Releases: descope/python-sdk
Releases · descope/python-sdk
1.7.7
This release introduces support for Python 3.13, embedded link signup, default role assignment, and enhancements to user and tenant search functionality.
🚀 New Features & Enhancements
- Embedded Link Signup – Added support for user signup via embedded links (#585)
- Default Role on Sign-Up – Allow setting a default role when creating new users (#588)
- Python 3.13 Support – Added compatibility with Python 3.13 (#599)
- Tenant Role Search Enhancements – Added
tenant_role_ids
andtenant_role_names
parameters to user search results (#612)
🛠 Fixes & Maintenance
- Test User Support – Added support for managing test users through the User Management functions (#609)
🔗 Full Changelog: Compare 1.7.6...1.7.7
1.7.6
1.7.5
This release includes improvements to user invitation status, SSO enforcement settings, tenant management, FGA resource handling, and more.
🚀 New Features & Enhancements
- Expand Role Search Options – Add the ability to include project roles in role search (#550)
- Invite Users with Specific Status – Support inviting users with a predefined user status (#556)
- Custom Refresh Token Duration – Allow setting a custom refresh token duration during authentication (#559)
- Tenant API Enhancements – Introduced the ability to Enforce SSO or Disable a tenant using the
enforce_sso
anddisabled
fields in the tenant management API (#538) - Save/Load FGA Resource Details – Added management APIs to persist FGA resource configurations (#562)
- Stop Impersonation API – Introduced an endpoint to explicitly stop an active impersonation session (#565)
- Add Template ID and Provider ID to Update User – Extended the update user request to support specifying a template and provider ID (#549)
🔗 Full Changelog: Compare 1.7.4...1.7.5
1.7.4
This release includes enhancements to SSO role management, user management APIs, anonymous user support, and more.
🚀 New Features & Enhancements
- Update JWT Refresh Duration Default Param – Set default parameter handling for JWT refresh duration (#492)
- Anonymous Users Support – Added support for creating and managing anonymous users (#494)
- Search Users by User IDs – Added capability to search for users using user IDs (#498)
- Return User Response in Update/Patch User – The
update_user
andpatch_user
methods now return the updated user object (#500) - Default SSO Roles Support – Added support for configuring default roles for SSO users (#539)
🔗 Full Changelog: Compare 1.7.3...1.7.4
1.7.3
Enhancements
- Multi-SSO support in tenants: In order to support multi-SSO tenants, and extra configuration of the
sso_id
parameter has been added to the SSOstart
function. - Configurable expiration time of JWT: We added support to configure the JWT's expiration time, using the
update_jwt
function. - Search users by dates: An option to filter user searches based on their creation time or modified time, using the
search_all
function. - TOTP seed deletion via management SDK: The function
remove_totp_seed
supports removing a TOTP seed for a specific user, based on their login ID. - README enhancements: Tiny adjustments to our README, to provide better examples.
Bug fixes
- Fixed API rate limiting message parsing: We made sure Descope's service rate limiting messages are delivered and parsed properly.
1.7.2
1.7.1
Enhancements
- FGA 2.0 support: Now that we've revamped our FGA support, we also updated our SDK functions. Under
mgmt.fga
we now support 4 more functions:save_schema
- Creates a new schema for the project.create_relations
- Creates new relations for the project.delete_relations
- Deletes relations for the project.check
- Checks if the given relations are satisfied.
- Template ID configuration for invitations: Continuing the effort from our previous release, we've added the option to configure the
template_id
parameter when sending invitations to users.
1.7.0
Breaking changes
- Support dropped for python 3.7: Python 3.7 has been deprecated for over a year now, and after thorough checks and validations we came to the conclusions that our customers don't use it either - so we decided to drop the support for it.
If you are using this version, it is highly advised to upgrade to a later version.
Enhancements
- Revoke other user sessions: We added a new configuration in
LoginOptions
calledrevoke_other_sessions
. This new configuration will expire all JWTs created other than the one in the request. This is useful for signing the user out of all their sessions, except for the current one. - Test user searching: We added a new function named
search_all_test_users
, to filter over test users. Learn more from our SDK's README. - Template ID configuration: We added a new parameter named
template_id
to all 'sign up' / 'sign in' / 'sign up or in' functions, to allow controlling which custom email/sms template should be used by the function. This will override the default configuration set in the project's 'Authentication Methods' page. - Enhanced functionality for adding user roles: With this new version of the
add_role
function, you can add a role to an existing user not just on the project level, but also on the tenant level. If the tenant isn't already associated with the user, it will happen as part of this command.
Full Changelog: 1.6.10...1.7.0
1.6.10
Enhancements
- Audience claim configuration in verification process: We now allow passing the audience claim explicitly when verifying the session token. The new
audience
parameter in theexchange_token
function can receive any string value, or stay empty by default.
1.6.9
Breaking changes
- Scalable user searching: We’ve made some improvements to enhance the scalability of our system to better support increased usage. These changes allow us to handle increased demand more efficiently, ensuring a smoother experience for all our customers.
As part of this update, there may be a delay (up to 100ms) in accessing newly written or updated user data from the search user endpoints. If you have any questions, feel free to reach out!
Enhancements
- User tenant API: We added an option to fetch a specific user's tenant(s) information from an active session. Using the new
my_tenants
function, you can query a current user's sessions' tenants details. See the example in the SDK's README. - Tenant created time: We added the tenant's creation time when loading the tenant (both in
load
andload_all
functions).