Skip to content

Latest commit

 

History

History
2513 lines (1767 loc) · 91 KB

AuthApi.md

File metadata and controls

2513 lines (1767 loc) · 91 KB

Swagger\Client\AuthApi

All URIs are relative to https://localhost:20000/api/3.1

Method HTTP request Description
acquireEmbedCookielessSession POST /embed/cookieless_session/acquire Create Acquire cookieless embed session
activateAppUser POST /oauth_client_apps/{client_guid}/users/{user_id} Activate OAuth App User
addSupportAccessAllowlistEntries POST /support_access/allowlist Add Support Access Allowlist Users
allOauthClientApps GET /oauth_client_apps Get All OAuth Client Apps
allUserLoginLockouts GET /user_login_lockouts Get All User Login Lockouts
createEmbedSecret POST /embed_config/secrets Create Embed Secret
createEmbedUrlAsMe POST /embed/token_url/me Create Embed URL
createOidcTestConfig POST /oidc_test_configs Create OIDC Test Configuration
createSamlTestConfig POST /saml_test_configs Create SAML Test Configuration
createSsoEmbedUrl POST /embed/sso_url Create SSO Embed Url
deactivateAppUser DELETE /oauth_client_apps/{client_guid}/users/{user_id} Deactivate OAuth App User
deleteEmbedCookielessSession DELETE /embed/cookieless_session/{session_reference_token} Delete cookieless embed session
deleteEmbedSecret DELETE /embed_config/secrets/{embed_secret_id} Delete Embed Secret
deleteOauthClientApp DELETE /oauth_client_apps/{client_guid} Delete OAuth Client App
deleteOidcTestConfig DELETE /oidc_test_configs/{test_slug} Delete OIDC Test Configuration
deleteSamlTestConfig DELETE /saml_test_configs/{test_slug} Delete SAML Test Configuration
deleteSupportAccessAllowlistEntry DELETE /support_access/allowlist/{entry_id} Delete Support Access Allowlist Entry
deleteUserLoginLockout DELETE /user_login_lockout/{key} Delete User Login Lockout
deregisterMobileDevice DELETE /mobile/device/{device_id} Deregister Mobile Device
disableSupportAccess PUT /support_access/disable Disable Support Access
enableSupportAccess PUT /support_access/enable Enable Support Access
fetchAndParseSamlIdpMetadata POST /fetch_and_parse_saml_idp_metadata Parse SAML IdP Url
forcePasswordResetAtNextLoginForAllUsers PUT /password_config/force_password_reset_at_next_login_for_all_users Force password reset
generateTokensForCookielessSession PUT /embed/cookieless_session/generate_tokens Generate tokens for cookieless embed session
getSupportAccessAllowlistEntries GET /support_access/allowlist Get Support Access Allowlist Users
invalidateTokens DELETE /oauth_client_apps/{client_guid}/tokens Invalidate Tokens
ldapConfig GET /ldap_config Get LDAP Configuration
oauthClientApp GET /oauth_client_apps/{client_guid} Get OAuth Client App
oidcConfig GET /oidc_config Get OIDC Configuration
oidcTestConfig GET /oidc_test_configs/{test_slug} Get OIDC Test Configuration
parseSamlIdpMetadata POST /parse_saml_idp_metadata Parse SAML IdP XML
passwordConfig GET /password_config Get Password Config
registerMobileDevice POST /mobile/device Register Mobile Device
registerOauthClientApp POST /oauth_client_apps/{client_guid} Register OAuth App
samlConfig GET /saml_config Get SAML Configuration
samlTestConfig GET /saml_test_configs/{test_slug} Get SAML Test Configuration
searchUserLoginLockouts GET /user_login_lockouts/search Search User Login Lockouts
sessionConfig GET /session_config Get Session Config
supportAccessStatus GET /support_access/status Support Access Status
testLdapConfigAuth PUT /ldap_config/test_auth Test LDAP Auth
testLdapConfigConnection PUT /ldap_config/test_connection Test LDAP Connection
testLdapConfigUserAuth PUT /ldap_config/test_user_auth Test LDAP User Auth
testLdapConfigUserInfo PUT /ldap_config/test_user_info Test LDAP User Info
updateLdapConfig PATCH /ldap_config Update LDAP Configuration
updateMobileDeviceRegistration PATCH /mobile/device/{device_id} Update Mobile Device Registration
updateOauthClientApp PATCH /oauth_client_apps/{client_guid} Update OAuth App
updateOidcConfig PATCH /oidc_config Update OIDC Configuration
updatePasswordConfig PATCH /password_config Update Password Config
updateSamlConfig PATCH /saml_config Update SAML Configuration
updateSessionConfig PATCH /session_config Update Session Config

acquireEmbedCookielessSession

\Swagger\Client\Model\EmbedCookielessSessionAcquireResponse acquireEmbedCookielessSession($body)

Create Acquire cookieless embed session

Acquire a cookieless embed session. The acquire session endpoint negates the need for signing the embed url and passing it as a parameter to the embed login. This endpoint accepts an embed user definition and creates it if it does not exist, otherwise it reuses it. Note that this endpoint will not update the user, user attributes or group attributes if the embed user already exists. This is the same behavior as the embed SSO login. The endpoint also accepts an optional session_reference_token. If present and the session has not expired and the credentials match the credentials for the embed session, a new authentication token will be generated. This allows the embed session to attach a new embedded IFRAME to the embed session. Note that the session will NOT be extended in this scenario, in other words the session_length parameter is ignored. If the session_reference_token has expired, it will be ignored and a new embed session will be created. If the credentials do not match the credentials associated with an exisiting session_reference_token, a 404 will be returned. The endpoint returns the following: - Authentication token - a token that is passed to /embed/login endpoint that creates or attaches to the embed session. This token can be used once and has a lifetime of 30 seconds. - Session reference token - a token that lives for the length of the session. This token is used to generate new api and navigation tokens OR create new embed IFRAMEs. - Api token - lives for 10 minutes. The Looker client will ask for this token once it is loaded into the iframe. - Navigation token - lives for 10 minutes. The Looker client will ask for this token once it is loaded into the iframe.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedCookielessSessionAcquire(); // \Swagger\Client\Model\EmbedCookielessSessionAcquire | Embed user details

try {
    $result = $apiInstance->acquireEmbedCookielessSession($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->acquireEmbedCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\EmbedCookielessSessionAcquire Embed user details

Return type

\Swagger\Client\Model\EmbedCookielessSessionAcquireResponse

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

activateAppUser

string activateAppUser($client_guid, $user_id, $fields)

Activate OAuth App User

Activate an app for a user Activates a user for a given oauth client app. This indicates the user has been informed that the app will have access to the user's looker data, and that the user has accepted and allowed the app to use their Looker account. Activating a user for an app that the user is already activated with returns a success response.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$user_id = "user_id_example"; // string | The id of the user to enable use of this app
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->activateAppUser($client_guid, $user_id, $fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->activateAppUser: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application
user_id string The id of the user to enable use of this app
fields string Requested fields. [optional]

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

addSupportAccessAllowlistEntries

\Swagger\Client\Model\SupportAccessAllowlistEntry[] addSupportAccessAllowlistEntries($body)

Add Support Access Allowlist Users

Add Support Access Allowlist Users Adds a list of emails to the Allowlist, using the provided reason

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SupportAccessAddEntries(); // \Swagger\Client\Model\SupportAccessAddEntries | Request params.

try {
    $result = $apiInstance->addSupportAccessAllowlistEntries($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->addSupportAccessAllowlistEntries: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\SupportAccessAddEntries Request params.

Return type

\Swagger\Client\Model\SupportAccessAllowlistEntry[]

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

allOauthClientApps

\Swagger\Client\Model\OauthClientApp[] allOauthClientApps($fields)

Get All OAuth Client Apps

List All OAuth Client Apps Lists all applications registered to use OAuth2 login with this Looker instance, including enabled and disabled apps. Results are filtered to include only the apps that the caller (current user) has permission to see.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->allOauthClientApps($fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->allOauthClientApps: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
fields string Requested fields. [optional]

Return type

\Swagger\Client\Model\OauthClientApp[]

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

allUserLoginLockouts

\Swagger\Client\Model\UserLoginLockout[] allUserLoginLockouts($fields)

Get All User Login Lockouts

Get currently locked-out users.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Include only these fields in the response

try {
    $result = $apiInstance->allUserLoginLockouts($fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->allUserLoginLockouts: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
fields string Include only these fields in the response [optional]

Return type

\Swagger\Client\Model\UserLoginLockout[]

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

createEmbedSecret

\Swagger\Client\Model\EmbedSecret createEmbedSecret($body)

Create Embed Secret

Create an embed secret using the specified information. The value of the secret field will be set by Looker and returned.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedSecret(); // \Swagger\Client\Model\EmbedSecret | embed secret

try {
    $result = $apiInstance->createEmbedSecret($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->createEmbedSecret: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\EmbedSecret embed secret [optional]

Return type

\Swagger\Client\Model\EmbedSecret

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

createEmbedUrlAsMe

\Swagger\Client\Model\EmbedUrlResponse createEmbedUrlAsMe($body)

Create Embed URL

Create an Embed URL Creates an embed URL that runs as the Looker user making this API call. ("Embed as me") This embed URL can then be used to instantiate a Looker embed session in a "Powered by Looker" (PBL) web application. This is similar to Private Embedding (https://cloud.google.com/looker/docs/r/admin/embed/private-embed). Instead of of logging into the Web UI to authenticate, the user has already authenticated against the API to be able to make this call. However, unlike Private Embed where the user has access to any other part of the Looker UI, the embed web session created by requesting the EmbedUrlResponse.url in a browser only has access to content visible under the /embed context. An embed URL can only be used once, and must be used within 5 minutes of being created. After it has been used to request a page from the Looker server, the URL is invalid. Future requests using the same URL will fail. This is to prevent 'replay attacks'. The target_url property must be a complete URL of a Looker Embedded UI page - scheme, hostname, path starting with "/embed" and query params. To load a dashboard with id 56 and with a filter of Date=1 years, the looker Embed URL would look like https://myname.looker.com/embed/dashboards/56?Date=1%20years. The best way to obtain this target_url is to navigate to the desired Looker page in your web browser, copy the URL shown in the browser address bar, insert "/embed" after the host/port, and paste it into the target_url property as a quoted string value in this API request. #### Security Note Protect this embed URL as you would an access token or password credentials - do not write it to disk, do not pass it to a third party, and only pass it through a secure HTTPS encrypted transport.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedParams(); // \Swagger\Client\Model\EmbedParams | Embed parameters

try {
    $result = $apiInstance->createEmbedUrlAsMe($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->createEmbedUrlAsMe: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\EmbedParams Embed parameters

Return type

\Swagger\Client\Model\EmbedUrlResponse

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

createOidcTestConfig

\Swagger\Client\Model\OIDCConfig createOidcTestConfig($body)

Create OIDC Test Configuration

Create a OIDC test configuration.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\OIDCConfig(); // \Swagger\Client\Model\OIDCConfig | OIDC test config

try {
    $result = $apiInstance->createOidcTestConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->createOidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\OIDCConfig OIDC test config

Return type

\Swagger\Client\Model\OIDCConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

createSamlTestConfig

\Swagger\Client\Model\SamlConfig createSamlTestConfig($body)

Create SAML Test Configuration

Create a SAML test configuration.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SamlConfig(); // \Swagger\Client\Model\SamlConfig | SAML test config

try {
    $result = $apiInstance->createSamlTestConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->createSamlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\SamlConfig SAML test config

Return type

\Swagger\Client\Model\SamlConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

createSsoEmbedUrl

\Swagger\Client\Model\EmbedUrlResponse createSsoEmbedUrl($body)

Create SSO Embed Url

Create SSO Embed URL Creates an SSO embed URL and cryptographically signs it with an embed secret. This signed URL can then be used to instantiate a Looker embed session in a PBL web application. Do not make any modifications to this URL - any change may invalidate the signature and cause the URL to fail to load a Looker embed session. A signed SSO embed URL can only be used once. After it has been used to request a page from the Looker server, the URL is invalid. Future requests using the same URL will fail. This is to prevent 'replay attacks'. The target_url property must be a complete URL of a Looker UI page - scheme, hostname, path and query params. To load a dashboard with id 56 and with a filter of Date=1 years, the looker URL would look like https:/myname.looker.com/dashboards/56?Date=1%20years. The best way to obtain this target_url is to navigate to the desired Looker page in your web browser, copy the URL shown in the browser address bar and paste it into the target_url property as a quoted string value in this API request. Permissions for the embed user are defined by the groups in which the embed user is a member (group_ids property) and the lists of models and permissions assigned to the embed user. At a minimum, you must provide values for either the group_ids property, or both the models and permissions properties. These properties are additive; an embed user can be a member of certain groups AND be granted access to models and permissions. The embed user's access is the union of permissions granted by the group_ids, models, and permissions properties. This function does not strictly require all group_ids, user attribute names, or model names to exist at the moment the SSO embed url is created. Unknown group_id, user attribute names or model names will be passed through to the output URL. To diagnose potential problems with an SSO embed URL, you can copy the signed URL into the Embed URI Validator text box in <your looker instance>/admin/embed. The secret_id parameter is optional. If specified, its value must be the id of an active secret defined in the Looker instance. if not specified, the URL will be signed using the newest active secret defined in the Looker instance. #### Security Note Protect this signed URL as you would an access token or password credentials - do not write it to disk, do not pass it to a third party, and only pass it through a secure HTTPS encrypted transport.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedSsoParams(); // \Swagger\Client\Model\EmbedSsoParams | SSO parameters

try {
    $result = $apiInstance->createSsoEmbedUrl($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->createSsoEmbedUrl: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\EmbedSsoParams SSO parameters

Return type

\Swagger\Client\Model\EmbedUrlResponse

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deactivateAppUser

string deactivateAppUser($client_guid, $user_id, $fields)

Deactivate OAuth App User

Deactivate an app for a user Deactivate a user for a given oauth client app. All tokens issued to the app for this user will be invalid immediately. Before the user can use the app with their Looker account, the user will have to read and accept an account use disclosure statement for the app. Admin users can deactivate other users, but non-admin users can only deactivate themselves. As with most REST DELETE operations, this endpoint does not return an error if the indicated resource (app or user) does not exist or has already been deactivated.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$user_id = "user_id_example"; // string | The id of the user to enable use of this app
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->deactivateAppUser($client_guid, $user_id, $fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deactivateAppUser: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application
user_id string The id of the user to enable use of this app
fields string Requested fields. [optional]

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteEmbedCookielessSession

string deleteEmbedCookielessSession($session_reference_token)

Delete cookieless embed session

Delete cookieless embed session This will delete the session associated with the given session reference token. Calling this endpoint will result in the session and session reference data being cleared from the system. This endpoint can be used to log an embed user out of the Looker instance.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$session_reference_token = "session_reference_token_example"; // string | Embed session reference token

try {
    $result = $apiInstance->deleteEmbedCookielessSession($session_reference_token);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteEmbedCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
session_reference_token string Embed session reference token

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteEmbedSecret

string deleteEmbedSecret($embed_secret_id)

Delete Embed Secret

Delete an embed secret.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$embed_secret_id = "embed_secret_id_example"; // string | Id of Embed Secret

try {
    $result = $apiInstance->deleteEmbedSecret($embed_secret_id);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteEmbedSecret: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
embed_secret_id string Id of Embed Secret

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteOauthClientApp

string deleteOauthClientApp($client_guid)

Delete OAuth Client App

Delete OAuth Client App Deletes the registration info of the app with the matching client_guid. All active sessions and tokens issued for this app will immediately become invalid. As with most REST DELETE operations, this endpoint does not return an error if the indicated resource does not exist. ### Note: this deletion cannot be undone.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application

try {
    $result = $apiInstance->deleteOauthClientApp($client_guid);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteOidcTestConfig

string deleteOidcTestConfig($test_slug)

Delete OIDC Test Configuration

Delete a OIDC test configuration.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config

try {
    $result = $apiInstance->deleteOidcTestConfig($test_slug);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteOidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
test_slug string Slug of test config

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteSamlTestConfig

string deleteSamlTestConfig($test_slug)

Delete SAML Test Configuration

Delete a SAML test configuration.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config

try {
    $result = $apiInstance->deleteSamlTestConfig($test_slug);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteSamlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
test_slug string Slug of test config

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteSupportAccessAllowlistEntry

string deleteSupportAccessAllowlistEntry($entry_id)

Delete Support Access Allowlist Entry

Delete Support Access Allowlist User Deletes the specified Allowlist Entry Id

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$entry_id = "entry_id_example"; // string | Id of Allowlist Entry

try {
    $result = $apiInstance->deleteSupportAccessAllowlistEntry($entry_id);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteSupportAccessAllowlistEntry: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
entry_id string Id of Allowlist Entry

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deleteUserLoginLockout

string deleteUserLoginLockout($key)

Delete User Login Lockout

Removes login lockout for the associated user.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$key = "key_example"; // string | The key associated with the locked user

try {
    $result = $apiInstance->deleteUserLoginLockout($key);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deleteUserLoginLockout: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
key string The key associated with the locked user

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

deregisterMobileDevice

deregisterMobileDevice($device_id)

Deregister Mobile Device

Deregister a mobile device.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$device_id = "device_id_example"; // string | Unique id of the device.

try {
    $apiInstance->deregisterMobileDevice($device_id);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->deregisterMobileDevice: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
device_id string Unique id of the device.

Return type

void (empty response body)

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

disableSupportAccess

\Swagger\Client\Model\SupportAccessStatus disableSupportAccess()

Disable Support Access

Disable Support Access Disables Support Access immediately

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->disableSupportAccess();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->disableSupportAccess: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\SupportAccessStatus

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

enableSupportAccess

\Swagger\Client\Model\SupportAccessStatus enableSupportAccess($body)

Enable Support Access

Enable Support Access Enables Support Access for the provided duration

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SupportAccessEnable(); // \Swagger\Client\Model\SupportAccessEnable | Enable Support Access request params.

try {
    $result = $apiInstance->enableSupportAccess($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->enableSupportAccess: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\SupportAccessEnable Enable Support Access request params.

Return type

\Swagger\Client\Model\SupportAccessStatus

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

fetchAndParseSamlIdpMetadata

\Swagger\Client\Model\SamlMetadataParseResult fetchAndParseSamlIdpMetadata($body)

Parse SAML IdP Url

Fetch the given url and parse it as a SAML IdP metadata document and return the result. Note that this requires that the url be public or at least at a location where the Looker instance can fetch it without requiring any special authentication.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = "body_example"; // string | SAML IdP metadata public url

try {
    $result = $apiInstance->fetchAndParseSamlIdpMetadata($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->fetchAndParseSamlIdpMetadata: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body string SAML IdP metadata public url

Return type

\Swagger\Client\Model\SamlMetadataParseResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: text/plain
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

forcePasswordResetAtNextLoginForAllUsers

string forcePasswordResetAtNextLoginForAllUsers()

Force password reset

Force all credentials_email users to reset their login passwords upon their next login.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->forcePasswordResetAtNextLoginForAllUsers();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->forcePasswordResetAtNextLoginForAllUsers: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

generateTokensForCookielessSession

\Swagger\Client\Model\EmbedCookielessSessionGenerateTokensResponse generateTokensForCookielessSession($body)

Generate tokens for cookieless embed session

Generate api and navigation tokens for a cookieless embed session The generate tokens endpoint is used to create new tokens of type: - Api token. - Navigation token. The generate tokens endpoint should be called every time the Looker client asks for a token (except for the first time when the tokens returned by the acquire_session endpoint should be used).

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens(); // \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens | Embed session reference token

try {
    $result = $apiInstance->generateTokensForCookielessSession($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->generateTokensForCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens Embed session reference token

Return type

\Swagger\Client\Model\EmbedCookielessSessionGenerateTokensResponse

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

getSupportAccessAllowlistEntries

\Swagger\Client\Model\SupportAccessAllowlistEntry[] getSupportAccessAllowlistEntries($fields)

Get Support Access Allowlist Users

Get Support Access Allowlist Users Returns the users that have been added to the Support Access Allowlist

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->getSupportAccessAllowlistEntries($fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->getSupportAccessAllowlistEntries: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
fields string Requested fields. [optional]

Return type

\Swagger\Client\Model\SupportAccessAllowlistEntry[]

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

invalidateTokens

string invalidateTokens($client_guid)

Invalidate Tokens

Invalidate All Issued Tokens Immediately invalidates all auth codes, sessions, access tokens and refresh tokens issued for this app for ALL USERS of this app.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of the application

try {
    $result = $apiInstance->invalidateTokens($client_guid);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->invalidateTokens: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of the application

Return type

string

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

ldapConfig

\Swagger\Client\Model\LDAPConfig ldapConfig()

Get LDAP Configuration

Get the LDAP configuration. Looker can be optionally configured to authenticate users against an Active Directory or other LDAP directory server. LDAP setup requires coordination with an administrator of that directory server. Only Looker administrators can read and update the LDAP configuration. Configuring LDAP impacts authentication for all users. This configuration should be done carefully. Looker maintains a single LDAP configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). LDAP is enabled or disabled for Looker using the enabled field. Looker will never return an auth_password field. That value can be set, but never retrieved. See the Looker LDAP docs for additional information.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->ldapConfig();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->ldapConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\LDAPConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

oauthClientApp

\Swagger\Client\Model\OauthClientApp oauthClientApp($client_guid, $fields)

Get OAuth Client App

Get Oauth Client App Returns the registered app client with matching client_guid.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->oauthClientApp($client_guid, $fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->oauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application
fields string Requested fields. [optional]

Return type

\Swagger\Client\Model\OauthClientApp

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

oidcConfig

\Swagger\Client\Model\OIDCConfig oidcConfig()

Get OIDC Configuration

Get the OIDC configuration. Looker can be optionally configured to authenticate users against an OpenID Connect (OIDC) authentication server. OIDC setup requires coordination with an administrator of that server. Only Looker administrators can read and update the OIDC configuration. Configuring OIDC impacts authentication for all users. This configuration should be done carefully. Looker maintains a single OIDC configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). OIDC is enabled or disabled for Looker using the enabled field.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->oidcConfig();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->oidcConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\OIDCConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

oidcTestConfig

\Swagger\Client\Model\OIDCConfig oidcTestConfig($test_slug)

Get OIDC Test Configuration

Get a OIDC test configuration by test_slug.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config

try {
    $result = $apiInstance->oidcTestConfig($test_slug);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->oidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
test_slug string Slug of test config

Return type

\Swagger\Client\Model\OIDCConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

parseSamlIdpMetadata

\Swagger\Client\Model\SamlMetadataParseResult parseSamlIdpMetadata($body)

Parse SAML IdP XML

Parse the given xml as a SAML IdP metadata document and return the result.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = "body_example"; // string | SAML IdP metadata xml

try {
    $result = $apiInstance->parseSamlIdpMetadata($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->parseSamlIdpMetadata: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body string SAML IdP metadata xml

Return type

\Swagger\Client\Model\SamlMetadataParseResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: text/plain
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

passwordConfig

\Swagger\Client\Model\PasswordConfig passwordConfig()

Get Password Config

Get password config.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->passwordConfig();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->passwordConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\PasswordConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

registerMobileDevice

\Swagger\Client\Model\MobileToken registerMobileDevice($body)

Register Mobile Device

Registers a mobile device. # Required fields: [:device_token, :device_type]

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\MobileToken(); // \Swagger\Client\Model\MobileToken | Writable device parameters.

try {
    $result = $apiInstance->registerMobileDevice($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->registerMobileDevice: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\MobileToken Writable device parameters.

Return type

\Swagger\Client\Model\MobileToken

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

registerOauthClientApp

\Swagger\Client\Model\OauthClientApp registerOauthClientApp($client_guid, $body, $fields)

Register OAuth App

Register an OAuth2 Client App Registers details identifying an external web app or native app as an OAuth2 login client of the Looker instance. The app registration must provide a unique client_guid and redirect_uri that the app will present in OAuth login requests. If the client_guid and redirect_uri parameters in the login request do not match the app details registered with the Looker instance, the request is assumed to be a forgery and is rejected.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$body = new \Swagger\Client\Model\OauthClientApp(); // \Swagger\Client\Model\OauthClientApp | OAuth Client App
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->registerOauthClientApp($client_guid, $body, $fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->registerOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application
body \Swagger\Client\Model\OauthClientApp OAuth Client App
fields string Requested fields. [optional]

Return type

\Swagger\Client\Model\OauthClientApp

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

samlConfig

\Swagger\Client\Model\SamlConfig samlConfig()

Get SAML Configuration

Get the SAML configuration. Looker can be optionally configured to authenticate users against a SAML authentication server. SAML setup requires coordination with an administrator of that server. Only Looker administrators can read and update the SAML configuration. Configuring SAML impacts authentication for all users. This configuration should be done carefully. Looker maintains a single SAML configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). SAML is enabled or disabled for Looker using the enabled field.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->samlConfig();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->samlConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\SamlConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

samlTestConfig

\Swagger\Client\Model\SamlConfig samlTestConfig($test_slug)

Get SAML Test Configuration

Get a SAML test configuration by test_slug.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config

try {
    $result = $apiInstance->samlTestConfig($test_slug);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->samlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
test_slug string Slug of test config

Return type

\Swagger\Client\Model\SamlConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

searchUserLoginLockouts

\Swagger\Client\Model\UserLoginLockout[] searchUserLoginLockouts($fields, $page, $per_page, $limit, $offset, $sorts, $auth_type, $full_name, $email, $remote_id, $filter_or)

Search User Login Lockouts

Search currently locked-out users.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Include only these fields in the response
$page = 789; // int | DEPRECATED. Use limit and offset instead. Return only page N of paginated results
$per_page = 789; // int | DEPRECATED. Use limit and offset instead. Return N rows of data per page
$limit = 789; // int | Number of results to return. (used with offset and takes priority over page and per_page)
$offset = 789; // int | Number of results to skip before returning any. (used with limit and takes priority over page and per_page)
$sorts = "sorts_example"; // string | Fields to sort by.
$auth_type = "auth_type_example"; // string | Auth type user is locked out for (email, ldap, totp, api)
$full_name = "full_name_example"; // string | Match name
$email = "email_example"; // string | Match email
$remote_id = "remote_id_example"; // string | Match remote LDAP ID
$filter_or = true; // bool | Combine given search criteria in a boolean OR expression

try {
    $result = $apiInstance->searchUserLoginLockouts($fields, $page, $per_page, $limit, $offset, $sorts, $auth_type, $full_name, $email, $remote_id, $filter_or);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->searchUserLoginLockouts: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
fields string Include only these fields in the response [optional]
page int DEPRECATED. Use limit and offset instead. Return only page N of paginated results [optional]
per_page int DEPRECATED. Use limit and offset instead. Return N rows of data per page [optional]
limit int Number of results to return. (used with offset and takes priority over page and per_page) [optional]
offset int Number of results to skip before returning any. (used with limit and takes priority over page and per_page) [optional]
sorts string Fields to sort by. [optional]
auth_type string Auth type user is locked out for (email, ldap, totp, api) [optional]
full_name string Match name [optional]
email string Match email [optional]
remote_id string Match remote LDAP ID [optional]
filter_or bool Combine given search criteria in a boolean OR expression [optional]

Return type

\Swagger\Client\Model\UserLoginLockout[]

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

sessionConfig

\Swagger\Client\Model\SessionConfig sessionConfig()

Get Session Config

Get session config.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->sessionConfig();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->sessionConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\SessionConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

supportAccessStatus

\Swagger\Client\Model\SupportAccessStatus supportAccessStatus()

Support Access Status

Support Access Status Returns the current Support Access Status

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);

try {
    $result = $apiInstance->supportAccessStatus();
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->supportAccessStatus: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

This endpoint does not need any parameter.

Return type

\Swagger\Client\Model\SupportAccessStatus

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

testLdapConfigAuth

\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigAuth($body)

Test LDAP Auth

Test the connection authentication settings for an LDAP configuration. This tests that the connection is possible and that a 'server' account to be used by Looker can authenticate to the LDAP server given connection and authentication information. connection_host, connection_port, and auth_username, are required. connection_tls and auth_password are optional. Example: json { \"connection_host\": \"ldap.example.com\", \"connection_port\": \"636\", \"connection_tls\": true, \"auth_username\": \"cn=looker,dc=example,dc=com\", \"auth_password\": \"secret\" } Looker will never return an auth_password. If this request omits the auth_password field, then the auth_password value from the active config (if present) will be used for the test. The active LDAP settings are not modified.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config

try {
    $result = $apiInstance->testLdapConfigAuth($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->testLdapConfigAuth: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\LDAPConfig LDAP Config

Return type

\Swagger\Client\Model\LDAPConfigTestResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

testLdapConfigConnection

\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigConnection($body)

Test LDAP Connection

Test the connection settings for an LDAP configuration. This tests that the connection is possible given a connection_host and connection_port. connection_host and connection_port are required. connection_tls is optional. Example: json { \"connection_host\": \"ldap.example.com\", \"connection_port\": \"636\", \"connection_tls\": true } No authentication to the LDAP server is attempted. The active LDAP settings are not modified.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config

try {
    $result = $apiInstance->testLdapConfigConnection($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->testLdapConfigConnection: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\LDAPConfig LDAP Config

Return type

\Swagger\Client\Model\LDAPConfigTestResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

testLdapConfigUserAuth

\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigUserAuth($body)

Test LDAP User Auth

Test the user authentication settings for an LDAP configuration. This test accepts a full LDAP configuration along with a username/password pair and attempts to authenticate the user with the LDAP server. The configuration is validated before attempting the authentication. Looker will never return an auth_password. If this request omits the auth_password field, then the auth_password value from the active config (if present) will be used for the test. test_ldap_user and test_ldap_password are required. The active LDAP settings are not modified.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config

try {
    $result = $apiInstance->testLdapConfigUserAuth($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->testLdapConfigUserAuth: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\LDAPConfig LDAP Config

Return type

\Swagger\Client\Model\LDAPConfigTestResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

testLdapConfigUserInfo

\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigUserInfo($body)

Test LDAP User Info

Test the user authentication settings for an LDAP configuration without authenticating the user. This test will let you easily test the mapping for user properties and roles for any user without needing to authenticate as that user. This test accepts a full LDAP configuration along with a username and attempts to find the full info for the user from the LDAP server without actually authenticating the user. So, user password is not required.The configuration is validated before attempting to contact the server. test_ldap_user is required. The active LDAP settings are not modified.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config

try {
    $result = $apiInstance->testLdapConfigUserInfo($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->testLdapConfigUserInfo: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\LDAPConfig LDAP Config

Return type

\Swagger\Client\Model\LDAPConfigTestResult

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateLdapConfig

\Swagger\Client\Model\LDAPConfig updateLdapConfig($body)

Update LDAP Configuration

Update the LDAP configuration. Configuring LDAP impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the LDAP configuration. LDAP is enabled or disabled for Looker using the enabled field. It is highly recommended that any LDAP setting changes be tested using the APIs below before being set globally. See the Looker LDAP docs for additional information.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config

try {
    $result = $apiInstance->updateLdapConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateLdapConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\LDAPConfig LDAP Config

Return type

\Swagger\Client\Model\LDAPConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateMobileDeviceRegistration

\Swagger\Client\Model\MobileToken updateMobileDeviceRegistration($device_id)

Update Mobile Device Registration

Updates the mobile device registration

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$device_id = "device_id_example"; // string | Unique id of the device.

try {
    $result = $apiInstance->updateMobileDeviceRegistration($device_id);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateMobileDeviceRegistration: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
device_id string Unique id of the device.

Return type

\Swagger\Client\Model\MobileToken

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateOauthClientApp

\Swagger\Client\Model\OauthClientApp updateOauthClientApp($client_guid, $body, $fields)

Update OAuth App

Update OAuth2 Client App Details Modifies the details a previously registered OAuth2 login client app.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$body = new \Swagger\Client\Model\OauthClientApp(); // \Swagger\Client\Model\OauthClientApp | OAuth Client App
$fields = "fields_example"; // string | Requested fields.

try {
    $result = $apiInstance->updateOauthClientApp($client_guid, $body, $fields);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
client_guid string The unique id of this application
body \Swagger\Client\Model\OauthClientApp OAuth Client App
fields string Requested fields. [optional]

Return type

\Swagger\Client\Model\OauthClientApp

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateOidcConfig

\Swagger\Client\Model\OIDCConfig updateOidcConfig($body)

Update OIDC Configuration

Update the OIDC configuration. Configuring OIDC impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the OIDC configuration. OIDC is enabled or disabled for Looker using the enabled field. It is highly recommended that any OIDC setting changes be tested using the APIs below before being set globally.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\OIDCConfig(); // \Swagger\Client\Model\OIDCConfig | OIDC Config

try {
    $result = $apiInstance->updateOidcConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateOidcConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\OIDCConfig OIDC Config

Return type

\Swagger\Client\Model\OIDCConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updatePasswordConfig

\Swagger\Client\Model\PasswordConfig updatePasswordConfig($body)

Update Password Config

Update password config.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\PasswordConfig(); // \Swagger\Client\Model\PasswordConfig | Password Config

try {
    $result = $apiInstance->updatePasswordConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updatePasswordConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\PasswordConfig Password Config

Return type

\Swagger\Client\Model\PasswordConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateSamlConfig

\Swagger\Client\Model\SamlConfig updateSamlConfig($body)

Update SAML Configuration

Update the SAML configuration. Configuring SAML impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the SAML configuration. SAML is enabled or disabled for Looker using the enabled field. It is highly recommended that any SAML setting changes be tested using the APIs below before being set globally.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SamlConfig(); // \Swagger\Client\Model\SamlConfig | SAML Config

try {
    $result = $apiInstance->updateSamlConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateSamlConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\SamlConfig SAML Config

Return type

\Swagger\Client\Model\SamlConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]

updateSessionConfig

\Swagger\Client\Model\SessionConfig updateSessionConfig($body)

Update Session Config

Update session config.

Example

<?php
require_once(__DIR__ . '/vendor/autoload.php');

$apiInstance = new Swagger\Client\Api\AuthApi(
    // If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
    // This is optional, `GuzzleHttp\Client` will be used as default.
    new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SessionConfig(); // \Swagger\Client\Model\SessionConfig | Session Config

try {
    $result = $apiInstance->updateSessionConfig($body);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling AuthApi->updateSessionConfig: ', $e->getMessage(), PHP_EOL;
}
?>

Parameters

Name Type Description Notes
body \Swagger\Client\Model\SessionConfig Session Config

Return type

\Swagger\Client\Model\SessionConfig

Authorization

No authorization required

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

[Back to top] [Back to API list] [Back to Model list] [Back to README]