Releases: descope/python-sdk
Releases · descope/python-sdk
1.5.8
Enhancements
- Setting email and phone verification status upon creation: When creating a new user, you can now control whether the email and/or phone of that user are verified or not.
- Setting the Invitation URL via SDK: Using the new
invite_url
parameter, you can define a specific invitation URL when inviting a new user, that will override the default invitation URL set in your project's settings.
1.5.7
Enhancements
- Password Replace return value: We're now returning the JWT's response in the
password.replace
function, so that the session and refresh JWTs can be utilized (for example, in flows). - OIDC JWT validation support: For OIDC JWT validation, we've added the option to pass the
audience
value to all validation functions (such asvalidation_session
). That value will be compared to theaud
claim in the JWT, so to make sure those are aligned. This is a must when using OIDC.
1.5.6
Enhancements
- Embedded links: We now support the option of generating an embedded link. Using the
generate_embedded_link
function, the Descoper can now generate a link that contains a user's token, thus requiring only verification to finalize the authentication.
⚠️ Please notice that this feature needs to be turned on in the console, as it's considered an advanced feature that requires extra planning and attention when used. Make sure only permitted personnel use it, and that it is audited appropriately in the relevant places. - Search by user status: We've added the option to search over user
statuses
using thesearch_all
function.
1.5.5
Breaking changes
- Update of the
configure_via_metadata
andconfigure
SSO functions: We've added two new parameters to theconfigure_via_metadata
function -redirect_url
,domain
. This is to complete the SSO configuration options when using the metadata URL option.
We've also made these parameters mandatory in theconfigure
function (used for configuring SSO using connection details).
Please notice that this breaks function signatures for both theconfigure_via_metadata
andconfigure
functions.
Enhancements
- Load tenant by ID: We added an option to load a specific tenant, using the
load
tenant function.
1.5.4
1.5.3
1.5.2
Enhancements
- Get a user's OAuth provider tokens: When using your own OAuth provider account, you can now choose to request additional scopes and have the provider's access tokens managed by Descope. When needed, those can be fetched using the
get_provider_token
function, which retrieves the token for your application to use. - Delete a tenant's SAML configuration: Using the
delete_settings
function, you can define which tenant's SAML configuration should be deleted. - Search over audit logs: You can now filter over Descope's audit logs using the
search
audit function. For a full list of filter options see function's documentation.
1.5.1
Enhancements
- Set and expire user passwords: You can now expire a user's password using the
expire_password
function, which will make the user reset it on their next authentication. There's also the option to set a new one using theset_password
function; notice that even when choosing a password, the user will still need reset it on their next authentication. - Package dependencies definition: We expanded our dependency ranges to increase compatibility.
Bug fixes
- JWT claims in validation responses: When validating the session (using
validate_session
,refresh_session
andvalidate_and_refresh_session
functions) we aligned the response to include the session JWT claims under thesessionToken
key. On top of that - information such as user ID (sub
), project ID (iss
) and associations such as tenants - are all populated with the relevant values.
1.5.0
Enhancements
- User custom attributes 💫 : We're glad to announce that we now support adding custom attributes to the user object! The default user object is great, but sometimes you want to keep a bit more information on it for your app's needs.
- Creation of the attributes are done from the Descope Console, and you can find them in the user object under the
custom_attributes
property. Option to set, update and delete the values are also available from the SDK. - Add a Login ID to the user upon update: When updating a user's phone or email (via OTP / Magic Link / Enchanted Link), you can decide if to make that new value part of the user's Login IDs so that they can later on authenticate with them.
There can be times where an existing user with the new identifier already exists in your user database - so a merging strategy needs to be defined as well.
All of this can be done using theadd_to_login_ids
parameter. - Import and export of Flows and Themes: If you want to export or import flows and themes from one project to another - you can do so now with supporting commands, such as
export_flow
. Examples can be found in the SDK's README. - Get tenant SSO configuration: Using the
get_settings
function, you can now fetch a specific tenant's SSO configuration. Example on how to do so in the repo's README, under the 'Manage SSO Settings' section. - User attribute updates: You can now update the user's picture using the new user
update_picture
command, and user custom attributes using theupdate_custom_attribute
command. - Timeouts for request: We added configurable timeouts to our request. Default is set by the
DEFAULT_TIMEOUT_SECONDS
property and is set to 60 seconds. (@tebeka)
Bug fixes
- Test user functions: Deleting and authenticating test users didn't work in some cases as they were using the wrong methods. We fixed it and now it should work smoothly.