npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@reltio/reltio-oauth-api-beta-2

v2020.2.0

Published

The_Reltio_Authentication_APIs_perform_authentication_operations_for_a_user_brCustomers_use_the_Reltio_Auth_API_to_get_the_access_token_to_access_their_tenant__The_access_token_permits_the_customer_to_request_protected_information_by_calling_other_Reltio_

Downloads

3

Readme

authentication_ap_is

AuthenticationApIs - JavaScript client for authentication_ap_is The Reltio Authentication APIs perform authentication operations for a user.Customers use the Reltio Auth API to get the access token to access their tenant. The access token permits the customer to request protected information by calling other Reltio Platform APIs. It is implemented by using the OAuth2 protocol.If your tenant is configured to use SSO, you must obtain an access token from your SSO Auth server. Since the third-party access tokens aren't known to the Reltio Auth server, some modifications must be made to the default configuration. This SDK is automatically generated by the OpenAPI Generator project:

  • API version: 2020.2.0.0.1-SNAPSHOT
  • Package version: 2020.2.0.0.1-SNAPSHOT
  • Build package: org.openapitools.codegen.languages.JavascriptClientCodegen For more information, please visit http://www.reltio.com

Installation

For Node.js

npm

To publish the library as a npm, please follow the procedure in "Publishing npm packages".

Then install it via:

npm install authentication_ap_is --save

Finally, you need to build the module:

npm run build
Local development

To use the library locally without publishing to a remote npm registry, first install the dependencies by changing into the directory containing package.json (and this README). Let's call this JAVASCRIPT_CLIENT_DIR. Then run:

npm install

Next, link it globally in npm with the following, also from JAVASCRIPT_CLIENT_DIR:

npm link

To use the link you just defined in your project, switch to the directory you want to use your authentication_ap_is from, and run:

npm link /path/to/<JAVASCRIPT_CLIENT_DIR>

Finally, you need to build the module:

npm run build

git

If the library is hosted at a git repository, e.g.https://github.com/GIT_USER_ID/GIT_REPO_ID then install it via:

    npm install GIT_USER_ID/GIT_REPO_ID --save

For browser

The library also works in the browser environment via npm and browserify. After following the above steps with Node.js and installing browserify with npm install -g browserify, perform the following (assuming main.js is your entry file):

browserify main.js > bundle.js

Then include bundle.js in the HTML pages.

Webpack Configuration

Using Webpack you may encounter the following error: "Module not found: Error: Cannot resolve module", most certainly you should disable AMD loader. Add/merge the following section to your webpack config:

module: {
  rules: [
    {
      parser: {
        amd: false
      }
    }
  ]
}

Getting Started

Please follow the installation instruction and execute the following JS code:

var AuthenticationApIs = require('authentication_ap_is');

var defaultClient = AuthenticationApIs.ApiClient.instance;
// Configure OAuth2 access token for authorization: reltio_auth
var reltio_auth = defaultClient.authentications['reltio_auth'];
reltio_auth.accessToken = "YOUR ACCESS TOKEN"

var api = new AuthenticationApIs.CheckAccessTokenApi()
var token = "token_example"; // {String} 
var opts = {
  'serviceId': "serviceId_example", // {String} 
  'tenantId': "tenantId_example" // {String} 
};
var callback = function(error, data, response) {
  if (error) {
    console.error(error);
  } else {
    console.log('API called successfully. Returned data: ' + data);
  }
};
api.getAuthorizationInfo(token, opts, callback);

Documentation for API Endpoints

All URIs are relative to http://localhost

Class | Method | HTTP request | Description ------------ | ------------- | ------------- | ------------- AuthenticationApIs.CheckAccessTokenApi | getAuthorizationInfo | POST /oauth/checkToken | AuthenticationApIs.ComReltioAuthDbSyncupControllerDBSyncupControllerApi | getSyncStatus | GET /admin//sync/status | AuthenticationApIs.ComReltioAuthRestV2controllersGlobalRolePermissionControllerV2Api | getByRoleName | GET /oauth//roles/permissions/v2/{roleName} | AuthenticationApIs.CustomerRolePermissionsApi | callDelete | DELETE /oauth//customers/{customerId}/roles/permissions/{roleName} | AuthenticationApIs.CustomerRolePermissionsApi | create | POST /oauth//customers/{customerId}/roles/permissions | This API creates permissions for the existing customer-specific roles. AuthenticationApIs.CustomerRolePermissionsApi | getAll | GET /oauth//customers/{customerId}/roles/permissions | This API request returns the details of all the roles and permissions configured for a customer, based on the Customer ID mentioned in the request. AuthenticationApIs.CustomerRolePermissionsApi | getByRoleName | GET /oauth//customers/{customerId}/roles/permissions/{roleName} | This API returns all the permissions configured for the specified role under the particular customer. AuthenticationApIs.CustomerRolePermissionsApi | override | PUT /oauth//customers/{customerId}/roles/permissions/{roleName} | This API request overrides the permissions of a customer specific role permissions object specified in the request body. AuthenticationApIs.CustomersApi | addCustomerSpecificRoles | POST /oauth//customers/{id}/roles | This API allows you to add customer specific roles. AuthenticationApIs.CustomersApi | createCustomers | POST /oauth//customers | This API request creates a customer record based on the details provided in the request body. AuthenticationApIs.CustomersApi | createGroups | POST /oauth//customers/{customerId}/groups | This API creates the groups with the tenant specific roles configured for the customer. AuthenticationApIs.CustomersApi | createSSOConfigurationForTenant | PUT /oauth//customers/{id}/externalProviderConfig/{tenant} | AuthenticationApIs.CustomersApi | deleteCustomer | DELETE /oauth//customers/{id} | AuthenticationApIs.CustomersApi | deleteGroup | DELETE /oauth//customers/{customerId}/groups/{groupId} | This API request deletes the group for the specified customer. AuthenticationApIs.CustomersApi | deleteSSOConfigurationForTenant | DELETE /oauth//customers/{id}/externalProviderConfig/{tenant} | AuthenticationApIs.CustomersApi | deleteShieldConfig | DELETE /oauth//customers/{id}/shieldConfig | AuthenticationApIs.CustomersApi | getCustomer | GET /oauth//customers/{id} | This API request displays the details of the customer based on the Customer ID provided in the request body. AuthenticationApIs.CustomersApi | getCustomers | GET /oauth//customers | This API allows to to get Customers API. AuthenticationApIs.CustomersApi | getGroup | GET /oauth//customers/{customerId}/groups/{groupId} | This API request displays the details of a Group for a specific customer, based on the Group ID and Customer ID mentioned in the request. AuthenticationApIs.CustomersApi | getGroups | GET /oauth//customers/{customerId}/groups | This API creates the groups with the tenant specific roles configured for the customer. The request body must be an array with group details. AuthenticationApIs.CustomersApi | getSSOConfigurationForTenant | GET /oauth//customers/{id}/externalProviderConfig/{tenant} | AuthenticationApIs.CustomersApi | getShieldConfig | GET /oauth//customers/{id}/shieldConfig | AuthenticationApIs.CustomersApi | getUsersForCustomer | GET /oauth//customers/{id}/users | This API request allows you to display the details of all the users belonging to a specific customer specified in the request body. AuthenticationApIs.CustomersApi | updateCustomer | PUT /oauth//customers/{id} | This API request allows you to modify the customer's details, based on the Customer ID specified in the request body. AuthenticationApIs.CustomersApi | updateCustomerPasswordPolicy | PUT /oauth//customers/{id}/passwordPolicy | AuthenticationApIs.CustomersApi | updateCustomerSpecificRoles | PUT /oauth//customers/{id}/roles | This API request updates the customer-specific roles to the list of roles sent in the body. AuthenticationApIs.CustomersApi | updateGroup | PUT /oauth//customers/{customerId}/groups/{groupId} | API request updates the group with the JSON object send in the request body. AuthenticationApIs.CustomersApi | updateShieldConfig | PUT /oauth//customers/{id}/shieldConfig | AuthenticationApIs.GlobalRolePermissionsApi | getAll | GET /oauth//roles/permissions | AuthenticationApIs.GlobalRolePermissionsApi | getByRoleName | GET /oauth//roles/permissions/{roleName} | This API returns the permissions JSON of the System role sent in the request. AuthenticationApIs.ReltioServiceApi | getAllReltioServices | GET /oauth//reltioservices | AuthenticationApIs.ReltioServiceApi | getReltioServiceByID | GET /oauth//reltioservices/{serviceId} | AuthenticationApIs.RevokeTokenApi | revokeToken | POST /oauth/revoke | This API request is used to revoke an access or refresh token and the data associated with it. AuthenticationApIs.UsersApi | addUserExternalTokens | POST /oauth//users/{username}/externalTokens | This API request is used to add an external token for the user specified in the request. AuthenticationApIs.UsersApi | addUsersToCollection | POST /oauth//users | This API request creates a user as specified in the request body. You can specify the roles and tenants by using the userPermissions property. AuthenticationApIs.UsersApi | deleteUser | DELETE /oauth//users/{username} | This API deletes the users. AuthenticationApIs.UsersApi | getCustomerForUser | GET /oauth//users/customers | AuthenticationApIs.UsersApi | getExternalTokens | GET /oauth//users/{username}/externalTokens | This API returns the external tokens for the specified username. AuthenticationApIs.UsersApi | getGroupsForUser | GET /oauth//users/{username}/groups | AuthenticationApIs.UsersApi | getUsers | GET /oauth//users | This API fetches the list of users. AuthenticationApIs.UsersApi | getUsersByGroup | GET /oauth//users/groups/{groupId} | AuthenticationApIs.UsersApi | listTokensForUser | GET /oauth/users/{user}/tokens | AuthenticationApIs.UsersApi | removeExternalToken | DELETE /oauth//users/{username}/externalTokens/{systemId} | AuthenticationApIs.UsersApi | resetPassword | POST /oauth//users/_resetPassword | This API allows changing of the user password using temporary reset link. AuthenticationApIs.UsersApi | revokeTokens | PUT /oauth//users/{username}/revoketokens | AuthenticationApIs.UsersApi | sendResetPasswordLink | POST /oauth//users/_sendResetPasswordLink | This API requests for a temporary password link. AuthenticationApIs.UsersApi | updateUser | PUT /oauth//users/{username} | This API overrides the users completely with the data sent in the request body. AuthenticationApIs.UsersApi | updateUserEmail | PUT /oauth//users/{username}/email | AuthenticationApIs.UsersApi | updateUserEntityId | PUT /oauth//users/{username}/entity | This API request is used to update an entity associated with a user. AuthenticationApIs.UsersApi | updateUserExternalToken | PUT /oauth//users/{username}/externalTokens/{systemId} | AuthenticationApIs.UsersApi | updateUserGroups | PUT /oauth//users/{username}/groups | AuthenticationApIs.UsersApi | updateUserPassword | PUT /oauth//users/{username}/password | This API updates the password for the specified username. AuthenticationApIs.UsersApi | updateUserRoles | PUT /oauth//users/{username}/tenantRoles | AuthenticationApIs.UsersApi | updateUserRolesRemoved | PUT /oauth//users/{username}/roles | AuthenticationApIs.UsersApi | updateUserTenantsRemoved | PUT /oauth//users/{username}/tenants | AuthenticationApIs.UsersApi | updateUser_0 | PUT /oauth//users/{username}/_unlock | AuthenticationApIs.UsersApi | viewUser | GET /oauth//users/{username} | This API request displays the details of a particular user, based on the User Name specified in the request body. AuthenticationApIs.UsersApi | viewUsersForTenant | GET /oauth//users/permissions/tenant/{tenantId} | AuthenticationApIs.UsersApi | viewUsersForTenant_0 | GET /oauth//users/tenant/{tenantId} | This API request displays the list of all the users for a tenant, based on the Tenant ID specified in the request body.

Documentation for Models

Documentation for Authorization

reltio_auth

  • Type: OAuth
  • Flow: password
  • Authorization URL:
  • Scopes:
    • write: Grant write-only access
    • read: Grant read-only access