Releases: okta/okta-sdk-python
Releases · okta/okta-sdk-python
Version 2.6.0
2.6.0
- Manage custom group profile attributes (Fixes #279)
Version 2.5.0
2.5.0
- Regenerate code using the open API spec v2.11.1
- Updates client template to persist aiohttp and related logic
- Fixed copyright headers which had the incorrect starting year
New resources:
- Brand
New models:
- EmailTemplate
- EmailTemplateContent
- EmailTemplateCustomization
- EmailTemplateCustomizationRequest
- EmailTemplateTestTrequest
- IdpPolicyRuleAction
- IdpPolicyRuleActionProvider
Version 2.4.0
2.4.0
- Regenerate code using the open API spec v2.10.0.
- Allow possibility to re-use http session.
New resources:
- Subscription
New models:
- ApplicationFeature
- CapabilitiesCreateObject
- CapabilitiesObject
- CapabilitiesUpdateObject
- ChangeEnum
- LifecycleCreateSettingObject
- LifecycleDeactivateSettingObject
- NotificationType
- Org2OrgApplication
- Org2OrgApplicationSettings
- Org2OrgApplicationSettingsApp
- PasswordSettingObject
- ProfileSettingObject
- ProvisioningConnection
- ProvisioningConnectionAuthScheme
- ProvisioningConnectionProfile
- ProvisioningConnectionRequest
- ProvisioningConnectionStatus
- SeedEnum
- Subscription
- SubscriptionStatus
New features:
Reuse http session to improve performance using client as a context manager:
import asyncio
import aiohttp
from okta.client import Client as OktaClient
async def main():
async with OktaClient() as client:
# perform all queries within same session
users, okta_resp, err = await client.list_users()
user, okta_resp, err = await client.get_user(users[0].id)
loop = asyncio.get_event_loop()
loop.run_until_complete(main())
Version 2.3.1
v2.3.1
- Regenerate code using the open API spec v2.9.2.
- Make DevicePolicyRuleCondition model parent for DeviceAccessPolicyRuleCondition
Version 2.3.0
v2.3.0
- Regenerate code using the open API spec v2.9.1.
- Allow next for all requests
- Allow upload files within FormData
- Add updateOrgLogo operation to Org resource (Org appeared in v2.2.0)
- Allow custom SSL Context settings
New resources:
- Brand
New models:
- AccessPolicy
- AccessPolicyConstraint
- AccessPolicyConstraints
- AccessPolicyRule
- AccessPolicyRuleActions
- AccessPolicyRuleApplicationSignOn
- AccessPolicyRuleConditions
- AccessPolicyRuleCustomCondition
- AuthenticatorProvider
- AuthenticatorProviderConfiguration
- AuthenticatorProviderConfigurationUserNamePlate
- Brand
- ChannelBinding
- Compliance
- DeviceAccessPolicyRuleCondition
- EmailTemplateTouchPointVariant
- EndUserDashboardTouchPointVariant
- ErrorPageTouchPointVariant
- FipsEnum
- ImageUploadResponse
- KnowledgeConstraint
- PossessionConstraint
- PreRegistrationInlineHook
- ProfileEnrollmentPolicy
- ProfileEnrollmentPolicyRule
- ProfileEnrollmentPolicyRuleAction
- ProfileEnrollmentPolicyRuleActions
- ProfileEnrollmentPolicyRuleActivationRequirement
- ProfileEnrollmentPolicyRuleProfileAttribute
- RequiredEnum
- SignInPageTouchPointVariant
- Theme
- ThemeResponse
- UserTypeCondition
- UserVerificationEnum
- VerificationMethod
Version 2.2.0
v2.2.0
- Regenerate code using the open API spec v2.7.0.
- Allow Bearer auth
- Support Python 3.9
New resources:
- Authenticator
- GroupSchema
- Org
New models:
- AllowedForEnum
- Authenticator
- AuthenticatorSettings
- AuthenticatorStatus
- AuthenticatorType
- GroupSchema
- GroupSchemaBase
- GroupSchemaCustom
- GroupSchemaAttribute
- GroupSchemaDefinitions
- GroupSchemaBaseProperties
- OrgContactType
- OrgContactTypeObj
- OrgContactUser
- OrgOktaCommunicationSetting
- OrgOktaSupportSetting
- OrgOktaSupportSettingsObj
- OrgPreferences
- OrgSetting
Version 2.1.0
v2.1.0
- Regenerate code using the open API spec v2.6.0.
- Expose parameter
keep_empty_params
to all user interfaces. - Fix docstring for get_group method, thanks @exitcode0!
New models:
- ApplicationSettingsNotes
- SignOnInlineHook
- TokenAuthorizationServerPolicyRuleActionInlineHook
Version 2.0.0
v2.0.0
- Regenerate code using the open API spec v2.5.0.
- Make sign_on_mode of all apps instance of enum, issue #198 (this change might be not compatible with custom clients code, although probability is low)
- Add response headers to OktaAPIResponse object, issue #218
New resources:
- Domain
- UserSchema
New models:
- DnsRecord
- DnsRecordType
- Domain
- DomainCertificate
- DomainCertificateMetadata
- DomainCertificateSourceType
- DomainCertificateType
- DomainListResponse
- DomainValidationStatus
- UserSchemaAttributeEnum
- UserSchemaAttributeItems
- UserSchemaAttributeMasterPriority
- UserSchemaAttributeMasterType
- UserSchemaAttributeScope
- UserSchemaAttributeType
- UserSchemaAttributeUnion
- UserSchemaProperties
- UserSchemaPropertiesProfile
- UserSchemaPropertiesProfileItem
Breaking changes
Previously, the type of sign_on_mode
attribute was inconsistent among different applications. While some applications, including the generic application, defined this attribute as string, others defined it as ApplicationSignOnMode
.
We have now standardized the sign_on_mode attribute making its type an ApplicationSignOnMode. Thus, code like the following, which was working previously, won't provide desired result:
# if sign_on_mode is not an ApplicationSignOnMode type, then it should be string; but now all sign_on_modes are of type ApplicationSignOnMode
if not isinstance(app.sign_on_mode, ApplicationSignOnMode):
do_some_stuff()
Version 1.7.0
- Regenerate code using the open API spec v2.4.0.
- Fix case issue with user custom attributes, issue #202.
- Fix UserProfile serializing, PR #207.
- Fix inconsistent responses within pagination, issue #210.
New resources:
- ThreatInsight
- NetworkZone
- ProfileMapping
New models:
- NetworkZone
- NetworkZoneAddress
- NetworkZoneAddressType
- NetworkZoneLocation
- NetworkZoneStatus
- NetworkZoneType
- NetworkZoneUsage
- PolicyRuleActions
- PolicyRuleActionsEnroll
- PolicyRuleActionsEnrollSelf
- ProfileMapping
- ProfileMappingProperty
- ProfileMappingPropertyPushStatus
- ProfileMappingSource
- ThreatInsightConfiguration