All URIs are relative to https://localhost:20000/api/3.1
Method | HTTP request | Description |
---|---|---|
acquireEmbedCookielessSession | POST /embed/cookieless_session/acquire | Create Acquire cookieless embed session |
activateAppUser | POST /oauth_client_apps/{client_guid}/users/{user_id} | Activate OAuth App User |
addSupportAccessAllowlistEntries | POST /support_access/allowlist | Add Support Access Allowlist Users |
allOauthClientApps | GET /oauth_client_apps | Get All OAuth Client Apps |
allUserLoginLockouts | GET /user_login_lockouts | Get All User Login Lockouts |
createEmbedSecret | POST /embed_config/secrets | Create Embed Secret |
createEmbedUrlAsMe | POST /embed/token_url/me | Create Embed URL |
createOidcTestConfig | POST /oidc_test_configs | Create OIDC Test Configuration |
createSamlTestConfig | POST /saml_test_configs | Create SAML Test Configuration |
createSsoEmbedUrl | POST /embed/sso_url | Create SSO Embed Url |
deactivateAppUser | DELETE /oauth_client_apps/{client_guid}/users/{user_id} | Deactivate OAuth App User |
deleteEmbedCookielessSession | DELETE /embed/cookieless_session/{session_reference_token} | Delete cookieless embed session |
deleteEmbedSecret | DELETE /embed_config/secrets/{embed_secret_id} | Delete Embed Secret |
deleteOauthClientApp | DELETE /oauth_client_apps/{client_guid} | Delete OAuth Client App |
deleteOidcTestConfig | DELETE /oidc_test_configs/{test_slug} | Delete OIDC Test Configuration |
deleteSamlTestConfig | DELETE /saml_test_configs/{test_slug} | Delete SAML Test Configuration |
deleteSupportAccessAllowlistEntry | DELETE /support_access/allowlist/{entry_id} | Delete Support Access Allowlist Entry |
deleteUserLoginLockout | DELETE /user_login_lockout/{key} | Delete User Login Lockout |
deregisterMobileDevice | DELETE /mobile/device/{device_id} | Deregister Mobile Device |
disableSupportAccess | PUT /support_access/disable | Disable Support Access |
enableSupportAccess | PUT /support_access/enable | Enable Support Access |
fetchAndParseSamlIdpMetadata | POST /fetch_and_parse_saml_idp_metadata | Parse SAML IdP Url |
forcePasswordResetAtNextLoginForAllUsers | PUT /password_config/force_password_reset_at_next_login_for_all_users | Force password reset |
generateTokensForCookielessSession | PUT /embed/cookieless_session/generate_tokens | Generate tokens for cookieless embed session |
getSupportAccessAllowlistEntries | GET /support_access/allowlist | Get Support Access Allowlist Users |
invalidateTokens | DELETE /oauth_client_apps/{client_guid}/tokens | Invalidate Tokens |
ldapConfig | GET /ldap_config | Get LDAP Configuration |
oauthClientApp | GET /oauth_client_apps/{client_guid} | Get OAuth Client App |
oidcConfig | GET /oidc_config | Get OIDC Configuration |
oidcTestConfig | GET /oidc_test_configs/{test_slug} | Get OIDC Test Configuration |
parseSamlIdpMetadata | POST /parse_saml_idp_metadata | Parse SAML IdP XML |
passwordConfig | GET /password_config | Get Password Config |
registerMobileDevice | POST /mobile/device | Register Mobile Device |
registerOauthClientApp | POST /oauth_client_apps/{client_guid} | Register OAuth App |
samlConfig | GET /saml_config | Get SAML Configuration |
samlTestConfig | GET /saml_test_configs/{test_slug} | Get SAML Test Configuration |
searchUserLoginLockouts | GET /user_login_lockouts/search | Search User Login Lockouts |
sessionConfig | GET /session_config | Get Session Config |
supportAccessStatus | GET /support_access/status | Support Access Status |
testLdapConfigAuth | PUT /ldap_config/test_auth | Test LDAP Auth |
testLdapConfigConnection | PUT /ldap_config/test_connection | Test LDAP Connection |
testLdapConfigUserAuth | PUT /ldap_config/test_user_auth | Test LDAP User Auth |
testLdapConfigUserInfo | PUT /ldap_config/test_user_info | Test LDAP User Info |
updateLdapConfig | PATCH /ldap_config | Update LDAP Configuration |
updateMobileDeviceRegistration | PATCH /mobile/device/{device_id} | Update Mobile Device Registration |
updateOauthClientApp | PATCH /oauth_client_apps/{client_guid} | Update OAuth App |
updateOidcConfig | PATCH /oidc_config | Update OIDC Configuration |
updatePasswordConfig | PATCH /password_config | Update Password Config |
updateSamlConfig | PATCH /saml_config | Update SAML Configuration |
updateSessionConfig | PATCH /session_config | Update Session Config |
\Swagger\Client\Model\EmbedCookielessSessionAcquireResponse acquireEmbedCookielessSession($body)
Create Acquire cookieless embed session
Acquire a cookieless embed session. The acquire session endpoint negates the need for signing the embed url and passing it as a parameter to the embed login. This endpoint accepts an embed user definition and creates it if it does not exist, otherwise it reuses it. Note that this endpoint will not update the user, user attributes or group attributes if the embed user already exists. This is the same behavior as the embed SSO login. The endpoint also accepts an optional session_reference_token
. If present and the session has not expired and the credentials match the credentials for the embed session, a new authentication token will be generated. This allows the embed session to attach a new embedded IFRAME to the embed session. Note that the session will NOT be extended in this scenario, in other words the session_length parameter is ignored. If the session_reference_token has expired, it will be ignored and a new embed session will be created. If the credentials do not match the credentials associated with an exisiting session_reference_token, a 404 will be returned. The endpoint returns the following: - Authentication token - a token that is passed to /embed/login
endpoint that creates or attaches to the embed session. This token can be used once and has a lifetime of 30 seconds. - Session reference token - a token that lives for the length of the session. This token is used to generate new api and navigation tokens OR create new embed IFRAMEs. - Api token - lives for 10 minutes. The Looker client will ask for this token once it is loaded into the iframe. - Navigation token - lives for 10 minutes. The Looker client will ask for this token once it is loaded into the iframe.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedCookielessSessionAcquire(); // \Swagger\Client\Model\EmbedCookielessSessionAcquire | Embed user details
try {
$result = $apiInstance->acquireEmbedCookielessSession($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->acquireEmbedCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\EmbedCookielessSessionAcquire | Embed user details |
\Swagger\Client\Model\EmbedCookielessSessionAcquireResponse
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string activateAppUser($client_guid, $user_id, $fields)
Activate OAuth App User
Activate an app for a user Activates a user for a given oauth client app. This indicates the user has been informed that the app will have access to the user's looker data, and that the user has accepted and allowed the app to use their Looker account. Activating a user for an app that the user is already activated with returns a success response.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$user_id = "user_id_example"; // string | The id of the user to enable use of this app
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->activateAppUser($client_guid, $user_id, $fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->activateAppUser: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application | |
user_id | string | The id of the user to enable use of this app | |
fields | string | Requested fields. | [optional] |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SupportAccessAllowlistEntry[] addSupportAccessAllowlistEntries($body)
Add Support Access Allowlist Users
Add Support Access Allowlist Users Adds a list of emails to the Allowlist, using the provided reason
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SupportAccessAddEntries(); // \Swagger\Client\Model\SupportAccessAddEntries | Request params.
try {
$result = $apiInstance->addSupportAccessAllowlistEntries($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->addSupportAccessAllowlistEntries: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\SupportAccessAddEntries | Request params. |
\Swagger\Client\Model\SupportAccessAllowlistEntry[]
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OauthClientApp[] allOauthClientApps($fields)
Get All OAuth Client Apps
List All OAuth Client Apps Lists all applications registered to use OAuth2 login with this Looker instance, including enabled and disabled apps. Results are filtered to include only the apps that the caller (current user) has permission to see.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->allOauthClientApps($fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->allOauthClientApps: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
fields | string | Requested fields. | [optional] |
\Swagger\Client\Model\OauthClientApp[]
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\UserLoginLockout[] allUserLoginLockouts($fields)
Get All User Login Lockouts
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Include only these fields in the response
try {
$result = $apiInstance->allUserLoginLockouts($fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->allUserLoginLockouts: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
fields | string | Include only these fields in the response | [optional] |
\Swagger\Client\Model\UserLoginLockout[]
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\EmbedSecret createEmbedSecret($body)
Create Embed Secret
Create an embed secret using the specified information. The value of the secret
field will be set by Looker and returned.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedSecret(); // \Swagger\Client\Model\EmbedSecret | embed secret
try {
$result = $apiInstance->createEmbedSecret($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->createEmbedSecret: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\EmbedSecret | embed secret | [optional] |
\Swagger\Client\Model\EmbedSecret
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\EmbedUrlResponse createEmbedUrlAsMe($body)
Create Embed URL
Create an Embed URL Creates an embed URL that runs as the Looker user making this API call. ("Embed as me") This embed URL can then be used to instantiate a Looker embed session in a "Powered by Looker" (PBL) web application. This is similar to Private Embedding (https://cloud.google.com/looker/docs/r/admin/embed/private-embed). Instead of of logging into the Web UI to authenticate, the user has already authenticated against the API to be able to make this call. However, unlike Private Embed where the user has access to any other part of the Looker UI, the embed web session created by requesting the EmbedUrlResponse.url in a browser only has access to content visible under the /embed
context. An embed URL can only be used once, and must be used within 5 minutes of being created. After it has been used to request a page from the Looker server, the URL is invalid. Future requests using the same URL will fail. This is to prevent 'replay attacks'. The target_url
property must be a complete URL of a Looker Embedded UI page - scheme, hostname, path starting with "/embed" and query params. To load a dashboard with id 56 and with a filter of Date=1 years
, the looker Embed URL would look like https://myname.looker.com/embed/dashboards/56?Date=1%20years
. The best way to obtain this target_url is to navigate to the desired Looker page in your web browser, copy the URL shown in the browser address bar, insert "/embed" after the host/port, and paste it into the target_url
property as a quoted string value in this API request. #### Security Note Protect this embed URL as you would an access token or password credentials - do not write it to disk, do not pass it to a third party, and only pass it through a secure HTTPS encrypted transport.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedParams(); // \Swagger\Client\Model\EmbedParams | Embed parameters
try {
$result = $apiInstance->createEmbedUrlAsMe($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->createEmbedUrlAsMe: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\EmbedParams | Embed parameters |
\Swagger\Client\Model\EmbedUrlResponse
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OIDCConfig createOidcTestConfig($body)
Create OIDC Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\OIDCConfig(); // \Swagger\Client\Model\OIDCConfig | OIDC test config
try {
$result = $apiInstance->createOidcTestConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->createOidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\OIDCConfig | OIDC test config |
\Swagger\Client\Model\OIDCConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlConfig createSamlTestConfig($body)
Create SAML Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SamlConfig(); // \Swagger\Client\Model\SamlConfig | SAML test config
try {
$result = $apiInstance->createSamlTestConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->createSamlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\SamlConfig | SAML test config |
\Swagger\Client\Model\SamlConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\EmbedUrlResponse createSsoEmbedUrl($body)
Create SSO Embed Url
Create SSO Embed URL Creates an SSO embed URL and cryptographically signs it with an embed secret. This signed URL can then be used to instantiate a Looker embed session in a PBL web application. Do not make any modifications to this URL - any change may invalidate the signature and cause the URL to fail to load a Looker embed session. A signed SSO embed URL can only be used once. After it has been used to request a page from the Looker server, the URL is invalid. Future requests using the same URL will fail. This is to prevent 'replay attacks'. The target_url
property must be a complete URL of a Looker UI page - scheme, hostname, path and query params. To load a dashboard with id 56 and with a filter of Date=1 years
, the looker URL would look like https:/myname.looker.com/dashboards/56?Date=1%20years
. The best way to obtain this target_url is to navigate to the desired Looker page in your web browser, copy the URL shown in the browser address bar and paste it into the target_url
property as a quoted string value in this API request. Permissions for the embed user are defined by the groups in which the embed user is a member (group_ids property) and the lists of models and permissions assigned to the embed user. At a minimum, you must provide values for either the group_ids property, or both the models and permissions properties. These properties are additive; an embed user can be a member of certain groups AND be granted access to models and permissions. The embed user's access is the union of permissions granted by the group_ids, models, and permissions properties. This function does not strictly require all group_ids, user attribute names, or model names to exist at the moment the SSO embed url is created. Unknown group_id, user attribute names or model names will be passed through to the output URL. To diagnose potential problems with an SSO embed URL, you can copy the signed URL into the Embed URI Validator text box in <your looker instance>/admin/embed
. The secret_id
parameter is optional. If specified, its value must be the id of an active secret defined in the Looker instance. if not specified, the URL will be signed using the newest active secret defined in the Looker instance. #### Security Note Protect this signed URL as you would an access token or password credentials - do not write it to disk, do not pass it to a third party, and only pass it through a secure HTTPS encrypted transport.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedSsoParams(); // \Swagger\Client\Model\EmbedSsoParams | SSO parameters
try {
$result = $apiInstance->createSsoEmbedUrl($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->createSsoEmbedUrl: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\EmbedSsoParams | SSO parameters |
\Swagger\Client\Model\EmbedUrlResponse
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deactivateAppUser($client_guid, $user_id, $fields)
Deactivate OAuth App User
Deactivate an app for a user Deactivate a user for a given oauth client app. All tokens issued to the app for this user will be invalid immediately. Before the user can use the app with their Looker account, the user will have to read and accept an account use disclosure statement for the app. Admin users can deactivate other users, but non-admin users can only deactivate themselves. As with most REST DELETE operations, this endpoint does not return an error if the indicated resource (app or user) does not exist or has already been deactivated.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$user_id = "user_id_example"; // string | The id of the user to enable use of this app
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->deactivateAppUser($client_guid, $user_id, $fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deactivateAppUser: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application | |
user_id | string | The id of the user to enable use of this app | |
fields | string | Requested fields. | [optional] |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteEmbedCookielessSession($session_reference_token)
Delete cookieless embed session
Delete cookieless embed session This will delete the session associated with the given session reference token. Calling this endpoint will result in the session and session reference data being cleared from the system. This endpoint can be used to log an embed user out of the Looker instance.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$session_reference_token = "session_reference_token_example"; // string | Embed session reference token
try {
$result = $apiInstance->deleteEmbedCookielessSession($session_reference_token);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteEmbedCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
session_reference_token | string | Embed session reference token |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteEmbedSecret($embed_secret_id)
Delete Embed Secret
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$embed_secret_id = "embed_secret_id_example"; // string | Id of Embed Secret
try {
$result = $apiInstance->deleteEmbedSecret($embed_secret_id);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteEmbedSecret: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
embed_secret_id | string | Id of Embed Secret |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteOauthClientApp($client_guid)
Delete OAuth Client App
Delete OAuth Client App Deletes the registration info of the app with the matching client_guid. All active sessions and tokens issued for this app will immediately become invalid. As with most REST DELETE operations, this endpoint does not return an error if the indicated resource does not exist. ### Note: this deletion cannot be undone.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
try {
$result = $apiInstance->deleteOauthClientApp($client_guid);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteOidcTestConfig($test_slug)
Delete OIDC Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config
try {
$result = $apiInstance->deleteOidcTestConfig($test_slug);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteOidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
test_slug | string | Slug of test config |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteSamlTestConfig($test_slug)
Delete SAML Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config
try {
$result = $apiInstance->deleteSamlTestConfig($test_slug);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteSamlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
test_slug | string | Slug of test config |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteSupportAccessAllowlistEntry($entry_id)
Delete Support Access Allowlist Entry
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$entry_id = "entry_id_example"; // string | Id of Allowlist Entry
try {
$result = $apiInstance->deleteSupportAccessAllowlistEntry($entry_id);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteSupportAccessAllowlistEntry: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
entry_id | string | Id of Allowlist Entry |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string deleteUserLoginLockout($key)
Delete User Login Lockout
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$key = "key_example"; // string | The key associated with the locked user
try {
$result = $apiInstance->deleteUserLoginLockout($key);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deleteUserLoginLockout: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
key | string | The key associated with the locked user |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
deregisterMobileDevice($device_id)
Deregister Mobile Device
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$device_id = "device_id_example"; // string | Unique id of the device.
try {
$apiInstance->deregisterMobileDevice($device_id);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->deregisterMobileDevice: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
device_id | string | Unique id of the device. |
void (empty response body)
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SupportAccessStatus disableSupportAccess()
Disable Support Access
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->disableSupportAccess();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->disableSupportAccess: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\SupportAccessStatus
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SupportAccessStatus enableSupportAccess($body)
Enable Support Access
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SupportAccessEnable(); // \Swagger\Client\Model\SupportAccessEnable | Enable Support Access request params.
try {
$result = $apiInstance->enableSupportAccess($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->enableSupportAccess: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\SupportAccessEnable | Enable Support Access request params. |
\Swagger\Client\Model\SupportAccessStatus
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlMetadataParseResult fetchAndParseSamlIdpMetadata($body)
Parse SAML IdP Url
Fetch the given url and parse it as a SAML IdP metadata document and return the result. Note that this requires that the url be public or at least at a location where the Looker instance can fetch it without requiring any special authentication.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = "body_example"; // string | SAML IdP metadata public url
try {
$result = $apiInstance->fetchAndParseSamlIdpMetadata($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->fetchAndParseSamlIdpMetadata: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | string | SAML IdP metadata public url |
\Swagger\Client\Model\SamlMetadataParseResult
No authorization required
- Content-Type: text/plain
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string forcePasswordResetAtNextLoginForAllUsers()
Force password reset
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->forcePasswordResetAtNextLoginForAllUsers();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->forcePasswordResetAtNextLoginForAllUsers: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\EmbedCookielessSessionGenerateTokensResponse generateTokensForCookielessSession($body)
Generate tokens for cookieless embed session
Generate api and navigation tokens for a cookieless embed session The generate tokens endpoint is used to create new tokens of type: - Api token. - Navigation token. The generate tokens endpoint should be called every time the Looker client asks for a token (except for the first time when the tokens returned by the acquire_session endpoint should be used).
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens(); // \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens | Embed session reference token
try {
$result = $apiInstance->generateTokensForCookielessSession($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->generateTokensForCookielessSession: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\EmbedCookielessSessionGenerateTokens | Embed session reference token |
\Swagger\Client\Model\EmbedCookielessSessionGenerateTokensResponse
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SupportAccessAllowlistEntry[] getSupportAccessAllowlistEntries($fields)
Get Support Access Allowlist Users
Get Support Access Allowlist Users Returns the users that have been added to the Support Access Allowlist
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->getSupportAccessAllowlistEntries($fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->getSupportAccessAllowlistEntries: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
fields | string | Requested fields. | [optional] |
\Swagger\Client\Model\SupportAccessAllowlistEntry[]
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
string invalidateTokens($client_guid)
Invalidate Tokens
Invalidate All Issued Tokens Immediately invalidates all auth codes, sessions, access tokens and refresh tokens issued for this app for ALL USERS of this app.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of the application
try {
$result = $apiInstance->invalidateTokens($client_guid);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->invalidateTokens: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of the application |
string
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfig ldapConfig()
Get LDAP Configuration
Get the LDAP configuration. Looker can be optionally configured to authenticate users against an Active Directory or other LDAP directory server. LDAP setup requires coordination with an administrator of that directory server. Only Looker administrators can read and update the LDAP configuration. Configuring LDAP impacts authentication for all users. This configuration should be done carefully. Looker maintains a single LDAP configuration. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). LDAP is enabled or disabled for Looker using the enabled field. Looker will never return an auth_password field. That value can be set, but never retrieved. See the Looker LDAP docs for additional information.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->ldapConfig();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->ldapConfig: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\LDAPConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OauthClientApp oauthClientApp($client_guid, $fields)
Get OAuth Client App
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->oauthClientApp($client_guid, $fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->oauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application | |
fields | string | Requested fields. | [optional] |
\Swagger\Client\Model\OauthClientApp
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OIDCConfig oidcConfig()
Get OIDC Configuration
Get the OIDC configuration. Looker can be optionally configured to authenticate users against an OpenID Connect (OIDC) authentication server. OIDC setup requires coordination with an administrator of that server. Only Looker administrators can read and update the OIDC configuration. Configuring OIDC impacts authentication for all users. This configuration should be done carefully. Looker maintains a single OIDC configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). OIDC is enabled or disabled for Looker using the enabled field.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->oidcConfig();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->oidcConfig: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\OIDCConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OIDCConfig oidcTestConfig($test_slug)
Get OIDC Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config
try {
$result = $apiInstance->oidcTestConfig($test_slug);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->oidcTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
test_slug | string | Slug of test config |
\Swagger\Client\Model\OIDCConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlMetadataParseResult parseSamlIdpMetadata($body)
Parse SAML IdP XML
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = "body_example"; // string | SAML IdP metadata xml
try {
$result = $apiInstance->parseSamlIdpMetadata($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->parseSamlIdpMetadata: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | string | SAML IdP metadata xml |
\Swagger\Client\Model\SamlMetadataParseResult
No authorization required
- Content-Type: text/plain
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\PasswordConfig passwordConfig()
Get Password Config
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->passwordConfig();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->passwordConfig: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\PasswordConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\MobileToken registerMobileDevice($body)
Register Mobile Device
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\MobileToken(); // \Swagger\Client\Model\MobileToken | Writable device parameters.
try {
$result = $apiInstance->registerMobileDevice($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->registerMobileDevice: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\MobileToken | Writable device parameters. |
\Swagger\Client\Model\MobileToken
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OauthClientApp registerOauthClientApp($client_guid, $body, $fields)
Register OAuth App
Register an OAuth2 Client App Registers details identifying an external web app or native app as an OAuth2 login client of the Looker instance. The app registration must provide a unique client_guid and redirect_uri that the app will present in OAuth login requests. If the client_guid and redirect_uri parameters in the login request do not match the app details registered with the Looker instance, the request is assumed to be a forgery and is rejected.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$body = new \Swagger\Client\Model\OauthClientApp(); // \Swagger\Client\Model\OauthClientApp | OAuth Client App
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->registerOauthClientApp($client_guid, $body, $fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->registerOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application | |
body | \Swagger\Client\Model\OauthClientApp | OAuth Client App | |
fields | string | Requested fields. | [optional] |
\Swagger\Client\Model\OauthClientApp
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlConfig samlConfig()
Get SAML Configuration
Get the SAML configuration. Looker can be optionally configured to authenticate users against a SAML authentication server. SAML setup requires coordination with an administrator of that server. Only Looker administrators can read and update the SAML configuration. Configuring SAML impacts authentication for all users. This configuration should be done carefully. Looker maintains a single SAML configuation. It can be read and updated. Updates only succeed if the new state will be valid (in the sense that all required fields are populated); it is up to you to ensure that the configuration is appropriate and correct). SAML is enabled or disabled for Looker using the enabled field.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->samlConfig();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->samlConfig: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\SamlConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlConfig samlTestConfig($test_slug)
Get SAML Test Configuration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$test_slug = "test_slug_example"; // string | Slug of test config
try {
$result = $apiInstance->samlTestConfig($test_slug);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->samlTestConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
test_slug | string | Slug of test config |
\Swagger\Client\Model\SamlConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\UserLoginLockout[] searchUserLoginLockouts($fields, $page, $per_page, $limit, $offset, $sorts, $auth_type, $full_name, $email, $remote_id, $filter_or)
Search User Login Lockouts
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$fields = "fields_example"; // string | Include only these fields in the response
$page = 789; // int | DEPRECATED. Use limit and offset instead. Return only page N of paginated results
$per_page = 789; // int | DEPRECATED. Use limit and offset instead. Return N rows of data per page
$limit = 789; // int | Number of results to return. (used with offset and takes priority over page and per_page)
$offset = 789; // int | Number of results to skip before returning any. (used with limit and takes priority over page and per_page)
$sorts = "sorts_example"; // string | Fields to sort by.
$auth_type = "auth_type_example"; // string | Auth type user is locked out for (email, ldap, totp, api)
$full_name = "full_name_example"; // string | Match name
$email = "email_example"; // string | Match email
$remote_id = "remote_id_example"; // string | Match remote LDAP ID
$filter_or = true; // bool | Combine given search criteria in a boolean OR expression
try {
$result = $apiInstance->searchUserLoginLockouts($fields, $page, $per_page, $limit, $offset, $sorts, $auth_type, $full_name, $email, $remote_id, $filter_or);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->searchUserLoginLockouts: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
fields | string | Include only these fields in the response | [optional] |
page | int | DEPRECATED. Use limit and offset instead. Return only page N of paginated results | [optional] |
per_page | int | DEPRECATED. Use limit and offset instead. Return N rows of data per page | [optional] |
limit | int | Number of results to return. (used with offset and takes priority over page and per_page) | [optional] |
offset | int | Number of results to skip before returning any. (used with limit and takes priority over page and per_page) | [optional] |
sorts | string | Fields to sort by. | [optional] |
auth_type | string | Auth type user is locked out for (email, ldap, totp, api) | [optional] |
full_name | string | Match name | [optional] |
string | Match email | [optional] | |
remote_id | string | Match remote LDAP ID | [optional] |
filter_or | bool | Combine given search criteria in a boolean OR expression | [optional] |
\Swagger\Client\Model\UserLoginLockout[]
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SessionConfig sessionConfig()
Get Session Config
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->sessionConfig();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->sessionConfig: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\SessionConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SupportAccessStatus supportAccessStatus()
Support Access Status
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
try {
$result = $apiInstance->supportAccessStatus();
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->supportAccessStatus: ', $e->getMessage(), PHP_EOL;
}
?>
This endpoint does not need any parameter.
\Swagger\Client\Model\SupportAccessStatus
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigAuth($body)
Test LDAP Auth
Test the connection authentication settings for an LDAP configuration. This tests that the connection is possible and that a 'server' account to be used by Looker can authenticate to the LDAP server given connection and authentication information. connection_host, connection_port, and auth_username, are required. connection_tls and auth_password are optional. Example: json { \"connection_host\": \"ldap.example.com\", \"connection_port\": \"636\", \"connection_tls\": true, \"auth_username\": \"cn=looker,dc=example,dc=com\", \"auth_password\": \"secret\" }
Looker will never return an auth_password. If this request omits the auth_password field, then the auth_password value from the active config (if present) will be used for the test. The active LDAP settings are not modified.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config
try {
$result = $apiInstance->testLdapConfigAuth($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->testLdapConfigAuth: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\LDAPConfig | LDAP Config |
\Swagger\Client\Model\LDAPConfigTestResult
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigConnection($body)
Test LDAP Connection
Test the connection settings for an LDAP configuration. This tests that the connection is possible given a connection_host and connection_port. connection_host and connection_port are required. connection_tls is optional. Example: json { \"connection_host\": \"ldap.example.com\", \"connection_port\": \"636\", \"connection_tls\": true }
No authentication to the LDAP server is attempted. The active LDAP settings are not modified.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config
try {
$result = $apiInstance->testLdapConfigConnection($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->testLdapConfigConnection: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\LDAPConfig | LDAP Config |
\Swagger\Client\Model\LDAPConfigTestResult
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigUserAuth($body)
Test LDAP User Auth
Test the user authentication settings for an LDAP configuration. This test accepts a full LDAP configuration along with a username/password pair and attempts to authenticate the user with the LDAP server. The configuration is validated before attempting the authentication. Looker will never return an auth_password. If this request omits the auth_password field, then the auth_password value from the active config (if present) will be used for the test. test_ldap_user and test_ldap_password are required. The active LDAP settings are not modified.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config
try {
$result = $apiInstance->testLdapConfigUserAuth($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->testLdapConfigUserAuth: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\LDAPConfig | LDAP Config |
\Swagger\Client\Model\LDAPConfigTestResult
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfigTestResult testLdapConfigUserInfo($body)
Test LDAP User Info
Test the user authentication settings for an LDAP configuration without authenticating the user. This test will let you easily test the mapping for user properties and roles for any user without needing to authenticate as that user. This test accepts a full LDAP configuration along with a username and attempts to find the full info for the user from the LDAP server without actually authenticating the user. So, user password is not required.The configuration is validated before attempting to contact the server. test_ldap_user is required. The active LDAP settings are not modified.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config
try {
$result = $apiInstance->testLdapConfigUserInfo($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->testLdapConfigUserInfo: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\LDAPConfig | LDAP Config |
\Swagger\Client\Model\LDAPConfigTestResult
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\LDAPConfig updateLdapConfig($body)
Update LDAP Configuration
Update the LDAP configuration. Configuring LDAP impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the LDAP configuration. LDAP is enabled or disabled for Looker using the enabled field. It is highly recommended that any LDAP setting changes be tested using the APIs below before being set globally. See the Looker LDAP docs for additional information.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\LDAPConfig(); // \Swagger\Client\Model\LDAPConfig | LDAP Config
try {
$result = $apiInstance->updateLdapConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateLdapConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\LDAPConfig | LDAP Config |
\Swagger\Client\Model\LDAPConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\MobileToken updateMobileDeviceRegistration($device_id)
Update Mobile Device Registration
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$device_id = "device_id_example"; // string | Unique id of the device.
try {
$result = $apiInstance->updateMobileDeviceRegistration($device_id);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateMobileDeviceRegistration: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
device_id | string | Unique id of the device. |
\Swagger\Client\Model\MobileToken
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OauthClientApp updateOauthClientApp($client_guid, $body, $fields)
Update OAuth App
Update OAuth2 Client App Details Modifies the details a previously registered OAuth2 login client app.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$client_guid = "client_guid_example"; // string | The unique id of this application
$body = new \Swagger\Client\Model\OauthClientApp(); // \Swagger\Client\Model\OauthClientApp | OAuth Client App
$fields = "fields_example"; // string | Requested fields.
try {
$result = $apiInstance->updateOauthClientApp($client_guid, $body, $fields);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateOauthClientApp: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
client_guid | string | The unique id of this application | |
body | \Swagger\Client\Model\OauthClientApp | OAuth Client App | |
fields | string | Requested fields. | [optional] |
\Swagger\Client\Model\OauthClientApp
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\OIDCConfig updateOidcConfig($body)
Update OIDC Configuration
Update the OIDC configuration. Configuring OIDC impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the OIDC configuration. OIDC is enabled or disabled for Looker using the enabled field. It is highly recommended that any OIDC setting changes be tested using the APIs below before being set globally.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\OIDCConfig(); // \Swagger\Client\Model\OIDCConfig | OIDC Config
try {
$result = $apiInstance->updateOidcConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateOidcConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\OIDCConfig | OIDC Config |
\Swagger\Client\Model\OIDCConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\PasswordConfig updatePasswordConfig($body)
Update Password Config
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\PasswordConfig(); // \Swagger\Client\Model\PasswordConfig | Password Config
try {
$result = $apiInstance->updatePasswordConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updatePasswordConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\PasswordConfig | Password Config |
\Swagger\Client\Model\PasswordConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SamlConfig updateSamlConfig($body)
Update SAML Configuration
Update the SAML configuration. Configuring SAML impacts authentication for all users. This configuration should be done carefully. Only Looker administrators can read and update the SAML configuration. SAML is enabled or disabled for Looker using the enabled field. It is highly recommended that any SAML setting changes be tested using the APIs below before being set globally.
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SamlConfig(); // \Swagger\Client\Model\SamlConfig | SAML Config
try {
$result = $apiInstance->updateSamlConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateSamlConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\SamlConfig | SAML Config |
\Swagger\Client\Model\SamlConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]
\Swagger\Client\Model\SessionConfig updateSessionConfig($body)
Update Session Config
<?php
require_once(__DIR__ . '/vendor/autoload.php');
$apiInstance = new Swagger\Client\Api\AuthApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client()
);
$body = new \Swagger\Client\Model\SessionConfig(); // \Swagger\Client\Model\SessionConfig | Session Config
try {
$result = $apiInstance->updateSessionConfig($body);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling AuthApi->updateSessionConfig: ', $e->getMessage(), PHP_EOL;
}
?>
Name | Type | Description | Notes |
---|---|---|---|
body | \Swagger\Client\Model\SessionConfig | Session Config |
\Swagger\Client\Model\SessionConfig
No authorization required
- Content-Type: application/json
- Accept: application/json
[Back to top] [Back to API list] [Back to Model list] [Back to README]