Skip to content

Releases: descope/python-sdk

1.6.10

22 Oct 13:44
6462efb
Compare
Choose a tag to compare

Enhancements

  • Audience claim configuration in verification process: We now allow passing the audience claim explicitly when verifying the session token. The new audience parameter in the exchange_token function can receive any string value, or stay empty by default.

1.6.9

26 Sep 08:06
1a1094d
Compare
Choose a tag to compare

Breaking changes

  • Scalable user searching: We’ve made some improvements to enhance the scalability of our system to better support increased usage. These changes allow us to handle increased demand more efficiently, ensuring a smoother experience for all our customers.
    As part of this update, there may be a delay (up to 100ms) in accessing newly written or updated user data from the search user endpoints. If you have any questions, feel free to reach out!

Enhancements

  • User tenant API: We added an option to fetch a specific user's tenant(s) information from an active session. Using the new my_tenants function, you can query a current user's sessions' tenants details. See the example in the SDK's README.
  • Tenant created time: We added the tenant's creation time when loading the tenant (both in load and load_all functions).

1.6.8

10 Sep 07:53
5ab1199
Compare
Choose a tag to compare

Enhancements

  • Project tags: Projects now have a tags attribute - a list of strings that can be used to distinguish your projects. Those can be updated using the update_tags command.

Bug fixes

  • JWT rotation enablement: We fixed a bug that we found that caused the JWT rotation feature not to work with this specific SDK. This gap was fixed and now the feature is working properly.

1.6.7

01 Aug 10:57
9b11aaa
Compare
Choose a tag to compare

Enhancements

  • Access key descriptions and permitted IPs list: Access key descriptions can now be set - both from the console as well as the SDK. This also applies for permitted IPs (the source IP that is used by the access key upon request) - which supports both single IP addresses as well as CIDRs.
  • Application sign-out URL: We've added an option to configure a specific application sign-out URL using the logout_redirect_url param in SAML related functions. This is useful when Descope is your IdP, and you want to sign a user out of Descope when they sign out from their SP.
  • User interaction override: With the force_authentication flag in applications, you can force end user to interact in a specific way with Descope (as IdP), regardless of the SP's settings.

Bug fixes

  • Audit timestamps weren't datetimes: the from and to audit parameters were fixed to be returned as proper datetime (timestamp) objects.

1.6.6

09 Jul 15:46
a6ad181
Compare
Choose a tag to compare

Enhancements

  • Custom audit events: We've added the function create_event to our audit object, that allows you to generate your own custom audit events. You can also create your custom audit event to provide different data than that provided by Descope.
  • Option to automatically delete related users/access keys when deleting their associated tenant: We've added an option to handle auto-deletion of 'orphaned' users and access keys when their last tenant is deleted. When deleting a tenant, you can use the new cascade flag to indicate that if part of the tenant's users/access keys are left with no tenant association - they will also be deleted from the project.
  • ReBAC relationship checker: We added a new function what_can_target_access_with_relation to check what resources a user has access, per the application's ReBAC schema. Search is recursive.
  • TOTP seed migration: When batch importing users into Descope, you can specify collecting their TOTP seed as part of the migration. If provided in the data, that seed will now be associated with the user and the next authentication will be seamless.
  • Force refresh of OAuth/OIDC provider token: Current refresh of provider token is based on its expiration time. There are some cases in which the provider doesn't return the expiration, and for that we aded the forceRefresh parameter when using the user_get_provider_token function - to force refreshing the provider token.

1.6.5

08 Apr 20:29
c2b6c91
Compare
Choose a tag to compare

Enhancements

  • OTP via voice: In addition to sending OTP via SMS or email - we now support a third delivery method - voice call, with the DeliveryMethod.VOICE option.

1.6.4

14 Mar 15:10
1860318
Compare
Choose a tag to compare

Enhancements

  • Custom claims for access keys: You can define custom claims that will be added upon creation or exchange of access key tokens. See our example on how to use it in the exchange process in our README.
  • Search over roles: We've added a new search function roles, to allow easy searching over them. This function works both for project level roles as well as tenant level roles (depending on the used filter).

1.6.3

26 Feb 12:24
3b5e69f
Compare
Choose a tag to compare

Breaking changes

  • Set an active password for a user: You can set a new active password for a user, with the set_active_password function , which they can then use to sign in. It will be applied with the project's password expiration settings, after which the user will have to update it to their own.
    Notice that we deprecated the set_password function, and now offer a set_temporary_password function instead. The functionality is the same as before (automatically expires the password, making the user reset it upon first authentication) - we just wanted to make sure it's clearer!

Enhancements

  • Tenant-level roles: Tenants can require having their own set of roles on top of the default roles provided in your application. For that, we enhanced existing roles function (create, update, delete) to support association with a specific tenant_id.
  • User impersonation: Using the impersonate function, you can decide which user you would want to temporarily sign in on behalf of. Please make sure to read our SDK's README on impersonation, as well as our KB article on the topic to fully understand this feature and how to securely use it.

1.6.2

05 Feb 10:59
f5f85b7
Compare
Choose a tag to compare

Enhancements

  • Support Bcrypt and Firebase encoding: Some systems encode passwords with the Bcrypt hashing mechanism, so we added support for importing those hashes into Descope using the InviteBatch function. We also added support for the Firebase hashing mechanism.
  • User authentication activity log: Using the new history command, you can find out more information (such as IP address, country, etc) on your users' authentications. Read more about this in the SDK's README.
  • Associate an access key with a specific user: We've added the user_id parameter to the access key create function, so that upon creation that key will be associated with the user. This means that if the user's status is change (for example - the user is disabled) - then the access key's status changes accordingly (gets deactivated).

1.6.1

28 Jan 15:34
9a402e9
Compare
Choose a tag to compare

Enhancements

  • 😮 Tenant SSO - supporting SAML and OIDC: We've recently expanded our tenant SSO support to both SAML and OIDC configurations, so we created a set of generic SSO commands that replace the existing SAML ones.
    Using the dedicated SSOSAMLSettings, SSOSAMLSettingsByMetadata and SSOOIDCSettings objects, along with their matching functions, you can define a tenant's SSO configuration settings.
    This also means that dedicated SAML authentication commands are now deprecated, and we encourage you to update your code to use the new commands:
    • saml.exchange_token >> sso.exchange_token
    • saml.start >> sso.start
  • Use external information in email/text message templates: Just like custom flow inputs, you can now provide custom template inputs that can be added to the email/text message template upon runtime. For example, you can choose to pass the user's IP into the template, to present upon verification.
  • Applications management: Applications, also known as SSO Applications, are used to integrate with an application using SAML or OIDC. Under the sso_application object, you can find an option to create, load, update and delete applications in a specific project. Find out more about applications in our documentation.
  • Associate an application to a user: You can decide to associate one or more application to a user, thus controlling which of your users has access to those apps. If the user doesn't have access - no JWT will be generated and the authentication to that application will fail.
  • Delete a flow: Using the delete_flows function, you can delete one or more flows.
  • Free search and sorting in users: Two new parameters were added to the search_all users function: text will allow searching any text value in all user attributes; sort will allow sorting the returned values alphabetically by attribute name.
  • Get recent changes in Authz schema definition: We added the get_modified authz function, to be able to understand which new targets and resources were created or updated since a certain time.