Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type AuthenticateParams ¶
type AuthenticateParams struct { // OAuthToken: The token to authenticate. OAuthToken string `json:"oauth_token,omitempty"` // SessionToken: A secret token for a given Stytch Session. SessionToken string `json:"session_token,omitempty"` // SessionDurationMinutes: Set the session lifetime to be this many minutes from now. This will start a new // session if one doesn't already exist, // returning both an opaque `session_token` and `session_jwt` for this session. Remember that the // `session_jwt` will have a fixed lifetime of // five minutes regardless of the underlying session duration, and will need to be refreshed over time. // // This value must be a minimum of 5 and a maximum of 527040 minutes (366 days). // // If a `session_token` or `session_jwt` is provided then a successful authentication will continue to // extend the session this many minutes. // // If the `session_duration_minutes` parameter is not specified, a Stytch session will be created with a // 60 minute duration. If you don't want // to use the Stytch session product, you can ignore the session fields in the response. SessionDurationMinutes int32 `json:"session_duration_minutes,omitempty"` // SessionJWT: The JSON Web Token (JWT) for a given Stytch Session. SessionJWT string `json:"session_jwt,omitempty"` // SessionCustomClaims: Add a custom claims map to the Session being authenticated. Claims are only created // if a Session is initialized by providing a value in // `session_duration_minutes`. Claims will be included on the Session object and in the JWT. To update a // key in an existing Session, supply a new value. To // delete a key, supply a null value. Custom claims made with reserved claims (`iss`, `sub`, `aud`, // `exp`, `nbf`, `iat`, `jti`) will be ignored. // Total custom claims size cannot exceed four kilobytes. SessionCustomClaims map[string]any `json:"session_custom_claims,omitempty"` // PkceCodeVerifier: A base64url encoded one time secret used to validate that the request starts and ends // on the same device. PkceCodeVerifier string `json:"pkce_code_verifier,omitempty"` // Locale: If the Member needs to complete an MFA step, and the Member has a phone number, this endpoint // will pre-emptively send a one-time passcode (OTP) to the Member's phone number. The locale argument will // be used to determine which language to use when sending the passcode. // // Parameter is a [IETF BCP 47 language tag](https://www.w3.org/International/articles/language-tags/), // e.g. `"en"`. // // Currently supported languages are English (`"en"`), Spanish (`"es"`), and Brazilian Portuguese // (`"pt-br"`); if no value is provided, the copy defaults to English. // // Request support for additional languages // [here](https://docs.google.com/forms/d/e/1FAIpQLScZSpAu_m2AmLXRT3F3kap-s_mcV6UTBitYn6CdyWP0-o7YjQ/viewform?usp=sf_link")! // Locale AuthenticateRequestLocale `json:"locale,omitempty"` }
AuthenticateParams: Request type for `OAuth.Authenticate`.
type AuthenticateRequestLocale ¶
type AuthenticateRequestLocale string
const ( AuthenticateRequestLocaleEn AuthenticateRequestLocale = "en" AuthenticateRequestLocaleEs AuthenticateRequestLocale = "es" AuthenticateRequestLocalePtbr AuthenticateRequestLocale = "pt-br" )
type AuthenticateResponse ¶
type AuthenticateResponse struct { // RequestID: Globally unique UUID that is returned with every API call. This value is important to log for // debugging purposes; we may ask for this value to help identify a specific API call when helping you // debug an issue. RequestID string `json:"request_id,omitempty"` // MemberID: Globally unique UUID that identifies a specific Member. MemberID string `json:"member_id,omitempty"` // ProviderSubject: The unique identifier for the User within a given OAuth provider. Also commonly called // the `sub` or "Subject field" in OAuth protocols. ProviderSubject string `json:"provider_subject,omitempty"` // ProviderType: Denotes the OAuth identity provider that the user has authenticated with, e.g. Google, // Microsoft, GitHub etc. ProviderType string `json:"provider_type,omitempty"` // SessionToken: A secret token for a given Stytch Session. SessionToken string `json:"session_token,omitempty"` // SessionJWT: The JSON Web Token (JWT) for a given Stytch Session. SessionJWT string `json:"session_jwt,omitempty"` // Member: The [Member object](https://stytch.com/docs/b2b/api/member-object) Member organizations.Member `json:"member,omitempty"` // OrganizationID: Globally unique UUID that identifies a specific Organization. The `organization_id` is // critical to perform operations on an Organization, so be sure to preserve this value. OrganizationID string `json:"organization_id,omitempty"` // Organization: The [Organization object](https://stytch.com/docs/b2b/api/organization-object). Organization organizations.Organization `json:"organization,omitempty"` ResetSessions bool `json:"reset_sessions,omitempty"` // MemberAuthenticated: Indicates whether the Member is fully authenticated. If false, the Member needs to // complete an MFA step to log in to the Organization. MemberAuthenticated bool `json:"member_authenticated,omitempty"` // IntermediateSessionToken: The returned Intermediate Session Token contains an OAuth factor associated // with the Member's email address. // The token can be used with the // [OTP SMS Authenticate endpoint](https://stytch.com/docs/b2b/api/authenticate-otp-sms) to complete the // MFA flow and log in to the Organization. // It can also be used with the // [Exchange Intermediate Session endpoint](https://stytch.com/docs/b2b/api/exchange-intermediate-session) // to join a different existing Organization that allows login with OAuth, // or the // [Create Organization via Discovery endpoint](https://stytch.com/docs/b2b/api/create-organization-via-discovery) to create a new Organization. IntermediateSessionToken string `json:"intermediate_session_token,omitempty"` // StatusCode: The HTTP status code of the response. Stytch follows standard HTTP response status code // patterns, e.g. 2XX values equate to success, 3XX values are redirects, 4XX are client errors, and 5XX // are server errors. StatusCode int32 `json:"status_code,omitempty"` // MemberSession: The [Session object](https://stytch.com/docs/b2b/api/session-object). MemberSession *sessions.MemberSession `json:"member_session,omitempty"` // ProviderValues: The `provider_values` object lists relevant identifiers, values, and scopes for a given // OAuth provider. For example this object will include a provider's `access_token` that you can use to // access the provider's API for a given user. // // Note that these values will vary based on the OAuth provider in question, e.g. `id_token` is only // returned by Microsoft. ProviderValues *ProviderValues `json:"provider_values,omitempty"` // MFARequired: Information about the MFA requirements of the Organization and the Member's options for // fulfilling MFA. MFARequired *mfa.MfaRequired `json:"mfa_required,omitempty"` }
AuthenticateResponse: Response type for `OAuth.Authenticate`.
type ProviderValues ¶
type ProviderValues struct { // AccessToken: The `access_token` that you may use to access the User's data in the provider's API. AccessToken string `json:"access_token,omitempty"` // Scopes: The OAuth scopes included for a given provider. See each provider's section above to see which // scopes are included by default and how to add custom scopes. Scopes []string `json:"scopes,omitempty"` // RefreshToken: The `refresh_token` that you may use to refresh a User's session within the provider's API. RefreshToken string `json:"refresh_token,omitempty"` ExpiresAt *time.Time `json:"expires_at,omitempty"` // IDToken: The `id_token` returned by the OAuth provider. ID Tokens are JWTs that contain structured // information about a user. The exact content of each ID Token varies from provider to provider. ID Tokens // are returned from OAuth providers that conform to the [OpenID Connect](https://openid.net/foundation/) // specification, which is based on OAuth. IDToken string `json:"id_token,omitempty"` }
ProviderValues:
Click to show internal directories.
Click to hide internal directories.