stream_segment_response_schema.py index eac5f0b2..e724ea1f 100644 --- a/src/auth0/management/types/log_stream_segment_response_schema.py +++ b/src/auth0/management/types/log_stream_segment_response_schema.py @@ -26,13 +26,11 @@ class LogStreamSegmentResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamSegmentEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_segment_sink.py b/src/auth0/management/types/log_stream_segment_sink.py index 18a28d2f..114bbd01 100644 --- a/src/auth0/management/types/log_stream_segment_sink.py +++ b/src/auth0/management/types/log_stream_segment_sink.py @@ -9,12 +9,11 @@ class LogStreamSegmentSink(UniversalBaseModel): - segment_write_key: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="segmentWriteKey")] = ( - pydantic.Field(alias="segmentWriteKey", default=None) - ) - """ - Segment write key - """ + segment_write_key: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="segmentWriteKey"), + pydantic.Field(alias="segmentWriteKey", description="Segment write key"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_segment_sink_write_key.py b/src/auth0/management/types/log_stream_segment_sink_write_key.py index 9070a756..de7ef935 100644 --- a/src/auth0/management/types/log_stream_segment_sink_write_key.py +++ b/src/auth0/management/types/log_stream_segment_sink_write_key.py @@ -9,12 +9,11 @@ class LogStreamSegmentSinkWriteKey(UniversalBaseModel): - segment_write_key: typing_extensions.Annotated[str, FieldMetadata(alias="segmentWriteKey")] = pydantic.Field( - alias="segmentWriteKey" - ) - """ - Segment write key - """ + segment_write_key: typing_extensions.Annotated[ + str, + FieldMetadata(alias="segmentWriteKey"), + pydantic.Field(alias="segmentWriteKey", description="Segment write key"), + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_splunk_response_schema.py b/src/auth0/management/types/log_stream_splunk_response_schema.py index 077e7e4f..831c006d 100644 --- a/src/auth0/management/types/log_stream_splunk_response_schema.py +++ b/src/auth0/management/types/log_stream_splunk_response_schema.py @@ -26,13 +26,11 @@ class LogStreamSplunkResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamSplunkEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_splunk_sink.py b/src/auth0/management/types/log_stream_splunk_sink.py index 4884eb30..0cf2e60b 100644 --- a/src/auth0/management/types/log_stream_splunk_sink.py +++ b/src/auth0/management/types/log_stream_splunk_sink.py @@ -9,33 +9,22 @@ class LogStreamSplunkSink(UniversalBaseModel): - splunk_domain: typing_extensions.Annotated[str, FieldMetadata(alias="splunkDomain")] = pydantic.Field( - alias="splunkDomain" - ) - """ - Splunk URL Endpoint - """ - - splunk_port: typing_extensions.Annotated[str, FieldMetadata(alias="splunkPort")] = pydantic.Field( - alias="splunkPort" - ) - """ - Port - """ - - splunk_token: typing_extensions.Annotated[str, FieldMetadata(alias="splunkToken")] = pydantic.Field( - alias="splunkToken" - ) - """ - Splunk token - """ - - splunk_secure: typing_extensions.Annotated[bool, FieldMetadata(alias="splunkSecure")] = pydantic.Field( - alias="splunkSecure" - ) - """ - Verify TLS certificate - """ + splunk_domain: typing_extensions.Annotated[ + str, + FieldMetadata(alias="splunkDomain"), + pydantic.Field(alias="splunkDomain", description="Splunk URL Endpoint"), + ] + splunk_port: typing_extensions.Annotated[ + str, FieldMetadata(alias="splunkPort"), pydantic.Field(alias="splunkPort", description="Port") + ] + splunk_token: typing_extensions.Annotated[ + str, FieldMetadata(alias="splunkToken"), pydantic.Field(alias="splunkToken", description="Splunk token") + ] + splunk_secure: typing_extensions.Annotated[ + bool, + FieldMetadata(alias="splunkSecure"), + pydantic.Field(alias="splunkSecure", description="Verify TLS certificate"), + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/log_stream_sumo_response_schema.py b/src/auth0/management/types/log_stream_sumo_response_schema.py index fff68699..06b046b9 100644 --- a/src/auth0/management/types/log_stream_sumo_response_schema.py +++ b/src/auth0/management/types/log_stream_sumo_response_schema.py @@ -26,13 +26,11 @@ class LogStreamSumoResponseSchema(UniversalBaseModel): status: typing.Optional[LogStreamStatusEnum] = None type: typing.Optional[LogStreamSumoEnum] = None - is_priority: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isPriority")] = pydantic.Field( - alias="isPriority", default=None - ) - """ - True for priority log streams, false for non-priority - """ - + is_priority: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isPriority"), + pydantic.Field(alias="isPriority", description="True for priority log streams, false for non-priority"), + ] = None filters: typing.Optional[typing.List[LogStreamFilter]] = pydantic.Field(default=None) """ Only logs events matching these filters will be delivered by the stream. If omitted or empty, all events will be delivered. diff --git a/src/auth0/management/types/log_stream_sumo_sink.py b/src/auth0/management/types/log_stream_sumo_sink.py index 1d3c1120..1cdb2c8d 100644 --- a/src/auth0/management/types/log_stream_sumo_sink.py +++ b/src/auth0/management/types/log_stream_sumo_sink.py @@ -9,12 +9,11 @@ class LogStreamSumoSink(UniversalBaseModel): - sumo_source_address: typing_extensions.Annotated[str, FieldMetadata(alias="sumoSourceAddress")] = pydantic.Field( - alias="sumoSourceAddress" - ) - """ - HTTP Source Address - """ + sumo_source_address: typing_extensions.Annotated[ + str, + FieldMetadata(alias="sumoSourceAddress"), + pydantic.Field(alias="sumoSourceAddress", description="HTTP Source Address"), + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/mdl_presentation_request.py b/src/auth0/management/types/mdl_presentation_request.py index 33fc3e2c..684c0b8b 100644 --- a/src/auth0/management/types/mdl_presentation_request.py +++ b/src/auth0/management/types/mdl_presentation_request.py @@ -15,8 +15,10 @@ class MdlPresentationRequest(UniversalBaseModel): """ org_iso_18013_5_1_m_dl: typing_extensions.Annotated[ - MdlPresentationRequestProperties, FieldMetadata(alias="org.iso.18013.5.1.mDL") - ] = pydantic.Field(alias="org.iso.18013.5.1.mDL") + MdlPresentationRequestProperties, + FieldMetadata(alias="org.iso.18013.5.1.mDL"), + pydantic.Field(alias="org.iso.18013.5.1.mDL"), + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/mdl_presentation_request_properties.py b/src/auth0/management/types/mdl_presentation_request_properties.py index 1c0c0504..cb6be49a 100644 --- a/src/auth0/management/types/mdl_presentation_request_properties.py +++ b/src/auth0/management/types/mdl_presentation_request_properties.py @@ -11,8 +11,8 @@ class MdlPresentationRequestProperties(UniversalBaseModel): org_iso_18013_5_1: typing_extensions.Annotated[ - MdlPresentationProperties, FieldMetadata(alias="org.iso.18013.5.1") - ] = pydantic.Field(alias="org.iso.18013.5.1") + MdlPresentationProperties, FieldMetadata(alias="org.iso.18013.5.1"), pydantic.Field(alias="org.iso.18013.5.1") + ] if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/native_social_login_apple.py b/src/auth0/management/types/native_social_login_apple.py index 16073c32..29164ed6 100644 --- a/src/auth0/management/types/native_social_login_apple.py +++ b/src/auth0/management/types/native_social_login_apple.py @@ -11,7 +11,7 @@ class NativeSocialLoginApple(UniversalBaseModel): Native Social Login support for the Apple connection """ - enabled: typing.Optional[bool] = pydantic.Field(default=False) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Determine whether or not to allow signing in natively using an Apple authorization code """ diff --git a/src/auth0/management/types/native_social_login_facebook.py b/src/auth0/management/types/native_social_login_facebook.py index a617009c..1563e38f 100644 --- a/src/auth0/management/types/native_social_login_facebook.py +++ b/src/auth0/management/types/native_social_login_facebook.py @@ -11,7 +11,7 @@ class NativeSocialLoginFacebook(UniversalBaseModel): Native Social Login support for the Facebook connection """ - enabled: typing.Optional[bool] = pydantic.Field(default=False) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Determine whether or not to allow signing in natively using Facebook """ diff --git a/src/auth0/management/types/native_social_login_google.py b/src/auth0/management/types/native_social_login_google.py index 099d7f03..04c4cfff 100644 --- a/src/auth0/management/types/native_social_login_google.py +++ b/src/auth0/management/types/native_social_login_google.py @@ -11,7 +11,7 @@ class NativeSocialLoginGoogle(UniversalBaseModel): Native Social Login support for the google-oauth2 connection """ - enabled: typing.Optional[bool] = pydantic.Field(default=False) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Determine whether or not to allow signing in natively using a Google ID token """ diff --git a/src/auth0/management/types/network_acl_match.py b/src/auth0/management/types/network_acl_match.py index 4ad5a1ee..5bb91bd4 100644 --- a/src/auth0/management/types/network_acl_match.py +++ b/src/auth0/management/types/network_acl_match.py @@ -15,17 +15,25 @@ class NetworkAclMatch(UniversalBaseModel): geo_country_codes: typing.Optional[typing.List[str]] = None geo_subdivision_codes: typing.Optional[typing.List[str]] = None ipv_4_cidrs: typing_extensions.Annotated[ - typing.Optional[typing.List[NetworkAclMatchIpv4Cidr]], FieldMetadata(alias="ipv4_cidrs") - ] = pydantic.Field(alias="ipv4_cidrs", default=None) + typing.Optional[typing.List[NetworkAclMatchIpv4Cidr]], + FieldMetadata(alias="ipv4_cidrs"), + pydantic.Field(alias="ipv4_cidrs"), + ] = None ipv_6_cidrs: typing_extensions.Annotated[ - typing.Optional[typing.List[NetworkAclMatchIpv6Cidr]], FieldMetadata(alias="ipv6_cidrs") - ] = pydantic.Field(alias="ipv6_cidrs", default=None) + typing.Optional[typing.List[NetworkAclMatchIpv6Cidr]], + FieldMetadata(alias="ipv6_cidrs"), + pydantic.Field(alias="ipv6_cidrs"), + ] = None ja_3_fingerprints: typing_extensions.Annotated[ - typing.Optional[typing.List[str]], FieldMetadata(alias="ja3_fingerprints") - ] = pydantic.Field(alias="ja3_fingerprints", default=None) + typing.Optional[typing.List[str]], + FieldMetadata(alias="ja3_fingerprints"), + pydantic.Field(alias="ja3_fingerprints"), + ] = None ja_4_fingerprints: typing_extensions.Annotated[ - typing.Optional[typing.List[str]], FieldMetadata(alias="ja4_fingerprints") - ] = pydantic.Field(alias="ja4_fingerprints", default=None) + typing.Optional[typing.List[str]], + FieldMetadata(alias="ja4_fingerprints"), + pydantic.Field(alias="ja4_fingerprints"), + ] = None user_agents: typing.Optional[typing.List[str]] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/organization.py b/src/auth0/management/types/organization.py index e39f16a6..239dffee 100644 --- a/src/auth0/management/types/organization.py +++ b/src/auth0/management/types/organization.py @@ -15,12 +15,12 @@ class Organization(UniversalBaseModel): Organization identifier. """ - name: typing.Optional[str] = pydantic.Field(default="organization-1") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of this organization. """ - display_name: typing.Optional[str] = pydantic.Field(default="Acme Users") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this organization. """ diff --git a/src/auth0/management/types/organization_invitation.py b/src/auth0/management/types/organization_invitation.py index 1daa2530..cf2adbf0 100644 --- a/src/auth0/management/types/organization_invitation.py +++ b/src/auth0/management/types/organization_invitation.py @@ -12,7 +12,7 @@ class OrganizationInvitation(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="uinv_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the user invitation. """ @@ -24,9 +24,7 @@ class OrganizationInvitation(UniversalBaseModel): inviter: typing.Optional[OrganizationInvitationInviter] = None invitee: typing.Optional[OrganizationInvitationInvitee] = None - invitation_url: typing.Optional[str] = pydantic.Field( - default="https://mycompany.org/login?invitation=f81dWWYW6gzGGicxT8Ha0txBkGNcAcYr&organization=org_0000000000000001&organization_name=acme" - ) + invitation_url: typing.Optional[str] = pydantic.Field(default=None) """ The invitation url to be send to the invitee. """ @@ -41,12 +39,12 @@ class OrganizationInvitation(UniversalBaseModel): The ISO 8601 formatted timestamp representing the expiration time of the invitation. """ - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ Auth0 client ID. Used to resolve the application's login initiation endpoint. """ - connection_id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + connection_id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the connection to force invitee to authenticate with. """ diff --git a/src/auth0/management/types/organization_invitation_invitee.py b/src/auth0/management/types/organization_invitation_invitee.py index 8586d94a..1876174b 100644 --- a/src/auth0/management/types/organization_invitation_invitee.py +++ b/src/auth0/management/types/organization_invitation_invitee.py @@ -7,7 +7,7 @@ class OrganizationInvitationInvitee(UniversalBaseModel): - email: str = pydantic.Field(default="john.doe@gmail.com") + email: str = pydantic.Field() """ The invitee's email. """ diff --git a/src/auth0/management/types/organization_invitation_inviter.py b/src/auth0/management/types/organization_invitation_inviter.py index d5263688..f73da984 100644 --- a/src/auth0/management/types/organization_invitation_inviter.py +++ b/src/auth0/management/types/organization_invitation_inviter.py @@ -7,7 +7,7 @@ class OrganizationInvitationInviter(UniversalBaseModel): - name: str = pydantic.Field(default="Jane Doe") + name: str = pydantic.Field() """ The inviter's name. """ diff --git a/src/auth0/management/types/organization_member.py b/src/auth0/management/types/organization_member.py index 2c0c606a..4e14aa4b 100644 --- a/src/auth0/management/types/organization_member.py +++ b/src/auth0/management/types/organization_member.py @@ -23,7 +23,7 @@ class OrganizationMember(UniversalBaseModel): Name of this user. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ diff --git a/src/auth0/management/types/partial_phone_template_content.py b/src/auth0/management/types/partial_phone_template_content.py index bbc7f2ad..7c46c3ce 100644 --- a/src/auth0/management/types/partial_phone_template_content.py +++ b/src/auth0/management/types/partial_phone_template_content.py @@ -10,13 +10,13 @@ class PartialPhoneTemplateContent(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default=None - ) - """ - Default phone number to be used as 'from' when sending a phone notification - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field( + alias="from", description="Default phone number to be used as 'from' when sending a phone notification" + ), + ] = None body: typing.Optional[PhoneTemplateBody] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/patch_client_credential_response_content.py b/src/auth0/management/types/patch_client_credential_response_content.py index da9d307b..c9513379 100644 --- a/src/auth0/management/types/patch_client_credential_response_content.py +++ b/src/auth0/management/types/patch_client_credential_response_content.py @@ -12,17 +12,17 @@ class PatchClientCredentialResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="cred_1m7sfABoNTTKYwTQ8qt6tX") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the credential. Generated on creation. """ - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name given to the credential by the user. """ - kid: typing.Optional[str] = pydantic.Field(default="IZSSTECp...") + kid: typing.Optional[str] = pydantic.Field(default=None) """ The key identifier of the credential, generated on creation. """ @@ -34,13 +34,11 @@ class PatchClientCredentialResponseContent(UniversalBaseModel): The X509 certificate's Subject Distinguished Name """ - thumbprint_sha_256: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="thumbprint_sha256")] = ( - pydantic.Field(alias="thumbprint_sha256", default=None) - ) - """ - The X509 certificate's SHA256 thumbprint - """ - + thumbprint_sha_256: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="thumbprint_sha256"), + pydantic.Field(alias="thumbprint_sha256", description="The X509 certificate's SHA256 thumbprint"), + ] = None created_at: typing.Optional[dt.datetime] = pydantic.Field(default=None) """ The ISO 8601 formatted date the credential was created. diff --git a/src/auth0/management/types/phone_template.py b/src/auth0/management/types/phone_template.py index ebe8e43c..c8aa8c91 100644 --- a/src/auth0/management/types/phone_template.py +++ b/src/auth0/management/types/phone_template.py @@ -15,7 +15,7 @@ class PhoneTemplate(UniversalBaseModel): tenant: typing.Optional[str] = None content: PhoneTemplateContent type: PhoneTemplateNotificationTypeEnum - disabled: bool = pydantic.Field(default=False) + disabled: bool = pydantic.Field() """ Whether the template is enabled (false) or disabled (true). """ diff --git a/src/auth0/management/types/phone_template_content.py b/src/auth0/management/types/phone_template_content.py index 72efd45b..0a4b57ee 100644 --- a/src/auth0/management/types/phone_template_content.py +++ b/src/auth0/management/types/phone_template_content.py @@ -11,13 +11,13 @@ class PhoneTemplateContent(UniversalBaseModel): syntax: typing.Optional[str] = None - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default=None - ) - """ - Default phone number to be used as 'from' when sending a phone notification - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field( + alias="from", description="Default phone number to be used as 'from' when sending a phone notification" + ), + ] = None body: typing.Optional[PhoneTemplateBody] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/post_client_credential_response_content.py b/src/auth0/management/types/post_client_credential_response_content.py index f559fb5d..0cc53dc9 100644 --- a/src/auth0/management/types/post_client_credential_response_content.py +++ b/src/auth0/management/types/post_client_credential_response_content.py @@ -12,17 +12,17 @@ class PostClientCredentialResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="cred_1m7sfABoNTTKYwTQ8qt6tX") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the credential. Generated on creation. """ - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name given to the credential by the user. """ - kid: typing.Optional[str] = pydantic.Field(default="IZSSTECp...") + kid: typing.Optional[str] = pydantic.Field(default=None) """ The key identifier of the credential, generated on creation. """ @@ -34,13 +34,11 @@ class PostClientCredentialResponseContent(UniversalBaseModel): The X509 certificate's Subject Distinguished Name """ - thumbprint_sha_256: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="thumbprint_sha256")] = ( - pydantic.Field(alias="thumbprint_sha256", default=None) - ) - """ - The X509 certificate's SHA256 thumbprint - """ - + thumbprint_sha_256: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="thumbprint_sha256"), + pydantic.Field(alias="thumbprint_sha256", description="The X509 certificate's SHA256 thumbprint"), + ] = None created_at: typing.Optional[dt.datetime] = pydantic.Field(default=None) """ The ISO 8601 formatted date the credential was created. diff --git a/src/auth0/management/types/public_key_credential.py b/src/auth0/management/types/public_key_credential.py index 7b6f07ee..9b8b65b3 100644 --- a/src/auth0/management/types/public_key_credential.py +++ b/src/auth0/management/types/public_key_credential.py @@ -11,18 +11,18 @@ class PublicKeyCredential(UniversalBaseModel): credential_type: PublicKeyCredentialTypeEnum - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name for a credential. """ - pem: str = pydantic.Field(default="-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n") + pem: str = pydantic.Field() """ PEM-formatted public key (SPKI and PKCS1) or X509 certificate. Must be JSON escaped. """ alg: typing.Optional[PublicKeyCredentialAlgorithmEnum] = None - parse_expiry_from_cert: typing.Optional[bool] = pydantic.Field(default=False) + parse_expiry_from_cert: typing.Optional[bool] = pydantic.Field(default=None) """ Parse expiry from x509 certificate. If true, attempts to parse the expiry date from the provided PEM. Applies to `public_key` credential type. """ diff --git a/src/auth0/management/types/refresh_token_response_content.py b/src/auth0/management/types/refresh_token_response_content.py index d9f4fb3c..bf937de4 100644 --- a/src/auth0/management/types/refresh_token_response_content.py +++ b/src/auth0/management/types/refresh_token_response_content.py @@ -17,7 +17,7 @@ class RefreshTokenResponseContent(UniversalBaseModel): The ID of the refresh token """ - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ diff --git a/src/auth0/management/types/reset_phone_template_response_content.py b/src/auth0/management/types/reset_phone_template_response_content.py index e9898cc0..64e1cf88 100644 --- a/src/auth0/management/types/reset_phone_template_response_content.py +++ b/src/auth0/management/types/reset_phone_template_response_content.py @@ -15,7 +15,7 @@ class ResetPhoneTemplateResponseContent(UniversalBaseModel): tenant: typing.Optional[str] = None content: PhoneTemplateContent type: PhoneTemplateNotificationTypeEnum - disabled: bool = pydantic.Field(default=False) + disabled: bool = pydantic.Field() """ Whether the template is enabled (false) or disabled (true). """ diff --git a/src/auth0/management/types/resource_server_token_encryption_key.py b/src/auth0/management/types/resource_server_token_encryption_key.py index bbf3f38a..7f85ee90 100644 --- a/src/auth0/management/types/resource_server_token_encryption_key.py +++ b/src/auth0/management/types/resource_server_token_encryption_key.py @@ -19,7 +19,7 @@ class ResourceServerTokenEncryptionKey(UniversalBaseModel): Key ID. """ - pem: str = pydantic.Field(default="-----BEGIN PUBLIC KEY-----\r\nMIIBIjANBg...\r\n-----END PUBLIC KEY-----\r\n") + pem: str = pydantic.Field() """ PEM-formatted public key. Must be JSON escaped. """ diff --git a/src/auth0/management/types/revoked_signing_keys_response_content.py b/src/auth0/management/types/revoked_signing_keys_response_content.py index aa65916b..3a8ac6f8 100644 --- a/src/auth0/management/types/revoked_signing_keys_response_content.py +++ b/src/auth0/management/types/revoked_signing_keys_response_content.py @@ -7,14 +7,12 @@ class RevokedSigningKeysResponseContent(UniversalBaseModel): - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ Revoked key certificate """ - kid: str = pydantic.Field(default="21hi274Rp02112mgkUGma") + kid: str = pydantic.Field() """ Revoked key id """ diff --git a/src/auth0/management/types/role_user.py b/src/auth0/management/types/role_user.py index 5fb5e824..d9d78dff 100644 --- a/src/auth0/management/types/role_user.py +++ b/src/auth0/management/types/role_user.py @@ -22,7 +22,7 @@ class RoleUser(UniversalBaseModel): Name of this user. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ diff --git a/src/auth0/management/types/rotate_client_secret_response_content.py b/src/auth0/management/types/rotate_client_secret_response_content.py index b4763387..78dfe023 100644 --- a/src/auth0/management/types/rotate_client_secret_response_content.py +++ b/src/auth0/management/types/rotate_client_secret_response_content.py @@ -33,36 +33,35 @@ class RotateClientSecretResponseContent(UniversalBaseModel): - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this client. """ - tenant: typing.Optional[str] = pydantic.Field(default="") + tenant: typing.Optional[str] = pydantic.Field(default=None) """ Name of the tenant this client belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="My application") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this client (min length: 1 character, does not allow `<` or `>`). """ - description: typing.Optional[str] = pydantic.Field(default="") + description: typing.Optional[str] = pydantic.Field(default=None) """ Free text description of this client (max length: 140 characters). """ - global_: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="global")] = pydantic.Field( - alias="global", default=False - ) - """ - Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false). - """ - - client_secret: typing.Optional[str] = pydantic.Field( - default="MG_TNT2ver-SylNat-_VeMmd-4m0Waba0jr1troztBniSChEw0glxEmgEi2Kw40H" - ) + global_: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="global"), + pydantic.Field( + alias="global", + description="Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false).", + ), + ] = None + client_secret: typing.Optional[str] = pydantic.Field(default=None) """ Client secret (which you must not make public). """ @@ -73,12 +72,12 @@ class RotateClientSecretResponseContent(UniversalBaseModel): URL of the logo to display for this client. Recommended size is 150x150 pixels. """ - is_first_party: typing.Optional[bool] = pydantic.Field(default=False) + is_first_party: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client a first party client (true) or not (false). """ - oidc_conformant: typing.Optional[bool] = pydantic.Field(default=False) + oidc_conformant: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false). """ @@ -123,12 +122,12 @@ class RotateClientSecretResponseContent(UniversalBaseModel): jwt_configuration: typing.Optional[ClientJwtConfiguration] = None signing_keys: typing.Optional[ClientSigningKeys] = None encryption_key: typing.Optional[ClientEncryptionKey] = None - sso: typing.Optional[bool] = pydantic.Field(default=False) + sso: typing.Optional[bool] = pydantic.Field(default=None) """ Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). """ - sso_disabled: typing.Optional[bool] = pydantic.Field(default=False) + sso_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether Single Sign On is disabled (true) or enabled (true). Defaults to true. """ @@ -143,29 +142,29 @@ class RotateClientSecretResponseContent(UniversalBaseModel): URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page. """ - custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=True) + custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=None) """ Whether a custom login page is to be used (true) or the default provided login page (false). """ - custom_login_page: typing.Optional[str] = pydantic.Field(default="") + custom_login_page: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. """ - custom_login_page_preview: typing.Optional[str] = pydantic.Field(default="") + custom_login_page_preview: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. (Used on Previews) """ - form_template: typing.Optional[str] = pydantic.Field(default="") + form_template: typing.Optional[str] = pydantic.Field(default=None) """ HTML form template to be used for WS-Federation. """ addons: typing.Optional[ClientAddons] = None token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = None - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=False) + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=None) """ If true, trust that the IP specified in the `auth0-forwarded-for` header is the end-user's IP for brute-force-protection on token endpoint. """ @@ -189,12 +188,12 @@ class RotateClientSecretResponseContent(UniversalBaseModel): """ client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = None - require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=False) + require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Pushed Authorization Requests mandatory for this client """ - require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=False) + require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Proof-of-Possession mandatory for this client """ diff --git a/src/auth0/management/types/rotate_connections_keys_response_content.py b/src/auth0/management/types/rotate_connections_keys_response_content.py index 1da408ab..d0f56cc9 100644 --- a/src/auth0/management/types/rotate_connections_keys_response_content.py +++ b/src/auth0/management/types/rotate_connections_keys_response_content.py @@ -13,16 +13,12 @@ class RotateConnectionsKeysResponseContent(UniversalBaseModel): The key id of the signing key """ - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ The public certificate of the signing key """ - pkcs: typing.Optional[str] = pydantic.Field( - default="-----BEGIN PKCS7-----\r\nMIIDPA....t8xAA==\r\n-----END PKCS7-----" - ) + pkcs: typing.Optional[str] = pydantic.Field(default=None) """ The public certificate of the signing key in pkcs7 format """ @@ -32,12 +28,12 @@ class RotateConnectionsKeysResponseContent(UniversalBaseModel): True if the key is the the next key """ - fingerprint: str = pydantic.Field(default="CC:FB:DD:D8:9A:B5:DE:1B:F0:CC:36:D2:99:59:21:12:03:DD:A8:25") + fingerprint: str = pydantic.Field() """ The cert fingerprint """ - thumbprint: str = pydantic.Field(default="CCFBDDD89AB5DE1BF0CC36D29959211203DDA825") + thumbprint: str = pydantic.Field() """ The cert thumbprint """ diff --git a/src/auth0/management/types/rotate_signing_keys_response_content.py b/src/auth0/management/types/rotate_signing_keys_response_content.py index cba2fc1a..921b92c2 100644 --- a/src/auth0/management/types/rotate_signing_keys_response_content.py +++ b/src/auth0/management/types/rotate_signing_keys_response_content.py @@ -7,14 +7,12 @@ class RotateSigningKeysResponseContent(UniversalBaseModel): - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ Next key certificate """ - kid: str = pydantic.Field(default="21hi274Rp02112mgkUGma") + kid: str = pydantic.Field() """ Next key id """ diff --git a/src/auth0/management/types/rule.py b/src/auth0/management/types/rule.py index 5245fa76..c7a0065e 100644 --- a/src/auth0/management/types/rule.py +++ b/src/auth0/management/types/rule.py @@ -7,34 +7,32 @@ class Rule(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="rule_1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this rule. """ - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this rule. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the rule is enabled (true), or disabled (false). """ - script: typing.Optional[str] = pydantic.Field( - default="function (user, context, callback) {\n callback(null, user, context);\n}" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this rule runs. """ - order: typing.Optional[float] = pydantic.Field(default=1.0) + order: typing.Optional[float] = pydantic.Field(default=None) """ Order that this rule should execute in relative to other rules. Lower-valued rules execute first. """ - stage: typing.Optional[str] = pydantic.Field(default="login_success") + stage: typing.Optional[str] = pydantic.Field(default=None) """ Execution stage of this rule. Can be `login_success`, `login_failure`, or `pre_authorize`. """ diff --git a/src/auth0/management/types/rules_config.py b/src/auth0/management/types/rules_config.py index 27680560..f716d6ee 100644 --- a/src/auth0/management/types/rules_config.py +++ b/src/auth0/management/types/rules_config.py @@ -7,7 +7,7 @@ class RulesConfig(UniversalBaseModel): - key: typing.Optional[str] = pydantic.Field(default="MY_RULES_CONFIG_KEY") + key: typing.Optional[str] = pydantic.Field(default=None) """ Key for a rules config variable. """ diff --git a/src/auth0/management/types/scim_mapping_item.py b/src/auth0/management/types/scim_mapping_item.py index d2ad1ca3..5f70d6c1 100644 --- a/src/auth0/management/types/scim_mapping_item.py +++ b/src/auth0/management/types/scim_mapping_item.py @@ -9,13 +9,11 @@ class ScimMappingItem(UniversalBaseModel): - auth_0: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="auth0")] = pydantic.Field( - alias="auth0", default=None - ) - """ - The field location in the auth0 schema - """ - + auth_0: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="auth0"), + pydantic.Field(alias="auth0", description="The field location in the auth0 schema"), + ] = None scim: typing.Optional[str] = pydantic.Field(default=None) """ The field location in the SCIM schema diff --git a/src/auth0/management/types/self_service_profile.py b/src/auth0/management/types/self_service_profile.py index 734e6a8c..0c227295 100644 --- a/src/auth0/management/types/self_service_profile.py +++ b/src/auth0/management/types/self_service_profile.py @@ -11,7 +11,7 @@ class SelfServiceProfile(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="ssp_n7SNCL8seoyV1TuSTCnAeo") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the self-service Profile. """ @@ -46,7 +46,7 @@ class SelfServiceProfile(UniversalBaseModel): default=None ) """ - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] """ user_attribute_profile_id: typing.Optional[str] = pydantic.Field(default=None) diff --git a/src/auth0/management/types/self_service_profile_sso_ticket_connection_config.py b/src/auth0/management/types/self_service_profile_sso_ticket_connection_config.py index 01477bf6..14ca33ee 100644 --- a/src/auth0/management/types/self_service_profile_sso_ticket_connection_config.py +++ b/src/auth0/management/types/self_service_profile_sso_ticket_connection_config.py @@ -13,7 +13,7 @@ class SelfServiceProfileSsoTicketConnectionConfig(UniversalBaseModel): If provided, this will create a new connection for the SSO flow with the given configuration """ - name: str = pydantic.Field(default="sso-generated-SAML-customer-12") + name: str = pydantic.Field() """ The name of the connection that will be created as a part of the SSO flow. """ diff --git a/src/auth0/management/types/session_authentication_signal.py b/src/auth0/management/types/session_authentication_signal.py index 8707944c..ff6030b0 100644 --- a/src/auth0/management/types/session_authentication_signal.py +++ b/src/auth0/management/types/session_authentication_signal.py @@ -3,9 +3,7 @@ import typing import pydantic -import typing_extensions from ..core.pydantic_utilities import IS_PYDANTIC_V2, UniversalBaseModel -from ..core.serialization import FieldMetadata from .session_date import SessionDate @@ -20,9 +18,7 @@ class SessionAuthenticationSignal(UniversalBaseModel): """ timestamp: typing.Optional[SessionDate] = None - type: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="^type$")] = pydantic.Field( - alias="^type$", default=None - ) + type: typing.Optional[str] = pydantic.Field(default=None) """ A specific MFA factor. Only present when "name" is set to "mfa" """ diff --git a/src/auth0/management/types/set_email_template_response_content.py b/src/auth0/management/types/set_email_template_response_content.py index ba1c8694..5c140e6b 100644 --- a/src/auth0/management/types/set_email_template_response_content.py +++ b/src/auth0/management/types/set_email_template_response_content.py @@ -16,44 +16,42 @@ class SetEmailTemplateResponseContent(UniversalBaseModel): Body of the email template. """ - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="sender@auth0.com" - ) - """ - Senders `from` email address. - """ - - result_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="resultUrl")] = pydantic.Field( - alias="resultUrl", default=None - ) - """ - URL to redirect the user to after a successful action. - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field(alias="from", description="Senders `from` email address."), + ] = None + result_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="resultUrl"), + pydantic.Field(alias="resultUrl", description="URL to redirect the user to after a successful action."), + ] = None subject: typing.Optional[str] = pydantic.Field(default=None) """ Subject line of the email. """ - syntax: typing.Optional[str] = pydantic.Field(default="liquid") + syntax: typing.Optional[str] = pydantic.Field(default=None) """ Syntax of the template body. """ url_lifetime_in_seconds: typing_extensions.Annotated[ - typing.Optional[float], FieldMetadata(alias="urlLifetimeInSeconds") - ] = pydantic.Field(alias="urlLifetimeInSeconds", default=None) - """ - Lifetime in seconds that the link within the email will be valid for. - """ - + typing.Optional[float], + FieldMetadata(alias="urlLifetimeInSeconds"), + pydantic.Field( + alias="urlLifetimeInSeconds", + description="Lifetime in seconds that the link within the email will be valid for.", + ), + ] = None include_email_in_redirect: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="includeEmailInRedirect") - ] = pydantic.Field(alias="includeEmailInRedirect", default=None) - """ - Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true. - """ - + typing.Optional[bool], + FieldMetadata(alias="includeEmailInRedirect"), + pydantic.Field( + alias="includeEmailInRedirect", + description="Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true.", + ), + ] = None enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the template is enabled (true) or disabled (false). diff --git a/src/auth0/management/types/set_guardian_factor_phone_templates_response_content.py b/src/auth0/management/types/set_guardian_factor_phone_templates_response_content.py index 94619858..b2a131fb 100644 --- a/src/auth0/management/types/set_guardian_factor_phone_templates_response_content.py +++ b/src/auth0/management/types/set_guardian_factor_phone_templates_response_content.py @@ -7,16 +7,12 @@ class SetGuardianFactorPhoneTemplatesResponseContent(UniversalBaseModel): - enrollment_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment." - ) + enrollment_message: str = pydantic.Field() """ Message sent to the user when they are invited to enroll with a phone number. """ - verification_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}" - ) + verification_message: str = pydantic.Field() """ Message sent to the user when they are prompted to verify their account. """ diff --git a/src/auth0/management/types/set_guardian_factor_sms_templates_response_content.py b/src/auth0/management/types/set_guardian_factor_sms_templates_response_content.py index f68bd6d3..dcedfbbc 100644 --- a/src/auth0/management/types/set_guardian_factor_sms_templates_response_content.py +++ b/src/auth0/management/types/set_guardian_factor_sms_templates_response_content.py @@ -7,16 +7,12 @@ class SetGuardianFactorSmsTemplatesResponseContent(UniversalBaseModel): - enrollment_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}. Please enter this code to verify your enrollment." - ) + enrollment_message: str = pydantic.Field() """ Message sent to the user when they are invited to enroll with a phone number. """ - verification_message: str = pydantic.Field( - default="{{code}} is your verification code for {{tenant.friendly_name}}" - ) + verification_message: str = pydantic.Field() """ Message sent to the user when they are prompted to verify their account. """ diff --git a/src/auth0/management/types/set_guardian_factors_provider_phone_twilio_response_content.py b/src/auth0/management/types/set_guardian_factors_provider_phone_twilio_response_content.py index a9483555..98b100d1 100644 --- a/src/auth0/management/types/set_guardian_factors_provider_phone_twilio_response_content.py +++ b/src/auth0/management/types/set_guardian_factors_provider_phone_twilio_response_content.py @@ -9,24 +9,20 @@ class SetGuardianFactorsProviderPhoneTwilioResponseContent(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="+1223323" - ) - """ - From number - """ - - messaging_service_sid: typing.Optional[str] = pydantic.Field(default="5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq") + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from", description="From number") + ] = None + messaging_service_sid: typing.Optional[str] = pydantic.Field(default=None) """ Copilot SID """ - auth_token: typing.Optional[str] = pydantic.Field(default="zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU") + auth_token: typing.Optional[str] = pydantic.Field(default=None) """ Twilio Authentication token """ - sid: typing.Optional[str] = pydantic.Field(default="wywA2BH4VqTpfywiDuyDAYZL3xQjoO40") + sid: typing.Optional[str] = pydantic.Field(default=None) """ Twilio SID """ diff --git a/src/auth0/management/types/set_guardian_factors_provider_push_notification_sns_response_content.py b/src/auth0/management/types/set_guardian_factors_provider_push_notification_sns_response_content.py index 7974cc3a..6d6f1d31 100644 --- a/src/auth0/management/types/set_guardian_factors_provider_push_notification_sns_response_content.py +++ b/src/auth0/management/types/set_guardian_factors_provider_push_notification_sns_response_content.py @@ -7,11 +7,11 @@ class SetGuardianFactorsProviderPushNotificationSnsResponseContent(UniversalBaseModel): - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40" - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL" - aws_region: typing.Optional[str] = "us-west-1" + aws_access_key_id: typing.Optional[str] = None + aws_secret_access_key: typing.Optional[str] = None + aws_region: typing.Optional[str] = None sns_apns_platform_application_arn: typing.Optional[str] = None - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP" + sns_gcm_platform_application_arn: typing.Optional[str] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/set_guardian_factors_provider_sms_twilio_response_content.py b/src/auth0/management/types/set_guardian_factors_provider_sms_twilio_response_content.py index f3d6a602..527580f8 100644 --- a/src/auth0/management/types/set_guardian_factors_provider_sms_twilio_response_content.py +++ b/src/auth0/management/types/set_guardian_factors_provider_sms_twilio_response_content.py @@ -9,24 +9,20 @@ class SetGuardianFactorsProviderSmsTwilioResponseContent(UniversalBaseModel): - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="+1223323" - ) - """ - From number - """ - - messaging_service_sid: typing.Optional[str] = pydantic.Field(default="5dEkAiHLPCuQ1uJj4qNXcAnERFAL6cpq") + from_: typing_extensions.Annotated[ + typing.Optional[str], FieldMetadata(alias="from"), pydantic.Field(alias="from", description="From number") + ] = None + messaging_service_sid: typing.Optional[str] = pydantic.Field(default=None) """ Copilot SID """ - auth_token: typing.Optional[str] = pydantic.Field(default="zw5Ku6z2sxhd0ZVXto5SDHX6KPDByJPU") + auth_token: typing.Optional[str] = pydantic.Field(default=None) """ Twilio Authentication token """ - sid: typing.Optional[str] = pydantic.Field(default="wywA2BH4VqTpfywiDuyDAYZL3xQjoO40") + sid: typing.Optional[str] = pydantic.Field(default=None) """ Twilio SID """ diff --git a/src/auth0/management/types/set_rules_config_response_content.py b/src/auth0/management/types/set_rules_config_response_content.py index 3d45c1c3..0a3c2440 100644 --- a/src/auth0/management/types/set_rules_config_response_content.py +++ b/src/auth0/management/types/set_rules_config_response_content.py @@ -7,12 +7,12 @@ class SetRulesConfigResponseContent(UniversalBaseModel): - key: str = pydantic.Field(default="MY_RULES_CONFIG_KEY") + key: str = pydantic.Field() """ Key for a rules config variable. """ - value: str = pydantic.Field(default="MY_RULES_CONFIG_VALUE") + value: str = pydantic.Field() """ Value for a rules config variable. """ diff --git a/src/auth0/management/types/signing_keys.py b/src/auth0/management/types/signing_keys.py index 5403bff4..b0e48c6d 100644 --- a/src/auth0/management/types/signing_keys.py +++ b/src/auth0/management/types/signing_keys.py @@ -10,26 +10,22 @@ class SigningKeys(UniversalBaseModel): - kid: str = pydantic.Field(default="21hi274Rp02112mgkUGma") + kid: str = pydantic.Field() """ The key id of the signing key """ - cert: str = pydantic.Field( - default="-----BEGIN CERTIFICATE-----\r\nMIIDDTCCA...YiA0TQhAt8=\r\n-----END CERTIFICATE-----" - ) + cert: str = pydantic.Field() """ The public certificate of the signing key """ - pkcs_7: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="pkcs7")] = pydantic.Field( - alias="pkcs7", default="-----BEGIN PKCS7-----\r\nMIIDPA....t8xAA==\r\n-----END PKCS7-----" - ) - """ - The public certificate of the signing key in pkcs7 format - """ - - current: typing.Optional[bool] = pydantic.Field(default=True) + pkcs_7: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="pkcs7"), + pydantic.Field(alias="pkcs7", description="The public certificate of the signing key in pkcs7 format"), + ] = None + current: typing.Optional[bool] = pydantic.Field(default=None) """ True if the key is the the current key """ @@ -46,12 +42,12 @@ class SigningKeys(UniversalBaseModel): current_since: typing.Optional[SigningKeysDate] = None current_until: typing.Optional[SigningKeysDate] = None - fingerprint: str = pydantic.Field(default="CC:FB:DD:D8:9A:B5:DE:1B:F0:CC:36:D2:99:59:21:12:03:DD:A8:25") + fingerprint: str = pydantic.Field() """ The cert fingerprint """ - thumbprint: str = pydantic.Field(default="CCFBDDD89AB5DE1BF0CC36D29959211203DDA825") + thumbprint: str = pydantic.Field() """ The cert thumbprint """ diff --git a/src/auth0/management/types/suspicious_ip_throttling_pre_login_stage.py b/src/auth0/management/types/suspicious_ip_throttling_pre_login_stage.py index 758ecf23..52839284 100644 --- a/src/auth0/management/types/suspicious_ip_throttling_pre_login_stage.py +++ b/src/auth0/management/types/suspicious_ip_throttling_pre_login_stage.py @@ -11,12 +11,12 @@ class SuspiciousIpThrottlingPreLoginStage(UniversalBaseModel): Configuration options that apply before every login attempt. """ - max_attempts: typing.Optional[int] = pydantic.Field(default=100) + max_attempts: typing.Optional[int] = pydantic.Field(default=None) """ Total number of attempts allowed per day. """ - rate: typing.Optional[int] = pydantic.Field(default=864000) + rate: typing.Optional[int] = pydantic.Field(default=None) """ Interval of time, given in milliseconds, at which new attempts are granted. """ diff --git a/src/auth0/management/types/suspicious_ip_throttling_pre_user_registration_stage.py b/src/auth0/management/types/suspicious_ip_throttling_pre_user_registration_stage.py index bd7dc052..adc9c448 100644 --- a/src/auth0/management/types/suspicious_ip_throttling_pre_user_registration_stage.py +++ b/src/auth0/management/types/suspicious_ip_throttling_pre_user_registration_stage.py @@ -11,12 +11,12 @@ class SuspiciousIpThrottlingPreUserRegistrationStage(UniversalBaseModel): Configuration options that apply before every user registration attempt. """ - max_attempts: typing.Optional[int] = pydantic.Field(default=50) + max_attempts: typing.Optional[int] = pydantic.Field(default=None) """ Total number of attempts allowed. """ - rate: typing.Optional[int] = pydantic.Field(default=1728000) + rate: typing.Optional[int] = pydantic.Field(default=None) """ Interval of time, given in milliseconds, at which new attempts are granted. """ diff --git a/src/auth0/management/types/suspicious_ip_throttling_stage.py b/src/auth0/management/types/suspicious_ip_throttling_stage.py index ae6d0d57..5fe0240c 100644 --- a/src/auth0/management/types/suspicious_ip_throttling_stage.py +++ b/src/auth0/management/types/suspicious_ip_throttling_stage.py @@ -16,11 +16,15 @@ class SuspiciousIpThrottlingStage(UniversalBaseModel): """ pre_login: typing_extensions.Annotated[ - typing.Optional[SuspiciousIpThrottlingPreLoginStage], FieldMetadata(alias="pre-login") - ] = pydantic.Field(alias="pre-login", default=None) + typing.Optional[SuspiciousIpThrottlingPreLoginStage], + FieldMetadata(alias="pre-login"), + pydantic.Field(alias="pre-login"), + ] = None pre_user_registration: typing_extensions.Annotated[ - typing.Optional[SuspiciousIpThrottlingPreUserRegistrationStage], FieldMetadata(alias="pre-user-registration") - ] = pydantic.Field(alias="pre-user-registration", default=None) + typing.Optional[SuspiciousIpThrottlingPreUserRegistrationStage], + FieldMetadata(alias="pre-user-registration"), + pydantic.Field(alias="pre-user-registration"), + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/tenant_oidc_logout_settings.py b/src/auth0/management/types/tenant_oidc_logout_settings.py index 755b11f8..53dcea35 100644 --- a/src/auth0/management/types/tenant_oidc_logout_settings.py +++ b/src/auth0/management/types/tenant_oidc_logout_settings.py @@ -11,7 +11,7 @@ class TenantOidcLogoutSettings(UniversalBaseModel): Settings related to OIDC RP-initiated Logout """ - rp_logout_end_session_endpoint_discovery: typing.Optional[bool] = pydantic.Field(default=True) + rp_logout_end_session_endpoint_discovery: typing.Optional[bool] = pydantic.Field(default=None) """ Enable the end_session_endpoint URL in the .well-known discovery configuration """ diff --git a/src/auth0/management/types/tenant_settings_device_flow.py b/src/auth0/management/types/tenant_settings_device_flow.py index 38d238a6..89071d97 100644 --- a/src/auth0/management/types/tenant_settings_device_flow.py +++ b/src/auth0/management/types/tenant_settings_device_flow.py @@ -13,7 +13,7 @@ class TenantSettingsDeviceFlow(UniversalBaseModel): """ charset: typing.Optional[TenantSettingsDeviceFlowCharset] = None - mask: typing.Optional[str] = pydantic.Field(default="****-****") + mask: typing.Optional[str] = pydantic.Field(default=None) """ Mask used to format a generated User Code into a friendly, readable format. """ diff --git a/src/auth0/management/types/tenant_settings_error_page.py b/src/auth0/management/types/tenant_settings_error_page.py index a589a1b5..2a30673f 100644 --- a/src/auth0/management/types/tenant_settings_error_page.py +++ b/src/auth0/management/types/tenant_settings_error_page.py @@ -11,17 +11,17 @@ class TenantSettingsErrorPage(UniversalBaseModel): Error page customization. """ - html: typing.Optional[str] = pydantic.Field(default="") + html: typing.Optional[str] = pydantic.Field(default=None) """ Custom Error HTML (Liquid syntax is supported). """ - show_log_link: typing.Optional[bool] = pydantic.Field(default=False) + show_log_link: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to show the link to log as part of the default error page (true, default) or not to show the link (false). """ - url: typing.Optional[str] = pydantic.Field(default="https://mycompany.org/error") + url: typing.Optional[str] = pydantic.Field(default=None) """ URL to redirect to when an error occurs instead of showing the default error page. """ diff --git a/src/auth0/management/types/tenant_settings_flags.py b/src/auth0/management/types/tenant_settings_flags.py index 72f662b6..1fd5e20e 100644 --- a/src/auth0/management/types/tenant_settings_flags.py +++ b/src/auth0/management/types/tenant_settings_flags.py @@ -14,34 +14,36 @@ class TenantSettingsFlags(UniversalBaseModel): """ change_pwd_flow_v_1: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="change_pwd_flow_v1") - ] = pydantic.Field(alias="change_pwd_flow_v1", default=False) - """ - Whether to use the older v1 change password flow (true, not recommended except for backward compatibility) or the newer safer flow (false, recommended). - """ - - enable_apis_section: typing.Optional[bool] = pydantic.Field(default=False) + typing.Optional[bool], + FieldMetadata(alias="change_pwd_flow_v1"), + pydantic.Field( + alias="change_pwd_flow_v1", + description="Whether to use the older v1 change password flow (true, not recommended except for backward compatibility) or the newer safer flow (false, recommended).", + ), + ] = None + enable_apis_section: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the APIs section is enabled (true) or disabled (false). """ - disable_impersonation: typing.Optional[bool] = pydantic.Field(default=False) + disable_impersonation: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the impersonation functionality has been disabled (true) or not (false). Read-only. """ - enable_client_connections: typing.Optional[bool] = pydantic.Field(default=True) + enable_client_connections: typing.Optional[bool] = pydantic.Field(default=None) """ Whether all current connections should be enabled when a new client (application) is created (true, default) or not (false). """ - enable_pipeline_2: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="enable_pipeline2")] = ( - pydantic.Field(alias="enable_pipeline2", default=True) - ) - """ - Whether advanced API Authorization scenarios are enabled (true) or disabled (false). - """ - + enable_pipeline_2: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="enable_pipeline2"), + pydantic.Field( + alias="enable_pipeline2", + description="Whether advanced API Authorization scenarios are enabled (true) or disabled (false).", + ), + ] = None allow_legacy_delegation_grant_types: typing.Optional[bool] = pydantic.Field(default=None) """ If enabled, clients are able to add legacy delegation grants. @@ -63,12 +65,13 @@ class TenantSettingsFlags(UniversalBaseModel): """ enable_idtoken_api_2: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="enable_idtoken_api2") - ] = pydantic.Field(alias="enable_idtoken_api2", default=None) - """ - Whether ID tokens can be used to authorize some types of requests to API v2 (true) not not (false). - """ - + typing.Optional[bool], + FieldMetadata(alias="enable_idtoken_api2"), + pydantic.Field( + alias="enable_idtoken_api2", + description="Whether ID tokens can be used to authorize some types of requests to API v2 (true) not not (false).", + ), + ] = None enable_public_signup_user_exists_error: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the public sign up process shows a user_exists error (true) or a generic error (false) if the user already exists. @@ -144,22 +147,22 @@ class TenantSettingsFlags(UniversalBaseModel): This tenant signed up for the Auth4GenAI trail """ - enable_dynamic_client_registration: typing.Optional[bool] = pydantic.Field(default=False) + enable_dynamic_client_registration: typing.Optional[bool] = pydantic.Field(default=None) """ Whether third-party developers can dynamically register applications for your APIs (true) or not (false). This flag enables dynamic client registration. """ - disable_management_api_sms_obfuscation: typing.Optional[bool] = pydantic.Field(default=True) + disable_management_api_sms_obfuscation: typing.Optional[bool] = pydantic.Field(default=None) """ If true, SMS phone numbers will not be obfuscated in Management API GET calls. """ - trust_azure_adfs_email_verified_connection_property: typing.Optional[bool] = pydantic.Field(default=False) + trust_azure_adfs_email_verified_connection_property: typing.Optional[bool] = pydantic.Field(default=None) """ Changes email_verified behavior for Azure AD/ADFS connections when enabled. Sets email_verified to false otherwise. """ - custom_domains_provisioning: typing.Optional[bool] = pydantic.Field(default=False) + custom_domains_provisioning: typing.Optional[bool] = pydantic.Field(default=None) """ If true, custom domains feature will be enabled for tenant. """ diff --git a/src/auth0/management/types/tenant_settings_guardian_page.py b/src/auth0/management/types/tenant_settings_guardian_page.py index 7fcb8e20..9744bd76 100644 --- a/src/auth0/management/types/tenant_settings_guardian_page.py +++ b/src/auth0/management/types/tenant_settings_guardian_page.py @@ -11,12 +11,12 @@ class TenantSettingsGuardianPage(UniversalBaseModel): Guardian page customization. """ - enabled: typing.Optional[bool] = pydantic.Field(default=False) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to use the custom Guardian HTML (true) or the default Auth0 page (false, default) """ - html: typing.Optional[str] = pydantic.Field(default="") + html: typing.Optional[str] = pydantic.Field(default=None) """ Custom Guardian HTML (Liquid syntax is supported). """ diff --git a/src/auth0/management/types/tenant_settings_mtls.py b/src/auth0/management/types/tenant_settings_mtls.py index e65bb1f2..afd8bb24 100644 --- a/src/auth0/management/types/tenant_settings_mtls.py +++ b/src/auth0/management/types/tenant_settings_mtls.py @@ -11,7 +11,7 @@ class TenantSettingsMtls(UniversalBaseModel): mTLS configuration. """ - enable_endpoint_aliases: typing.Optional[bool] = pydantic.Field(default=False) + enable_endpoint_aliases: typing.Optional[bool] = pydantic.Field(default=None) """ If true, enables mTLS endpoint aliases """ diff --git a/src/auth0/management/types/tenant_settings_password_page.py b/src/auth0/management/types/tenant_settings_password_page.py index 00690b3a..adfa6ad8 100644 --- a/src/auth0/management/types/tenant_settings_password_page.py +++ b/src/auth0/management/types/tenant_settings_password_page.py @@ -11,12 +11,12 @@ class TenantSettingsPasswordPage(UniversalBaseModel): Change Password page customization. """ - enabled: typing.Optional[bool] = pydantic.Field(default=False) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to use the custom change password HTML (true) or the default Auth0 page (false). Default is to use the Auth0 page. """ - html: typing.Optional[str] = pydantic.Field(default="") + html: typing.Optional[str] = pydantic.Field(default=None) """ Custom change password HTML (Liquid syntax supported). """ diff --git a/src/auth0/management/types/tenant_settings_sessions.py b/src/auth0/management/types/tenant_settings_sessions.py index 0cd3e396..2ba1db06 100644 --- a/src/auth0/management/types/tenant_settings_sessions.py +++ b/src/auth0/management/types/tenant_settings_sessions.py @@ -11,7 +11,7 @@ class TenantSettingsSessions(UniversalBaseModel): Sessions related settings for tenant """ - oidc_logout_prompt_enabled: typing.Optional[bool] = pydantic.Field(default=True) + oidc_logout_prompt_enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to bypass prompting logic (false) when performing OIDC Logout """ diff --git a/src/auth0/management/types/token_exchange_profile_response_content.py b/src/auth0/management/types/token_exchange_profile_response_content.py index 91141ba7..61e759e6 100644 --- a/src/auth0/management/types/token_exchange_profile_response_content.py +++ b/src/auth0/management/types/token_exchange_profile_response_content.py @@ -14,7 +14,7 @@ class TokenExchangeProfileResponseContent(UniversalBaseModel): The unique ID of the token exchange profile. """ - name: typing.Optional[str] = pydantic.Field(default="Token Exchange Profile 1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this profile. """ diff --git a/src/auth0/management/types/update_action_response_content.py b/src/auth0/management/types/update_action_response_content.py index c385fbd6..198acae8 100644 --- a/src/auth0/management/types/update_action_response_content.py +++ b/src/auth0/management/types/update_action_response_content.py @@ -15,12 +15,12 @@ class UpdateActionResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="910b1053-577f-4d81-a8c8-020e7319a38a") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the action. """ - name: typing.Optional[str] = pydantic.Field(default="my-action") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of an action. """ @@ -30,7 +30,7 @@ class UpdateActionResponseContent(UniversalBaseModel): The list of triggers that this action supports. At this time, an action can only target a single trigger at a time. """ - all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=False) + all_changes_deployed: typing.Optional[bool] = pydantic.Field(default=None) """ True if all of an Action's contents have been deployed. """ @@ -45,7 +45,7 @@ class UpdateActionResponseContent(UniversalBaseModel): The time when this action was updated. """ - code: typing.Optional[str] = pydantic.Field(default="module.exports = () => {}") + code: typing.Optional[str] = pydantic.Field(default=None) """ The source code of the action. """ @@ -55,7 +55,7 @@ class UpdateActionResponseContent(UniversalBaseModel): The list of third party npm modules, and their versions, that this action depends on. """ - runtime: typing.Optional[str] = pydantic.Field(default="node22") + runtime: typing.Optional[str] = pydantic.Field(default=None) """ The Node runtime. For example: `node22`, defaults to `node22` """ @@ -66,7 +66,7 @@ class UpdateActionResponseContent(UniversalBaseModel): """ deployed_version: typing.Optional[ActionDeployedVersion] = None - installed_integration_id: typing.Optional[str] = pydantic.Field(default="7d2bc0c9-c0c2-433a-9f4e-86ef80270aad") + installed_integration_id: typing.Optional[str] = pydantic.Field(default=None) """ installed_integration_id is the fk reference to the InstalledIntegration entity. """ @@ -78,7 +78,7 @@ class UpdateActionResponseContent(UniversalBaseModel): The time when this action was built successfully. """ - deploy: typing.Optional[bool] = pydantic.Field(default=False) + deploy: typing.Optional[bool] = pydantic.Field(default=None) """ True if the action should be deployed after creation. """ diff --git a/src/auth0/management/types/update_acul_response_content.py b/src/auth0/management/types/update_acul_response_content.py index b68a219b..754dd488 100644 --- a/src/auth0/management/types/update_acul_response_content.py +++ b/src/auth0/management/types/update_acul_response_content.py @@ -13,12 +13,12 @@ class UpdateAculResponseContent(UniversalBaseModel): rendering_mode: typing.Optional[AculRenderingModeEnum] = None context_configuration: typing.Optional[AculContextConfiguration] = None - default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=False) + default_head_tags_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Override Universal Login default head tags """ - use_page_template: typing.Optional[bool] = pydantic.Field(default=False) + use_page_template: typing.Optional[bool] = pydantic.Field(default=None) """ Use page template with ACUL """ diff --git a/src/auth0/management/types/update_attack_protection_captcha_response_content.py b/src/auth0/management/types/update_attack_protection_captcha_response_content.py index 0e3784db..0df1b7df 100644 --- a/src/auth0/management/types/update_attack_protection_captcha_response_content.py +++ b/src/auth0/management/types/update_attack_protection_captcha_response_content.py @@ -31,8 +31,10 @@ class UpdateAttackProtectionCaptchaResponseContent(UniversalBaseModel): friendly_captcha: typing.Optional[AttackProtectionCaptchaFriendlyCaptchaResponseContent] = None recaptcha_enterprise: typing.Optional[AttackProtectionCaptchaRecaptchaEnterpriseResponseContent] = None recaptcha_v_2: typing_extensions.Annotated[ - typing.Optional[AttackProtectionCaptchaRecaptchaV2ResponseContent], FieldMetadata(alias="recaptcha_v2") - ] = pydantic.Field(alias="recaptcha_v2", default=None) + typing.Optional[AttackProtectionCaptchaRecaptchaV2ResponseContent], + FieldMetadata(alias="recaptcha_v2"), + pydantic.Field(alias="recaptcha_v2"), + ] = None simple_captcha: typing.Optional[AttackProtectionCaptchaSimpleCaptchaResponseContent] = None if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/update_branding_theme_response_content.py b/src/auth0/management/types/update_branding_theme_response_content.py index 36d1d106..cf88952f 100644 --- a/src/auth0/management/types/update_branding_theme_response_content.py +++ b/src/auth0/management/types/update_branding_theme_response_content.py @@ -16,20 +16,14 @@ class UpdateBrandingThemeResponseContent(UniversalBaseModel): borders: BrandingThemeBorders colors: BrandingThemeColors - display_name: typing_extensions.Annotated[str, FieldMetadata(alias="displayName")] = pydantic.Field( - alias="displayName" - ) - """ - Display Name - """ - + display_name: typing_extensions.Annotated[ + str, FieldMetadata(alias="displayName"), pydantic.Field(alias="displayName", description="Display Name") + ] fonts: BrandingThemeFonts page_background: BrandingThemePageBackground - theme_id: typing_extensions.Annotated[str, FieldMetadata(alias="themeId")] = pydantic.Field(alias="themeId") - """ - Theme Id - """ - + theme_id: typing_extensions.Annotated[ + str, FieldMetadata(alias="themeId"), pydantic.Field(alias="themeId", description="Theme Id") + ] widget: BrandingThemeWidget if IS_PYDANTIC_V2: diff --git a/src/auth0/management/types/update_breached_password_detection_settings_response_content.py b/src/auth0/management/types/update_breached_password_detection_settings_response_content.py index d40badcf..d1fc1704 100644 --- a/src/auth0/management/types/update_breached_password_detection_settings_response_content.py +++ b/src/auth0/management/types/update_breached_password_detection_settings_response_content.py @@ -13,7 +13,7 @@ class UpdateBreachedPasswordDetectionSettingsResponseContent(UniversalBaseModel): - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether or not breached password detection is active. """ diff --git a/src/auth0/management/types/update_brute_force_settings_response_content.py b/src/auth0/management/types/update_brute_force_settings_response_content.py index dde661ff..72e054e1 100644 --- a/src/auth0/management/types/update_brute_force_settings_response_content.py +++ b/src/auth0/management/types/update_brute_force_settings_response_content.py @@ -26,7 +26,7 @@ class UpdateBruteForceSettingsResponseContent(UniversalBaseModel): """ mode: typing.Optional[BruteForceProtectionModeEnum] = None - max_attempts: typing.Optional[int] = pydantic.Field(default=10) + max_attempts: typing.Optional[int] = pydantic.Field(default=None) """ Maximum number of unsuccessful attempts. """ diff --git a/src/auth0/management/types/update_client_response_content.py b/src/auth0/management/types/update_client_response_content.py index bb93e0da..4e2c8d61 100644 --- a/src/auth0/management/types/update_client_response_content.py +++ b/src/auth0/management/types/update_client_response_content.py @@ -33,36 +33,35 @@ class UpdateClientResponseContent(UniversalBaseModel): - client_id: typing.Optional[str] = pydantic.Field(default="AaiyAPdpYdesoKnqjj8HJqRn4T5titww") + client_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this client. """ - tenant: typing.Optional[str] = pydantic.Field(default="") + tenant: typing.Optional[str] = pydantic.Field(default=None) """ Name of the tenant this client belongs to. """ - name: typing.Optional[str] = pydantic.Field(default="My application") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this client (min length: 1 character, does not allow `<` or `>`). """ - description: typing.Optional[str] = pydantic.Field(default="") + description: typing.Optional[str] = pydantic.Field(default=None) """ Free text description of this client (max length: 140 characters). """ - global_: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="global")] = pydantic.Field( - alias="global", default=False - ) - """ - Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false). - """ - - client_secret: typing.Optional[str] = pydantic.Field( - default="MG_TNT2ver-SylNat-_VeMmd-4m0Waba0jr1troztBniSChEw0glxEmgEi2Kw40H" - ) + global_: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="global"), + pydantic.Field( + alias="global", + description="Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false).", + ), + ] = None + client_secret: typing.Optional[str] = pydantic.Field(default=None) """ Client secret (which you must not make public). """ @@ -73,12 +72,12 @@ class UpdateClientResponseContent(UniversalBaseModel): URL of the logo to display for this client. Recommended size is 150x150 pixels. """ - is_first_party: typing.Optional[bool] = pydantic.Field(default=False) + is_first_party: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client a first party client (true) or not (false). """ - oidc_conformant: typing.Optional[bool] = pydantic.Field(default=False) + oidc_conformant: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false). """ @@ -123,12 +122,12 @@ class UpdateClientResponseContent(UniversalBaseModel): jwt_configuration: typing.Optional[ClientJwtConfiguration] = None signing_keys: typing.Optional[ClientSigningKeys] = None encryption_key: typing.Optional[ClientEncryptionKey] = None - sso: typing.Optional[bool] = pydantic.Field(default=False) + sso: typing.Optional[bool] = pydantic.Field(default=None) """ Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). """ - sso_disabled: typing.Optional[bool] = pydantic.Field(default=False) + sso_disabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether Single Sign On is disabled (true) or enabled (true). Defaults to true. """ @@ -143,29 +142,29 @@ class UpdateClientResponseContent(UniversalBaseModel): URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page. """ - custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=True) + custom_login_page_on: typing.Optional[bool] = pydantic.Field(default=None) """ Whether a custom login page is to be used (true) or the default provided login page (false). """ - custom_login_page: typing.Optional[str] = pydantic.Field(default="") + custom_login_page: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. """ - custom_login_page_preview: typing.Optional[str] = pydantic.Field(default="") + custom_login_page_preview: typing.Optional[str] = pydantic.Field(default=None) """ The content (HTML, CSS, JS) of the custom login page. (Used on Previews) """ - form_template: typing.Optional[str] = pydantic.Field(default="") + form_template: typing.Optional[str] = pydantic.Field(default=None) """ HTML form template to be used for WS-Federation. """ addons: typing.Optional[ClientAddons] = None token_endpoint_auth_method: typing.Optional[ClientTokenEndpointAuthMethodEnum] = None - is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=False) + is_token_endpoint_ip_header_trusted: typing.Optional[bool] = pydantic.Field(default=None) """ If true, trust that the IP specified in the `auth0-forwarded-for` header is the end-user's IP for brute-force-protection on token endpoint. """ @@ -189,12 +188,12 @@ class UpdateClientResponseContent(UniversalBaseModel): """ client_authentication_methods: typing.Optional[ClientAuthenticationMethod] = None - require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=False) + require_pushed_authorization_requests: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Pushed Authorization Requests mandatory for this client """ - require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=False) + require_proof_of_possession: typing.Optional[bool] = pydantic.Field(default=None) """ Makes the use of Proof-of-Possession mandatory for this client """ diff --git a/src/auth0/management/types/update_connection_options.py b/src/auth0/management/types/update_connection_options.py index ab271597..3359aaa9 100644 --- a/src/auth0/management/types/update_connection_options.py +++ b/src/auth0/management/types/update_connection_options.py @@ -46,25 +46,27 @@ class UpdateConnectionOptions(UniversalBaseModel): """ enabled_database_customization: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="enabledDatabaseCustomization") - ] = pydantic.Field(alias="enabledDatabaseCustomization", default=None) - """ - Set to true to use a legacy user store - """ - + typing.Optional[bool], + FieldMetadata(alias="enabledDatabaseCustomization"), + pydantic.Field(alias="enabledDatabaseCustomization", description="Set to true to use a legacy user store"), + ] = None import_mode: typing.Optional[bool] = pydantic.Field(default=None) """ Enable this if you have a legacy user store and you want to gradually migrate those users to the Auth0 user store """ custom_scripts: typing_extensions.Annotated[ - typing.Optional[ConnectionCustomScripts], FieldMetadata(alias="customScripts") - ] = pydantic.Field(alias="customScripts", default=None) + typing.Optional[ConnectionCustomScripts], + FieldMetadata(alias="customScripts"), + pydantic.Field(alias="customScripts"), + ] = None authentication_methods: typing.Optional[ConnectionAuthenticationMethods] = None passkey_options: typing.Optional[ConnectionPasskeyOptions] = None password_policy: typing_extensions.Annotated[ - typing.Optional[ConnectionPasswordPolicyEnum], FieldMetadata(alias="passwordPolicy") - ] = pydantic.Field(alias="passwordPolicy", default=None) + typing.Optional[ConnectionPasswordPolicyEnum], + FieldMetadata(alias="passwordPolicy"), + pydantic.Field(alias="passwordPolicy"), + ] = None password_complexity_options: typing.Optional[ConnectionPasswordComplexityOptions] = None password_history: typing.Optional[ConnectionPasswordHistoryOptions] = None password_no_personal_info: typing.Optional[ConnectionPasswordNoPersonalInfoOptions] = None diff --git a/src/auth0/management/types/update_connection_request_content_salesforce_community.py b/src/auth0/management/types/update_connection_request_content_salesforce_community.py index 13289b2a..3a47f9af 100644 --- a/src/auth0/management/types/update_connection_request_content_salesforce_community.py +++ b/src/auth0/management/types/update_connection_request_content_salesforce_community.py @@ -5,7 +5,7 @@ import pydantic from ..core.pydantic_utilities import IS_PYDANTIC_V2 from .connection_common import ConnectionCommon -from .connection_options_salesforce import ConnectionOptionsSalesforce +from .connection_options_salesforce_community import ConnectionOptionsSalesforceCommunity class UpdateConnectionRequestContentSalesforceCommunity(ConnectionCommon): @@ -13,7 +13,7 @@ class UpdateConnectionRequestContentSalesforceCommunity(ConnectionCommon): Update a connection with strategy=salesforce-community """ - options: typing.Optional[ConnectionOptionsSalesforce] = None + options: typing.Optional[ConnectionOptionsSalesforceCommunity] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/update_connection_response_content.py b/src/auth0/management/types/update_connection_response_content.py index 80bce589..efb71054 100644 --- a/src/auth0/management/types/update_connection_response_content.py +++ b/src/auth0/management/types/update_connection_response_content.py @@ -11,7 +11,7 @@ class UpdateConnectionResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="My connection") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of the connection """ @@ -22,12 +22,12 @@ class UpdateConnectionResponseContent(UniversalBaseModel): """ options: typing.Optional[ConnectionOptions] = None - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The connection's identifier """ - strategy: typing.Optional[str] = pydantic.Field(default="auth0") + strategy: typing.Optional[str] = pydantic.Field(default=None) """ The type of the connection, related to the identity provider """ diff --git a/src/auth0/management/types/update_custom_domain_response_content.py b/src/auth0/management/types/update_custom_domain_response_content.py index 50af5bbc..06216537 100644 --- a/src/auth0/management/types/update_custom_domain_response_content.py +++ b/src/auth0/management/types/update_custom_domain_response_content.py @@ -12,22 +12,22 @@ class UpdateCustomDomainResponseContent(UniversalBaseModel): - custom_domain_id: str = pydantic.Field(default="cd_0000000000000001") + custom_domain_id: str = pydantic.Field() """ ID of the custom domain. """ - domain: str = pydantic.Field(default="login.mycompany.com") + domain: str = pydantic.Field() """ Domain name. """ - primary: bool = pydantic.Field(default=False) + primary: bool = pydantic.Field() """ Whether this is a primary domain (true) or not (false). """ - is_default: typing.Optional[bool] = pydantic.Field(default=False) + is_default: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this is the default custom domain (true) or not (false). """ @@ -40,7 +40,7 @@ class UpdateCustomDomainResponseContent(UniversalBaseModel): The HTTP header to fetch the client's IP address """ - tls_policy: typing.Optional[str] = pydantic.Field(default="recommended") + tls_policy: typing.Optional[str] = pydantic.Field(default=None) """ The TLS version policy """ diff --git a/src/auth0/management/types/update_email_provider_response_content.py b/src/auth0/management/types/update_email_provider_response_content.py index da43a194..b822b8c6 100644 --- a/src/auth0/management/types/update_email_provider_response_content.py +++ b/src/auth0/management/types/update_email_provider_response_content.py @@ -9,12 +9,12 @@ class UpdateEmailProviderResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="sendgrid") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of the email provider. Can be `mailgun`, `mandrill`, `sendgrid`, `ses`, `sparkpost`, `smtp`, `azure_cs`, `ms365`, or `custom`. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the provider is enabled (true) or disabled (false). """ diff --git a/src/auth0/management/types/update_email_template_response_content.py b/src/auth0/management/types/update_email_template_response_content.py index 2adb41f0..3eb310fe 100644 --- a/src/auth0/management/types/update_email_template_response_content.py +++ b/src/auth0/management/types/update_email_template_response_content.py @@ -16,44 +16,42 @@ class UpdateEmailTemplateResponseContent(UniversalBaseModel): Body of the email template. """ - from_: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="from")] = pydantic.Field( - alias="from", default="sender@auth0.com" - ) - """ - Senders `from` email address. - """ - - result_url: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="resultUrl")] = pydantic.Field( - alias="resultUrl", default=None - ) - """ - URL to redirect the user to after a successful action. - """ - + from_: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="from"), + pydantic.Field(alias="from", description="Senders `from` email address."), + ] = None + result_url: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="resultUrl"), + pydantic.Field(alias="resultUrl", description="URL to redirect the user to after a successful action."), + ] = None subject: typing.Optional[str] = pydantic.Field(default=None) """ Subject line of the email. """ - syntax: typing.Optional[str] = pydantic.Field(default="liquid") + syntax: typing.Optional[str] = pydantic.Field(default=None) """ Syntax of the template body. """ url_lifetime_in_seconds: typing_extensions.Annotated[ - typing.Optional[float], FieldMetadata(alias="urlLifetimeInSeconds") - ] = pydantic.Field(alias="urlLifetimeInSeconds", default=None) - """ - Lifetime in seconds that the link within the email will be valid for. - """ - + typing.Optional[float], + FieldMetadata(alias="urlLifetimeInSeconds"), + pydantic.Field( + alias="urlLifetimeInSeconds", + description="Lifetime in seconds that the link within the email will be valid for.", + ), + ] = None include_email_in_redirect: typing_extensions.Annotated[ - typing.Optional[bool], FieldMetadata(alias="includeEmailInRedirect") - ] = pydantic.Field(alias="includeEmailInRedirect", default=None) - """ - Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true. - """ - + typing.Optional[bool], + FieldMetadata(alias="includeEmailInRedirect"), + pydantic.Field( + alias="includeEmailInRedirect", + description="Whether the `reset_email` and `verify_email` templates should include the user's email address as the `email` parameter in the returnUrl (true) or whether no email address should be included in the redirect (false). Defaults to true.", + ), + ] = None enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the template is enabled (true) or disabled (false). diff --git a/src/auth0/management/types/update_guardian_factors_provider_push_notification_sns_response_content.py b/src/auth0/management/types/update_guardian_factors_provider_push_notification_sns_response_content.py index dc0be9f8..91039974 100644 --- a/src/auth0/management/types/update_guardian_factors_provider_push_notification_sns_response_content.py +++ b/src/auth0/management/types/update_guardian_factors_provider_push_notification_sns_response_content.py @@ -7,11 +7,11 @@ class UpdateGuardianFactorsProviderPushNotificationSnsResponseContent(UniversalBaseModel): - aws_access_key_id: typing.Optional[str] = "wywA2BH4VqTpfywiDuyDAYZL3xQjoO40" - aws_secret_access_key: typing.Optional[str] = "B1ER5JHDGJL3C4sVAKK7SBsq806R3IpL" - aws_region: typing.Optional[str] = "us-west-1" + aws_access_key_id: typing.Optional[str] = None + aws_secret_access_key: typing.Optional[str] = None + aws_region: typing.Optional[str] = None sns_apns_platform_application_arn: typing.Optional[str] = None - sns_gcm_platform_application_arn: typing.Optional[str] = "urn://yRMeBxgcCXh8MeTXPBAxhQnm6gP6f5nP" + sns_gcm_platform_application_arn: typing.Optional[str] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/update_hook_response_content.py b/src/auth0/management/types/update_hook_response_content.py index 99c12a5b..f37d8459 100644 --- a/src/auth0/management/types/update_hook_response_content.py +++ b/src/auth0/management/types/update_hook_response_content.py @@ -10,31 +10,27 @@ class UpdateHookResponseContent(UniversalBaseModel): - trigger_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="triggerId")] = pydantic.Field( - alias="triggerId", default=None - ) - """ - Trigger ID - """ - - id: typing.Optional[str] = pydantic.Field(default="00001") + trigger_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="triggerId"), + pydantic.Field(alias="triggerId", description="Trigger ID"), + ] = None + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this hook. """ - name: typing.Optional[str] = pydantic.Field(default="hook") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this hook. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this hook will be executed (true) or ignored (false). """ - script: typing.Optional[str] = pydantic.Field( - default="module.exports = function(client, scope, audience, context, cb) cb(null, access_token); };" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this hook runs. """ diff --git a/src/auth0/management/types/update_organization_response_content.py b/src/auth0/management/types/update_organization_response_content.py index dc3b1b02..b6afdb2e 100644 --- a/src/auth0/management/types/update_organization_response_content.py +++ b/src/auth0/management/types/update_organization_response_content.py @@ -15,12 +15,12 @@ class UpdateOrganizationResponseContent(UniversalBaseModel): Organization identifier. """ - name: typing.Optional[str] = pydantic.Field(default="organization-1") + name: typing.Optional[str] = pydantic.Field(default=None) """ The name of this organization. """ - display_name: typing.Optional[str] = pydantic.Field(default="Acme Users") + display_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name of this organization. """ diff --git a/src/auth0/management/types/update_phone_template_response_content.py b/src/auth0/management/types/update_phone_template_response_content.py index c04d7e87..a216caea 100644 --- a/src/auth0/management/types/update_phone_template_response_content.py +++ b/src/auth0/management/types/update_phone_template_response_content.py @@ -15,7 +15,7 @@ class UpdatePhoneTemplateResponseContent(UniversalBaseModel): tenant: typing.Optional[str] = None content: PhoneTemplateContent type: PhoneTemplateNotificationTypeEnum - disabled: bool = pydantic.Field(default=False) + disabled: bool = pydantic.Field() """ Whether the template is enabled (false) or disabled (true). """ diff --git a/src/auth0/management/types/update_refresh_token_response_content.py b/src/auth0/management/types/update_refresh_token_response_content.py index 286c6ebe..410862a8 100644 --- a/src/auth0/management/types/update_refresh_token_response_content.py +++ b/src/auth0/management/types/update_refresh_token_response_content.py @@ -17,7 +17,7 @@ class UpdateRefreshTokenResponseContent(UniversalBaseModel): The ID of the refresh token """ - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ diff --git a/src/auth0/management/types/update_rule_response_content.py b/src/auth0/management/types/update_rule_response_content.py index 6c2da1fc..58cfc5b0 100644 --- a/src/auth0/management/types/update_rule_response_content.py +++ b/src/auth0/management/types/update_rule_response_content.py @@ -7,34 +7,32 @@ class UpdateRuleResponseContent(UniversalBaseModel): - name: typing.Optional[str] = pydantic.Field(default="rule_1") + name: typing.Optional[str] = pydantic.Field(default=None) """ Name of this rule. """ - id: typing.Optional[str] = pydantic.Field(default="con_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ ID of this rule. """ - enabled: typing.Optional[bool] = pydantic.Field(default=True) + enabled: typing.Optional[bool] = pydantic.Field(default=None) """ Whether the rule is enabled (true), or disabled (false). """ - script: typing.Optional[str] = pydantic.Field( - default="function (user, context, callback) {\n callback(null, user, context);\n}" - ) + script: typing.Optional[str] = pydantic.Field(default=None) """ Code to be executed when this rule runs. """ - order: typing.Optional[float] = pydantic.Field(default=1.0) + order: typing.Optional[float] = pydantic.Field(default=None) """ Order that this rule should execute in relative to other rules. Lower-valued rules execute first. """ - stage: typing.Optional[str] = pydantic.Field(default="login_success") + stage: typing.Optional[str] = pydantic.Field(default=None) """ Execution stage of this rule. Can be `login_success`, `login_failure`, or `pre_authorize`. """ diff --git a/src/auth0/management/types/update_self_service_profile_response_content.py b/src/auth0/management/types/update_self_service_profile_response_content.py index 55424cdd..10c20b35 100644 --- a/src/auth0/management/types/update_self_service_profile_response_content.py +++ b/src/auth0/management/types/update_self_service_profile_response_content.py @@ -11,7 +11,7 @@ class UpdateSelfServiceProfileResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="ssp_n7SNCL8seoyV1TuSTCnAeo") + id: typing.Optional[str] = pydantic.Field(default=None) """ The unique ID of the self-service Profile. """ @@ -46,7 +46,7 @@ class UpdateSelfServiceProfileResponseContent(UniversalBaseModel): default=None ) """ - List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `auth0-samlp`, `okta-samlp`, `keycloak-samlp`, `pingfederate`] + List of IdP strategies that will be shown to users during the Self-Service SSO flow. Possible values: [`oidc`, `samlp`, `waad`, `google-apps`, `adfs`, `okta`, `keycloak-samlp`, `pingfederate`] """ user_attribute_profile_id: typing.Optional[str] = pydantic.Field(default=None) diff --git a/src/auth0/management/types/update_tenant_settings_response_content.py b/src/auth0/management/types/update_tenant_settings_response_content.py index d8eb44cc..644e4998 100644 --- a/src/auth0/management/types/update_tenant_settings_response_content.py +++ b/src/auth0/management/types/update_tenant_settings_response_content.py @@ -21,12 +21,12 @@ class UpdateTenantSettingsResponseContent(UniversalBaseModel): change_password: typing.Optional[TenantSettingsPasswordPage] = None guardian_mfa_page: typing.Optional[TenantSettingsGuardianPage] = None - default_audience: typing.Optional[str] = pydantic.Field(default="") + default_audience: typing.Optional[str] = pydantic.Field(default=None) """ Default audience for API authorization. """ - default_directory: typing.Optional[str] = pydantic.Field(default="") + default_directory: typing.Optional[str] = pydantic.Field(default=None) """ Name of connection used for password grants at the `/token`endpoint. The following connection types are supported: LDAP, AD, Database Connections, Passwordless, Windows Azure Active Directory, ADFS. """ @@ -35,22 +35,22 @@ class UpdateTenantSettingsResponseContent(UniversalBaseModel): device_flow: typing.Optional[TenantSettingsDeviceFlow] = None default_token_quota: typing.Optional[DefaultTokenQuota] = None flags: typing.Optional[TenantSettingsFlags] = None - friendly_name: typing.Optional[str] = pydantic.Field(default="My Company") + friendly_name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name for this tenant. """ - picture_url: typing.Optional[str] = pydantic.Field(default="https://mycompany.org/logo.png") + picture_url: typing.Optional[str] = pydantic.Field(default=None) """ URL of logo to be shown for this tenant (recommended size: 150x150) """ - support_email: typing.Optional[str] = pydantic.Field(default="support@mycompany.org") + support_email: typing.Optional[str] = pydantic.Field(default=None) """ End-user support email address. """ - support_url: typing.Optional[str] = pydantic.Field(default="https://mycompany.org/support") + support_url: typing.Optional[str] = pydantic.Field(default=None) """ End-user support URL. """ @@ -60,32 +60,32 @@ class UpdateTenantSettingsResponseContent(UniversalBaseModel): URLs that are valid to redirect to after logout from Auth0. """ - session_lifetime: typing.Optional[float] = pydantic.Field(default=168.0) + session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours a session will stay valid. """ - idle_session_lifetime: typing.Optional[float] = pydantic.Field(default=72.0) + idle_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours for which a session can be inactive before the user must log in again. """ - ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=72.0) + ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours an ephemeral (non-persistent) session will stay valid. """ - idle_ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=24.0) + idle_ephemeral_session_lifetime: typing.Optional[float] = pydantic.Field(default=None) """ Number of hours for which an ephemeral (non-persistent) session can be inactive before the user must log in again. """ - sandbox_version: typing.Optional[str] = pydantic.Field(default="22") + sandbox_version: typing.Optional[str] = pydantic.Field(default=None) """ Selected sandbox version for the extensibility environment. """ - legacy_sandbox_version: typing.Optional[str] = pydantic.Field(default="") + legacy_sandbox_version: typing.Optional[str] = pydantic.Field(default=None) """ Selected sandbox version for rules and hooks extensibility. """ @@ -108,12 +108,12 @@ class UpdateTenantSettingsResponseContent(UniversalBaseModel): session_cookie: typing.Optional[SessionCookieSchema] = None sessions: typing.Optional[TenantSettingsSessions] = None oidc_logout: typing.Optional[TenantOidcLogoutSettings] = None - allow_organization_name_in_authentication_api: typing.Optional[bool] = pydantic.Field(default=False) + allow_organization_name_in_authentication_api: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to accept an organization name instead of an ID on auth endpoints """ - customize_mfa_in_postlogin_action: typing.Optional[bool] = pydantic.Field(default=False) + customize_mfa_in_postlogin_action: typing.Optional[bool] = pydantic.Field(default=None) """ Whether to enable flexible factors for MFA in the PostLogin action """ @@ -124,12 +124,12 @@ class UpdateTenantSettingsResponseContent(UniversalBaseModel): """ mtls: typing.Optional[TenantSettingsMtls] = None - pushed_authorization_requests_supported: typing.Optional[bool] = pydantic.Field(default=False) + pushed_authorization_requests_supported: typing.Optional[bool] = pydantic.Field(default=None) """ Enables the use of Pushed Authorization Requests """ - authorization_response_iss_parameter_supported: typing.Optional[bool] = pydantic.Field(default=False) + authorization_response_iss_parameter_supported: typing.Optional[bool] = pydantic.Field(default=None) """ Supports iss parameter in authorization responses """ diff --git a/src/auth0/management/types/update_user_response_content.py b/src/auth0/management/types/update_user_response_content.py index ac814b4d..7582bbed 100644 --- a/src/auth0/management/types/update_user_response_content.py +++ b/src/auth0/management/types/update_user_response_content.py @@ -11,32 +11,32 @@ class UpdateUserResponseContent(UniversalBaseModel): - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ - email_verified: typing.Optional[bool] = pydantic.Field(default=False) + email_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this email address is verified (true) or unverified (false). """ - username: typing.Optional[str] = pydantic.Field(default="johndoe") + username: typing.Optional[str] = pydantic.Field(default=None) """ Username of this user. """ - phone_number: typing.Optional[str] = pydantic.Field(default="+199999999999999") + phone_number: typing.Optional[str] = pydantic.Field(default=None) """ Phone number for this user. Follows the E.164 recommendation. """ - phone_verified: typing.Optional[bool] = pydantic.Field(default=False) + phone_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this phone number has been verified (true) or not (false). """ diff --git a/src/auth0/management/types/update_verifiable_credential_template_response_content.py b/src/auth0/management/types/update_verifiable_credential_template_response_content.py index ad9e14b1..d14ab11a 100644 --- a/src/auth0/management/types/update_verifiable_credential_template_response_content.py +++ b/src/auth0/management/types/update_verifiable_credential_template_response_content.py @@ -9,7 +9,7 @@ class UpdateVerifiableCredentialTemplateResponseContent(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="vct_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the template. """ @@ -19,12 +19,12 @@ class UpdateVerifiableCredentialTemplateResponseContent(UniversalBaseModel): The name of the template. """ - type: typing.Optional[str] = pydantic.Field(default="mdl") + type: typing.Optional[str] = pydantic.Field(default=None) """ The type of the template. """ - dialect: typing.Optional[str] = pydantic.Field(default="simplified/1.0") + dialect: typing.Optional[str] = pydantic.Field(default=None) """ The dialect of the template. """ diff --git a/src/auth0/management/types/user_attribute_profile_strategy_overrides.py b/src/auth0/management/types/user_attribute_profile_strategy_overrides.py index f7e46df1..3062df87 100644 --- a/src/auth0/management/types/user_attribute_profile_strategy_overrides.py +++ b/src/auth0/management/types/user_attribute_profile_strategy_overrides.py @@ -19,8 +19,10 @@ class UserAttributeProfileStrategyOverrides(UniversalBaseModel): adfs: typing.Optional[UserAttributeProfileStrategyOverridesMapping] = None waad: typing.Optional[UserAttributeProfileStrategyOverridesMapping] = None google_apps: typing_extensions.Annotated[ - typing.Optional[UserAttributeProfileStrategyOverridesMapping], FieldMetadata(alias="google-apps") - ] = pydantic.Field(alias="google-apps", default=None) + typing.Optional[UserAttributeProfileStrategyOverridesMapping], + FieldMetadata(alias="google-apps"), + pydantic.Field(alias="google-apps"), + ] = None okta: typing.Optional[UserAttributeProfileStrategyOverridesMapping] = None oidc: typing.Optional[UserAttributeProfileStrategyOverridesMapping] = None samlp: typing.Optional[UserAttributeProfileStrategyOverridesMapping] = None diff --git a/src/auth0/management/types/user_attribute_profile_strategy_overrides_user_id.py b/src/auth0/management/types/user_attribute_profile_strategy_overrides_user_id.py index 99fe5a6c..606f0a15 100644 --- a/src/auth0/management/types/user_attribute_profile_strategy_overrides_user_id.py +++ b/src/auth0/management/types/user_attribute_profile_strategy_overrides_user_id.py @@ -21,8 +21,10 @@ class UserAttributeProfileStrategyOverridesUserId(UniversalBaseModel): adfs: typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping] = None waad: typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping] = None google_apps: typing_extensions.Annotated[ - typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping], FieldMetadata(alias="google-apps") - ] = pydantic.Field(alias="google-apps", default=None) + typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping], + FieldMetadata(alias="google-apps"), + pydantic.Field(alias="google-apps"), + ] = None okta: typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping] = None oidc: typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping] = None samlp: typing.Optional[UserAttributeProfileStrategyOverridesUserIdMapping] = None diff --git a/src/auth0/management/types/user_attribute_profile_user_attribute_additional_properties.py b/src/auth0/management/types/user_attribute_profile_user_attribute_additional_properties.py index d2c60e72..825960a6 100644 --- a/src/auth0/management/types/user_attribute_profile_user_attribute_additional_properties.py +++ b/src/auth0/management/types/user_attribute_profile_user_attribute_additional_properties.py @@ -27,13 +27,11 @@ class UserAttributeProfileUserAttributeAdditionalProperties(UniversalBaseModel): Whether this attribute is required in the profile """ - auth_0_mapping: typing_extensions.Annotated[str, FieldMetadata(alias="auth0_mapping")] = pydantic.Field( - alias="auth0_mapping" - ) - """ - Auth0 mapping for this attribute - """ - + auth_0_mapping: typing_extensions.Annotated[ + str, + FieldMetadata(alias="auth0_mapping"), + pydantic.Field(alias="auth0_mapping", description="Auth0 mapping for this attribute"), + ] oidc_mapping: typing.Optional[UserAttributeProfileOidcMapping] = None saml_mapping: typing.Optional[UserAttributeProfileSamlMapping] = None scim_mapping: typing.Optional[str] = pydantic.Field(default=None) diff --git a/src/auth0/management/types/user_block_identifier.py b/src/auth0/management/types/user_block_identifier.py index 9d3855e1..687e0fd1 100644 --- a/src/auth0/management/types/user_block_identifier.py +++ b/src/auth0/management/types/user_block_identifier.py @@ -7,12 +7,12 @@ class UserBlockIdentifier(UniversalBaseModel): - identifier: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + identifier: typing.Optional[str] = pydantic.Field(default=None) """ Identifier (should be any of an `email`, `username`, or `phone_number`) """ - ip: typing.Optional[str] = pydantic.Field(default="10.0.0.1") + ip: typing.Optional[str] = pydantic.Field(default=None) """ IP Address """ diff --git a/src/auth0/management/types/user_grant.py b/src/auth0/management/types/user_grant.py index ac80db5c..4fcd2a8c 100644 --- a/src/auth0/management/types/user_grant.py +++ b/src/auth0/management/types/user_grant.py @@ -14,13 +14,11 @@ class UserGrant(UniversalBaseModel): ID of the grant. """ - client_id: typing_extensions.Annotated[typing.Optional[str], FieldMetadata(alias="clientID")] = pydantic.Field( - alias="clientID", default=None - ) - """ - ID of the client. - """ - + client_id: typing_extensions.Annotated[ + typing.Optional[str], + FieldMetadata(alias="clientID"), + pydantic.Field(alias="clientID", description="ID of the client."), + ] = None user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user. diff --git a/src/auth0/management/types/user_identity.py b/src/auth0/management/types/user_identity.py index 0835088f..7b632d48 100644 --- a/src/auth0/management/types/user_identity.py +++ b/src/auth0/management/types/user_identity.py @@ -11,27 +11,27 @@ class UserIdentity(UniversalBaseModel): - connection: str = pydantic.Field(default="twitter") + connection: str = pydantic.Field() """ Connection name of this identity. """ user_id: UserId - provider: str = pydantic.Field(default="twitter") + provider: str = pydantic.Field() """ Type of identity provider. """ - profile_data: typing_extensions.Annotated[typing.Optional[UserProfileData], FieldMetadata(alias="profileData")] = ( - pydantic.Field(alias="profileData", default=None) - ) - is_social: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isSocial")] = pydantic.Field( - alias="isSocial", default=None - ) - """ - Whether the identity provider is a social provider (true) or not (false). - """ - + profile_data: typing_extensions.Annotated[ + typing.Optional[UserProfileData], FieldMetadata(alias="profileData"), pydantic.Field(alias="profileData") + ] = None + is_social: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isSocial"), + pydantic.Field( + alias="isSocial", description="Whether the identity provider is a social provider (true) or not (false)." + ), + ] = None access_token: typing.Optional[str] = pydantic.Field(default=None) """ IDP access token returned if scope `read:user_idp_tokens` is defined. diff --git a/src/auth0/management/types/user_identity_schema.py b/src/auth0/management/types/user_identity_schema.py index 6caac189..3b899a8d 100644 --- a/src/auth0/management/types/user_identity_schema.py +++ b/src/auth0/management/types/user_identity_schema.py @@ -22,13 +22,13 @@ class UserIdentitySchema(UniversalBaseModel): """ provider: typing.Optional[UserIdentityProviderEnum] = None - is_social: typing_extensions.Annotated[typing.Optional[bool], FieldMetadata(alias="isSocial")] = pydantic.Field( - alias="isSocial", default=None - ) - """ - Whether this identity is from a social provider (true) or not (false). - """ - + is_social: typing_extensions.Annotated[ + typing.Optional[bool], + FieldMetadata(alias="isSocial"), + pydantic.Field( + alias="isSocial", description="Whether this identity is from a social provider (true) or not (false)." + ), + ] = None access_token: typing.Optional[str] = pydantic.Field(default=None) """ IDP access token returned only if scope read:user_idp_tokens is defined. @@ -44,9 +44,9 @@ class UserIdentitySchema(UniversalBaseModel): IDP refresh token returned only if scope read:user_idp_tokens is defined. """ - profile_data: typing_extensions.Annotated[typing.Optional[UserProfileData], FieldMetadata(alias="profileData")] = ( - pydantic.Field(alias="profileData", default=None) - ) + profile_data: typing_extensions.Annotated[ + typing.Optional[UserProfileData], FieldMetadata(alias="profileData"), pydantic.Field(alias="profileData") + ] = None if IS_PYDANTIC_V2: model_config: typing.ClassVar[pydantic.ConfigDict] = pydantic.ConfigDict(extra="allow", frozen=True) # type: ignore # Pydantic v2 diff --git a/src/auth0/management/types/user_profile_data.py b/src/auth0/management/types/user_profile_data.py index a6228cab..6d1efe6c 100644 --- a/src/auth0/management/types/user_profile_data.py +++ b/src/auth0/management/types/user_profile_data.py @@ -22,7 +22,7 @@ class UserProfileData(UniversalBaseModel): Name of this user. """ - username: typing.Optional[str] = pydantic.Field(default="johndoe") + username: typing.Optional[str] = pydantic.Field(default=None) """ Username of this user. """ diff --git a/src/auth0/management/types/user_response_schema.py b/src/auth0/management/types/user_response_schema.py index bee75ca6..5d1e5842 100644 --- a/src/auth0/management/types/user_response_schema.py +++ b/src/auth0/management/types/user_response_schema.py @@ -11,32 +11,32 @@ class UserResponseSchema(UniversalBaseModel): - user_id: typing.Optional[str] = pydantic.Field(default="auth0|507f1f77bcf86cd799439020") + user_id: typing.Optional[str] = pydantic.Field(default=None) """ ID of the user which can be used when interacting with other APIs. """ - email: typing.Optional[str] = pydantic.Field(default="john.doe@gmail.com") + email: typing.Optional[str] = pydantic.Field(default=None) """ Email address of this user. """ - email_verified: typing.Optional[bool] = pydantic.Field(default=False) + email_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this email address is verified (true) or unverified (false). """ - username: typing.Optional[str] = pydantic.Field(default="johndoe") + username: typing.Optional[str] = pydantic.Field(default=None) """ Username of this user. """ - phone_number: typing.Optional[str] = pydantic.Field(default="+199999999999999") + phone_number: typing.Optional[str] = pydantic.Field(default=None) """ Phone number for this user. Follows the E.164 recommendation. """ - phone_verified: typing.Optional[bool] = pydantic.Field(default=False) + phone_verified: typing.Optional[bool] = pydantic.Field(default=None) """ Whether this phone number has been verified (true) or not (false). """ diff --git a/src/auth0/management/types/verifiable_credential_template_response.py b/src/auth0/management/types/verifiable_credential_template_response.py index ff9b7aaa..983a98c3 100644 --- a/src/auth0/management/types/verifiable_credential_template_response.py +++ b/src/auth0/management/types/verifiable_credential_template_response.py @@ -9,7 +9,7 @@ class VerifiableCredentialTemplateResponse(UniversalBaseModel): - id: typing.Optional[str] = pydantic.Field(default="vct_0000000000000001") + id: typing.Optional[str] = pydantic.Field(default=None) """ The id of the template. """ @@ -19,12 +19,12 @@ class VerifiableCredentialTemplateResponse(UniversalBaseModel): The name of the template. """ - type: typing.Optional[str] = pydantic.Field(default="mdl") + type: typing.Optional[str] = pydantic.Field(default=None) """ The type of the template. """ - dialect: typing.Optional[str] = pydantic.Field(default="simplified/1.0") + dialect: typing.Optional[str] = pydantic.Field(default=None) """ The dialect of the template. """ diff --git a/src/auth0/management/types/verify_custom_domain_response_content.py b/src/auth0/management/types/verify_custom_domain_response_content.py index f384deb6..fdc72015 100644 --- a/src/auth0/management/types/verify_custom_domain_response_content.py +++ b/src/auth0/management/types/verify_custom_domain_response_content.py @@ -12,31 +12,29 @@ class VerifyCustomDomainResponseContent(UniversalBaseModel): - custom_domain_id: str = pydantic.Field(default="cd_0000000000000001") + custom_domain_id: str = pydantic.Field() """ ID of the custom domain. """ - domain: str = pydantic.Field(default="login.mycompany.com") + domain: str = pydantic.Field() """ Domain name. """ - primary: bool = pydantic.Field(default=False) + primary: bool = pydantic.Field() """ Whether this is a primary domain (true) or not (false). """ status: CustomDomainStatusFilterEnum type: CustomDomainTypeEnum - cname_api_key: typing.Optional[str] = pydantic.Field(default="d4feca...") + cname_api_key: typing.Optional[str] = pydantic.Field(default=None) """ CNAME API key header. """ - origin_domain_name: typing.Optional[str] = pydantic.Field( - default="mycompany_cd_0000000000000001.edge.tenants.auth0.com" - ) + origin_domain_name: typing.Optional[str] = pydantic.Field(default=None) """ Intermediate address. """ @@ -47,7 +45,7 @@ class VerifyCustomDomainResponseContent(UniversalBaseModel): The HTTP header to fetch the client's IP address """ - tls_policy: typing.Optional[str] = pydantic.Field(default="recommended") + tls_policy: typing.Optional[str] = pydantic.Field(default=None) """ The TLS version policy """ diff --git a/src/auth0/management/types/verify_email_ticket_response_content.py b/src/auth0/management/types/verify_email_ticket_response_content.py index f885d2d2..c6d37d5d 100644 --- a/src/auth0/management/types/verify_email_ticket_response_content.py +++ b/src/auth0/management/types/verify_email_ticket_response_content.py @@ -7,9 +7,7 @@ class VerifyEmailTicketResponseContent(UniversalBaseModel): - ticket: str = pydantic.Field( - default="https://login.auth0.com/lo/verify_email?client_id=nsaPS2p3cargoFy82WT7betaOPOt3qSh&tenant=mdocs&bewit=bmNlR01CcDNOUE1GeXVzODJXVDdyY1RUT1BPdDNxU2hcMTQzMDY2MjE4MVxuRTcxM0RSeUNlbEpzUUJmaFVaS3A1NEdJbWFzSUZMYzRTdEFtY2NMMXhZPVx7ImVtYWloojoiZGFtaWtww2NoQGhvdG1haWwuY29tIiwidGVuYW50IjoiZHNjaGVua2tjwWFuIiwiY2xpZW50X2lkIjoibmNlR01CcDNOUE1GeXVzODJXVDdyY1RUT1BPiiqxU2giLCJjb25uZWN0aW9uIjoiRGFtaWmsdiwicmVzdWx0VXJsIjoiIn0" - ) + ticket: str = pydantic.Field() """ URL representing the ticket. """ diff --git a/src/auth0/management/types/x_509_certificate_credential.py b/src/auth0/management/types/x_509_certificate_credential.py index bf9c32f1..84aabb6e 100644 --- a/src/auth0/management/types/x_509_certificate_credential.py +++ b/src/auth0/management/types/x_509_certificate_credential.py @@ -9,12 +9,12 @@ class X509CertificateCredential(UniversalBaseModel): credential_type: X509CertificateCredentialTypeEnum - name: typing.Optional[str] = pydantic.Field(default="") + name: typing.Optional[str] = pydantic.Field(default=None) """ Friendly name for a credential. """ - pem: str = pydantic.Field(default="-----BEGIN CERTIFICATE-----\r\nMIIBIjANBg...\r\n-----END CERTIFICATE-----\r\n") + pem: str = pydantic.Field() """ PEM-formatted X509 certificate. Must be JSON escaped. """ diff --git a/src/auth0/management/users/client.py b/src/auth0/management/users/client.py index 4db38c44..3182b7e5 100644 --- a/src/auth0/management/users/client.py +++ b/src/auth0/management/users/client.py @@ -185,25 +185,23 @@ def list( def create( self, *, - connection: str = "Initial-Connection", - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", + connection: str, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - user_id: typing.Optional[str] = "abc", - password: typing.Optional[str] = "secret", - verify_email: typing.Optional[bool] = False, - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + user_id: typing.Optional[str] = OMIT, + password: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateUserResponseContent: """ @@ -437,26 +435,24 @@ def update( self, id: str, *, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - verify_email: typing.Optional[bool] = False, - verify_phone_number: typing.Optional[bool] = False, - password: typing.Optional[str] = "secret", - connection: typing.Optional[str] = "Initial-Connection", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + verify_phone_number: typing.Optional[bool] = OMIT, + password: typing.Optional[str] = OMIT, + connection: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateUserResponseContent: """ @@ -669,7 +665,7 @@ def revoke_access( id: str, *, session_id: typing.Optional[str] = OMIT, - preserve_refresh_tokens: typing.Optional[bool] = False, + preserve_refresh_tokens: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> None: """ @@ -985,25 +981,23 @@ async def main() -> None: async def create( self, *, - connection: str = "Initial-Connection", - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", + connection: str, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - user_id: typing.Optional[str] = "abc", - password: typing.Optional[str] = "secret", - verify_email: typing.Optional[bool] = False, - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + user_id: typing.Optional[str] = OMIT, + password: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> CreateUserResponseContent: """ @@ -1269,26 +1263,24 @@ async def update( self, id: str, *, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - verify_email: typing.Optional[bool] = False, - verify_phone_number: typing.Optional[bool] = False, - password: typing.Optional[str] = "secret", - connection: typing.Optional[str] = "Initial-Connection", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + verify_phone_number: typing.Optional[bool] = OMIT, + password: typing.Optional[str] = OMIT, + connection: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> UpdateUserResponseContent: """ @@ -1517,7 +1509,7 @@ async def revoke_access( id: str, *, session_id: typing.Optional[str] = OMIT, - preserve_refresh_tokens: typing.Optional[bool] = False, + preserve_refresh_tokens: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> None: """ diff --git a/src/auth0/management/users/identities/client.py b/src/auth0/management/users/identities/client.py index 11b91cea..8d8ce7e0 100644 --- a/src/auth0/management/users/identities/client.py +++ b/src/auth0/management/users/identities/client.py @@ -36,7 +36,7 @@ def link( provider: typing.Optional[UserIdentityProviderEnum] = OMIT, connection_id: typing.Optional[str] = OMIT, user_id: typing.Optional[UserId] = OMIT, - link_with: typing.Optional[str] = "{SECONDARY_ACCOUNT_JWT}", + link_with: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> typing.List[UserIdentity]: """ @@ -184,7 +184,7 @@ async def link( provider: typing.Optional[UserIdentityProviderEnum] = OMIT, connection_id: typing.Optional[str] = OMIT, user_id: typing.Optional[UserId] = OMIT, - link_with: typing.Optional[str] = "{SECONDARY_ACCOUNT_JWT}", + link_with: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> typing.List[UserIdentity]: """ diff --git a/src/auth0/management/users/identities/raw_client.py b/src/auth0/management/users/identities/raw_client.py index 35987817..c9651130 100644 --- a/src/auth0/management/users/identities/raw_client.py +++ b/src/auth0/management/users/identities/raw_client.py @@ -35,7 +35,7 @@ def link( provider: typing.Optional[UserIdentityProviderEnum] = OMIT, connection_id: typing.Optional[str] = OMIT, user_id: typing.Optional[UserId] = OMIT, - link_with: typing.Optional[str] = "{SECONDARY_ACCOUNT_JWT}", + link_with: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[typing.List[UserIdentity]]: """ @@ -286,7 +286,7 @@ async def link( provider: typing.Optional[UserIdentityProviderEnum] = OMIT, connection_id: typing.Optional[str] = OMIT, user_id: typing.Optional[UserId] = OMIT, - link_with: typing.Optional[str] = "{SECONDARY_ACCOUNT_JWT}", + link_with: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[typing.List[UserIdentity]]: """ diff --git a/src/auth0/management/users/raw_client.py b/src/auth0/management/users/raw_client.py index 58d6be01..47ef7d60 100644 --- a/src/auth0/management/users/raw_client.py +++ b/src/auth0/management/users/raw_client.py @@ -213,25 +213,23 @@ def list( def create( self, *, - connection: str = "Initial-Connection", - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", + connection: str, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - user_id: typing.Optional[str] = "abc", - password: typing.Optional[str] = "secret", - verify_email: typing.Optional[bool] = False, - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + user_id: typing.Optional[str] = OMIT, + password: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[CreateUserResponseContent]: """ @@ -685,26 +683,24 @@ def update( self, id: str, *, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - verify_email: typing.Optional[bool] = False, - verify_phone_number: typing.Optional[bool] = False, - password: typing.Optional[str] = "secret", - connection: typing.Optional[str] = "Initial-Connection", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + verify_phone_number: typing.Optional[bool] = OMIT, + password: typing.Optional[str] = OMIT, + connection: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[UpdateUserResponseContent]: """ @@ -1031,7 +1027,7 @@ def revoke_access( id: str, *, session_id: typing.Optional[str] = OMIT, - preserve_refresh_tokens: typing.Optional[bool] = False, + preserve_refresh_tokens: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> HttpResponse[None]: """ @@ -1306,25 +1302,23 @@ async def _get_next(): async def create( self, *, - connection: str = "Initial-Connection", - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", + connection: str, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - user_id: typing.Optional[str] = "abc", - password: typing.Optional[str] = "secret", - verify_email: typing.Optional[bool] = False, - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + user_id: typing.Optional[str] = OMIT, + password: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[CreateUserResponseContent]: """ @@ -1780,26 +1774,24 @@ async def update( self, id: str, *, - blocked: typing.Optional[bool] = False, - email_verified: typing.Optional[bool] = False, - email: typing.Optional[str] = "john.doe@gmail.com", - phone_number: typing.Optional[str] = "+199999999999999", - phone_verified: typing.Optional[bool] = False, + blocked: typing.Optional[bool] = OMIT, + email_verified: typing.Optional[bool] = OMIT, + email: typing.Optional[str] = OMIT, + phone_number: typing.Optional[str] = OMIT, + phone_verified: typing.Optional[bool] = OMIT, user_metadata: typing.Optional[UserMetadata] = OMIT, app_metadata: typing.Optional[AppMetadata] = OMIT, - given_name: typing.Optional[str] = "John", - family_name: typing.Optional[str] = "Doe", - name: typing.Optional[str] = "John Doe", - nickname: typing.Optional[str] = "Johnny", - picture: typing.Optional[ - str - ] = "https://secure.gravatar.com/avatar/15626c5e0c749cb912f9d1ad48dba440?s=480&r=pg&d=https%3A%2F%2Fssl.gstatic.com%2Fs2%2Fprofiles%2Fimages%2Fsilhouette80.png", - verify_email: typing.Optional[bool] = False, - verify_phone_number: typing.Optional[bool] = False, - password: typing.Optional[str] = "secret", - connection: typing.Optional[str] = "Initial-Connection", - client_id: typing.Optional[str] = "DaM8bokEXBWrTUFCiJjWn50jei6ardyX", - username: typing.Optional[str] = "johndoe", + given_name: typing.Optional[str] = OMIT, + family_name: typing.Optional[str] = OMIT, + name: typing.Optional[str] = OMIT, + nickname: typing.Optional[str] = OMIT, + picture: typing.Optional[str] = OMIT, + verify_email: typing.Optional[bool] = OMIT, + verify_phone_number: typing.Optional[bool] = OMIT, + password: typing.Optional[str] = OMIT, + connection: typing.Optional[str] = OMIT, + client_id: typing.Optional[str] = OMIT, + username: typing.Optional[str] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[UpdateUserResponseContent]: """ @@ -2126,7 +2118,7 @@ async def revoke_access( id: str, *, session_id: typing.Optional[str] = OMIT, - preserve_refresh_tokens: typing.Optional[bool] = False, + preserve_refresh_tokens: typing.Optional[bool] = OMIT, request_options: typing.Optional[RequestOptions] = None, ) -> AsyncHttpResponse[None]: """ diff --git a/tests/wire/test_actions_modules_versions.py b/tests/wire/test_actions_modules_versions.py index aca4b50f..2d77ea15 100644 --- a/tests/wire/test_actions_modules_versions.py +++ b/tests/wire/test_actions_modules_versions.py @@ -5,8 +5,8 @@ def test_actions_modules_versions_list_() -> None: """Test list endpoint with WireMock""" test_id = "actions.modules.versions.list_.0" client = get_client(test_id) - client.actions.modules.versions.list(id="id") - verify_request_count(test_id, "GET", "/actions/modules/id/versions", None, 1) + client.actions.modules.versions.list(id="id", page=1, per_page=1) + verify_request_count(test_id, "GET", "/actions/modules/id/versions", {"page": "1", "per_page": "1"}, 1) def test_actions_modules_versions_create() -> None: diff --git a/wiremock/wiremock-mappings.json b/wiremock/wiremock-mappings.json index 02136424..42407bed 100644 --- a/wiremock/wiremock-mappings.json +++ b/wiremock/wiremock-mappings.json @@ -1 +1 @@ -{"mappings":[{"id":"33519415-78d5-4e20-b7ed-c0f6609b6e90","name":"Get actions - default","request":{"urlPathTemplate":"/actions/actions","method":"GET"},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"actions\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"installed_integration_id\": \"installed_integration_id\",\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33519415-78d5-4e20-b7ed-c0f6609b6e90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","name":"Create an action - default","request":{"urlPathTemplate":"/actions/actions","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9919a572-ff14-4914-88b8-acd7f6acc41d","name":"Get an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9919a572-ff14-4914-88b8-acd7f6acc41d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bb73e26-2243-414b-80fc-fcf53169d4fe","name":"Delete an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1bb73e26-2243-414b-80fc-fcf53169d4fe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2679764d-6f00-495e-b8fb-210d140167ba","name":"Update an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2679764d-6f00-495e-b8fb-210d140167ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bde5116-17ac-4ea2-be52-e584711a6b70","name":"Deploy an action - default","request":{"urlPathTemplate":"/actions/actions/{id}/deploy","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bde5116-17ac-4ea2-be52-e584711a6b70","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ebf627bb-6f85-4597-a454-0c654c35202c","name":"Test an Action - default","request":{"urlPathTemplate":"/actions/actions/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"payload\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"ebf627bb-6f85-4597-a454-0c654c35202c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f76d290-6b70-4f62-abc8-3760917fe787","name":"Get branding settings - default","request":{"urlPathTemplate":"/branding","method":"GET"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f76d290-6b70-4f62-abc8-3760917fe787","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9ca9e729-0745-457c-828d-37f7c8ab1698","name":"Update branding settings - default","request":{"urlPathTemplate":"/branding","method":"PATCH"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9ca9e729-0745-457c-828d-37f7c8ab1698","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5dbe0859-fbb5-4eb1-a803-8132e840e762","name":"Get client grants - default","request":{"urlPathTemplate":"/client-grants","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5dbe0859-fbb5-4eb1-a803-8132e840e762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"006f7f26-5002-4b98-a65f-39f8aee8e968","name":"Create client grant - default","request":{"urlPathTemplate":"/client-grants","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"006f7f26-5002-4b98-a65f-39f8aee8e968","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","name":"Get client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"00010fe3-8553-4cd6-9b9a-68aad031054f","name":"Delete client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"00010fe3-8553-4cd6-9b9a-68aad031054f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","name":"Update client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e9057410-f073-4b5b-83dc-dc4d5625ef27","name":"Get clients - default","request":{"urlPathTemplate":"/clients","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"clients\": [\n {\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"grant_types\": [\n \"grant_types\"\n ],\n \"signing_keys\": [\n {}\n ],\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\"\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {}\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9057410-f073-4b5b-83dc-dc4d5625ef27","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","name":"Create a client - default","request":{"urlPathTemplate":"/clients","method":"POST"},"response":{"status":201,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","name":"Get client by ID - default","request":{"urlPathTemplate":"/clients/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"814f5054-4723-45e8-8d89-5a7da08db0d8","name":"Delete a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"814f5054-4723-45e8-8d89-5a7da08db0d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e5dc6c-c84f-4128-b87a-50876b601f77","name":"Update a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e5dc6c-c84f-4128-b87a-50876b601f77","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","name":"Rotate a client secret - default","request":{"urlPathTemplate":"/clients/{id}/rotate-secret","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"af1dc5c5-16af-447c-8374-e80a178ce120","name":"Get Connection Profiles - default","request":{"urlPathTemplate":"/connection-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connection_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"af1dc5c5-16af-447c-8374-e80a178ce120","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","name":"Create a connection profile - default","request":{"urlPathTemplate":"/connection-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d6f52e7-dd90-4579-a469-761793294ec5","name":"Get Connection Profile Templates - default","request":{"urlPathTemplate":"/connection-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"connection_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d6f52e7-dd90-4579-a469-761793294ec5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","name":"Get Connection Profile Template - default","request":{"urlPathTemplate":"/connection-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","name":"Get Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","name":"Delete Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77f167dc-e4c6-478a-b74f-0e1385df797c","name":"Modify a Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"77f167dc-e4c6-478a-b74f-0e1385df797c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","name":"Get all connections - default","request":{"urlPathTemplate":"/connections","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bfae8759-4528-462e-9a50-239cbd75f902","name":"Create a connection - default","request":{"urlPathTemplate":"/connections","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"bfae8759-4528-462e-9a50-239cbd75f902","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","name":"Get a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e55d516f-7f79-4796-8adf-e0032183c04c","name":"Delete a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e55d516f-7f79-4796-8adf-e0032183c04c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"aa701672-a67f-47fc-9cfd-3d68353d9846","name":"Update a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"aa701672-a67f-47fc-9cfd-3d68353d9846","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6e5db857-6ab6-4406-a83f-fb4332f72b48","name":"Check connection status - default","request":{"urlPathTemplate":"/connections/{id}/status","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6e5db857-6ab6-4406-a83f-fb4332f72b48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65f529d-2be4-4dc7-81c0-6d696834184e","name":"Get custom domains configurations - default","request":{"urlPathTemplate":"/custom-domains","method":"GET"},"response":{"status":200,"body":"[\n {\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c65f529d-2be4-4dc7-81c0-6d696834184e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d2917b20-da7e-4962-a75f-362f99682cf9","name":"Configure a new custom domain - default","request":{"urlPathTemplate":"/custom-domains","method":"POST"},"response":{"status":201,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2917b20-da7e-4962-a75f-362f99682cf9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d56d6773-eda9-4b8a-9193-025d27feecb9","name":"Get custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d56d6773-eda9-4b8a-9193-025d27feecb9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","name":"Delete custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","name":"Update custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","name":"Test a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"success\": true,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"43d540a8-528e-44db-9bda-83cf1ef8a54d","name":"Verify a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/verify","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"cname_api_key\": \"cname_api_key\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"43d540a8-528e-44db-9bda-83cf1ef8a54d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cfcb7751-7a75-45bf-b39f-29bac41590da","name":"Retrieve device credentials - default","request":{"urlPathTemplate":"/device-credentials","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"device_credentials\": [\n {\n \"id\": \"id\",\n \"device_name\": \"device_name\",\n \"device_id\": \"device_id\",\n \"type\": \"public_key\",\n \"user_id\": \"user_id\",\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"cfcb7751-7a75-45bf-b39f-29bac41590da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","name":"Create a device public key credential - default","request":{"urlPathTemplate":"/device-credentials","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","name":"Delete a device credential - default","request":{"urlPathTemplate":"/device-credentials/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"27d925db-b0e4-4cad-bf10-75440adb5dea","name":"Create an email template - default","request":{"urlPathTemplate":"/email-templates","method":"POST"},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"27d925db-b0e4-4cad-bf10-75440adb5dea","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e41992b1-8cf3-4611-9179-334debfd831a","name":"Get an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"GET","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e41992b1-8cf3-4611-9179-334debfd831a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","name":"Update an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PUT","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","name":"Patch an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PATCH","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fe7f4b8-58ff-4442-9339-c48f5185600f","name":"Get event streams - default","request":{"urlPathTemplate":"/event-streams","method":"GET"},"response":{"status":200,"body":"{\n \"eventStreams\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {}\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0fe7f4b8-58ff-4442-9339-c48f5185600f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","name":"Create an event stream - default","request":{"urlPathTemplate":"/event-streams","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"85d4a52f-7433-408c-a7cc-30776d9ed641","name":"Get an event stream by ID - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"85d4a52f-7433-408c-a7cc-30776d9ed641","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4812fcc9-8f28-4732-96d4-8adb072fa78a","name":"Delete an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4812fcc9-8f28-4732-96d4-8adb072fa78a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","name":"Update an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4ba115c6-e86b-4427-9ce9-8468a24916b0","name":"Send a test event to an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4ba115c6-e86b-4427-9ce9-8468a24916b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9bee2213-71c4-41f8-9350-d50ede2f6c53","name":"Get flows - default","request":{"urlPathTemplate":"/flows","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"flows\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9bee2213-71c4-41f8-9350-d50ede2f6c53","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","name":"Create a flow - default","request":{"urlPathTemplate":"/flows","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1eccebc1-db7b-4349-8fae-45c8537e9880","name":"Get a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1eccebc1-db7b-4349-8fae-45c8537e9880","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","name":"Delete a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fc07198a-b41e-4537-aec6-1226e9691c86","name":"Update a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fc07198a-b41e-4537-aec6-1226e9691c86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bf65872-e8cf-4987-becb-bb082f08419f","name":"Get forms - default","request":{"urlPathTemplate":"/forms","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"forms\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bf65872-e8cf-4987-becb-bb082f08419f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","name":"Create a form - default","request":{"urlPathTemplate":"/forms","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf329d0-420d-4f08-aec1-df5f12d67762","name":"Get a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bf329d0-420d-4f08-aec1-df5f12d67762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","name":"Delete a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"944b211b-eacb-4acc-8f40-a3463ae62f37","name":"Update a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"944b211b-eacb-4acc-8f40-a3463ae62f37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"800693b3-6319-4d73-997d-7899f5d8b842","name":"Get grants - default","request":{"urlPathTemplate":"/grants","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"grants\": [\n {\n \"id\": \"id\",\n \"clientID\": \"clientID\",\n \"user_id\": \"user_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"800693b3-6319-4d73-997d-7899f5d8b842","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","name":"Delete a grant by user_id - default","request":{"urlPathTemplate":"/grants","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","name":"Delete a grant by id - default","request":{"urlPathTemplate":"/grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","name":"Get all Groups - default","request":{"urlPathTemplate":"/groups","method":"GET"},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"871b57bd-a1f8-4a23-8337-5872e46fc987","name":"Get a Group - default","request":{"urlPathTemplate":"/groups/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"871b57bd-a1f8-4a23-8337-5872e46fc987","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e59d144-ec26-4602-a30e-51471fa41a83","name":"Get hooks - default","request":{"urlPathTemplate":"/hooks","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"hooks\": [\n {\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e59d144-ec26-4602-a30e-51471fa41a83","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","name":"Create a hook - default","request":{"urlPathTemplate":"/hooks","method":"POST"},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f14ce249-5900-4b4f-acd6-a9fa7255d829","name":"Get a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f14ce249-5900-4b4f-acd6-a9fa7255d829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","name":"Delete a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b56e935-667b-4af8-be86-94a3aa61008d","name":"Update a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b56e935-667b-4af8-be86-94a3aa61008d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdce95c-c559-471a-985a-45682f16bc5a","name":"Get a job - default","request":{"urlPathTemplate":"/jobs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"location\": \"location\",\n \"percentage_done\": 1,\n \"time_left_seconds\": 1,\n \"format\": \"json\",\n \"status_details\": \"status_details\",\n \"summary\": {\n \"failed\": 1,\n \"updated\": 1,\n \"inserted\": 1,\n \"total\": 1\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdce95c-c559-471a-985a-45682f16bc5a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","name":"Get log streams - default","request":{"urlPathTemplate":"/log-streams","method":"GET"},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {}\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3cac6a38-0d9f-40e0-983f-439cbedfa617","name":"Create a log stream - default","request":{"urlPathTemplate":"/log-streams","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cac6a38-0d9f-40e0-983f-439cbedfa617","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","name":"Get log stream by ID - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9fb04f8d-0fba-4891-8126-013d70d871aa","name":"Delete log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9fb04f8d-0fba-4891-8126-013d70d871aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8d10acdd-e185-496c-98c4-c91d469e6ed2","name":"Update a log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"8d10acdd-e185-496c-98c4-c91d469e6ed2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","name":"Search log events - default","request":{"urlPathTemplate":"/logs","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b10cc251-b48a-429a-a136-810cdb7290fc","name":"Get a log event by id - default","request":{"urlPathTemplate":"/logs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\",\n \"security_context\": {\n \"ja3\": \"ja3\",\n \"ja4\": \"ja4\"\n },\n \"location_info\": {\n \"country_code\": \"country_code\",\n \"country_code3\": \"country_code3\",\n \"country_name\": \"country_name\",\n \"city_name\": \"city_name\",\n \"latitude\": 1.1,\n \"longitude\": 1.1,\n \"time_zone\": \"time_zone\",\n \"continent_code\": \"continent_code\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b10cc251-b48a-429a-a136-810cdb7290fc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858e0070-39b1-460a-a2d5-53d0a5c3524a","name":"Get all access control list entries for a tenant - default","request":{"urlPathTemplate":"/network-acls","method":"GET"},"response":{"status":200,"body":"{\n \"network_acls\": [\n {\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {},\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"858e0070-39b1-460a-a2d5-53d0a5c3524a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f8a963bf-a53b-445d-b1d7-e21a4b253957","name":"Create Access Control List - default","request":{"urlPathTemplate":"/network-acls","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f8a963bf-a53b-445d-b1d7-e21a4b253957","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","name":"Get a specific access control list entry for a tenant - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b26d23ea-edcd-4512-a319-51a6e98131a0","name":"Update Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b26d23ea-edcd-4512-a319-51a6e98131a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","name":"Delete Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80648d37-b6ab-4ab4-ba80-17f00933453d","name":"Partial Update for an Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"80648d37-b6ab-4ab4-ba80-17f00933453d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4016e68-1c58-4a5c-b698-27ca350b937c","name":"Get organizations - default","request":{"urlPathTemplate":"/organizations","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a4016e68-1c58-4a5c-b698-27ca350b937c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"61349de2-c20a-4002-822b-9ed84e87ca1f","name":"Create an Organization - default","request":{"urlPathTemplate":"/organizations","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"61349de2-c20a-4002-822b-9ed84e87ca1f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dabd338a-8798-40ba-aaa0-8ce9b262b711","name":"Get organization by name - default","request":{"urlPathTemplate":"/organizations/name/{name}","method":"GET","pathParameters":{"name":{"equalTo":"name"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"dabd338a-8798-40ba-aaa0-8ce9b262b711","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da7fe10b-f528-48cf-b4e0-8d769617a66c","name":"Get organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"da7fe10b-f528-48cf-b4e0-8d769617a66c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"82031fa8-9043-489a-aa84-46bae3772393","name":"Delete organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"82031fa8-9043-489a-aa84-46bae3772393","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","name":"Modify an Organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","name":"Get prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"GET"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","name":"Update prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"PATCH"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6a045b19-b94d-495c-b30c-c1de79efc46f","name":"Get a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6a045b19-b94d-495c-b30c-c1de79efc46f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","name":"Delete a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7ea8e845-2337-4fbc-9632-246f4befb072","name":"Update a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ea8e845-2337-4fbc-9632-246f4befb072","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","name":"Get resource servers - default","request":{"urlPathTemplate":"/resource-servers","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"resource_servers\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"alg\": \"RSA-OAEP-256\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true\n },\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"47aa9a64-a544-47e0-9817-a2fe54866219","name":"Create a resource server - default","request":{"urlPathTemplate":"/resource-servers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47aa9a64-a544-47e0-9817-a2fe54866219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da399a32-c9a2-481c-9995-fc402c47f72a","name":"Get a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"da399a32-c9a2-481c-9995-fc402c47f72a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","name":"Delete a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","name":"Update a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","name":"Get roles - default","request":{"urlPathTemplate":"/roles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","name":"Create a role - default","request":{"urlPathTemplate":"/roles","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","name":"Get a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","name":"Delete a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb25cab0-ca38-4950-ba80-98504d41bb20","name":"Update a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb25cab0-ca38-4950-ba80-98504d41bb20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"551dd253-310d-4f66-ab80-e07988490a37","name":"Get rules - default","request":{"urlPathTemplate":"/rules","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"rules\": [\n {\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"551dd253-310d-4f66-ab80-e07988490a37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","name":"Create a rule - default","request":{"urlPathTemplate":"/rules","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6bd903b2-17f8-4021-9cae-4c1141223c95","name":"Get a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6bd903b2-17f8-4021-9cae-4c1141223c95","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6110c86e-027f-441b-bb72-e5b0e6096803","name":"Delete a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6110c86e-027f-441b-bb72-e5b0e6096803","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3033effa-f1f9-4988-8752-203075bb6aec","name":"Update a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3033effa-f1f9-4988-8752-203075bb6aec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","name":"Retrieve config variable keys for rules (get_rules-configs) - default","request":{"urlPathTemplate":"/rules-configs","method":"GET"},"response":{"status":200,"body":"[\n {\n \"key\": \"key\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f90321dc-6914-4101-8af1-743cafaa62d7","name":"Set rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"PUT","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"{\n \"key\": \"key\",\n \"value\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f90321dc-6914-4101-8af1-743cafaa62d7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4e06c73c-ffd7-4b88-9857-99801c652707","name":"Delete rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"DELETE","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4e06c73c-ffd7-4b88-9857-99801c652707","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","name":"Get self-service profiles - default","request":{"urlPathTemplate":"/self-service-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"self_service_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","name":"Create a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"19739c76-9199-492a-bd18-730f773b6ffb","name":"Get a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"19739c76-9199-492a-bd18-730f773b6ffb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","name":"Delete a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","name":"Update a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3eff16ca-bc50-43ac-9373-249bdaf18766","name":"Get session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3eff16ca-bc50-43ac-9373-249bdaf18766","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","name":"Delete session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","name":"Update session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","name":"Revokes a session - default","request":{"urlPathTemplate":"/sessions/{id}/revoke","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","name":"Get active users count - default","request":{"urlPathTemplate":"/stats/active-users","method":"GET"},"response":{"status":200,"body":"1.1","headers":{"Content-Type":"application/json"}},"uuid":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","name":"Get daily stats - default","request":{"urlPathTemplate":"/stats/daily","method":"GET"},"response":{"status":200,"body":"[\n {\n \"date\": \"date\",\n \"logins\": 1,\n \"signups\": 1,\n \"leaked_passwords\": 1,\n \"updated_at\": \"updated_at\",\n \"created_at\": \"created_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"818f5cc7-86b3-4568-8861-9d114c5669ef","name":"Get the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"GET"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"818f5cc7-86b3-4568-8861-9d114c5669ef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","name":"Update the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"PATCH"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b479979-e975-4c68-b8fd-ca081dfcbca7","name":"Create an email verification ticket - default","request":{"urlPathTemplate":"/tickets/email-verification","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b479979-e975-4c68-b8fd-ca081dfcbca7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","name":"Create a password change ticket - default","request":{"urlPathTemplate":"/tickets/password-change","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","name":"Get token exchange profiles - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"token_exchange_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","name":"Create a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4594d614-c499-48ab-9fee-e1d4df134a89","name":"Get a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4594d614-c499-48ab-9fee-e1d4df134a89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","name":"Delete a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","name":"Update an existing token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","name":"Get User Attribute Profiles - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"user_attribute_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","name":"Post User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5a222f5e-5188-4dff-ae26-46d41f56c061","name":"Get User Attribute Profile Templates - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"user_attribute_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5a222f5e-5188-4dff-ae26-46d41f56c061","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","name":"Get User Attribute Profile Template - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b09540c6-726c-42e3-b5e8-dbc7182c2147","name":"Get User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b09540c6-726c-42e3-b5e8-dbc7182c2147","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","name":"Delete User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e6307a7-6f62-4b1f-a02b-e6414927a286","name":"Modify a user attribute profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e6307a7-6f62-4b1f-a02b-e6414927a286","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","name":"Get blocks by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"GET"},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","name":"Unblock by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2565899-4c2a-4b6b-93b5-caecdbadc782","name":"Get a user's blocks - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2565899-4c2a-4b6b-93b5-caecdbadc782","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b3f82ebe-f646-4a06-9770-8ece4e55d861","name":"Unblock a user - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b3f82ebe-f646-4a06-9770-8ece4e55d861","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8b4e8914-5be6-4e9b-896f-0b72752d9671","name":"List or Search Users - default","request":{"urlPathTemplate":"/users","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8b4e8914-5be6-4e9b-896f-0b72752d9671","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","name":"Create a User - default","request":{"urlPathTemplate":"/users","method":"POST"},"response":{"status":201,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","name":"Search Users by Email - default","request":{"urlPathTemplate":"/users-by-email","method":"GET"},"response":{"status":200,"body":"[\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9fc639a9-4bc3-4dab-909f-41947203684a","name":"Get a User - default","request":{"urlPathTemplate":"/users/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9fc639a9-4bc3-4dab-909f-41947203684a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"265181b3-7abf-472b-99f2-d2e6eb47b27e","name":"Delete a User - default","request":{"urlPathTemplate":"/users/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"265181b3-7abf-472b-99f2-d2e6eb47b27e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","name":"Update a User - default","request":{"urlPathTemplate":"/users/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1a7b88c7-c33a-4670-953b-957ea26d298e","name":"Generate New Multi-factor Authentication Recovery Code - default","request":{"urlPathTemplate":"/users/{id}/recovery-code-regeneration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"recovery_code\": \"recovery_code\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1a7b88c7-c33a-4670-953b-957ea26d298e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a562240d-132f-4adc-a0f6-763101460526","name":"Revokes selected resources from a user - default","request":{"urlPathTemplate":"/users/{id}/revoke-access","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a562240d-132f-4adc-a0f6-763101460526","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","name":"Get an action's versions - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"versions\": [\n {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33c0cb30-ca1f-4477-9078-8647e82f975f","name":"Get a specific version of an action - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33c0cb30-ca1f-4477-9078-8647e82f975f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"746fbf5a-cee7-4302-ad86-14035a3912f7","name":"Roll back to a previous action version - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}/deploy","method":"POST","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"746fbf5a-cee7-4302-ad86-14035a3912f7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"822dd98d-546e-46d8-a976-8f2c97028432","name":"Get an execution - default","request":{"urlPathTemplate":"/actions/executions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"status\": \"unspecified\",\n \"results\": [\n {\n \"action_name\": \"action_name\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"822dd98d-546e-46d8-a976-8f2c97028432","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8abc8ed4-7895-434f-a43b-613d4101d6bc","name":"List Actions Modules - default","request":{"urlPathTemplate":"/actions/modules","method":"GET"},"response":{"status":200,"body":"{\n \"modules\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"8abc8ed4-7895-434f-a43b-613d4101d6bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3e5b836f-105d-4d50-a185-5cd051f4db56","name":"Create a new Actions Module - default","request":{"urlPathTemplate":"/actions/modules","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3e5b836f-105d-4d50-a185-5cd051f4db56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","name":"Get a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"613a56ac-b303-417b-bbfe-d8ceda21db89","name":"Delete a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"613a56ac-b303-417b-bbfe-d8ceda21db89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","name":"Update a specific Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"989d944b-6872-44fc-957b-87900af162f6","name":"List all actions using an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/actions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"actions\": [\n {\n \"action_id\": \"action_id\",\n \"action_name\": \"action_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1,\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"989d944b-6872-44fc-957b-87900af162f6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","name":"Rollback an Actions Module to a previous version - default","request":{"urlPathTemplate":"/actions/modules/{id}/rollback","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6c96303-6883-4084-989f-2dbadb13c1d9","name":"Get triggers - default","request":{"urlPathTemplate":"/actions/triggers","method":"GET"},"response":{"status":200,"body":"{\n \"triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6c96303-6883-4084-989f-2dbadb13c1d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","name":"List all versions of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"versions\": [\n {\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {}\n ],\n \"dependencies\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f2ae0322-48cb-47bb-a197-e4607ede713a","name":"Create a new version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f2ae0322-48cb-47bb-a197-e4607ede713a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"29f3eb37-e484-460b-a662-6e196927da74","name":"Get a specific version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions/{versionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"versionId":{"equalTo":"versionId"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"29f3eb37-e484-460b-a662-6e196927da74","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","name":"Get trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"GET","pathParameters":{"triggerId":{"equalTo":"triggerId"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"677bf282-a2a0-4bc7-a065-b5de9e248673","name":"Update trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"PATCH","pathParameters":{"triggerId":{"equalTo":"triggerId"}}},"response":{"status":200,"body":"{\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"677bf282-a2a0-4bc7-a065-b5de9e248673","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858c0df0-350f-4619-8960-6f774c0f234a","name":"Check if an IP address is blocked - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"858c0df0-350f-4619-8960-6f774c0f234a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","name":"Remove the blocked IP address - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80b1e16c-5284-48f9-9802-ff189fca3b63","name":"Get Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"GET"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"80b1e16c-5284-48f9-9802-ff189fca3b63","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bf92fa51-631d-42ef-bf27-8161f3bcab37","name":"Update Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf92fa51-631d-42ef-bf27-8161f3bcab37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","name":"Get Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7f0c04d7-e36a-49ce-af70-af9df4825f56","name":"Update Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"7f0c04d7-e36a-49ce-af70-af9df4825f56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","name":"Get Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","name":"Update Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","name":"Get the CAPTCHA configuration for a tenant - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"GET"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","name":"Partial Update for CAPTCHA Configuration - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"PATCH"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","name":"Get Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","name":"Update Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bdf661b2-3819-41c2-98f8-4b9137f67189","name":"Get template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"GET"},"response":{"status":200,"body":"{\n \"body\": \"body\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bdf661b2-3819-41c2-98f8-4b9137f67189","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"44f5b8dc-7d64-47a1-8889-79cda94f7809","name":"Set template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"PUT"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"44f5b8dc-7d64-47a1-8889-79cda94f7809","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","name":"Delete template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c7a5627-a851-4881-9e60-689c81a3122b","name":"Create branding theme - default","request":{"urlPathTemplate":"/branding/themes","method":"POST"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c7a5627-a851-4881-9e60-689c81a3122b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"91d16fa4-7e8b-4de2-aa78-061a5267295b","name":"Get default branding theme - default","request":{"urlPathTemplate":"/branding/themes/default","method":"GET"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"91d16fa4-7e8b-4de2-aa78-061a5267295b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f102da1c-5323-41ec-b320-888d05f069b8","name":"Get branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"GET","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f102da1c-5323-41ec-b320-888d05f069b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"215eeb29-68c9-4243-857e-d87a7c62795f","name":"Delete branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"DELETE","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"215eeb29-68c9-4243-857e-d87a7c62795f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dbbd929-7e98-438f-8310-2500cb90f70c","name":"Update branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"PATCH","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2dbbd929-7e98-438f-8310-2500cb90f70c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"520b4b30-1317-42da-89bf-a0491d1694b6","name":"Get a list of phone providers - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"GET"},"response":{"status":200,"body":"{\n \"providers\": [\n {\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"520b4b30-1317-42da-89bf-a0491d1694b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","name":"Configure the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8c639058-4844-47c5-8ad8-c0ccd33399bb","name":"Get a phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8c639058-4844-47c5-8ad8-c0ccd33399bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a6175428-056a-47f4-b776-4dcf8260822c","name":"Deletes a Phone Provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a6175428-056a-47f4-b776-4dcf8260822c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"95edda2c-d9d9-4854-9130-044ebb441bd7","name":"Update the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"95edda2c-d9d9-4854-9130-044ebb441bd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eced0fdd-3915-430a-8c28-1161ab6a3313","name":"Send a test phone notification for the configured provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"code\": 1.1,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"eced0fdd-3915-430a-8c28-1161ab6a3313","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","name":"Get a list of phone notification templates - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"templates\": [\n {\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {},\n \"type\": \"otp_verify\",\n \"disabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"300d3eb8-52bc-4001-8af4-a0594f4242d9","name":"Create a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"300d3eb8-52bc-4001-8af4-a0594f4242d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","name":"Get a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","name":"Delete a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e4c517e-f1d0-4252-bfea-7b6342825fba","name":"Update a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e4c517e-f1d0-4252-bfea-7b6342825fba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","name":"Resets a phone notification template values - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/reset","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"x\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"x\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"x\",\n \"body\": {\n \"text\": \"x\",\n \"voice\": \"x\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d9ba799-020f-40db-86d6-08de485ad618","name":"Send a test phone notification for the configured template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d9ba799-020f-40db-86d6-08de485ad618","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","name":"Get the organizations associated to a client grant - default","request":{"urlPathTemplate":"/client-grants/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"318739d6-2060-4406-9548-e1dca9fc9306","name":"Get client credentials - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"318739d6-2060-4406-9548-e1dca9fc9306","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","name":"Create a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"POST","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"84fb49da-5fa4-4f09-8176-cf14ff179829","name":"Get client credential details - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"84fb49da-5fa4-4f09-8176-cf14ff179829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ac24c006-0300-485b-b881-9bfd0a38c4aa","name":"Delete a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"DELETE","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ac24c006-0300-485b-b881-9bfd0a38c4aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c820cce1-37c3-4aa6-8700-119563b70d23","name":"Update a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"PATCH","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c820cce1-37c3-4aa6-8700-119563b70d23","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","name":"Get enabled connections for a client - default","request":{"urlPathTemplate":"/clients/{id}/connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","name":"Get a list of directory provisioning configurations - default","request":{"urlPathTemplate":"/connections-directory-provisionings","method":"GET"},"response":{"status":200,"body":"{\n \"directory_provisionings\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","name":"Get a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3cfd3977-6fa4-44df-bdf3-78fee867315a","name":"Create a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cfd3977-6fa4-44df-bdf3-78fee867315a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","name":"Delete a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","name":"Patch a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"181a029d-c4d1-4386-8c0d-4e517aea7579","name":"Get a connection's default directory provisioning attribute mapping - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"181a029d-c4d1-4386-8c0d-4e517aea7579","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cda0987-d608-47ba-b465-245ecfaabb90","name":"Get enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cda0987-d608-47ba-b465-245ecfaabb90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","name":"Update enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf72570e-1315-4eaa-8145-3f400d3eccf0","name":"Get connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"bf72570e-1315-4eaa-8145-3f400d3eccf0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","name":"Rotate connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys/rotate","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"next\": true,\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","name":"Get a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"45f92e80-8b92-4937-b29b-76fac22cf624","name":"Create a SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"45f92e80-8b92-4937-b29b-76fac22cf624","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9239c3d-f534-4c1d-a05e-64c0785f569a","name":"Delete a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9239c3d-f534-4c1d-a05e-64c0785f569a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d298cb6d-3c6a-4510-a78c-556fad17fd65","name":"Patch a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d298cb6d-3c6a-4510-a78c-556fad17fd65","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","name":"Get a connection's default SCIM mapping - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","name":"Delete a connection user - default","request":{"urlPathTemplate":"/connections/{id}/users","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"175c0550-405b-4cd6-b498-6501a695ed33","name":"Request an on-demand synchronization of the directory - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/synchronizations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"synchronization_id\": \"synchronization_id\",\n \"status\": \"status\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"175c0550-405b-4cd6-b498-6501a695ed33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58eab082-4eda-42df-9764-ed787b38df1e","name":"Get a connection's SCIM tokens - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"token_id\": \"token_id\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\",\n \"last_used_at\": \"last_used_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"58eab082-4eda-42df-9764-ed787b38df1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b55da7ed-453d-4799-b895-796f72020abb","name":"Create a SCIM Token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"token_id\": \"token_id\",\n \"token\": \"token\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b55da7ed-453d-4799-b895-796f72020abb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","name":"Delete a connection's SCIM token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens/{tokenId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenId":{"equalTo":"tokenId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","name":"Get email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"GET"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d1a0f535-378f-4200-865f-23ca6cf50b9d","name":"Configure email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d1a0f535-378f-4200-865f-23ca6cf50b9d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","name":"Delete email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36f2813e-a299-41fd-a6d6-54938ea37a15","name":"Update email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"PATCH"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"36f2813e-a299-41fd-a6d6-54938ea37a15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c3751490-b492-4376-9596-bd7d6f5e8443","name":"Get this event stream's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c3751490-b492-4376-9596-bd7d6f5e8443","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"93fa5cb1-a92c-4b20-8483-814c91175496","name":"Get a specific event's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries/{event_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"93fa5cb1-a92c-4b20-8483-814c91175496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"25856d60-9bad-4777-b7f2-7b5e2656b133","name":"Redeliver failed events - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"date_from\": \"2024-01-15T09:30:00Z\",\n \"date_to\": \"2024-01-15T09:30:00Z\",\n \"statuses\": [\n \"failed\"\n ],\n \"event_types\": [\n \"user.created\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"25856d60-9bad-4777-b7f2-7b5e2656b133","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","name":"Redeliver a single failed event by ID - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver/{event_id}","method":"POST","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"62d121a4-93bc-4281-8659-06708ac8d781","name":"Get flow executions - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"executions\": [\n {\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"62d121a4-93bc-4281-8659-06708ac8d781","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","name":"Get a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"debug\": {\n \"key\": \"value\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","name":"Delete a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"DELETE","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","name":"Get Flows Vault connection list - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b56d64da-174f-4d7e-86e7-3240fb1a8174","name":"Create a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b56d64da-174f-4d7e-86e7-3240fb1a8174","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","name":"Get a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","name":"Delete a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cdbf8062-2c13-4861-9280-e1ef2af24823","name":"Update a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cdbf8062-2c13-4861-9280-e1ef2af24823","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","name":"Get Group Members - default","request":{"urlPathTemplate":"/groups/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"members\": [\n {\n \"id\": \"id\",\n \"member_type\": \"user\",\n \"type\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a2982e98-d69b-4815-a50d-57f1267374d8","name":"Create a multi-factor authentication enrollment ticket - default","request":{"urlPathTemplate":"/guardian/enrollments/ticket","method":"POST"},"response":{"status":200,"body":"{\n \"ticket_id\": \"ticket_id\",\n \"ticket_url\": \"ticket_url\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a2982e98-d69b-4815-a50d-57f1267374d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"029d8a45-40e7-4697-b2da-a0c12a4d3895","name":"Get a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"status\": \"pending\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"enrolled_at\": \"enrolled_at\",\n \"last_auth\": \"last_auth\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"029d8a45-40e7-4697-b2da-a0c12a4d3895","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","name":"Delete a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12377456-a682-4cdc-b63d-41a188b3ce32","name":"Get Factors and multi-factor authentication details - default","request":{"urlPathTemplate":"/guardian/factors","method":"GET"},"response":{"status":200,"body":"[\n {\n \"enabled\": true,\n \"trial_expired\": true,\n \"name\": \"push-notification\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"12377456-a682-4cdc-b63d-41a188b3ce32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"93c9905e-4981-4cb3-a7b0-026dab1704d6","name":"Update multi-factor authentication type - default","request":{"urlPathTemplate":"/guardian/factors/{name}","method":"PUT","pathParameters":{"name":{"equalTo":"push-notification"}}},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"93c9905e-4981-4cb3-a7b0-026dab1704d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e47dd04a-f3a3-409a-a301-7732f16f3bec","name":"Get multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"GET"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"e47dd04a-f3a3-409a-a301-7732f16f3bec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8ee26dda-4638-4269-9b14-59f2907ef28b","name":"Update multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"PUT"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"8ee26dda-4638-4269-9b14-59f2907ef28b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ed435b3e-66b6-47b0-882f-08d926944cad","name":"Get Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"GET"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ed435b3e-66b6-47b0-882f-08d926944cad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92b96146-6175-4994-87af-ac137f73595d","name":"Update the Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"PUT"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"92b96146-6175-4994-87af-ac137f73595d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bd1421c2-3dbe-4603-b96c-02e53872498b","name":"Get Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bd1421c2-3dbe-4603-b96c-02e53872498b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","name":"Update Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5c310715-a914-4928-9142-141be90dd71e","name":"Get phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5c310715-a914-4928-9142-141be90dd71e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"555dfcb1-93af-4dcf-8241-1114028c32b4","name":"Update phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"555dfcb1-93af-4dcf-8241-1114028c32b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","name":"Get Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","name":"Update Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","name":"Get APNS push notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"GET"},"response":{"status":200,"body":"{\n \"bundle_id\": \"bundle_id\",\n \"sandbox\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","name":"Update APNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PUT"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","name":"Update APNs provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PATCH"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"91658483-7866-4a3d-b63b-0c7dea839dbe","name":"Updates FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"91658483-7866-4a3d-b63b-0c7dea839dbe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","name":"Updates FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e301ea18-e5af-4e68-8700-953158819796","name":"Updates FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e301ea18-e5af-4e68-8700-953158819796","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de696b9c-3ffb-4bc8-adde-131913ca6338","name":"Updates FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"de696b9c-3ffb-4bc8-adde-131913ca6338","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03df5fb-b6e0-4345-9c83-e920d88114c9","name":"Get AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"GET"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03df5fb-b6e0-4345-9c83-e920d88114c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6e8e169e-036c-4ebe-8171-a3aeb7c68ad5","name":"Update AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PUT"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6e8e169e-036c-4ebe-8171-a3aeb7c68ad5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","name":"Update AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PATCH"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0496348c-7357-4623-8514-fb741a753c75","name":"Get push notification provider - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0496348c-7357-4623-8514-fb741a753c75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7285a311-6499-4a95-a8cc-6701a6997bf5","name":"Update Push Notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7285a311-6499-4a95-a8cc-6701a6997bf5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e8ca19da-0184-44a0-868c-f020f73cbcbe","name":"Get Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e8ca19da-0184-44a0-868c-f020f73cbcbe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","name":"Update Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","name":"Get SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"69919759-0017-4dd6-8df8-a40088848ddb","name":"Update SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"69919759-0017-4dd6-8df8-a40088848ddb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1731b364-a171-42f2-8475-62bdb634879d","name":"Get SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1731b364-a171-42f2-8475-62bdb634879d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","name":"Update SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47cb059e-e754-4e4c-804b-52d84dd12162","name":"Get DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"GET"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47cb059e-e754-4e4c-804b-52d84dd12162","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"59380cca-acd7-464e-86e0-1017e022aaa0","name":"Update the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PUT"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"59380cca-acd7-464e-86e0-1017e022aaa0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38a5aa65-75f0-471c-ab5e-10b544359b3c","name":"Update the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38a5aa65-75f0-471c-ab5e-10b544359b3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","name":"Get hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","name":"Add hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1e6e250b-ded1-4ca6-831a-83d54b71295e","name":"Delete hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1e6e250b-ded1-4ca6-831a-83d54b71295e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"81e2c92a-69de-446b-82c8-7f320f9e1060","name":"Update hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"81e2c92a-69de-446b-82c8-7f320f9e1060","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a93c6324-dab3-4581-8117-74e0dc2c05b3","name":"Create export users job - default","request":{"urlPathTemplate":"/jobs/users-exports","method":"POST"},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"format\": \"json\",\n \"limit\": 1,\n \"fields\": [\n {\n \"name\": \"name\",\n \"export_as\": \"export_as\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a93c6324-dab3-4581-8117-74e0dc2c05b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","name":"Create import users job - default","request":{"urlPathTemplate":"/jobs/users-imports","method":"POST"},"response":{"status":202,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"external_id\": \"external_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","name":"Send an email address verification email - default","request":{"urlPathTemplate":"/jobs/verification-email","method":"POST"},"response":{"status":201,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ddcb674-4117-4538-98e8-5723fdb083e8","name":"Get job error details - default","request":{"urlPathTemplate":"/jobs/{id}/errors","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"user\": {\n \"key\": \"value\"\n },\n \"errors\": [\n {}\n ]\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1ddcb674-4117-4538-98e8-5723fdb083e8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"70e1c2da-e7db-401a-b166-be0b5da6139c","name":"Get custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"GET"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"70e1c2da-e7db-401a-b166-be0b5da6139c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3b40098d-d649-4030-bc12-31606e807e15","name":"Create or replace custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"PUT"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3b40098d-d649-4030-bc12-31606e807e15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","name":"Delete custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c09166ed-9d73-4607-92f6-ae884592a5e5","name":"Get all encryption keys - default","request":{"urlPathTemplate":"/keys/encryption","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1,\n \"limit\": 1,\n \"total\": 1,\n \"keys\": [\n {\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c09166ed-9d73-4607-92f6-ae884592a5e5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","name":"Create the new encryption key - default","request":{"urlPathTemplate":"/keys/encryption","method":"POST"},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"974880c1-1ef6-4001-a614-aa43c37b4420","name":"Rekey the key hierarchy - default","request":{"urlPathTemplate":"/keys/encryption/rekey","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"974880c1-1ef6-4001-a614-aa43c37b4420","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77bab061-9dae-4268-84d0-0b63e263f1ab","name":"Get the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"77bab061-9dae-4268-84d0-0b63e263f1ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86a3fc30-c02a-4c36-ac4c-7900289870b8","name":"Import the encryption key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"86a3fc30-c02a-4c36-ac4c-7900289870b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","name":"Delete the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"DELETE","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","name":"Create the public wrapping key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}/wrapping-key","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"public_key\": \"public_key\",\n \"algorithm\": \"CKM_RSA_AES_KEY_WRAP\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bde50a3-a51e-41b4-9018-8f46bd597774","name":"Get all Application Signing Keys - default","request":{"urlPathTemplate":"/keys/signing","method":"GET"},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1bde50a3-a51e-41b4-9018-8f46bd597774","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e9d4827d-c55c-4b09-a761-24a551052257","name":"Rotate the Application Signing Key - default","request":{"urlPathTemplate":"/keys/signing/rotate","method":"POST"},"response":{"status":201,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9d4827d-c55c-4b09-a761-24a551052257","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","name":"Get an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","name":"Revoke an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}/revoke","method":"PUT","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bd5c630-fb83-4b4e-a903-67268e3218e0","name":"Get client grants associated to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bd5c630-fb83-4b4e-a903-67268e3218e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","name":"Associate a client grant with an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","name":"Remove a client grant from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants/{grant_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"grant_id":{"equalTo":"grant_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2edde951-0b04-4e05-9389-658b85c37299","name":"Retrieve all organization discovery domains - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"domains\": [\n {\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2edde951-0b04-4e05-9389-658b85c37299","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","name":"Create an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","name":"Retrieve an organization discovery domain by domain name - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/name/{discovery_domain}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain":{"equalTo":"discovery_domain"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","name":"Retrieve an organization discovery domain by ID - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"803a298e-d6f6-4370-8e03-37d06547eeef","name":"Delete an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"803a298e-d6f6-4370-8e03-37d06547eeef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fca95551-032d-44de-a3cf-849f98ec2177","name":"Update an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fca95551-032d-44de-a3cf-849f98ec2177","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","name":"Get connections enabled for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c311c287-5333-41bd-819e-e813c541ed66","name":"Add connections to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c311c287-5333-41bd-819e-e813c541ed66","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","name":"Get an enabled connection for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0dc9106a-150c-40d8-9000-176bd6350a98","name":"Delete connections from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0dc9106a-150c-40d8-9000-176bd6350a98","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9a371d52-abea-44dc-a464-f04f63a601b0","name":"Update the Connection of an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9a371d52-abea-44dc-a464-f04f63a601b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7fb2e068-8caf-4234-aa52-3b51c9f37300","name":"Get invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"invitations\": [\n {\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7fb2e068-8caf-4234-aa52-3b51c9f37300","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"49ad8742-5d95-4969-87cf-09427959682f","name":"Create invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"49ad8742-5d95-4969-87cf-09427959682f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2bf04456-d49c-45d6-aedf-19598f4c6df8","name":"Get a specific invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2bf04456-d49c-45d6-aedf-19598f4c6df8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1a1c3283-fac9-4185-bcb8-3a9053a43163","name":"Delete an invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1a1c3283-fac9-4185-bcb8-3a9053a43163","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","name":"Get members who belong to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"members\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\",\n \"roles\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8536454b-53b8-4272-8829-062f2cb9092d","name":"Add members to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8536454b-53b8-4272-8829-062f2cb9092d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"71dcfc22-87b0-4591-921b-7d7088bd16ae","name":"Delete members from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"71dcfc22-87b0-4591-921b-7d7088bd16ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c099b94-dfed-4bf8-b370-25ceade844b1","name":"Get user roles assigned to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c099b94-dfed-4bf8-b370-25ceade844b1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","name":"Assign user roles to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"245dc825-fc94-49ca-9547-a4b30ac4485a","name":"Delete user roles from an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"245dc825-fc94-49ca-9547-a4b30ac4485a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","name":"Get render setting configurations for all screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"GET"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d0abb404-e603-4992-9c65-19a5766a9462","name":"Update render settings for multiple screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"PATCH"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"prompt\": \"login\",\n \"screen\": \"login\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d0abb404-e603-4992-9c65-19a5766a9462","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","name":"Get render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"248d2934-0ee0-434c-a9a5-df7501ef901c","name":"Update render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"PATCH","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"248d2934-0ee0-434c-a9a5-df7501ef901c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cd54de8-b246-4b0a-863b-f5fa0184e206","name":"Get custom text for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cd54de8-b246-4b0a-863b-f5fa0184e206","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bff89979-efc7-413e-8aaf-a45d84f1793b","name":"Set custom text for a specific prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"bff89979-efc7-413e-8aaf-a45d84f1793b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","name":"Get partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"GET","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9517422-8a42-4204-8156-cda9b385f017","name":"Set partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9517422-8a42-4204-8156-cda9b385f017","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb391545-5076-433d-8b32-b19ed3d73939","name":"Get risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"cb391545-5076-433d-8b32-b19ed3d73939","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8018c245-2f30-469f-992f-dc1668cccd75","name":"Update risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"8018c245-2f30-469f-992f-dc1668cccd75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","name":"Get new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"GET"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","name":"Update new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"PATCH"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf10686c-2651-4040-8299-93e4bbc9834d","name":"Get permissions granted by role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf10686c-2651-4040-8299-93e4bbc9834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"23e27895-e8da-4c4d-bec9-94df0205eb5c","name":"Associate permissions with a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"23e27895-e8da-4c4d-bec9-94df0205eb5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","name":"Remove permissions from a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c87640fd-900b-400f-93f0-9ccb6702a609","name":"Get a role's users - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c87640fd-900b-400f-93f0-9ccb6702a609","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","name":"Assign users to a role - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6173c4f-82c6-420c-a40d-889a713cb3e7","name":"Get custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6173c4f-82c6-420c-a40d-889a713cb3e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"52a78cce-bea7-4f10-be84-5b860989a20e","name":"Set custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"PUT","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"52a78cce-bea7-4f10-be84-5b860989a20e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","name":"Create an SSO access ticket to initiate the Self Service SSO Flow - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/sso-ticket","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","name":"Revoke an SSO access ticket - default","request":{"urlPathTemplate":"/self-service-profiles/{profileId}/sso-ticket/{id}/revoke","method":"POST","pathParameters":{"profileId":{"equalTo":"profileId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12199f5c-a53a-4405-8a5f-a83867b89865","name":"Get tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"GET"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"12199f5c-a53a-4405-8a5f-a83867b89865","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","name":"Update tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","name":"Get a list of authentication methods - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"authenticators\": [\n {\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a786d309-f573-4722-9c1a-4336dcb2ca34","name":"Creates an authentication method for a given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a786d309-f573-4722-9c1a-4336dcb2ca34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de90147a-4c08-43b0-9e64-3c7afab7fe48","name":"Update all authentication methods by replacing them with the given ones - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"de90147a-4c08-43b0-9e64-3c7afab7fe48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","name":"Delete all authentication methods for the given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","name":"Get an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"add53361-2a24-44ea-93fe-fd31b9981468","name":"Delete an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"add53361-2a24-44ea-93fe-fd31b9981468","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","name":"Update an authentication method - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"59e259ee-3764-496e-9875-949a218233be","name":"Delete All Authenticators - default","request":{"urlPathTemplate":"/users/{id}/authenticators","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"59e259ee-3764-496e-9875-949a218233be","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","name":"Get a User's Connected Accounts - default","request":{"urlPathTemplate":"/users/{id}/connected-accounts","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connected_accounts\": [\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"strategy\": \"strategy\",\n \"access_type\": \"offline\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4fb03086-4c19-4d4d-a060-b0f30cbed64f","name":"Get the First Confirmed Multi-factor Authentication Enrollment - default","request":{"urlPathTemplate":"/users/{id}/enrollments","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"status\": \"pending\",\n \"type\": \"type\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"auth_method\": \"authenticator\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"4fb03086-4c19-4d4d-a060-b0f30cbed64f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7df16d6a-51ec-415e-a605-f161474b5a60","name":"Get tokensets for a user - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"scope\": \"scope\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"issued_at\": \"2024-01-15T09:30:00Z\",\n \"last_used_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"7df16d6a-51ec-415e-a605-f161474b5a60","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","name":"Deletes a tokenset for federated connections by id. - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets/{tokenset_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenset_id":{"equalTo":"tokenset_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","name":"Get user's groups - default","request":{"urlPathTemplate":"/users/{id}/groups","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"membership_created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0333210f-005f-4731-9928-1487697620ba","name":"Link a User Account - default","request":{"urlPathTemplate":"/users/{id}/identities","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n },\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0333210f-005f-4731-9928-1487697620ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","name":"Unlink a User Identity - default","request":{"urlPathTemplate":"/users/{id}/identities/{provider}/{user_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"ad"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","name":"Get user's log events - default","request":{"urlPathTemplate":"/users/{id}/logs","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8224b345-c369-4d08-b366-81060009c441","name":"Invalidate All Remembered Browsers for Multi-factor Authentication - default","request":{"urlPathTemplate":"/users/{id}/multifactor/actions/invalidate-remember-browser","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8224b345-c369-4d08-b366-81060009c441","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86847e95-c858-46df-b005-c0f0392ae95c","name":"Delete a User's Multi-factor Provider - default","request":{"urlPathTemplate":"/users/{id}/multifactor/{provider}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"duo"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"86847e95-c858-46df-b005-c0f0392ae95c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","name":"List user's organizations - default","request":{"urlPathTemplate":"/users/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58cc0983-45ee-47d2-8a5c-b6e215c83942","name":"Get a User's Permissions - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"58cc0983-45ee-47d2-8a5c-b6e215c83942","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"812e845d-b47e-41b3-ad6b-edf602577cc4","name":"Assign Permissions to a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"812e845d-b47e-41b3-ad6b-edf602577cc4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6829e581-25db-4d58-99ad-1fd675c362f1","name":"Remove Permissions from a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6829e581-25db-4d58-99ad-1fd675c362f1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf944f2-8c7e-474c-82eb-9e21bb625219","name":"Clear risk assessment assessors for a specific user - default","request":{"urlPathTemplate":"/users/{id}/risk-assessments/clear","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0bf944f2-8c7e-474c-82eb-9e21bb625219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96a14af0-6c21-49ec-af86-512e672dd464","name":"Get a user's roles - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"96a14af0-6c21-49ec-af86-512e672dd464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcc9270b-77f1-4374-b64e-ce2381665996","name":"Assign roles to a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcc9270b-77f1-4374-b64e-ce2381665996","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c727015f-123f-4f98-9b24-25828361a4ab","name":"Removes roles from a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c727015f-123f-4f98-9b24-25828361a4ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"28b46c14-5cc3-42ad-8808-0072fb3249ba","name":"Get refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"28b46c14-5cc3-42ad-8808-0072fb3249ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1f25d8aa-36f6-4ba8-9865-27c99731105f","name":"Delete refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1f25d8aa-36f6-4ba8-9865-27c99731105f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","name":"Get sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"sessions\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"clients\": [\n {}\n ],\n \"session_metadata\": {\n \"key\": \"value\"\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0691684c-d746-4411-aa18-4de52a90a463","name":"Delete sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0691684c-d746-4411-aa18-4de52a90a463","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7424dc01-51cd-4cc9-b47d-082a7931e487","name":"List verifiable credentials template for tenant. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"templates\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7424dc01-51cd-4cc9-b47d-082a7931e487","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"65b53386-72a6-4ac3-afba-c41377b10e93","name":"Create a verifiable credential template. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"65b53386-72a6-4ac3-afba-c41377b10e93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bac80375-0249-4659-a3d4-3cad535b4a20","name":"Get a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bac80375-0249-4659-a3d4-3cad535b4a20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","name":"Delete a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9934fba5-6f64-4698-89dd-6123d0878561","name":"Update a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9934fba5-6f64-4698-89dd-6123d0878561","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}}],"meta":{"total":389}} \ No newline at end of file +{"mappings":[{"id":"33519415-78d5-4e20-b7ed-c0f6609b6e90","name":"Get actions - default","request":{"urlPathTemplate":"/actions/actions","method":"GET"},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"actions\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"installed_integration_id\": \"installed_integration_id\",\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33519415-78d5-4e20-b7ed-c0f6609b6e90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","name":"Create an action - default","request":{"urlPathTemplate":"/actions/actions","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0af03b66-13d2-4fbe-a736-0f9dae1a89da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9919a572-ff14-4914-88b8-acd7f6acc41d","name":"Get an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9919a572-ff14-4914-88b8-acd7f6acc41d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bb73e26-2243-414b-80fc-fcf53169d4fe","name":"Delete an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1bb73e26-2243-414b-80fc-fcf53169d4fe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2679764d-6f00-495e-b8fb-210d140167ba","name":"Update an action - default","request":{"urlPathTemplate":"/actions/actions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"deployed_version\": {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n },\n \"installed_integration_id\": \"installed_integration_id\",\n \"integration\": {\n \"id\": \"id\",\n \"catalog_id\": \"catalog_id\",\n \"url_slug\": \"url_slug\",\n \"partner_id\": \"partner_id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"short_description\": \"short_description\",\n \"logo\": \"logo\",\n \"feature_type\": \"unspecified\",\n \"terms_of_use_url\": \"terms_of_use_url\",\n \"privacy_policy_url\": \"privacy_policy_url\",\n \"public_support_link\": \"public_support_link\",\n \"current_release\": {\n \"id\": \"id\",\n \"trigger\": {\n \"id\": \"id\"\n },\n \"required_secrets\": [\n {}\n ],\n \"required_configuration\": [\n {}\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"status\": \"pending\",\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"deploy\": true,\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2679764d-6f00-495e-b8fb-210d140167ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bde5116-17ac-4ea2-be52-e584711a6b70","name":"Deploy an action - default","request":{"urlPathTemplate":"/actions/actions/{id}/deploy","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bde5116-17ac-4ea2-be52-e584711a6b70","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ebf627bb-6f85-4597-a454-0c654c35202c","name":"Test an Action - default","request":{"urlPathTemplate":"/actions/actions/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"payload\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"ebf627bb-6f85-4597-a454-0c654c35202c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f76d290-6b70-4f62-abc8-3760917fe787","name":"Get branding settings - default","request":{"urlPathTemplate":"/branding","method":"GET"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f76d290-6b70-4f62-abc8-3760917fe787","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9ca9e729-0745-457c-828d-37f7c8ab1698","name":"Update branding settings - default","request":{"urlPathTemplate":"/branding","method":"PATCH"},"response":{"status":200,"body":"{\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n },\n \"favicon_url\": \"favicon_url\",\n \"logo_url\": \"logo_url\",\n \"font\": {\n \"url\": \"url\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9ca9e729-0745-457c-828d-37f7c8ab1698","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5dbe0859-fbb5-4eb1-a803-8132e840e762","name":"Get client grants - default","request":{"urlPathTemplate":"/client-grants","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5dbe0859-fbb5-4eb1-a803-8132e840e762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"006f7f26-5002-4b98-a65f-39f8aee8e968","name":"Create client grant - default","request":{"urlPathTemplate":"/client-grants","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"006f7f26-5002-4b98-a65f-39f8aee8e968","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","name":"Get client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"03f565a5-e2d6-4f29-ac5c-7e1d2bd25c37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"00010fe3-8553-4cd6-9b9a-68aad031054f","name":"Delete client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"00010fe3-8553-4cd6-9b9a-68aad031054f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","name":"Update client grant - default","request":{"urlPathTemplate":"/client-grants/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true,\n \"is_system\": true,\n \"subject_type\": \"client\",\n \"authorization_details_types\": [\n \"authorization_details_types\"\n ],\n \"allow_all_scopes\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"d4a5deb2-fef3-4f0d-84ab-d78760e07405","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e9057410-f073-4b5b-83dc-dc4d5625ef27","name":"Get clients - default","request":{"urlPathTemplate":"/clients","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"clients\": [\n {\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"grant_types\": [\n \"grant_types\"\n ],\n \"signing_keys\": [\n {}\n ],\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\"\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {}\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9057410-f073-4b5b-83dc-dc4d5625ef27","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","name":"Create a client - default","request":{"urlPathTemplate":"/clients","method":"POST"},"response":{"status":201,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f689c30d-6d4c-42b6-8ab3-1dd1ca9672d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","name":"Get client by ID - default","request":{"urlPathTemplate":"/clients/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"12071cdc-1adc-4b32-8601-2cd12aa19c0c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"814f5054-4723-45e8-8d89-5a7da08db0d8","name":"Delete a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"814f5054-4723-45e8-8d89-5a7da08db0d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e5dc6c-c84f-4128-b87a-50876b601f77","name":"Update a client - default","request":{"urlPathTemplate":"/clients/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e5dc6c-c84f-4128-b87a-50876b601f77","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","name":"Rotate a client secret - default","request":{"urlPathTemplate":"/clients/{id}/rotate-secret","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"client_id\": \"client_id\",\n \"tenant\": \"tenant\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"global\": true,\n \"client_secret\": \"client_secret\",\n \"app_type\": \"native\",\n \"logo_uri\": \"logo_uri\",\n \"is_first_party\": true,\n \"oidc_conformant\": true,\n \"callbacks\": [\n \"callbacks\"\n ],\n \"allowed_origins\": [\n \"allowed_origins\"\n ],\n \"web_origins\": [\n \"web_origins\"\n ],\n \"client_aliases\": [\n \"client_aliases\"\n ],\n \"allowed_clients\": [\n \"allowed_clients\"\n ],\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_transfer\": {\n \"can_create_session_transfer_token\": true,\n \"enforce_cascade_revocation\": true,\n \"allowed_authentication_methods\": [\n \"cookie\"\n ],\n \"enforce_device_binding\": \"ip\",\n \"allow_refresh_token\": true,\n \"enforce_online_refresh_tokens\": true\n },\n \"oidc_logout\": {\n \"backchannel_logout_urls\": [\n \"backchannel_logout_urls\"\n ],\n \"backchannel_logout_initiators\": {\n \"mode\": \"custom\",\n \"selected_initiators\": [\n \"rp-logout\"\n ]\n },\n \"backchannel_logout_session_metadata\": {\n \"include\": true\n }\n },\n \"grant_types\": [\n \"grant_types\"\n ],\n \"jwt_configuration\": {\n \"lifetime_in_seconds\": 1,\n \"secret_encoded\": true,\n \"scopes\": {\n \"key\": \"value\"\n },\n \"alg\": \"HS256\"\n },\n \"signing_keys\": [\n {\n \"pkcs7\": \"pkcs7\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n }\n ],\n \"encryption_key\": {\n \"pub\": \"pub\",\n \"cert\": \"cert\",\n \"subject\": \"subject\"\n },\n \"sso\": true,\n \"sso_disabled\": true,\n \"cross_origin_authentication\": true,\n \"cross_origin_loc\": \"cross_origin_loc\",\n \"custom_login_page_on\": true,\n \"custom_login_page\": \"custom_login_page\",\n \"custom_login_page_preview\": \"custom_login_page_preview\",\n \"form_template\": \"form_template\",\n \"addons\": {\n \"aws\": {\n \"principal\": \"principal\",\n \"role\": \"role\",\n \"lifetime_in_seconds\": 1\n },\n \"azure_blob\": {\n \"accountName\": \"accountName\",\n \"storageAccessKey\": \"storageAccessKey\",\n \"containerName\": \"containerName\",\n \"blobName\": \"blobName\",\n \"expiration\": 1,\n \"signedIdentifier\": \"signedIdentifier\",\n \"blob_read\": true,\n \"blob_write\": true,\n \"blob_delete\": true,\n \"container_read\": true,\n \"container_write\": true,\n \"container_delete\": true,\n \"container_list\": true\n },\n \"azure_sb\": {\n \"namespace\": \"namespace\",\n \"sasKeyName\": \"sasKeyName\",\n \"sasKey\": \"sasKey\",\n \"entityPath\": \"entityPath\",\n \"expiration\": 1\n },\n \"rms\": {\n \"url\": \"url\"\n },\n \"mscrm\": {\n \"url\": \"url\"\n },\n \"slack\": {\n \"team\": \"team\"\n },\n \"sentry\": {\n \"org_slug\": \"org_slug\",\n \"base_url\": \"base_url\"\n },\n \"box\": {\n \"key\": \"value\"\n },\n \"cloudbees\": {\n \"key\": \"value\"\n },\n \"concur\": {\n \"key\": \"value\"\n },\n \"dropbox\": {\n \"key\": \"value\"\n },\n \"echosign\": {\n \"domain\": \"domain\"\n },\n \"egnyte\": {\n \"domain\": \"domain\"\n },\n \"firebase\": {\n \"secret\": \"secret\",\n \"private_key_id\": \"private_key_id\",\n \"private_key\": \"private_key\",\n \"client_email\": \"client_email\",\n \"lifetime_in_seconds\": 1\n },\n \"newrelic\": {\n \"account\": \"account\"\n },\n \"office365\": {\n \"domain\": \"domain\",\n \"connection\": \"connection\"\n },\n \"salesforce\": {\n \"entity_id\": \"entity_id\"\n },\n \"salesforce_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"salesforce_sandbox_api\": {\n \"clientid\": \"clientid\",\n \"principal\": \"principal\",\n \"communityName\": \"communityName\",\n \"community_url_section\": \"community_url_section\"\n },\n \"samlp\": {\n \"mappings\": {\n \"key\": \"value\"\n },\n \"audience\": \"audience\",\n \"recipient\": \"recipient\",\n \"createUpnClaim\": true,\n \"mapUnknownClaimsAsIs\": true,\n \"passthroughClaimsWithNoMapping\": true,\n \"mapIdentities\": true,\n \"signatureAlgorithm\": \"signatureAlgorithm\",\n \"digestAlgorithm\": \"digestAlgorithm\",\n \"issuer\": \"issuer\",\n \"destination\": \"destination\",\n \"lifetimeInSeconds\": 1,\n \"signResponse\": true,\n \"nameIdentifierFormat\": \"nameIdentifierFormat\",\n \"nameIdentifierProbes\": [\n \"nameIdentifierProbes\"\n ],\n \"authnContextClassRef\": \"authnContextClassRef\"\n },\n \"layer\": {\n \"providerId\": \"providerId\",\n \"keyId\": \"keyId\",\n \"privateKey\": \"privateKey\",\n \"principal\": \"principal\",\n \"expiration\": 1\n },\n \"sap_api\": {\n \"clientid\": \"clientid\",\n \"usernameAttribute\": \"usernameAttribute\",\n \"tokenEndpointUrl\": \"tokenEndpointUrl\",\n \"scope\": \"scope\",\n \"servicePassword\": \"servicePassword\",\n \"nameIdentifierFormat\": \"nameIdentifierFormat\"\n },\n \"sharepoint\": {\n \"url\": \"url\",\n \"external_url\": [\n \"external_url\"\n ]\n },\n \"springcm\": {\n \"acsurl\": \"acsurl\"\n },\n \"wams\": {\n \"masterkey\": \"masterkey\"\n },\n \"wsfed\": {\n \"key\": \"value\"\n },\n \"zendesk\": {\n \"accountName\": \"accountName\"\n },\n \"zoom\": {\n \"account\": \"account\"\n },\n \"sso_integration\": {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n },\n \"token_endpoint_auth_method\": \"none\",\n \"is_token_endpoint_ip_header_trusted\": true,\n \"client_metadata\": {\n \"key\": \"value\"\n },\n \"mobile\": {\n \"android\": {\n \"app_package_name\": \"app_package_name\",\n \"sha256_cert_fingerprints\": [\n \"sha256_cert_fingerprints\"\n ]\n },\n \"ios\": {\n \"team_id\": \"team_id\",\n \"app_bundle_identifier\": \"app_bundle_identifier\"\n }\n },\n \"initiate_login_uri\": \"initiate_login_uri\",\n \"refresh_token\": {\n \"rotation_type\": \"rotating\",\n \"expiration_type\": \"expiring\",\n \"leeway\": 1,\n \"token_lifetime\": 1,\n \"infinite_token_lifetime\": true,\n \"idle_token_lifetime\": 1,\n \"infinite_idle_token_lifetime\": true,\n \"policies\": [\n {\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n },\n \"default_organization\": {\n \"organization_id\": \"organization_id\",\n \"flows\": [\n \"client_credentials\"\n ]\n },\n \"organization_usage\": \"deny\",\n \"organization_require_behavior\": \"no_prompt\",\n \"organization_discovery_methods\": [\n \"email\"\n ],\n \"client_authentication_methods\": {\n \"private_key_jwt\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"self_signed_tls_client_auth\": {\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n },\n \"require_pushed_authorization_requests\": true,\n \"require_proof_of_possession\": true,\n \"signed_request_object\": {\n \"required\": true,\n \"credentials\": [\n {\n \"id\": \"id\"\n }\n ]\n },\n \"compliance_level\": \"none\",\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"token_exchange\": {\n \"allow_any_profile_of_type\": [\n \"custom_authentication\"\n ]\n },\n \"par_request_expiry\": 1,\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"express_configuration\": {\n \"initiate_login_uri_template\": \"initiate_login_uri_template\",\n \"user_attribute_profile_id\": \"user_attribute_profile_id\",\n \"connection_profile_id\": \"connection_profile_id\",\n \"enable_client\": true,\n \"enable_organization\": true,\n \"linked_clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"okta_oin_client_id\": \"okta_oin_client_id\",\n \"admin_login_domain\": \"admin_login_domain\",\n \"oin_submission_id\": \"oin_submission_id\"\n },\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"async_approval_notification_channels\": [\n \"guardian-push\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3dbf1f11-9054-4a8d-b670-96640f3ba9a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"af1dc5c5-16af-447c-8374-e80a178ce120","name":"Get Connection Profiles - default","request":{"urlPathTemplate":"/connection-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connection_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"af1dc5c5-16af-447c-8374-e80a178ce120","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","name":"Create a connection profile - default","request":{"urlPathTemplate":"/connection-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"759e4e87-7cf1-4e78-9d5e-ae5cdd0f4947","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d6f52e7-dd90-4579-a469-761793294ec5","name":"Get Connection Profile Templates - default","request":{"urlPathTemplate":"/connection-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"connection_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d6f52e7-dd90-4579-a469-761793294ec5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","name":"Get Connection Profile Template - default","request":{"urlPathTemplate":"/connection-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4e7a3895-5c6c-41cc-b32f-4303e2a973d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","name":"Get Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d5fff7c1-6be8-487e-a8b2-45fa4f4713d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","name":"Delete Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcfdce88-b3c9-4a57-8c4b-672e88f0363c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77f167dc-e4c6-478a-b74f-0e1385df797c","name":"Modify a Connection Profile - default","request":{"urlPathTemplate":"/connection-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"organization\": {\n \"show_as_button\": \"none\",\n \"assign_membership_on_login\": \"none\"\n },\n \"connection_name_prefix_template\": \"connection_name_prefix_template\",\n \"enabled_features\": [\n \"scim\"\n ],\n \"strategy_overrides\": {\n \"pingfederate\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"ad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"adfs\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"waad\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"google-apps\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"okta\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"oidc\": {\n \"enabled_features\": [\n \"scim\"\n ]\n },\n \"samlp\": {\n \"enabled_features\": [\n \"scim\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"77f167dc-e4c6-478a-b74f-0e1385df797c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","name":"Get all connections - default","request":{"urlPathTemplate":"/connections","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"baf70a92-2b1e-4355-a67e-a94f22a92ab5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bfae8759-4528-462e-9a50-239cbd75f902","name":"Create a connection - default","request":{"urlPathTemplate":"/connections","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"bfae8759-4528-462e-9a50-239cbd75f902","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","name":"Get a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb9c1976-0ef9-4666-adde-d2059ed3c1a2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e55d516f-7f79-4796-8adf-e0032183c04c","name":"Delete a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e55d516f-7f79-4796-8adf-e0032183c04c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"aa701672-a67f-47fc-9cfd-3d68353d9846","name":"Update a connection - default","request":{"urlPathTemplate":"/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"enabled_clients\": [\n \"enabled_clients\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"metadata\": {\n \"key\": \"value\"\n },\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true,\n \"cross_app_access\": true\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"aa701672-a67f-47fc-9cfd-3d68353d9846","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6e5db857-6ab6-4406-a83f-fb4332f72b48","name":"Check connection status - default","request":{"urlPathTemplate":"/connections/{id}/status","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6e5db857-6ab6-4406-a83f-fb4332f72b48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65f529d-2be4-4dc7-81c0-6d696834184e","name":"Get custom domains configurations - default","request":{"urlPathTemplate":"/custom-domains","method":"GET"},"response":{"status":200,"body":"[\n {\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c65f529d-2be4-4dc7-81c0-6d696834184e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d2917b20-da7e-4962-a75f-362f99682cf9","name":"Configure a new custom domain - default","request":{"urlPathTemplate":"/custom-domains","method":"POST"},"response":{"status":201,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2917b20-da7e-4962-a75f-362f99682cf9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d56d6773-eda9-4b8a-9193-025d27feecb9","name":"Get custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d56d6773-eda9-4b8a-9193-025d27feecb9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","name":"Delete custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0d3570c3-79d1-49e1-85ca-aa706fb2834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","name":"Update custom domain configuration - default","request":{"urlPathTemplate":"/custom-domains/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"is_default\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n },\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38539a1e-230b-4e70-b2f9-7ae0f252e1b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","name":"Test a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"success\": true,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cbb866f2-d5e1-4c1e-8e0e-9f50b3b5632c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"43d540a8-528e-44db-9bda-83cf1ef8a54d","name":"Verify a custom domain - default","request":{"urlPathTemplate":"/custom-domains/{id}/verify","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"custom_domain_id\": \"custom_domain_id\",\n \"domain\": \"domain\",\n \"primary\": true,\n \"status\": \"pending_verification\",\n \"type\": \"auth0_managed_certs\",\n \"cname_api_key\": \"cname_api_key\",\n \"origin_domain_name\": \"origin_domain_name\",\n \"verification\": {\n \"methods\": [\n {\n \"name\": \"cname\",\n \"record\": \"record\"\n }\n ],\n \"status\": \"verified\",\n \"error_msg\": \"error_msg\",\n \"last_verified_at\": \"last_verified_at\"\n },\n \"custom_client_ip_header\": \"custom_client_ip_header\",\n \"tls_policy\": \"tls_policy\",\n \"domain_metadata\": {\n \"key\": \"value\"\n },\n \"certificate\": {\n \"status\": \"provisioning\",\n \"error_msg\": \"error_msg\",\n \"certificate_authority\": \"letsencrypt\",\n \"renews_before\": \"renews_before\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"43d540a8-528e-44db-9bda-83cf1ef8a54d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cfcb7751-7a75-45bf-b39f-29bac41590da","name":"Retrieve device credentials - default","request":{"urlPathTemplate":"/device-credentials","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"device_credentials\": [\n {\n \"id\": \"id\",\n \"device_name\": \"device_name\",\n \"device_id\": \"device_id\",\n \"type\": \"public_key\",\n \"user_id\": \"user_id\",\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"cfcb7751-7a75-45bf-b39f-29bac41590da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","name":"Create a device public key credential - default","request":{"urlPathTemplate":"/device-credentials","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"01818d23-c5cc-483a-90d7-5a5b11bf52e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","name":"Delete a device credential - default","request":{"urlPathTemplate":"/device-credentials/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d2da3529-65a2-4a85-a6c8-c60a55a085ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"27d925db-b0e4-4cad-bf10-75440adb5dea","name":"Create an email template - default","request":{"urlPathTemplate":"/email-templates","method":"POST"},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"27d925db-b0e4-4cad-bf10-75440adb5dea","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e41992b1-8cf3-4611-9179-334debfd831a","name":"Get an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"GET","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e41992b1-8cf3-4611-9179-334debfd831a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","name":"Update an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PUT","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"4b7ee5d7-df46-44d7-8747-1db6f37bcda8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","name":"Patch an email template - default","request":{"urlPathTemplate":"/email-templates/{templateName}","method":"PATCH","pathParameters":{"templateName":{"equalTo":"verify_email"}}},"response":{"status":200,"body":"{\n \"template\": \"verify_email\",\n \"body\": \"body\",\n \"from\": \"from\",\n \"resultUrl\": \"resultUrl\",\n \"subject\": \"subject\",\n \"syntax\": \"syntax\",\n \"urlLifetimeInSeconds\": 1.1,\n \"includeEmailInRedirect\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"1489d312-c6ca-4277-a1d2-01ce4c4fdad9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fe7f4b8-58ff-4442-9339-c48f5185600f","name":"Get event streams - default","request":{"urlPathTemplate":"/event-streams","method":"GET"},"response":{"status":200,"body":"{\n \"eventStreams\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {}\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0fe7f4b8-58ff-4442-9339-c48f5185600f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","name":"Create an event stream - default","request":{"urlPathTemplate":"/event-streams","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b1a29bf-5c5c-45dd-a9fb-64f6944455e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"85d4a52f-7433-408c-a7cc-30776d9ed641","name":"Get an event stream by ID - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"85d4a52f-7433-408c-a7cc-30776d9ed641","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4812fcc9-8f28-4732-96d4-8adb072fa78a","name":"Delete an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4812fcc9-8f28-4732-96d4-8adb072fa78a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","name":"Update an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subscriptions\": [\n {\n \"event_type\": \"event_type\"\n }\n ],\n \"destination\": {\n \"type\": \"webhook\",\n \"configuration\": {\n \"webhook_endpoint\": \"webhook_endpoint\",\n \"webhook_authorization\": {\n \"method\": \"basic\",\n \"username\": \"username\"\n }\n }\n },\n \"status\": \"enabled\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"08468f05-d404-462e-8fdd-ce9dca3f4e3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4ba115c6-e86b-4427-9ce9-8468a24916b0","name":"Send a test event to an event stream - default","request":{"urlPathTemplate":"/event-streams/{id}/test","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"4ba115c6-e86b-4427-9ce9-8468a24916b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9bee2213-71c4-41f8-9350-d50ede2f6c53","name":"Get flows - default","request":{"urlPathTemplate":"/flows","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"flows\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"9bee2213-71c4-41f8-9350-d50ede2f6c53","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","name":"Create a flow - default","request":{"urlPathTemplate":"/flows","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eb24c4a-01ad-47bc-bf9a-927970d1096e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1eccebc1-db7b-4349-8fae-45c8537e9880","name":"Get a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1eccebc1-db7b-4349-8fae-45c8537e9880","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","name":"Delete a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4dba8bf4-bec9-4e15-8591-752e9ac3644e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fc07198a-b41e-4537-aec6-1226e9691c86","name":"Update a flow - default","request":{"urlPathTemplate":"/flows/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"actions\": [\n {\n \"id\": \"id\",\n \"alias\": \"alias\",\n \"type\": \"ACTIVECAMPAIGN\",\n \"action\": \"LIST_CONTACTS\",\n \"allow_failure\": true,\n \"mask_output\": true,\n \"params\": {\n \"connection_id\": \"connection_id\",\n \"email\": \"email\"\n }\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"executed_at\": \"executed_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fc07198a-b41e-4537-aec6-1226e9691c86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bf65872-e8cf-4987-becb-bb082f08419f","name":"Get forms - default","request":{"urlPathTemplate":"/forms","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"forms\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bf65872-e8cf-4987-becb-bb082f08419f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","name":"Create a form - default","request":{"urlPathTemplate":"/forms","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6255561a-7fa0-4557-a0e7-5d3a6f40b2a1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf329d0-420d-4f08-aec1-df5f12d67762","name":"Get a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0bf329d0-420d-4f08-aec1-df5f12d67762","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","name":"Delete a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c91995fc-fe8b-410c-9cbf-e13e1d538d1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"944b211b-eacb-4acc-8f40-a3463ae62f37","name":"Update a form - default","request":{"urlPathTemplate":"/forms/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"messages\": {\n \"errors\": {\n \"key\": \"value\"\n },\n \"custom\": {\n \"key\": \"value\"\n }\n },\n \"languages\": {\n \"primary\": \"primary\",\n \"default\": \"default\"\n },\n \"translations\": {\n \"key\": {\n \"key\": \"value\"\n }\n },\n \"nodes\": [\n {\n \"id\": \"id\",\n \"type\": \"FLOW\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"alias\": \"alias\",\n \"config\": {\n \"flow_id\": \"flow_id\"\n }\n }\n ],\n \"start\": {\n \"hidden_fields\": [\n {\n \"key\": \"key\"\n }\n ],\n \"next_node\": \"$ending\",\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n }\n },\n \"ending\": {\n \"redirection\": {\n \"delay\": 1,\n \"target\": \"target\"\n },\n \"after_submit\": {\n \"flow_id\": \"flow_id\"\n },\n \"coordinates\": {\n \"x\": 1,\n \"y\": 1\n },\n \"resume_flow\": true\n },\n \"style\": {\n \"css\": \"css\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"embedded_at\": \"embedded_at\",\n \"submitted_at\": \"submitted_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"944b211b-eacb-4acc-8f40-a3463ae62f37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"800693b3-6319-4d73-997d-7899f5d8b842","name":"Get grants - default","request":{"urlPathTemplate":"/grants","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"grants\": [\n {\n \"id\": \"id\",\n \"clientID\": \"clientID\",\n \"user_id\": \"user_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"800693b3-6319-4d73-997d-7899f5d8b842","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","name":"Delete a grant by user_id - default","request":{"urlPathTemplate":"/grants","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"42d14bbf-3fda-4f6e-82c7-0511f2cc78b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","name":"Delete a grant by id - default","request":{"urlPathTemplate":"/grants/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0384a6d8-8b93-4c86-9b01-4a78b2056a0b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","name":"Get all Groups - default","request":{"urlPathTemplate":"/groups","method":"GET"},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"eef0d4e7-35b8-494e-9e36-bcdefebe33db","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"871b57bd-a1f8-4a23-8337-5872e46fc987","name":"Get a Group - default","request":{"urlPathTemplate":"/groups/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"871b57bd-a1f8-4a23-8337-5872e46fc987","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e59d144-ec26-4602-a30e-51471fa41a83","name":"Get hooks - default","request":{"urlPathTemplate":"/hooks","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"hooks\": [\n {\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e59d144-ec26-4602-a30e-51471fa41a83","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","name":"Create a hook - default","request":{"urlPathTemplate":"/hooks","method":"POST"},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"275f3fd6-ea46-4d4e-b0b7-b3ccfa929d1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f14ce249-5900-4b4f-acd6-a9fa7255d829","name":"Get a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f14ce249-5900-4b4f-acd6-a9fa7255d829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","name":"Delete a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fff91330-4870-4c93-ac97-6d27a8f1fb9e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b56e935-667b-4af8-be86-94a3aa61008d","name":"Update a hook - default","request":{"urlPathTemplate":"/hooks/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"triggerId\": \"triggerId\",\n \"id\": \"id\",\n \"name\": \"name\",\n \"enabled\": true,\n \"script\": \"script\",\n \"dependencies\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b56e935-667b-4af8-be86-94a3aa61008d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdce95c-c559-471a-985a-45682f16bc5a","name":"Get a job - default","request":{"urlPathTemplate":"/jobs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"location\": \"location\",\n \"percentage_done\": 1,\n \"time_left_seconds\": 1,\n \"format\": \"json\",\n \"status_details\": \"status_details\",\n \"summary\": {\n \"failed\": 1,\n \"updated\": 1,\n \"inserted\": 1,\n \"total\": 1\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdce95c-c559-471a-985a-45682f16bc5a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","name":"Get log streams - default","request":{"urlPathTemplate":"/log-streams","method":"GET"},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {}\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0ce12a9c-ca36-486e-aa2a-e41e0eb1ef44","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3cac6a38-0d9f-40e0-983f-439cbedfa617","name":"Create a log stream - default","request":{"urlPathTemplate":"/log-streams","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cac6a38-0d9f-40e0-983f-439cbedfa617","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","name":"Get log stream by ID - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"046f0424-b1aa-49bc-bf20-db22d7a7bdf4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9fb04f8d-0fba-4891-8126-013d70d871aa","name":"Delete log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9fb04f8d-0fba-4891-8126-013d70d871aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8d10acdd-e185-496c-98c4-c91d469e6ed2","name":"Update a log stream - default","request":{"urlPathTemplate":"/log-streams/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"status\": \"active\",\n \"type\": \"http\",\n \"isPriority\": true,\n \"filters\": [\n {\n \"type\": \"category\",\n \"name\": \"auth.login.fail\"\n }\n ],\n \"pii_config\": {\n \"log_fields\": [\n \"first_name\"\n ],\n \"method\": \"mask\",\n \"algorithm\": \"xxhash\"\n },\n \"sink\": {\n \"httpAuthorization\": \"httpAuthorization\",\n \"httpContentFormat\": \"JSONARRAY\",\n \"httpContentType\": \"httpContentType\",\n \"httpEndpoint\": \"httpEndpoint\",\n \"httpCustomHeaders\": [\n {}\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"8d10acdd-e185-496c-98c4-c91d469e6ed2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","name":"Search log events - default","request":{"urlPathTemplate":"/logs","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"dc2b7d2b-54f2-4803-8bf1-bd0cfdcb6132","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b10cc251-b48a-429a-a136-810cdb7290fc","name":"Get a log event by id - default","request":{"urlPathTemplate":"/logs/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\",\n \"security_context\": {\n \"ja3\": \"ja3\",\n \"ja4\": \"ja4\"\n },\n \"location_info\": {\n \"country_code\": \"country_code\",\n \"country_code3\": \"country_code3\",\n \"country_name\": \"country_name\",\n \"city_name\": \"city_name\",\n \"latitude\": 1.1,\n \"longitude\": 1.1,\n \"time_zone\": \"time_zone\",\n \"continent_code\": \"continent_code\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b10cc251-b48a-429a-a136-810cdb7290fc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858e0070-39b1-460a-a2d5-53d0a5c3524a","name":"Get all access control list entries for a tenant - default","request":{"urlPathTemplate":"/network-acls","method":"GET"},"response":{"status":200,"body":"{\n \"network_acls\": [\n {\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {},\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"858e0070-39b1-460a-a2d5-53d0a5c3524a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f8a963bf-a53b-445d-b1d7-e21a4b253957","name":"Create Access Control List - default","request":{"urlPathTemplate":"/network-acls","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f8a963bf-a53b-445d-b1d7-e21a4b253957","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","name":"Get a specific access control list entry for a tenant - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb3b0b5f-3ab2-4b19-b79b-8f10391b7deb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b26d23ea-edcd-4512-a319-51a6e98131a0","name":"Update Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b26d23ea-edcd-4512-a319-51a6e98131a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","name":"Delete Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6df7bc0d-d051-4e5f-8f62-608e9d028cc6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80648d37-b6ab-4ab4-ba80-17f00933453d","name":"Partial Update for an Access Control List - default","request":{"urlPathTemplate":"/network-acls/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"description\": \"description\",\n \"active\": true,\n \"priority\": 1.1,\n \"rule\": {\n \"action\": {\n \"block\": true,\n \"allow\": true,\n \"log\": true,\n \"redirect\": true,\n \"redirect_uri\": \"redirect_uri\"\n },\n \"match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"not_match\": {\n \"asns\": [\n 1\n ],\n \"geo_country_codes\": [\n \"geo_country_codes\"\n ],\n \"geo_subdivision_codes\": [\n \"geo_subdivision_codes\"\n ],\n \"ipv4_cidrs\": [\n \"ipv4_cidrs\"\n ],\n \"ipv6_cidrs\": [\n \"ipv6_cidrs\"\n ],\n \"ja3_fingerprints\": [\n \"ja3_fingerprints\"\n ],\n \"ja4_fingerprints\": [\n \"ja4_fingerprints\"\n ],\n \"user_agents\": [\n \"user_agents\"\n ]\n },\n \"scope\": \"management\"\n },\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"80648d37-b6ab-4ab4-ba80-17f00933453d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4016e68-1c58-4a5c-b698-27ca350b937c","name":"Get organizations - default","request":{"urlPathTemplate":"/organizations","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a4016e68-1c58-4a5c-b698-27ca350b937c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"61349de2-c20a-4002-822b-9ed84e87ca1f","name":"Create an Organization - default","request":{"urlPathTemplate":"/organizations","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n },\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"61349de2-c20a-4002-822b-9ed84e87ca1f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dabd338a-8798-40ba-aaa0-8ce9b262b711","name":"Get organization by name - default","request":{"urlPathTemplate":"/organizations/name/{name}","method":"GET","pathParameters":{"name":{"equalTo":"name"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"dabd338a-8798-40ba-aaa0-8ce9b262b711","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da7fe10b-f528-48cf-b4e0-8d769617a66c","name":"Get organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"da7fe10b-f528-48cf-b4e0-8d769617a66c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"82031fa8-9043-489a-aa84-46bae3772393","name":"Delete organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"82031fa8-9043-489a-aa84-46bae3772393","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","name":"Modify an Organization - default","request":{"urlPathTemplate":"/organizations/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\",\n \"page_background\": \"page_background\"\n }\n },\n \"metadata\": {\n \"key\": \"value\"\n },\n \"token_quota\": {\n \"client_credentials\": {\n \"enforce\": true,\n \"per_day\": 1,\n \"per_hour\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03fdbdd-77b7-4c31-9a5f-6d63cf2c017a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","name":"Get prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"GET"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"a5b27e78-ff1e-480e-a2ff-cda4a7e2a15e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","name":"Update prompt settings - default","request":{"urlPathTemplate":"/prompts","method":"PATCH"},"response":{"status":200,"body":"{\n \"universal_login_experience\": \"new\",\n \"identifier_first\": true,\n \"webauthn_platform_first_factor\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"170f5b5a-a3d8-415f-b2ab-64eb7e3b775b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6a045b19-b94d-495c-b30c-c1de79efc46f","name":"Get a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6a045b19-b94d-495c-b30c-c1de79efc46f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","name":"Delete a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9b9572e8-f0ad-4d7d-9367-b2d3e62c7cd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7ea8e845-2337-4fbc-9632-246f4befb072","name":"Update a refresh token - default","request":{"urlPathTemplate":"/refresh-tokens/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"initial_user_agent\": \"initial_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\",\n \"last_user_agent\": \"last_user_agent\"\n },\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {\n \"audience\": \"audience\",\n \"scopes\": \"scopes\"\n }\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ea8e845-2337-4fbc-9632-246f4befb072","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","name":"Get resource servers - default","request":{"urlPathTemplate":"/resource-servers","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"resource_servers\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"alg\": \"RSA-OAEP-256\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true\n },\n \"client_id\": \"client_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e9d39f1-8389-4238-acc7-0c1fd5f97c1b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"47aa9a64-a544-47e0-9817-a2fe54866219","name":"Create a resource server - default","request":{"urlPathTemplate":"/resource-servers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47aa9a64-a544-47e0-9817-a2fe54866219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"da399a32-c9a2-481c-9995-fc402c47f72a","name":"Get a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"da399a32-c9a2-481c-9995-fc402c47f72a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","name":"Delete a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f46b0f05-ce0a-4b6a-9004-650a8a9d14da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","name":"Update a resource server - default","request":{"urlPathTemplate":"/resource-servers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"is_system\": true,\n \"identifier\": \"identifier\",\n \"scopes\": [\n {\n \"value\": \"value\",\n \"description\": \"description\"\n }\n ],\n \"signing_alg\": \"HS256\",\n \"signing_secret\": \"signing_secret\",\n \"allow_offline_access\": true,\n \"skip_consent_for_verifiable_first_party_clients\": true,\n \"token_lifetime\": 1,\n \"token_lifetime_for_web\": 1,\n \"enforce_policies\": true,\n \"token_dialect\": \"access_token\",\n \"token_encryption\": {\n \"format\": \"compact-nested-jwe\",\n \"encryption_key\": {\n \"name\": \"name\",\n \"alg\": \"RSA-OAEP-256\",\n \"kid\": \"kid\",\n \"pem\": \"pem\"\n }\n },\n \"consent_policy\": \"transactional-authorization-with-mfa\",\n \"authorization_details\": [\n {\n \"key\": \"value\"\n }\n ],\n \"proof_of_possession\": {\n \"mechanism\": \"mtls\",\n \"required\": true,\n \"required_for\": \"public_clients\"\n },\n \"subject_type_authorization\": {\n \"user\": {\n \"policy\": \"allow_all\"\n },\n \"client\": {\n \"policy\": \"deny_all\"\n }\n },\n \"client_id\": \"client_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd7769c9-ea3c-4d2e-bf38-bc9cd0083bc7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","name":"Get roles - default","request":{"urlPathTemplate":"/roles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d64f1dab-8cae-47da-98e9-b16c1a5189dc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","name":"Create a role - default","request":{"urlPathTemplate":"/roles","method":"POST"},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"ddc91359-6806-4cf1-b143-e8d1bc363c3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","name":"Get a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"18803f36-8ee6-4051-9c5e-ab4a2a000ec7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","name":"Delete a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"53428abe-f9c9-49e7-ada5-7cabecc6f0f5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fb25cab0-ca38-4950-ba80-98504d41bb20","name":"Update a role - default","request":{"urlPathTemplate":"/roles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fb25cab0-ca38-4950-ba80-98504d41bb20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"551dd253-310d-4f66-ab80-e07988490a37","name":"Get rules - default","request":{"urlPathTemplate":"/rules","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"rules\": [\n {\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"551dd253-310d-4f66-ab80-e07988490a37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","name":"Create a rule - default","request":{"urlPathTemplate":"/rules","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6eba8e54-3d94-4b5a-9f90-34ea57895fb5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6bd903b2-17f8-4021-9cae-4c1141223c95","name":"Get a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6bd903b2-17f8-4021-9cae-4c1141223c95","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6110c86e-027f-441b-bb72-e5b0e6096803","name":"Delete a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6110c86e-027f-441b-bb72-e5b0e6096803","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3033effa-f1f9-4988-8752-203075bb6aec","name":"Update a rule - default","request":{"urlPathTemplate":"/rules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"id\": \"id\",\n \"enabled\": true,\n \"script\": \"script\",\n \"order\": 1.1,\n \"stage\": \"stage\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3033effa-f1f9-4988-8752-203075bb6aec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","name":"Retrieve config variable keys for rules (get_rules-configs) - default","request":{"urlPathTemplate":"/rules-configs","method":"GET"},"response":{"status":200,"body":"[\n {\n \"key\": \"key\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"3abfda6c-fc81-4be8-a87e-be80fcef8c2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f90321dc-6914-4101-8af1-743cafaa62d7","name":"Set rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"PUT","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"{\n \"key\": \"key\",\n \"value\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f90321dc-6914-4101-8af1-743cafaa62d7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4e06c73c-ffd7-4b88-9857-99801c652707","name":"Delete rules config for a given key - default","request":{"urlPathTemplate":"/rules-configs/{key}","method":"DELETE","pathParameters":{"key":{"equalTo":"key"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"4e06c73c-ffd7-4b88-9857-99801c652707","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","name":"Get self-service profiles - default","request":{"urlPathTemplate":"/self-service-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"self_service_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"466bc78c-8022-4a7f-96e1-2a01c78c0b54","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","name":"Create a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bc8551be-c96c-4800-a5cc-dbbecc17b15b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"19739c76-9199-492a-bd18-730f773b6ffb","name":"Get a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"19739c76-9199-492a-bd18-730f773b6ffb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","name":"Delete a self-service profile by Id - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"5378d984-8d98-4586-9b4a-7dd9f2ef00af","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","name":"Update a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\",\n \"user_attributes\": [\n {\n \"name\": \"name\",\n \"description\": \"description\",\n \"is_optional\": true\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"branding\": {\n \"logo_url\": \"logo_url\",\n \"colors\": {\n \"primary\": \"primary\"\n }\n },\n \"allowed_strategies\": [\n \"oidc\"\n ],\n \"user_attribute_profile_id\": \"user_attribute_profile_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d25c3782-1ef8-47b4-bf73-67a8f977fb17","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3eff16ca-bc50-43ac-9373-249bdaf18766","name":"Get session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3eff16ca-bc50-43ac-9373-249bdaf18766","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","name":"Delete session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"046df2cc-1fd5-4ffb-bf25-97235e3418aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","name":"Update session - default","request":{"urlPathTemplate":"/sessions/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"device\": {\n \"initial_user_agent\": \"initial_user_agent\",\n \"initial_ip\": \"initial_ip\",\n \"initial_asn\": \"initial_asn\",\n \"last_user_agent\": \"last_user_agent\",\n \"last_ip\": \"last_ip\",\n \"last_asn\": \"last_asn\"\n },\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"authentication\": {\n \"methods\": [\n {}\n ]\n },\n \"cookie\": {\n \"mode\": \"non-persistent\"\n },\n \"session_metadata\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"cde85d14-94e2-472f-93d0-ab0f6a1e29e6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","name":"Revokes a session - default","request":{"urlPathTemplate":"/sessions/{id}/revoke","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"eceb4045-ef5a-414d-a73f-ebbc3266db3b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","name":"Get active users count - default","request":{"urlPathTemplate":"/stats/active-users","method":"GET"},"response":{"status":200,"body":"1.1","headers":{"Content-Type":"application/json"}},"uuid":"deb6f466-7529-4d43-9ae7-ec08cdee6fc8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","name":"Get daily stats - default","request":{"urlPathTemplate":"/stats/daily","method":"GET"},"response":{"status":200,"body":"[\n {\n \"date\": \"date\",\n \"logins\": 1,\n \"signups\": 1,\n \"leaked_passwords\": 1,\n \"updated_at\": \"updated_at\",\n \"created_at\": \"created_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"a1c7c8b9-a534-46f2-ae35-eb70ca7628ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"818f5cc7-86b3-4568-8861-9d114c5669ef","name":"Get the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"GET"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"818f5cc7-86b3-4568-8861-9d114c5669ef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","name":"Update the supplemental signals configuration for a tenant - default","request":{"urlPathTemplate":"/supplemental-signals","method":"PATCH"},"response":{"status":200,"body":"{\n \"akamai_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7ba85b66-eee6-4f11-b0e1-ae58fc016a79","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5b479979-e975-4c68-b8fd-ca081dfcbca7","name":"Create an email verification ticket - default","request":{"urlPathTemplate":"/tickets/email-verification","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5b479979-e975-4c68-b8fd-ca081dfcbca7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","name":"Create a password change ticket - default","request":{"urlPathTemplate":"/tickets/password-change","method":"POST"},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b3107dc-9258-4e8c-bfb4-9f4d911eefec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","name":"Get token exchange profiles - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"token_exchange_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"83be5ec3-d77b-4a3a-9e52-87f57af4d962","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","name":"Create a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"98e2d250-d01b-4580-a4b1-92e13a0b54b9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4594d614-c499-48ab-9fee-e1d4df134a89","name":"Get a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"subject_token_type\": \"subject_token_type\",\n \"action_id\": \"action_id\",\n \"type\": \"custom_authentication\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4594d614-c499-48ab-9fee-e1d4df134a89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","name":"Delete a token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"172477bd-43d7-47ae-8ec8-eeb2f403f89c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","name":"Update an existing token exchange profile - default","request":{"urlPathTemplate":"/token-exchange-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2d5941b9-03b1-47b9-ad3b-1466357ae3b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","name":"Get User Attribute Profiles - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"user_attribute_profiles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b4e9ccbb-5ef3-4c51-8149-56153dc787d4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","name":"Post User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d032e452-b3cb-4a7a-8906-bb80a76c6b8f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5a222f5e-5188-4dff-ae26-46d41f56c061","name":"Get User Attribute Profile Templates - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates","method":"GET"},"response":{"status":200,"body":"{\n \"user_attribute_profile_templates\": [\n {\n \"id\": \"id\",\n \"display_name\": \"display_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"5a222f5e-5188-4dff-ae26-46d41f56c061","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","name":"Get User Attribute Profile Template - default","request":{"urlPathTemplate":"/user-attribute-profiles/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"display_name\": \"display_name\",\n \"template\": {\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\"\n }\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"6672c8c9-01d1-4aae-9ade-20890bbff6b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b09540c6-726c-42e3-b5e8-dbc7182c2147","name":"Get User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b09540c6-726c-42e3-b5e8-dbc7182c2147","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","name":"Delete User Attribute Profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ce0d7ce2-8b91-4791-be9b-2774f5efeec0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e6307a7-6f62-4b1f-a02b-e6414927a286","name":"Modify a user attribute profile - default","request":{"urlPathTemplate":"/user-attribute-profiles/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"user_id\": {\n \"oidc_mapping\": \"sub\",\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n },\n \"user_attributes\": {\n \"key\": {\n \"description\": \"description\",\n \"label\": \"label\",\n \"profile_required\": true,\n \"auth0_mapping\": \"auth0_mapping\",\n \"oidc_mapping\": {\n \"mapping\": \"mapping\"\n },\n \"saml_mapping\": [\n \"saml_mapping\"\n ],\n \"scim_mapping\": \"scim_mapping\"\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e6307a7-6f62-4b1f-a02b-e6414927a286","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","name":"Get blocks by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"GET"},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2522dc7d-5aa2-4655-a7a9-24f79a2b8425","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","name":"Unblock by identifier - default","request":{"urlPathTemplate":"/user-blocks","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"049ee4c7-943e-481c-8ebf-dc6d21d5260c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d2565899-4c2a-4b6b-93b5-caecdbadc782","name":"Get a user's blocks - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"blocked_for\": [\n {\n \"identifier\": \"identifier\",\n \"ip\": \"ip\",\n \"connection\": \"connection\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d2565899-4c2a-4b6b-93b5-caecdbadc782","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b3f82ebe-f646-4a06-9770-8ece4e55d861","name":"Unblock a user - default","request":{"urlPathTemplate":"/user-blocks/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b3f82ebe-f646-4a06-9770-8ece4e55d861","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8b4e8914-5be6-4e9b-896f-0b72752d9671","name":"List or Search Users - default","request":{"urlPathTemplate":"/users","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"8b4e8914-5be6-4e9b-896f-0b72752d9671","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","name":"Create a User - default","request":{"urlPathTemplate":"/users","method":"POST"},"response":{"status":201,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4a8c54d7-9d2a-4a48-ad89-4b2481eed23a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","name":"Search Users by Email - default","request":{"urlPathTemplate":"/users-by-email","method":"GET"},"response":{"status":200,"body":"[\n {\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {}\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"414f2fd9-cbe8-4b07-b181-1bc4d03f38d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"9fc639a9-4bc3-4dab-909f-41947203684a","name":"Get a User - default","request":{"urlPathTemplate":"/users/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9fc639a9-4bc3-4dab-909f-41947203684a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"265181b3-7abf-472b-99f2-d2e6eb47b27e","name":"Delete a User - default","request":{"urlPathTemplate":"/users/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"265181b3-7abf-472b-99f2-d2e6eb47b27e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","name":"Update a User - default","request":{"urlPathTemplate":"/users/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"user_id\": \"user_id\",\n \"email\": \"email\",\n \"email_verified\": true,\n \"username\": \"username\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"created_at\": \"created_at\",\n \"updated_at\": \"updated_at\",\n \"identities\": [\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"ad\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n ],\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"nickname\": \"nickname\",\n \"multifactor\": [\n \"multifactor\"\n ],\n \"last_ip\": \"last_ip\",\n \"last_login\": \"last_login\",\n \"logins_count\": 1,\n \"blocked\": true,\n \"given_name\": \"given_name\",\n \"family_name\": \"family_name\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c65910b9-fa24-4a35-87b7-3b8e611f2d5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1a7b88c7-c33a-4670-953b-957ea26d298e","name":"Generate New Multi-factor Authentication Recovery Code - default","request":{"urlPathTemplate":"/users/{id}/recovery-code-regeneration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"recovery_code\": \"recovery_code\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1a7b88c7-c33a-4670-953b-957ea26d298e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a562240d-132f-4adc-a0f6-763101460526","name":"Revokes selected resources from a user - default","request":{"urlPathTemplate":"/users/{id}/revoke-access","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a562240d-132f-4adc-a0f6-763101460526","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","name":"Get an action's versions - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"versions\": [\n {\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {}\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {}\n ],\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"modules\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ccdc2dc5-d900-4938-9ae0-3a9466191ed1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33c0cb30-ca1f-4477-9078-8647e82f975f","name":"Get a specific version of an action - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}","method":"GET","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"33c0cb30-ca1f-4477-9078-8647e82f975f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"746fbf5a-cee7-4302-ad86-14035a3912f7","name":"Roll back to a previous action version - default","request":{"urlPathTemplate":"/actions/actions/{actionId}/versions/{id}/deploy","method":"POST","pathParameters":{"actionId":{"equalTo":"actionId"},"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"id\": \"id\",\n \"action_id\": \"action_id\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\",\n \"registry_url\": \"registry_url\"\n }\n ],\n \"deployed\": true,\n \"runtime\": \"runtime\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"status\": \"pending\",\n \"number\": 1.1,\n \"errors\": [\n {\n \"id\": \"id\",\n \"msg\": \"msg\",\n \"url\": \"url\"\n }\n ],\n \"action\": {\n \"id\": \"id\",\n \"name\": \"name\",\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ],\n \"all_changes_deployed\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n },\n \"built_at\": \"2024-01-15T09:30:00Z\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"supported_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ],\n \"modules\": [\n {\n \"module_id\": \"module_id\",\n \"module_name\": \"module_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"746fbf5a-cee7-4302-ad86-14035a3912f7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"822dd98d-546e-46d8-a976-8f2c97028432","name":"Get an execution - default","request":{"urlPathTemplate":"/actions/executions/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"status\": \"unspecified\",\n \"results\": [\n {\n \"action_name\": \"action_name\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"822dd98d-546e-46d8-a976-8f2c97028432","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8abc8ed4-7895-434f-a43b-613d4101d6bc","name":"List Actions Modules - default","request":{"urlPathTemplate":"/actions/modules","method":"GET"},"response":{"status":200,"body":"{\n \"modules\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"8abc8ed4-7895-434f-a43b-613d4101d6bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3e5b836f-105d-4d50-a185-5cd051f4db56","name":"Create a new Actions Module - default","request":{"urlPathTemplate":"/actions/modules","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3e5b836f-105d-4d50-a185-5cd051f4db56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","name":"Get a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"51d32ec1-89e7-4db1-aae7-76445e9e0cd2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"613a56ac-b303-417b-bbfe-d8ceda21db89","name":"Delete a specific Actions Module by ID - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"613a56ac-b303-417b-bbfe-d8ceda21db89","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","name":"Update a specific Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"33cfded9-118e-4c8a-b0a1-207b0f1ae202","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"989d944b-6872-44fc-957b-87900af162f6","name":"List all actions using an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/actions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"actions\": [\n {\n \"action_id\": \"action_id\",\n \"action_name\": \"action_name\",\n \"module_version_id\": \"module_version_id\",\n \"module_version_number\": 1,\n \"supported_triggers\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"989d944b-6872-44fc-957b-87900af162f6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","name":"Rollback an Actions Module to a previous version - default","request":{"urlPathTemplate":"/actions/modules/{id}/rollback","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"code\": \"code\",\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"actions_using_module_total\": 1,\n \"all_changes_published\": true,\n \"latest_version_number\": 1,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"latest_version\": {\n \"id\": \"id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"dependencies\": [\n {}\n ],\n \"secrets\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d83ce3f7-bfbf-4999-97ba-7813c7fb466b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6c96303-6883-4084-989f-2dbadb13c1d9","name":"Get triggers - default","request":{"urlPathTemplate":"/actions/triggers","method":"GET"},"response":{"status":200,"body":"{\n \"triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\",\n \"status\": \"status\",\n \"runtimes\": [\n \"runtimes\"\n ],\n \"default_runtime\": \"default_runtime\",\n \"compatible_triggers\": [\n {\n \"id\": \"id\",\n \"version\": \"version\"\n }\n ],\n \"binding_policy\": \"trigger-bound\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6c96303-6883-4084-989f-2dbadb13c1d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","name":"List all versions of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"versions\": [\n {\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {}\n ],\n \"dependencies\": [\n {}\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"total\": 1,\n \"page\": 1,\n \"per_page\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"f9d3c975-0170-4fb7-977a-8b220d9f62bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f2ae0322-48cb-47bb-a197-e4607ede713a","name":"Create a new version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f2ae0322-48cb-47bb-a197-e4607ede713a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"29f3eb37-e484-460b-a662-6e196927da74","name":"Get a specific version of an Actions Module - default","request":{"urlPathTemplate":"/actions/modules/{id}/versions/{versionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"versionId":{"equalTo":"versionId"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"module_id\": \"module_id\",\n \"version_number\": 1,\n \"code\": \"code\",\n \"secrets\": [\n {\n \"name\": \"name\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"dependencies\": [\n {\n \"name\": \"name\",\n \"version\": \"version\"\n }\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"29f3eb37-e484-460b-a662-6e196927da74","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","name":"Get trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"GET","pathParameters":{"triggerId":{"equalTo":"triggerId"}}},"response":{"status":200,"body":"{\n \"total\": 1.1,\n \"page\": 1.1,\n \"per_page\": 1.1,\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"eb7071fc-50a8-4dc9-a79d-ce47e23d4637","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"677bf282-a2a0-4bc7-a065-b5de9e248673","name":"Update trigger bindings - default","request":{"urlPathTemplate":"/actions/triggers/{triggerId}/bindings","method":"PATCH","pathParameters":{"triggerId":{"equalTo":"triggerId"}}},"response":{"status":200,"body":"{\n \"bindings\": [\n {\n \"id\": \"id\",\n \"trigger_id\": \"trigger_id\",\n \"display_name\": \"display_name\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"677bf282-a2a0-4bc7-a065-b5de9e248673","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"858c0df0-350f-4619-8960-6f774c0f234a","name":"Check if an IP address is blocked - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"858c0df0-350f-4619-8960-6f774c0f234a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","name":"Remove the blocked IP address - default","request":{"urlPathTemplate":"/anomaly/blocks/ips/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3c386455-0d8c-4edf-a027-a4ac0ff2e391","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"80b1e16c-5284-48f9-9802-ff189fca3b63","name":"Get Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"GET"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"80b1e16c-5284-48f9-9802-ff189fca3b63","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"bf92fa51-631d-42ef-bf27-8161f3bcab37","name":"Update Bot Detection settings - default","request":{"urlPathTemplate":"/attack-protection/bot-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"bot_detection_level\": \"low\",\n \"challenge_password_policy\": \"never\",\n \"challenge_passwordless_policy\": \"never\",\n \"challenge_password_reset_policy\": \"never\",\n \"allowlist\": [\n \"allowlist\"\n ],\n \"monitoring_mode_enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf92fa51-631d-42ef-bf27-8161f3bcab37","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","name":"Get Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"3ecb5fd3-5290-46e1-80da-bbdc282e2e86","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7f0c04d7-e36a-49ce-af70-af9df4825f56","name":"Update Breached Password Detection settings - default","request":{"urlPathTemplate":"/attack-protection/breached-password-detection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"admin_notification_frequency\": [\n \"immediately\"\n ],\n \"method\": \"standard\",\n \"stage\": {\n \"pre-user-registration\": {\n \"shields\": [\n \"block\"\n ]\n },\n \"pre-change-password\": {\n \"shields\": [\n \"block\"\n ]\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"7f0c04d7-e36a-49ce-af70-af9df4825f56","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","name":"Get Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"7870c330-d1c9-4a9f-9745-40e1d8b2d0ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","name":"Update Brute-force settings - default","request":{"urlPathTemplate":"/attack-protection/brute-force-protection","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"mode\": \"count_per_identifier_and_ip\",\n \"max_attempts\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"23e440e9-0ef4-4ec5-96f3-0b4d84085d92","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","name":"Get the CAPTCHA configuration for a tenant - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"GET"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfbbf1e-0b0a-4d9e-bfe5-8d796adbfb34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","name":"Partial Update for CAPTCHA Configuration - default","request":{"urlPathTemplate":"/attack-protection/captcha","method":"PATCH"},"response":{"status":200,"body":"{\n \"active_provider_id\": \"active_provider_id\",\n \"arkose\": {\n \"site_key\": \"site_key\",\n \"fail_open\": true,\n \"client_subdomain\": \"client_subdomain\",\n \"verify_subdomain\": \"verify_subdomain\"\n },\n \"auth_challenge\": {\n \"fail_open\": true\n },\n \"hcaptcha\": {\n \"site_key\": \"site_key\"\n },\n \"friendly_captcha\": {\n \"site_key\": \"site_key\"\n },\n \"recaptcha_enterprise\": {\n \"site_key\": \"site_key\",\n \"project_id\": \"project_id\"\n },\n \"recaptcha_v2\": {\n \"site_key\": \"site_key\"\n },\n \"simple_captcha\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c8a6243c-e0ad-49f2-8b47-405276a8ae5e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","name":"Get Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ae14b8-1582-4cae-bb51-84b1d3b3fccf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","name":"Update Suspicious IP Throttling settings - default","request":{"urlPathTemplate":"/attack-protection/suspicious-ip-throttling","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true,\n \"shields\": [\n \"block\"\n ],\n \"allowlist\": [\n \"allowlist\"\n ],\n \"stage\": {\n \"pre-login\": {\n \"max_attempts\": 1,\n \"rate\": 1\n },\n \"pre-user-registration\": {\n \"max_attempts\": 1,\n \"rate\": 1\n }\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"119c9fe7-b349-4ad0-8846-3e6be6a9661e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bdf661b2-3819-41c2-98f8-4b9137f67189","name":"Get template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"GET"},"response":{"status":200,"body":"{\n \"body\": \"body\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bdf661b2-3819-41c2-98f8-4b9137f67189","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"44f5b8dc-7d64-47a1-8889-79cda94f7809","name":"Set template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"PUT"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"44f5b8dc-7d64-47a1-8889-79cda94f7809","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","name":"Delete template for New Universal Login Experience - default","request":{"urlPathTemplate":"/branding/templates/universal-login","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c2b51bd9-187b-466d-8fe6-68a2eb02e00f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c7a5627-a851-4881-9e60-689c81a3122b","name":"Create branding theme - default","request":{"urlPathTemplate":"/branding/themes","method":"POST"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c7a5627-a851-4881-9e60-689c81a3122b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"91d16fa4-7e8b-4de2-aa78-061a5267295b","name":"Get default branding theme - default","request":{"urlPathTemplate":"/branding/themes/default","method":"GET"},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"91d16fa4-7e8b-4de2-aa78-061a5267295b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"f102da1c-5323-41ec-b320-888d05f069b8","name":"Get branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"GET","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"f102da1c-5323-41ec-b320-888d05f069b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"215eeb29-68c9-4243-857e-d87a7c62795f","name":"Delete branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"DELETE","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"215eeb29-68c9-4243-857e-d87a7c62795f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dbbd929-7e98-438f-8310-2500cb90f70c","name":"Update branding theme - default","request":{"urlPathTemplate":"/branding/themes/{themeId}","method":"PATCH","pathParameters":{"themeId":{"equalTo":"themeId"}}},"response":{"status":200,"body":"{\n \"borders\": {\n \"button_border_radius\": 1.1,\n \"button_border_weight\": 1.1,\n \"buttons_style\": \"pill\",\n \"input_border_radius\": 1.1,\n \"input_border_weight\": 1.1,\n \"inputs_style\": \"pill\",\n \"show_widget_shadow\": true,\n \"widget_border_weight\": 1.1,\n \"widget_corner_radius\": 1.1\n },\n \"colors\": {\n \"base_focus_color\": \"base_focus_color\",\n \"base_hover_color\": \"base_hover_color\",\n \"body_text\": \"body_text\",\n \"captcha_widget_theme\": \"auto\",\n \"error\": \"error\",\n \"header\": \"header\",\n \"icons\": \"icons\",\n \"input_background\": \"input_background\",\n \"input_border\": \"input_border\",\n \"input_filled_text\": \"input_filled_text\",\n \"input_labels_placeholders\": \"input_labels_placeholders\",\n \"links_focused_components\": \"links_focused_components\",\n \"primary_button\": \"primary_button\",\n \"primary_button_label\": \"primary_button_label\",\n \"read_only_background\": \"read_only_background\",\n \"secondary_button_border\": \"secondary_button_border\",\n \"secondary_button_label\": \"secondary_button_label\",\n \"success\": \"success\",\n \"widget_background\": \"widget_background\",\n \"widget_border\": \"widget_border\"\n },\n \"displayName\": \"displayName\",\n \"fonts\": {\n \"body_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"buttons_text\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"font_url\": \"font_url\",\n \"input_labels\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"links_style\": \"normal\",\n \"reference_text_size\": 1.1,\n \"subtitle\": {\n \"bold\": true,\n \"size\": 1.1\n },\n \"title\": {\n \"bold\": true,\n \"size\": 1.1\n }\n },\n \"page_background\": {\n \"background_color\": \"background_color\",\n \"background_image_url\": \"background_image_url\",\n \"page_layout\": \"center\"\n },\n \"themeId\": \"themeId\",\n \"widget\": {\n \"header_text_alignment\": \"center\",\n \"logo_height\": 1.1,\n \"logo_position\": \"center\",\n \"logo_url\": \"logo_url\",\n \"social_buttons_layout\": \"bottom\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"2dbbd929-7e98-438f-8310-2500cb90f70c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"520b4b30-1317-42da-89bf-a0491d1694b6","name":"Get a list of phone providers - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"GET"},"response":{"status":200,"body":"{\n \"providers\": [\n {\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"520b4b30-1317-42da-89bf-a0491d1694b6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","name":"Configure the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"be5761ff-7af6-40ca-95bb-4fdc3bf8eb00","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8c639058-4844-47c5-8ad8-c0ccd33399bb","name":"Get a phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8c639058-4844-47c5-8ad8-c0ccd33399bb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a6175428-056a-47f4-b776-4dcf8260822c","name":"Deletes a Phone Provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a6175428-056a-47f4-b776-4dcf8260822c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"95edda2c-d9d9-4854-9130-044ebb441bd7","name":"Update the phone provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"tenant\": \"tenant\",\n \"name\": \"twilio\",\n \"channel\": \"phone\",\n \"disabled\": true,\n \"configuration\": {\n \"default_from\": \"default_from\",\n \"mssid\": \"mssid\",\n \"sid\": \"sid\",\n \"delivery_methods\": [\n \"text\"\n ]\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"95edda2c-d9d9-4854-9130-044ebb441bd7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"eced0fdd-3915-430a-8c28-1161ab6a3313","name":"Send a test phone notification for the configured provider - default","request":{"urlPathTemplate":"/branding/phone/providers/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"code\": 1.1,\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"eced0fdd-3915-430a-8c28-1161ab6a3313","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","name":"Get a list of phone notification templates - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"templates\": [\n {\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {},\n \"type\": \"otp_verify\",\n \"disabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"927ee9f5-34f7-4b77-83bf-5eb0b1a61e2d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"300d3eb8-52bc-4001-8af4-a0594f4242d9","name":"Create a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"300d3eb8-52bc-4001-8af4-a0594f4242d9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","name":"Get a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"76aa966c-5fbe-4a23-a2a4-7cbf13eb043c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","name":"Delete a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97c15733-1abd-4f5e-8eda-3dc1b372e0ec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2e4c517e-f1d0-4252-bfea-7b6342825fba","name":"Update a phone notification template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"tenant\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"from\",\n \"body\": {\n \"text\": \"text\",\n \"voice\": \"voice\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"2e4c517e-f1d0-4252-bfea-7b6342825fba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","name":"Resets a phone notification template values - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/reset","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"x\",\n \"channel\": \"channel\",\n \"customizable\": true,\n \"tenant\": \"x\",\n \"content\": {\n \"syntax\": \"syntax\",\n \"from\": \"x\",\n \"body\": {\n \"text\": \"x\",\n \"voice\": \"x\"\n }\n },\n \"type\": \"otp_verify\",\n \"disabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"7d7a4ccb-4b23-4fb0-813d-9f0eef8f6ed4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0d9ba799-020f-40db-86d6-08de485ad618","name":"Send a test phone notification for the configured template - default","request":{"urlPathTemplate":"/branding/phone/templates/{id}/try","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"message\": \"message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0d9ba799-020f-40db-86d6-08de485ad618","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","name":"Get the organizations associated to a client grant - default","request":{"urlPathTemplate":"/client-grants/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"f3b442cc-02a6-4c76-9a8f-3c3bd4c6efde","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"318739d6-2060-4406-9548-e1dca9fc9306","name":"Get client credentials - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"318739d6-2060-4406-9548-e1dca9fc9306","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","name":"Create a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials","method":"POST","pathParameters":{"client_id":{"equalTo":"client_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e1b4ce2a-40cd-428d-98c4-4fe2c4dfb358","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"84fb49da-5fa4-4f09-8176-cf14ff179829","name":"Get client credential details - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"GET","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"84fb49da-5fa4-4f09-8176-cf14ff179829","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ac24c006-0300-485b-b881-9bfd0a38c4aa","name":"Delete a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"DELETE","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ac24c006-0300-485b-b881-9bfd0a38c4aa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c820cce1-37c3-4aa6-8700-119563b70d23","name":"Update a client credential - default","request":{"urlPathTemplate":"/clients/{client_id}/credentials/{credential_id}","method":"PATCH","pathParameters":{"client_id":{"equalTo":"client_id"},"credential_id":{"equalTo":"credential_id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"kid\": \"kid\",\n \"alg\": \"RS256\",\n \"credential_type\": \"public_key\",\n \"subject_dn\": \"subject_dn\",\n \"thumbprint_sha256\": \"thumbprint_sha256\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"c820cce1-37c3-4aa6-8700-119563b70d23","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","name":"Get enabled connections for a client - default","request":{"urlPathTemplate":"/clients/{id}/connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connections\": [\n {\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"options\": {\n \"key\": \"value\"\n },\n \"id\": \"id\",\n \"strategy\": \"strategy\",\n \"realms\": [\n \"realms\"\n ],\n \"is_domain_connection\": true,\n \"show_as_button\": true,\n \"authentication\": {\n \"active\": true\n },\n \"connected_accounts\": {\n \"active\": true\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"324ddd4f-5b97-4bf3-8c51-91ad2c931c47","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","name":"Get a list of directory provisioning configurations - default","request":{"urlPathTemplate":"/connections-directory-provisionings","method":"GET"},"response":{"status":200,"body":"{\n \"directory_provisionings\": [\n {\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7960ea97-24a9-4c8e-ad42-2dcb8c0215bc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","name":"Get a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"feeddf21-212e-4dbc-a0eb-4a922ec0341b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3cfd3977-6fa4-44df-bdf3-78fee867315a","name":"Create a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3cfd3977-6fa4-44df-bdf3-78fee867315a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","name":"Delete a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2ee66349-1719-45a8-bbbc-65b8e4e783a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","name":"Patch a directory provisioning configuration - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ],\n \"synchronize_automatically\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_at\": \"2024-01-15T09:30:00Z\",\n \"last_synchronization_status\": \"last_synchronization_status\",\n \"last_synchronization_error\": \"last_synchronization_error\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"738a6f0e-a176-48c6-ac5b-1bcc67bc8656","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"181a029d-c4d1-4386-8c0d-4e517aea7579","name":"Get a connection's default directory provisioning attribute mapping - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"idp\": \"idp\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"181a029d-c4d1-4386-8c0d-4e517aea7579","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cda0987-d608-47ba-b465-245ecfaabb90","name":"Get enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"clients\": [\n {\n \"client_id\": \"client_id\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cda0987-d608-47ba-b465-245ecfaabb90","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","name":"Update enabled clients for a connection - default","request":{"urlPathTemplate":"/connections/{id}/clients","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0c56da15-4d9a-470c-9fcd-64f2c04dd3d3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf72570e-1315-4eaa-8145-3f400d3eccf0","name":"Get connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"bf72570e-1315-4eaa-8145-3f400d3eccf0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","name":"Rotate connection keys - default","request":{"urlPathTemplate":"/connections/{id}/keys/rotate","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs\": \"pkcs\",\n \"next\": true,\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"algorithm\": \"algorithm\",\n \"key_use\": \"encryption\",\n \"subject_dn\": \"subject_dn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b11a1483-99df-4d6a-ace7-cb55bf35ba34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","name":"Get a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"30a0fe58-a2bc-4645-9d9e-c1ca9f8c3e2f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"45f92e80-8b92-4937-b29b-76fac22cf624","name":"Create a SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"45f92e80-8b92-4937-b29b-76fac22cf624","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9239c3d-f534-4c1d-a05e-64c0785f569a","name":"Delete a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9239c3d-f534-4c1d-a05e-64c0785f569a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d298cb6d-3c6a-4510-a78c-556fad17fd65","name":"Patch a connection's SCIM configuration - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"connection_name\": \"connection_name\",\n \"strategy\": \"strategy\",\n \"tenant_name\": \"tenant_name\",\n \"user_id_attribute\": \"user_id_attribute\",\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ],\n \"created_at\": \"created_at\",\n \"updated_on\": \"updated_on\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d298cb6d-3c6a-4510-a78c-556fad17fd65","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","name":"Get a connection's default SCIM mapping - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/default-mapping","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"mapping\": [\n {\n \"auth0\": \"auth0\",\n \"scim\": \"scim\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cc31df0-e4df-450c-9fac-16b9c893e9fa","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","name":"Delete a connection user - default","request":{"urlPathTemplate":"/connections/{id}/users","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1d0cb62f-340c-4168-bd90-0fa1ba032e3a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"175c0550-405b-4cd6-b498-6501a695ed33","name":"Request an on-demand synchronization of the directory - default","request":{"urlPathTemplate":"/connections/{id}/directory-provisioning/synchronizations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"synchronization_id\": \"synchronization_id\",\n \"status\": \"status\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"175c0550-405b-4cd6-b498-6501a695ed33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58eab082-4eda-42df-9764-ed787b38df1e","name":"Get a connection's SCIM tokens - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"token_id\": \"token_id\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\",\n \"last_used_at\": \"last_used_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"58eab082-4eda-42df-9764-ed787b38df1e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b55da7ed-453d-4799-b895-796f72020abb","name":"Create a SCIM Token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"token_id\": \"token_id\",\n \"token\": \"token\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"created_at\",\n \"valid_until\": \"valid_until\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b55da7ed-453d-4799-b895-796f72020abb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","name":"Delete a connection's SCIM token - default","request":{"urlPathTemplate":"/connections/{id}/scim-configuration/tokens/{tokenId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenId":{"equalTo":"tokenId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e0eaabd0-7ebe-4b89-90e6-f0c7b43be7c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","name":"Get email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"GET"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"53da06f4-1ed4-4e51-8bb8-0ce04e219464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d1a0f535-378f-4200-865f-23ca6cf50b9d","name":"Configure email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"POST"},"response":{"status":201,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"d1a0f535-378f-4200-865f-23ca6cf50b9d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","name":"Delete email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a57ca053-0cf9-416a-9cb3-144e7c5bd4d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36f2813e-a299-41fd-a6d6-54938ea37a15","name":"Update email provider - default","request":{"urlPathTemplate":"/emails/provider","method":"PATCH"},"response":{"status":200,"body":"{\n \"name\": \"name\",\n \"enabled\": true,\n \"default_from_address\": \"default_from_address\",\n \"credentials\": {\n \"api_user\": \"api_user\",\n \"region\": \"region\",\n \"smtp_host\": \"smtp_host\",\n \"smtp_port\": 1,\n \"smtp_user\": \"smtp_user\"\n },\n \"settings\": {\n \"key\": \"value\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"36f2813e-a299-41fd-a6d6-54938ea37a15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c3751490-b492-4376-9596-bd7d6f5e8443","name":"Get this event stream's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"c3751490-b492-4376-9596-bd7d6f5e8443","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"93fa5cb1-a92c-4b20-8483-814c91175496","name":"Get a specific event's delivery history - default","request":{"urlPathTemplate":"/event-streams/{id}/deliveries/{event_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"event_stream_id\": \"event_stream_id\",\n \"status\": \"failed\",\n \"event_type\": \"user.created\",\n \"attempts\": [\n {\n \"status\": \"failed\",\n \"timestamp\": \"2024-01-15T09:30:00Z\",\n \"error_message\": \"error_message\"\n }\n ],\n \"event\": {\n \"id\": \"id\",\n \"source\": \"source\",\n \"specversion\": \"specversion\",\n \"type\": \"type\",\n \"time\": \"2024-01-15T09:30:00Z\",\n \"data\": \"data\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"93fa5cb1-a92c-4b20-8483-814c91175496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"25856d60-9bad-4777-b7f2-7b5e2656b133","name":"Redeliver failed events - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":202,"body":"{\n \"date_from\": \"2024-01-15T09:30:00Z\",\n \"date_to\": \"2024-01-15T09:30:00Z\",\n \"statuses\": [\n \"failed\"\n ],\n \"event_types\": [\n \"user.created\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"25856d60-9bad-4777-b7f2-7b5e2656b133","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","name":"Redeliver a single failed event by ID - default","request":{"urlPathTemplate":"/event-streams/{id}/redeliver/{event_id}","method":"POST","pathParameters":{"id":{"equalTo":"id"},"event_id":{"equalTo":"event_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"05d8b619-8b8d-41ea-b60f-bea3298d5e33","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"62d121a4-93bc-4281-8659-06708ac8d781","name":"Get flow executions - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"executions\": [\n {\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"62d121a4-93bc-4281-8659-06708ac8d781","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","name":"Get a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"GET","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"trace_id\": \"trace_id\",\n \"journey_id\": \"journey_id\",\n \"status\": \"status\",\n \"debug\": {\n \"key\": \"value\"\n },\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"started_at\": \"2024-01-15T09:30:00Z\",\n \"ended_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"3151ee0d-c1ca-45b6-9f72-5b4138b4b90d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","name":"Delete a flow execution - default","request":{"urlPathTemplate":"/flows/{flow_id}/executions/{execution_id}","method":"DELETE","pathParameters":{"flow_id":{"equalTo":"flow_id"},"execution_id":{"equalTo":"execution_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"9f81cb02-c44f-4e52-a1a3-cc26c0ae01a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","name":"Get Flows Vault connection list - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"connections\": [\n {\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ee40f82d-4bce-4a5a-8cbb-bb5eda1909ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b56d64da-174f-4d7e-86e7-3240fb1a8174","name":"Create a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b56d64da-174f-4d7e-86e7-3240fb1a8174","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","name":"Get a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6cc30ec0-8e30-44ab-b033-e2db27abc3ac","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","name":"Delete a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"97e2e46c-2af3-4cf0-b6df-e09cd0f4151a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cdbf8062-2c13-4861-9280-e1ef2af24823","name":"Update a Flows Vault connection - default","request":{"urlPathTemplate":"/flows/vault/connections/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"app_id\": \"app_id\",\n \"environment\": \"environment\",\n \"name\": \"name\",\n \"account_name\": \"account_name\",\n \"ready\": true,\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"refreshed_at\": \"2024-01-15T09:30:00Z\",\n \"fingerprint\": \"fingerprint\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cdbf8062-2c13-4861-9280-e1ef2af24823","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","name":"Get Group Members - default","request":{"urlPathTemplate":"/groups/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"members\": [\n {\n \"id\": \"id\",\n \"member_type\": \"user\",\n \"type\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a79f7c93-ff7f-4b2e-8d07-41cdddf27eeb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a2982e98-d69b-4815-a50d-57f1267374d8","name":"Create a multi-factor authentication enrollment ticket - default","request":{"urlPathTemplate":"/guardian/enrollments/ticket","method":"POST"},"response":{"status":200,"body":"{\n \"ticket_id\": \"ticket_id\",\n \"ticket_url\": \"ticket_url\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a2982e98-d69b-4815-a50d-57f1267374d8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"029d8a45-40e7-4697-b2da-a0c12a4d3895","name":"Get a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"status\": \"pending\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"enrolled_at\": \"enrolled_at\",\n \"last_auth\": \"last_auth\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"029d8a45-40e7-4697-b2da-a0c12a4d3895","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","name":"Delete a multi-factor authentication enrollment - default","request":{"urlPathTemplate":"/guardian/enrollments/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"d28abba4-f155-4fa4-ba9b-077e8ea016ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12377456-a682-4cdc-b63d-41a188b3ce32","name":"Get Factors and multi-factor authentication details - default","request":{"urlPathTemplate":"/guardian/factors","method":"GET"},"response":{"status":200,"body":"[\n {\n \"enabled\": true,\n \"trial_expired\": true,\n \"name\": \"push-notification\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"12377456-a682-4cdc-b63d-41a188b3ce32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"93c9905e-4981-4cb3-a7b0-026dab1704d6","name":"Update multi-factor authentication type - default","request":{"urlPathTemplate":"/guardian/factors/{name}","method":"PUT","pathParameters":{"name":{"equalTo":"push-notification"}}},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"93c9905e-4981-4cb3-a7b0-026dab1704d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e47dd04a-f3a3-409a-a301-7732f16f3bec","name":"Get multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"GET"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"e47dd04a-f3a3-409a-a301-7732f16f3bec","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8ee26dda-4638-4269-9b14-59f2907ef28b","name":"Update multi-factor authentication policies - default","request":{"urlPathTemplate":"/guardian/policies","method":"PUT"},"response":{"status":200,"body":"[\n \"all-applications\"\n]","headers":{"Content-Type":"application/json"}},"uuid":"8ee26dda-4638-4269-9b14-59f2907ef28b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ed435b3e-66b6-47b0-882f-08d926944cad","name":"Get Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"GET"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"ed435b3e-66b6-47b0-882f-08d926944cad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92b96146-6175-4994-87af-ac137f73595d","name":"Update the Enabled Phone Factors - default","request":{"urlPathTemplate":"/guardian/factors/phone/message-types","method":"PUT"},"response":{"status":200,"body":"{\n \"message_types\": [\n \"sms\"\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"92b96146-6175-4994-87af-ac137f73595d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bd1421c2-3dbe-4603-b96c-02e53872498b","name":"Get Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bd1421c2-3dbe-4603-b96c-02e53872498b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","name":"Update Twilio configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"92ac09b5-25bb-4b34-8fad-73bbd1a12984","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"5c310715-a914-4928-9142-141be90dd71e","name":"Get phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"5c310715-a914-4928-9142-141be90dd71e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"555dfcb1-93af-4dcf-8241-1114028c32b4","name":"Update phone provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/phone/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"555dfcb1-93af-4dcf-8241-1114028c32b4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","name":"Get Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0e83b2df-19bf-4909-b1c4-0522a7f929a3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","name":"Update Enrollment and Verification Phone Templates - default","request":{"urlPathTemplate":"/guardian/factors/phone/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d55307be-4c05-42f6-888f-c5a6ee1d2ae2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","name":"Get APNS push notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"GET"},"response":{"status":200,"body":"{\n \"bundle_id\": \"bundle_id\",\n \"sandbox\": true,\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"11ed0ad4-9dc8-48ea-bc9c-9824179b9f32","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","name":"Update APNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PUT"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e3a3549b-eb87-4309-aa03-a9f08b1b17a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","name":"Update APNs provider configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/apns","method":"PATCH"},"response":{"status":200,"body":"{\n \"sandbox\": true,\n \"bundle_id\": \"bundle_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"177fd0d5-49f0-4b48-8c6a-6d7dfc8e7784","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"91658483-7866-4a3d-b63b-0c7dea839dbe","name":"Updates FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"91658483-7866-4a3d-b63b-0c7dea839dbe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","name":"Updates FCM configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcm","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"96fb85cc-6ac7-4ec7-9234-6b2db38ea009","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e301ea18-e5af-4e68-8700-953158819796","name":"Updates FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PUT"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e301ea18-e5af-4e68-8700-953158819796","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de696b9c-3ffb-4bc8-adde-131913ca6338","name":"Updates FCMV1 configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/fcmv1","method":"PATCH"},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"de696b9c-3ffb-4bc8-adde-131913ca6338","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a03df5fb-b6e0-4345-9c83-e920d88114c9","name":"Get AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"GET"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a03df5fb-b6e0-4345-9c83-e920d88114c9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"6e8e169e-036c-4ebe-8171-a3aeb7c68ad5","name":"Update AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PUT"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6e8e169e-036c-4ebe-8171-a3aeb7c68ad5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","name":"Update AWS SNS configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/providers/sns","method":"PATCH"},"response":{"status":200,"body":"{\n \"aws_access_key_id\": \"aws_access_key_id\",\n \"aws_secret_access_key\": \"aws_secret_access_key\",\n \"aws_region\": \"aws_region\",\n \"sns_apns_platform_application_arn\": \"sns_apns_platform_application_arn\",\n \"sns_gcm_platform_application_arn\": \"sns_gcm_platform_application_arn\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"79a10ee8-bacd-486b-b5f3-4f23e2382c4b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0496348c-7357-4623-8514-fb741a753c75","name":"Get push notification provider - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0496348c-7357-4623-8514-fb741a753c75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"7285a311-6499-4a95-a8cc-6701a6997bf5","name":"Update Push Notification configuration - default","request":{"urlPathTemplate":"/guardian/factors/push-notification/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"guardian\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"7285a311-6499-4a95-a8cc-6701a6997bf5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e8ca19da-0184-44a0-868c-f020f73cbcbe","name":"Get Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"GET"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e8ca19da-0184-44a0-868c-f020f73cbcbe","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","name":"Update Twilio SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/providers/twilio","method":"PUT"},"response":{"status":200,"body":"{\n \"from\": \"from\",\n \"messaging_service_sid\": \"messaging_service_sid\",\n \"auth_token\": \"auth_token\",\n \"sid\": \"sid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"8e51f842-c731-4fc6-9f28-42d20d05f8a7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","name":"Get SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"GET"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a9bd6f03-210a-4eba-9f63-48eb355c59a5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"69919759-0017-4dd6-8df8-a40088848ddb","name":"Update SMS configuration - default","request":{"urlPathTemplate":"/guardian/factors/sms/selected-provider","method":"PUT"},"response":{"status":200,"body":"{\n \"provider\": \"auth0\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"69919759-0017-4dd6-8df8-a40088848ddb","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1731b364-a171-42f2-8475-62bdb634879d","name":"Get SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"GET"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1731b364-a171-42f2-8475-62bdb634879d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","name":"Update SMS enrollment and verification templates - default","request":{"urlPathTemplate":"/guardian/factors/sms/templates","method":"PUT"},"response":{"status":200,"body":"{\n \"enrollment_message\": \"enrollment_message\",\n \"verification_message\": \"verification_message\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2b0be931-6224-442e-92ca-1b5dfe5c06ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47cb059e-e754-4e4c-804b-52d84dd12162","name":"Get DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"GET"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47cb059e-e754-4e4c-804b-52d84dd12162","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"59380cca-acd7-464e-86e0-1017e022aaa0","name":"Update the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PUT"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"59380cca-acd7-464e-86e0-1017e022aaa0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"38a5aa65-75f0-471c-ab5e-10b544359b3c","name":"Update the DUO Configuration - default","request":{"urlPathTemplate":"/guardian/factors/duo/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"ikey\": \"ikey\",\n \"skey\": \"skey\",\n \"host\": \"host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"38a5aa65-75f0-471c-ab5e-10b544359b3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","name":"Get hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fcdfec44-0fb3-42b6-a292-48e9fb13271a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","name":"Add hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"a4e022c8-8ee2-4d3b-a52d-18c34a18c1e2","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1e6e250b-ded1-4ca6-831a-83d54b71295e","name":"Delete hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1e6e250b-ded1-4ca6-831a-83d54b71295e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"81e2c92a-69de-446b-82c8-7f320f9e1060","name":"Update hook secrets - default","request":{"urlPathTemplate":"/hooks/{id}/secrets","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"81e2c92a-69de-446b-82c8-7f320f9e1060","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a93c6324-dab3-4581-8117-74e0dc2c05b3","name":"Create export users job - default","request":{"urlPathTemplate":"/jobs/users-exports","method":"POST"},"response":{"status":200,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"format\": \"json\",\n \"limit\": 1,\n \"fields\": [\n {\n \"name\": \"name\",\n \"export_as\": \"export_as\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"a93c6324-dab3-4581-8117-74e0dc2c05b3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","name":"Create import users job - default","request":{"urlPathTemplate":"/jobs/users-imports","method":"POST"},"response":{"status":202,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\",\n \"connection_id\": \"connection_id\",\n \"external_id\": \"external_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"d7d59bf9-f846-4967-a50c-0d5e2daaf044","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","name":"Send an email address verification email - default","request":{"urlPathTemplate":"/jobs/verification-email","method":"POST"},"response":{"status":201,"body":"{\n \"status\": \"status\",\n \"type\": \"type\",\n \"created_at\": \"created_at\",\n \"id\": \"id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1ec86184-b7ac-4cff-9fa1-e78fcdcaa954","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1ddcb674-4117-4538-98e8-5723fdb083e8","name":"Get job error details - default","request":{"urlPathTemplate":"/jobs/{id}/errors","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"user\": {\n \"key\": \"value\"\n },\n \"errors\": [\n {}\n ]\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1ddcb674-4117-4538-98e8-5723fdb083e8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"70e1c2da-e7db-401a-b166-be0b5da6139c","name":"Get custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"GET"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"70e1c2da-e7db-401a-b166-be0b5da6139c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"3b40098d-d649-4030-bc12-31606e807e15","name":"Create or replace custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"PUT"},"response":{"status":200,"body":"{\n \"keys\": [\n {\n \"kty\": \"EC\",\n \"kid\": \"kid\",\n \"use\": \"sig\",\n \"key_ops\": [\n \"verify\"\n ],\n \"alg\": \"RS256\",\n \"n\": \"n\",\n \"e\": \"e\",\n \"crv\": \"P-256\",\n \"x\": \"x\",\n \"y\": \"y\",\n \"x5u\": \"x5u\",\n \"x5c\": [\n \"x5c\"\n ],\n \"x5t\": \"x5t\",\n \"x5t#S256\": \"x5t#S256\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3b40098d-d649-4030-bc12-31606e807e15","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","name":"Delete custom signing keys - default","request":{"urlPathTemplate":"/keys/custom-signing","method":"DELETE"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"f9b82290-1c82-4a29-891c-cee6ec28bcc5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c09166ed-9d73-4607-92f6-ae884592a5e5","name":"Get all encryption keys - default","request":{"urlPathTemplate":"/keys/encryption","method":"GET"},"response":{"status":200,"body":"{\n \"start\": 1,\n \"limit\": 1,\n \"total\": 1,\n \"keys\": [\n {\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c09166ed-9d73-4607-92f6-ae884592a5e5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","name":"Create the new encryption key - default","request":{"urlPathTemplate":"/keys/encryption","method":"POST"},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"b0a9c75d-5268-41dd-849a-da3c0cfcb04b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"974880c1-1ef6-4001-a614-aa43c37b4420","name":"Rekey the key hierarchy - default","request":{"urlPathTemplate":"/keys/encryption/rekey","method":"POST"},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"974880c1-1ef6-4001-a614-aa43c37b4420","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"77bab061-9dae-4268-84d0-0b63e263f1ab","name":"Get the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"77bab061-9dae-4268-84d0-0b63e263f1ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86a3fc30-c02a-4c36-ac4c-7900289870b8","name":"Import the encryption key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"kid\": \"kid\",\n \"type\": \"customer-provided-root-key\",\n \"state\": \"pre-activation\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"parent_kid\": \"parent_kid\",\n \"public_key\": \"public_key\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"86a3fc30-c02a-4c36-ac4c-7900289870b8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","name":"Delete the encryption key by its key id - default","request":{"urlPathTemplate":"/keys/encryption/{kid}","method":"DELETE","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"cb3a536a-7775-4fcf-a037-f10b16d2fe1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","name":"Create the public wrapping key - default","request":{"urlPathTemplate":"/keys/encryption/{kid}/wrapping-key","method":"POST","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":201,"body":"{\n \"public_key\": \"public_key\",\n \"algorithm\": \"CKM_RSA_AES_KEY_WRAP\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cf0b4ec6-52f1-4f55-974a-9eadd755c04f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1bde50a3-a51e-41b4-9018-8f46bd597774","name":"Get all Application Signing Keys - default","request":{"urlPathTemplate":"/keys/signing","method":"GET"},"response":{"status":200,"body":"[\n {\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"1bde50a3-a51e-41b4-9018-8f46bd597774","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"e9d4827d-c55c-4b09-a761-24a551052257","name":"Rotate the Application Signing Key - default","request":{"urlPathTemplate":"/keys/signing/rotate","method":"POST"},"response":{"status":201,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e9d4827d-c55c-4b09-a761-24a551052257","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","name":"Get an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}","method":"GET","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"kid\": \"kid\",\n \"cert\": \"cert\",\n \"pkcs7\": \"pkcs7\",\n \"current\": true,\n \"next\": true,\n \"previous\": true,\n \"current_since\": \"current_since\",\n \"current_until\": \"current_until\",\n \"fingerprint\": \"fingerprint\",\n \"thumbprint\": \"thumbprint\",\n \"revoked\": true,\n \"revoked_at\": \"revoked_at\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"adec0e81-f58d-4f1f-9071-2c1f28b236e1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","name":"Revoke an Application Signing Key by its key id - default","request":{"urlPathTemplate":"/keys/signing/{kid}/revoke","method":"PUT","pathParameters":{"kid":{"equalTo":"kid"}}},"response":{"status":200,"body":"{\n \"cert\": \"cert\",\n \"kid\": \"kid\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"cab3e5d7-c549-4ce9-aa51-648a2d61b321","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3bd5c630-fb83-4b4e-a903-67268e3218e0","name":"Get client grants associated to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"client_grants\": [\n {\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3bd5c630-fb83-4b4e-a903-67268e3218e0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","name":"Associate a client grant with an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"client_id\": \"client_id\",\n \"audience\": \"audience\",\n \"scope\": [\n \"scope\"\n ],\n \"organization_usage\": \"deny\",\n \"allow_any_organization\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"e4a9924e-c625-4ff3-a5ed-44c5e7f20053","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","name":"Remove a client grant from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/client-grants/{grant_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"grant_id":{"equalTo":"grant_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"36ae6d81-83b3-4c2c-8f37-5e921d4740ad","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2edde951-0b04-4e05-9389-658b85c37299","name":"Retrieve all organization discovery domains - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"domains\": [\n {\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2edde951-0b04-4e05-9389-658b85c37299","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","name":"Create an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fdfc20b0-5e2b-4eb6-98af-e0f922aefac7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","name":"Retrieve an organization discovery domain by domain name - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/name/{discovery_domain}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain":{"equalTo":"discovery_domain"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"6880f9c8-a623-4d59-b041-fc7f1b5104cc","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","name":"Retrieve an organization discovery domain by ID - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"4cb0d18e-2a9a-4d6c-a1f3-f2c3e5c3c496","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"803a298e-d6f6-4370-8e03-37d06547eeef","name":"Delete an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"803a298e-d6f6-4370-8e03-37d06547eeef","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fca95551-032d-44de-a3cf-849f98ec2177","name":"Update an organization discovery domain - default","request":{"urlPathTemplate":"/organizations/{id}/discovery-domains/{discovery_domain_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"discovery_domain_id":{"equalTo":"discovery_domain_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"domain\": \"domain\",\n \"status\": \"pending\",\n \"use_for_organization_discovery\": true,\n \"verification_txt\": \"verification_txt\",\n \"verification_host\": \"verification_host\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"fca95551-032d-44de-a3cf-849f98ec2177","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","name":"Get connections enabled for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"enabled_connections\": [\n {\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"47767c5f-78ac-42c3-affe-a5d3e1ed6800","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c311c287-5333-41bd-819e-e813c541ed66","name":"Add connections to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c311c287-5333-41bd-819e-e813c541ed66","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","name":"Get an enabled connection for an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"c455a9b2-1f8f-45e1-8100-df1d73cd097d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0dc9106a-150c-40d8-9000-176bd6350a98","name":"Delete connections from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0dc9106a-150c-40d8-9000-176bd6350a98","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9a371d52-abea-44dc-a464-f04f63a601b0","name":"Update the Connection of an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/enabled_connections/{connectionId}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"connectionId":{"equalTo":"connectionId"}}},"response":{"status":200,"body":"{\n \"connection_id\": \"connection_id\",\n \"assign_membership_on_login\": true,\n \"show_as_button\": true,\n \"is_signup_enabled\": true,\n \"connection\": {\n \"name\": \"name\",\n \"strategy\": \"strategy\"\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"9a371d52-abea-44dc-a464-f04f63a601b0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7fb2e068-8caf-4234-aa52-3b51c9f37300","name":"Get invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"invitations\": [\n {\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7fb2e068-8caf-4234-aa52-3b51c9f37300","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"49ad8742-5d95-4969-87cf-09427959682f","name":"Create invitations to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"49ad8742-5d95-4969-87cf-09427959682f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2bf04456-d49c-45d6-aedf-19598f4c6df8","name":"Get a specific invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"organization_id\": \"organization_id\",\n \"inviter\": {\n \"name\": \"name\"\n },\n \"invitee\": {\n \"email\": \"email\"\n },\n \"invitation_url\": \"invitation_url\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"connection_id\": \"connection_id\",\n \"app_metadata\": {\n \"key\": \"value\"\n },\n \"user_metadata\": {\n \"key\": \"value\"\n },\n \"roles\": [\n \"roles\"\n ],\n \"ticket_id\": \"ticket_id\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"2bf04456-d49c-45d6-aedf-19598f4c6df8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1a1c3283-fac9-4185-bcb8-3a9053a43163","name":"Delete an invitation to an Organization - default","request":{"urlPathTemplate":"/organizations/{id}/invitations/{invitation_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"invitation_id":{"equalTo":"invitation_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1a1c3283-fac9-4185-bcb8-3a9053a43163","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","name":"Get members who belong to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"members\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\",\n \"roles\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"b33d5e95-cdf1-4d3a-b019-7fa6e46267a0","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8536454b-53b8-4272-8829-062f2cb9092d","name":"Add members to an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8536454b-53b8-4272-8829-062f2cb9092d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"71dcfc22-87b0-4591-921b-7d7088bd16ae","name":"Delete members from an organization - default","request":{"urlPathTemplate":"/organizations/{id}/members","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"71dcfc22-87b0-4591-921b-7d7088bd16ae","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2c099b94-dfed-4bf8-b370-25ceade844b1","name":"Get user roles assigned to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"2c099b94-dfed-4bf8-b370-25ceade844b1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","name":"Assign user roles to an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8a5dc31c-084d-4753-9c95-0a0ddd2294da","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"245dc825-fc94-49ca-9547-a4b30ac4485a","name":"Delete user roles from an Organization member - default","request":{"urlPathTemplate":"/organizations/{id}/members/{user_id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"245dc825-fc94-49ca-9547-a4b30ac4485a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","name":"Get render setting configurations for all screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"GET"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ],\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"f02cb8dc-cee0-4470-b69b-596e4d0653f9","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"d0abb404-e603-4992-9c65-19a5766a9462","name":"Update render settings for multiple screens - default","request":{"urlPathTemplate":"/prompts/rendering","method":"PATCH"},"response":{"status":200,"body":"{\n \"configs\": [\n {\n \"prompt\": \"login\",\n \"screen\": \"login\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {}\n ]\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"d0abb404-e603-4992-9c65-19a5766a9462","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","name":"Get render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"tenant\": \"tenant\",\n \"prompt\": \"prompt\",\n \"screen\": \"screen\",\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"b6f4a3c0-8032-487e-be5c-24b52aea56c3","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"248d2934-0ee0-434c-a9a5-df7501ef901c","name":"Update render settings for a screen - default","request":{"urlPathTemplate":"/prompts/{prompt}/screen/{screen}/rendering","method":"PATCH","pathParameters":{"prompt":{"equalTo":"login"},"screen":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"rendering_mode\": \"advanced\",\n \"context_configuration\": [\n \"branding.settings\"\n ],\n \"default_head_tags_disabled\": true,\n \"use_page_template\": true,\n \"head_tags\": [\n {\n \"tag\": \"tag\",\n \"attributes\": {\n \"key\": \"value\"\n },\n \"content\": \"content\"\n }\n ],\n \"filters\": {\n \"match_type\": \"includes_any\",\n \"clients\": [\n {\n \"id\": \"id\"\n }\n ],\n \"organizations\": [\n {\n \"id\": \"id\"\n }\n ],\n \"domains\": [\n {\n \"id\": \"id\"\n }\n ]\n }\n}","headers":{"Content-Type":"application/json"}},"uuid":"248d2934-0ee0-434c-a9a5-df7501ef901c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cd54de8-b246-4b0a-863b-f5fa0184e206","name":"Get custom text for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"GET","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cd54de8-b246-4b0a-863b-f5fa0184e206","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bff89979-efc7-413e-8aaf-a45d84f1793b","name":"Set custom text for a specific prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/custom-text/{language}","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"},"language":{"equalTo":"am"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"bff89979-efc7-413e-8aaf-a45d84f1793b","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","name":"Get partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"GET","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"e2ccf6be-be59-4e7f-90f9-dd24529c4981","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c9517422-8a42-4204-8156-cda9b385f017","name":"Set partials for a prompt - default","request":{"urlPathTemplate":"/prompts/{prompt}/partials","method":"PUT","pathParameters":{"prompt":{"equalTo":"login"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c9517422-8a42-4204-8156-cda9b385f017","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"cb391545-5076-433d-8b32-b19ed3d73939","name":"Get risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"GET"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"cb391545-5076-433d-8b32-b19ed3d73939","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"8018c245-2f30-469f-992f-dc1668cccd75","name":"Update risk assessment settings - default","request":{"urlPathTemplate":"/risk-assessments/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"enabled\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"8018c245-2f30-469f-992f-dc1668cccd75","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","name":"Get new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"GET"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"b25bc47f-4ec8-4cd8-b419-5323232b8bb8","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","name":"Update new device assessor - default","request":{"urlPathTemplate":"/risk-assessments/settings/new-device","method":"PATCH"},"response":{"status":200,"body":"{\n \"remember_for\": 1\n}","headers":{"Content-Type":"application/json"}},"uuid":"07a0ab5c-d2e9-4e3d-899b-3f9a833c3813","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bf10686c-2651-4040-8299-93e4bbc9834d","name":"Get permissions granted by role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bf10686c-2651-4040-8299-93e4bbc9834d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"23e27895-e8da-4c4d-bec9-94df0205eb5c","name":"Associate permissions with a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"23e27895-e8da-4c4d-bec9-94df0205eb5c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","name":"Remove permissions from a role - default","request":{"urlPathTemplate":"/roles/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"b94e86fc-05a4-43a3-a57f-ecd7e72ca50a","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c87640fd-900b-400f-93f0-9ccb6702a609","name":"Get a role's users - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"users\": [\n {\n \"user_id\": \"user_id\",\n \"picture\": \"picture\",\n \"name\": \"name\",\n \"email\": \"email\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"c87640fd-900b-400f-93f0-9ccb6702a609","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","name":"Assign users to a role - default","request":{"urlPathTemplate":"/roles/{id}/users","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"3715bf7c-6aeb-4cbb-b3a0-57d86272ae3f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"f6173c4f-82c6-420c-a40d-889a713cb3e7","name":"Get custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"f6173c4f-82c6-420c-a40d-889a713cb3e7","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"52a78cce-bea7-4f10-be84-5b860989a20e","name":"Set custom text for a self-service profile - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/custom-text/{language}/{page}","method":"PUT","pathParameters":{"id":{"equalTo":"id"},"language":{"equalTo":"en"},"page":{"equalTo":"get-started"}}},"response":{"status":200,"body":"{\n \"key\": \"value\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"52a78cce-bea7-4f10-be84-5b860989a20e","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","name":"Create an SSO access ticket to initiate the Self Service SSO Flow - default","request":{"urlPathTemplate":"/self-service-profiles/{id}/sso-ticket","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"ticket\": \"ticket\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"47229b19-16ff-4ccd-8fd2-7f925b1743c4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","name":"Revoke an SSO access ticket - default","request":{"urlPathTemplate":"/self-service-profiles/{profileId}/sso-ticket/{id}/revoke","method":"POST","pathParameters":{"profileId":{"equalTo":"profileId"},"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"e406adeb-54e0-4218-9e0c-edbfbf0a64bf","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"12199f5c-a53a-4405-8a5f-a83867b89865","name":"Get tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"GET"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"12199f5c-a53a-4405-8a5f-a83867b89865","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","name":"Update tenant settings - default","request":{"urlPathTemplate":"/tenants/settings","method":"PATCH"},"response":{"status":200,"body":"{\n \"change_password\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"guardian_mfa_page\": {\n \"enabled\": true,\n \"html\": \"html\"\n },\n \"default_audience\": \"default_audience\",\n \"default_directory\": \"default_directory\",\n \"error_page\": {\n \"html\": \"html\",\n \"show_log_link\": true,\n \"url\": \"url\"\n },\n \"device_flow\": {\n \"charset\": \"base20\",\n \"mask\": \"mask\"\n },\n \"default_token_quota\": {\n \"clients\": {\n \"client_credentials\": {}\n },\n \"organizations\": {\n \"client_credentials\": {}\n }\n },\n \"flags\": {\n \"change_pwd_flow_v1\": true,\n \"enable_apis_section\": true,\n \"disable_impersonation\": true,\n \"enable_client_connections\": true,\n \"enable_pipeline2\": true,\n \"allow_legacy_delegation_grant_types\": true,\n \"allow_legacy_ro_grant_types\": true,\n \"allow_legacy_tokeninfo_endpoint\": true,\n \"enable_legacy_profile\": true,\n \"enable_idtoken_api2\": true,\n \"enable_public_signup_user_exists_error\": true,\n \"enable_sso\": true,\n \"allow_changing_enable_sso\": true,\n \"disable_clickjack_protection_headers\": true,\n \"no_disclose_enterprise_connections\": true,\n \"enforce_client_authentication_on_passwordless_start\": true,\n \"enable_adfs_waad_email_verification\": true,\n \"revoke_refresh_token_grant\": true,\n \"dashboard_log_streams_next\": true,\n \"dashboard_insights_view\": true,\n \"disable_fields_map_fix\": true,\n \"mfa_show_factor_list_on_enrollment\": true,\n \"remove_alg_from_jwks\": true,\n \"improved_signup_bot_detection_in_classic\": true,\n \"genai_trial\": true,\n \"enable_dynamic_client_registration\": true,\n \"disable_management_api_sms_obfuscation\": true,\n \"trust_azure_adfs_email_verified_connection_property\": true,\n \"custom_domains_provisioning\": true\n },\n \"friendly_name\": \"friendly_name\",\n \"picture_url\": \"picture_url\",\n \"support_email\": \"support_email\",\n \"support_url\": \"support_url\",\n \"allowed_logout_urls\": [\n \"allowed_logout_urls\"\n ],\n \"session_lifetime\": 1.1,\n \"idle_session_lifetime\": 1.1,\n \"ephemeral_session_lifetime\": 1.1,\n \"idle_ephemeral_session_lifetime\": 1.1,\n \"sandbox_version\": \"sandbox_version\",\n \"legacy_sandbox_version\": \"legacy_sandbox_version\",\n \"sandbox_versions_available\": [\n \"sandbox_versions_available\"\n ],\n \"default_redirection_uri\": \"default_redirection_uri\",\n \"enabled_locales\": [\n \"am\"\n ],\n \"session_cookie\": {\n \"mode\": \"persistent\"\n },\n \"sessions\": {\n \"oidc_logout_prompt_enabled\": true\n },\n \"oidc_logout\": {\n \"rp_logout_end_session_endpoint_discovery\": true\n },\n \"allow_organization_name_in_authentication_api\": true,\n \"customize_mfa_in_postlogin_action\": true,\n \"acr_values_supported\": [\n \"acr_values_supported\"\n ],\n \"mtls\": {\n \"enable_endpoint_aliases\": true\n },\n \"pushed_authorization_requests_supported\": true,\n \"authorization_response_iss_parameter_supported\": true,\n \"skip_non_verifiable_callback_uri_confirmation_prompt\": true,\n \"resource_parameter_profile\": \"audience\",\n \"phone_consolidated_experience\": true,\n \"enable_ai_guide\": true\n}","headers":{"Content-Type":"application/json"}},"uuid":"48a056e4-f2d6-45a2-9b0a-3b7d173c8597","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","name":"Get a list of authentication methods - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"authenticators\": [\n {\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3d87eb15-86f8-42c9-b9bf-b1bdcb1d72d5","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a786d309-f573-4722-9c1a-4336dcb2ca34","name":"Creates an authentication method for a given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a786d309-f573-4722-9c1a-4336dcb2ca34","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"de90147a-4c08-43b0-9e64-3c7afab7fe48","name":"Update all authentication methods by replacing them with the given ones - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"PUT","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {}\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"de90147a-4c08-43b0-9e64-3c7afab7fe48","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","name":"Delete all authentication methods for the given user - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0fd546c5-9e1f-4319-b6f2-9ee49c498250","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","name":"Get an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"GET","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"recovery-code\",\n \"confirmed\": true,\n \"name\": \"name\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"link_id\": \"link_id\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth_at\": \"2024-01-15T09:30:00Z\",\n \"credential_device_type\": \"credential_device_type\",\n \"credential_backed_up\": true,\n \"identity_user_id\": \"identity_user_id\",\n \"user_agent\": \"user_agent\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"a3ee9cc4-e4af-46b6-9fcc-371bb0db0e03","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"add53361-2a24-44ea-93fe-fd31b9981468","name":"Delete an authentication method by ID - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"add53361-2a24-44ea-93fe-fd31b9981468","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","name":"Update an authentication method - default","request":{"urlPathTemplate":"/users/{id}/authentication-methods/{authentication_method_id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"},"authentication_method_id":{"equalTo":"authentication_method_id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"type\": \"phone\",\n \"name\": \"name\",\n \"totp_secret\": \"totp_secret\",\n \"phone_number\": \"phone_number\",\n \"email\": \"email\",\n \"authentication_methods\": [\n {\n \"type\": \"totp\",\n \"id\": \"id\"\n }\n ],\n \"preferred_authentication_method\": \"voice\",\n \"key_id\": \"key_id\",\n \"public_key\": \"public_key\",\n \"aaguid\": \"aaguid\",\n \"relying_party_identifier\": \"relying_party_identifier\",\n \"created_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"1cfc820b-23ae-4b7b-8b10-d9e1c2825e51","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"59e259ee-3764-496e-9875-949a218233be","name":"Delete All Authenticators - default","request":{"urlPathTemplate":"/users/{id}/authenticators","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"59e259ee-3764-496e-9875-949a218233be","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","name":"Get a User's Connected Accounts - default","request":{"urlPathTemplate":"/users/{id}/connected-accounts","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"connected_accounts\": [\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"strategy\": \"strategy\",\n \"access_type\": \"offline\",\n \"scopes\": [\n \"scopes\"\n ],\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"0f4d4b1f-e7f1-42bd-8a14-64c2e7348b16","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"4fb03086-4c19-4d4d-a060-b0f30cbed64f","name":"Get the First Confirmed Multi-factor Authentication Enrollment - default","request":{"urlPathTemplate":"/users/{id}/enrollments","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"status\": \"pending\",\n \"type\": \"type\",\n \"name\": \"name\",\n \"identifier\": \"identifier\",\n \"phone_number\": \"phone_number\",\n \"auth_method\": \"authenticator\",\n \"enrolled_at\": \"2024-01-15T09:30:00Z\",\n \"last_auth\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"4fb03086-4c19-4d4d-a060-b0f30cbed64f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7df16d6a-51ec-415e-a605-f161474b5a60","name":"Get tokensets for a user - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"[\n {\n \"id\": \"id\",\n \"connection\": \"connection\",\n \"scope\": \"scope\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"issued_at\": \"2024-01-15T09:30:00Z\",\n \"last_used_at\": \"2024-01-15T09:30:00Z\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"7df16d6a-51ec-415e-a605-f161474b5a60","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","name":"Deletes a tokenset for federated connections by id. - default","request":{"urlPathTemplate":"/users/{id}/federated-connections-tokensets/{tokenset_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"tokenset_id":{"equalTo":"tokenset_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"2dd7f5e1-dfec-4564-8331-8dd9d7ecfa93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","name":"Get user's groups - default","request":{"urlPathTemplate":"/users/{id}/groups","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"groups\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"external_id\": \"external_id\",\n \"connection_id\": \"connection_id\",\n \"organization_id\": \"organization_id\",\n \"tenant_name\": \"tenant_name\",\n \"description\": \"description\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"membership_created_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\",\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1\n}","headers":{"Content-Type":"application/json"}},"uuid":"10f1d36a-08fb-4d1c-9ae0-7e3a75f996ee","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0333210f-005f-4731-9928-1487697620ba","name":"Link a User Account - default","request":{"urlPathTemplate":"/users/{id}/identities","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":201,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n },\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\"\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"0333210f-005f-4731-9928-1487697620ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","name":"Unlink a User Identity - default","request":{"urlPathTemplate":"/users/{id}/identities/{provider}/{user_id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"ad"},"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"[\n {\n \"connection\": \"connection\",\n \"user_id\": \"user_id\",\n \"provider\": \"provider\",\n \"isSocial\": true,\n \"access_token\": \"access_token\",\n \"access_token_secret\": \"access_token_secret\",\n \"refresh_token\": \"refresh_token\",\n \"profileData\": {\n \"email\": \"email\",\n \"email_verified\": true,\n \"name\": \"name\",\n \"username\": \"username\",\n \"given_name\": \"given_name\",\n \"phone_number\": \"phone_number\",\n \"phone_verified\": true,\n \"family_name\": \"family_name\"\n }\n }\n]","headers":{"Content-Type":"application/json"}},"uuid":"2dc23165-ddbe-4c7a-8f82-ed8cb6afed3c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","name":"Get user's log events - default","request":{"urlPathTemplate":"/users/{id}/logs","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"length\": 1.1,\n \"total\": 1.1,\n \"logs\": [\n {\n \"date\": \"date\",\n \"type\": \"type\",\n \"description\": \"description\",\n \"connection\": \"connection\",\n \"connection_id\": \"connection_id\",\n \"client_id\": \"client_id\",\n \"client_name\": \"client_name\",\n \"ip\": \"ip\",\n \"hostname\": \"hostname\",\n \"user_id\": \"user_id\",\n \"user_name\": \"user_name\",\n \"audience\": \"audience\",\n \"scope\": \"scope\",\n \"strategy\": \"strategy\",\n \"strategy_type\": \"strategy_type\",\n \"log_id\": \"log_id\",\n \"isMobile\": true,\n \"details\": {\n \"key\": \"value\"\n },\n \"user_agent\": \"user_agent\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"bb12a5f2-c0fc-41b9-874a-4d0b151ca508","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"8224b345-c369-4d08-b366-81060009c441","name":"Invalidate All Remembered Browsers for Multi-factor Authentication - default","request":{"urlPathTemplate":"/users/{id}/multifactor/actions/invalidate-remember-browser","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"8224b345-c369-4d08-b366-81060009c441","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"86847e95-c858-46df-b005-c0f0392ae95c","name":"Delete a User's Multi-factor Provider - default","request":{"urlPathTemplate":"/users/{id}/multifactor/{provider}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"},"provider":{"equalTo":"duo"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"86847e95-c858-46df-b005-c0f0392ae95c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","name":"List user's organizations - default","request":{"urlPathTemplate":"/users/{id}/organizations","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"organizations\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"display_name\": \"display_name\",\n \"token_quota\": {\n \"client_credentials\": {}\n }\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"3a825384-1ed6-44a5-9a15-b2be0438a1d6","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"58cc0983-45ee-47d2-8a5c-b6e215c83942","name":"Get a User's Permissions - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"permissions\": [\n {\n \"resource_server_identifier\": \"resource_server_identifier\",\n \"permission_name\": \"permission_name\",\n \"resource_server_name\": \"resource_server_name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"58cc0983-45ee-47d2-8a5c-b6e215c83942","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"812e845d-b47e-41b3-ad6b-edf602577cc4","name":"Assign Permissions to a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"812e845d-b47e-41b3-ad6b-edf602577cc4","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"6829e581-25db-4d58-99ad-1fd675c362f1","name":"Remove Permissions from a User - default","request":{"urlPathTemplate":"/users/{id}/permissions","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"6829e581-25db-4d58-99ad-1fd675c362f1","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0bf944f2-8c7e-474c-82eb-9e21bb625219","name":"Clear risk assessment assessors for a specific user - default","request":{"urlPathTemplate":"/users/{id}/risk-assessments/clear","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0bf944f2-8c7e-474c-82eb-9e21bb625219","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"96a14af0-6c21-49ec-af86-512e672dd464","name":"Get a user's roles - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"start\": 1.1,\n \"limit\": 1.1,\n \"total\": 1.1,\n \"roles\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"description\": \"description\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"96a14af0-6c21-49ec-af86-512e672dd464","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"fcc9270b-77f1-4374-b64e-ce2381665996","name":"Assign roles to a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"POST","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"fcc9270b-77f1-4374-b64e-ce2381665996","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"c727015f-123f-4f98-9b24-25828361a4ab","name":"Removes roles from a user - default","request":{"urlPathTemplate":"/users/{id}/roles","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"c727015f-123f-4f98-9b24-25828361a4ab","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"28b46c14-5cc3-42ad-8808-0072fb3249ba","name":"Get refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"tokens\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"client_id\": \"client_id\",\n \"session_id\": \"session_id\",\n \"rotating\": true,\n \"resource_servers\": [\n {}\n ],\n \"refresh_token_metadata\": {\n \"key\": \"value\"\n },\n \"last_exchanged_at\": \"2024-01-15T09:30:00Z\"\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"28b46c14-5cc3-42ad-8808-0072fb3249ba","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"1f25d8aa-36f6-4ba8-9865-27c99731105f","name":"Delete refresh tokens for a user - default","request":{"urlPathTemplate":"/users/{user_id}/refresh-tokens","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"1f25d8aa-36f6-4ba8-9865-27c99731105f","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","name":"Get sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"GET","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"{\n \"sessions\": [\n {\n \"id\": \"id\",\n \"user_id\": \"user_id\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\",\n \"authenticated_at\": \"2024-01-15T09:30:00Z\",\n \"idle_expires_at\": \"2024-01-15T09:30:00Z\",\n \"expires_at\": \"2024-01-15T09:30:00Z\",\n \"last_interacted_at\": \"2024-01-15T09:30:00Z\",\n \"clients\": [\n {}\n ],\n \"session_metadata\": {\n \"key\": \"value\"\n }\n }\n ],\n \"next\": \"next\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"dd1c4072-54e4-4dbc-82d9-ca1c27916f1d","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"0691684c-d746-4411-aa18-4de52a90a463","name":"Delete sessions for user - default","request":{"urlPathTemplate":"/users/{user_id}/sessions","method":"DELETE","pathParameters":{"user_id":{"equalTo":"user_id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"0691684c-d746-4411-aa18-4de52a90a463","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"7424dc01-51cd-4cc9-b47d-082a7931e487","name":"List verifiable credentials template for tenant. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"GET"},"response":{"status":200,"body":"{\n \"next\": \"next\",\n \"templates\": [\n {\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n }\n ]\n}","headers":{"Content-Type":"application/json"}},"uuid":"7424dc01-51cd-4cc9-b47d-082a7931e487","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}},"postServeActions":[]},{"id":"65b53386-72a6-4ac3-afba-c41377b10e93","name":"Create a verifiable credential template. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates","method":"POST"},"response":{"status":201,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"65b53386-72a6-4ac3-afba-c41377b10e93","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"bac80375-0249-4659-a3d4-3cad535b4a20","name":"Get a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"GET","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"bac80375-0249-4659-a3d4-3cad535b4a20","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","name":"Delete a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"DELETE","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"\"\"","headers":{"Content-Type":"application/json"}},"uuid":"ca7ff9f3-642c-4fae-92b4-0e4e95f34d4c","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}},{"id":"9934fba5-6f64-4698-89dd-6123d0878561","name":"Update a verifiable credential template by ID. - default","request":{"urlPathTemplate":"/verifiable-credentials/verification/templates/{id}","method":"PATCH","pathParameters":{"id":{"equalTo":"id"}}},"response":{"status":200,"body":"{\n \"id\": \"id\",\n \"name\": \"name\",\n \"type\": \"type\",\n \"dialect\": \"dialect\",\n \"presentation\": {\n \"org.iso.18013.5.1.mDL\": {\n \"org.iso.18013.5.1\": {}\n }\n },\n \"custom_certificate_authority\": \"custom_certificate_authority\",\n \"well_known_trusted_issuers\": \"well_known_trusted_issuers\",\n \"created_at\": \"2024-01-15T09:30:00Z\",\n \"updated_at\": \"2024-01-15T09:30:00Z\"\n}","headers":{"Content-Type":"application/json"}},"uuid":"9934fba5-6f64-4698-89dd-6123d0878561","persistent":true,"priority":3,"metadata":{"mocklab":{"created":{"at":"2020-01-01T00:00:00.000Z","via":"SYSTEM"}}}}],"meta":{"total":389}} \ No newline at end of file