pub(crate) struct LoginSuccessApiResponse {Show 17 fields
pub access_token: String,
pub expires_in: u64,
pub scope: String,
pub token_type: String,
pub refresh_token: Option<String>,
pub private_key: Option<String>,
pub account_keys: Option<PrivateKeysResponseModel>,
pub key: Option<String>,
pub two_factor_token: Option<String>,
pub kdf: Option<KdfType>,
pub kdf_iterations: Option<i32>,
pub kdf_memory: Option<i32>,
pub kdf_parallelism: Option<i32>,
pub force_password_reset: Option<bool>,
pub api_use_key_connector: Option<bool>,
pub user_decryption_options: Option<UserDecryptionOptionsApiResponse>,
pub master_password_policy: Option<MasterPasswordPolicyResponseModel>,
}Expand description
API response model for a successful login via the Identity API. OAuth 2.0 Successful Response RFC reference: https://datatracker.ietf.org/doc/html/rfc6749#section-5.1
Fields§
§access_token: StringThe access token string.
expires_in: u64The duration in seconds until the token expires.
scope: StringThe scope of the access token. OAuth 2.0 RFC reference: https://datatracker.ietf.org/doc/html/rfc6749#section-3.3
token_type: StringThe type of the token. This will be “Bearer” for send access tokens. OAuth 2.0 RFC reference: https://datatracker.ietf.org/doc/html/rfc6749#section-7.1
refresh_token: Option<String>The optional refresh token string. This token can be used to obtain new access tokens when the current one expires.
private_key: Option<String>The user key wrapped user private key
Deprecated in favor of the AccountKeys field but still present for backward
compatibility. and we can’t expose AccountKeys in our LoginSuccessResponse until we get
a PrivateKeysResponseModel SDK response model from KM with WASM / uniffi support.
TODO: PM-30222 - clean up the comment about not being able to expose AccountKeys once
we have a trait to convert PrivateKeysResponseModel to WrappedAccountCryptographicState
account_keys: Option<PrivateKeysResponseModel>The user’s asymmetric encryption keys and signature keys
key: Option<String>user_decryption_options.master_password_unlock insteadThe master key wrapped user key.
two_factor_token: Option<String>Two factor remember me token to be used for future requests to bypass 2FA prompts for a limited time.
kdf: Option<KdfType>user_decryption_options.master_password_unlock insteadMaster key derivation function type
kdf_iterations: Option<i32>user_decryption_options.master_password_unlock insteadMaster key derivation function iterations
kdf_memory: Option<i32>user_decryption_options.master_password_unlock insteadMaster key derivation function memory
kdf_parallelism: Option<i32>user_decryption_options.master_password_unlock insteadMaster key derivation function parallelism
force_password_reset: Option<bool>Indicates whether an admin has reset the user’s master password, requiring them to set a new password upon next login.
api_use_key_connector: Option<bool>Indicates whether the user uses Key Connector and if the client should have a locally configured Key Connector URL in their environment. Note: This is currently only applicable for client_credential grant type logins and is only expected to be relevant for the CLI
user_decryption_options: Option<UserDecryptionOptionsApiResponse>The user’s decryption options for their vault.
master_password_policy: Option<MasterPasswordPolicyResponseModel>If the user is subject to an organization master password policy, this field contains the requirements of that policy.
Trait Implementations§
Source§impl Debug for LoginSuccessApiResponse
impl Debug for LoginSuccessApiResponse
Source§impl<'de> Deserialize<'de> for LoginSuccessApiResponse
impl<'de> Deserialize<'de> for LoginSuccessApiResponse
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl PartialEq for LoginSuccessApiResponse
impl PartialEq for LoginSuccessApiResponse
Source§impl Serialize for LoginSuccessApiResponse
impl Serialize for LoginSuccessApiResponse
impl StructuralPartialEq for LoginSuccessApiResponse
Auto Trait Implementations§
impl Freeze for LoginSuccessApiResponse
impl RefUnwindSafe for LoginSuccessApiResponse
impl Send for LoginSuccessApiResponse
impl Sync for LoginSuccessApiResponse
impl Unpin for LoginSuccessApiResponse
impl UnwindSafe for LoginSuccessApiResponse
Blanket Implementations§
§impl<T> AnySync for T
impl<T> AnySync for T
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
§impl<T> CompatExt for T
impl<T> CompatExt for T
§impl<T, UT> HandleAlloc<UT> for T
impl<T, UT> HandleAlloc<UT> for T
§fn new_handle(value: Arc<T>) -> Handle
fn new_handle(value: Arc<T>) -> Handle
§unsafe fn clone_handle(handle: Handle) -> Handle
unsafe fn clone_handle(handle: Handle) -> Handle
§unsafe fn consume_handle(handle: Handle) -> Arc<T>
unsafe fn consume_handle(handle: Handle) -> Arc<T>
Arc<> Read more§impl<T> Instrument for T
impl<T> Instrument for T
§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read more