KosmoKrator

productivity

Logto MCP, CLI, and Lua Integration for AI Agents

Logto integration docs for AI agents: MCP gateway setup, Logto CLI commands, Lua API reference, credentials, and function schemas.

Logto for agents

Credentials can be configured manually in web or CLI hosts.

Use this integration from Lua code mode, the headless integrations CLI, or the KosmoKrator MCP gateway. The same package metadata powers all three surfaces.

Agent Surfaces

Machine-Readable Metadata

Function Catalog

FunctionTypeParametersDescription
logto.logto_add_mfa_verification Write write 0 Add a MFA verification to the user, a logto-verification-id in header is required for checking sensitive permissions.
logto.logto_add_one_time_tokens Write write 0 Create a new one-time token associated with an email address. The token can be used for verification purposes and has an expiration time.
logto.logto_add_organization_applications Write write 0 Add an application to the organization.
logto.logto_add_organization_users Write write 0 Add users as members to the specified organization with the given user IDs.
logto.logto_add_user_identities Write write 0 Add an identity (social identity) to the user, a logto-verification-id in header is required for checking sensitive permissions, and a verification record for the social identity is required.
logto.logto_add_user_profile Write write 0 Adds user profile data to the current experience interaction. - For `Register`: The profile data provided before the identification request will be used to create a new user account. - For `SignIn` and `Register`: The profile data provided after the user is identified will be used to update the user's profile when the interaction is submitted. - `ForgotPassword`: Not supported.
logto.logto_assert_saml Write write 0 The Assertion Consumer Service (ACS) endpoint for Simple Assertion Markup Language (SAML) social connectors. SAML social connectors are deprecated. Use the SSO SAML connector instead.
logto.logto_assert_single_sign_on_saml Write write 0 The Assertion Consumer Service (ACS) endpoint for Simple Assertion Markup Language (SAML) single sign-on (SSO) connectors. This endpoint is used to complete the SAML SSO authentication flow. It receives the SAML assertion response from the identity provider (IdP) and redirects the user to complete the authentication flow.
logto.logto_assign_application_roles Write write 0 Assign API resource roles to the specified application. The API resource roles will be added to the existing API resource roles.
logto.logto_assign_organization_roles_to_application Write write 0 Add a role to the application in the organization.
logto.logto_assign_organization_roles_to_applications Write write 0 Assign roles to applications in the specified organization.
logto.logto_assign_organization_roles_to_user Write write 0 Assign roles to a user in the specified organization with the provided data.
logto.logto_assign_organization_roles_to_users Write write 0 Assign roles to user members of the specified organization.
logto.logto_assign_user_roles Write write 0 Assign API resource roles to the user. The roles will be added to the existing roles.
logto.logto_bind_mfa_verification Write write 0 Bind new MFA verification to the user profile using the verificationId.
logto.logto_bind_passkey Write write 0 Bind a WebAuthn credential as a passkey for sign-in purposes. Unlike `POST /api/experience/profile/mfa` with `type: WebAuthn`, this endpoint is exclusively for adding a passkey as a sign-in method and does NOT mark the user's optional MFA as enabled.
logto.logto_check_password_with_default_sign_in_experience Write write 0 Check if a password meets the password policy in the sign-in experience settings.
logto.logto_cleanup_domains Write write 0 Clean up custom domains that have been inactive (not verified) for a specified number of days. This uses Cloudflare as the source of truth to determine domain activity.
logto.logto_create_and_send_mfa_verification_code Write write 0 Create a new MFA verification code and send it to the user's bound identifier (email or phone). This endpoint automatically uses the user's bound email address or phone number from their profile for MFA verification. The user must be identified before calling this endpoint.
logto.logto_create_and_send_verification_code Write write 0 Create a new `CodeVerification` record and sends the code to the specified identifier. The code verification can be used to verify the given identifier.
logto.logto_create_application Write write 0 Create a new application with the given data.
logto.logto_create_application_protected_app_metadata_custom_domain Write write 0 Add a custom domain to the application. You'll need to setup DNS record later.
logto.logto_create_application_secret Write write 0 Add a new secret for the application.
logto.logto_create_application_user_consent_organization Write write 0 Grant a list of organization access of a user for a application by application id and user id. The user must be a member of all the organizations. Only third-party application needs to be granted access to organizations, all the other applications can request for all the organizations' access by default.
logto.logto_create_application_user_consent_scope Write write 0 Assign the user consent scopes to an application by application id
logto.logto_create_connector Write write 0 Create a connector with the given data.
logto.logto_create_connector_authorization_uri Write write 0 Get authorization URI for specified connector by providing redirect URI and randomly generated state.
logto.logto_create_connector_test Write write 0 Test a passwordless (email or SMS) connector by sending a test message to the given phone number or email address.
logto.logto_create_custom_profile_field Write write 0 Create a custom profile field.
logto.logto_create_custom_profile_fields_batch Write write 0 Create multiple custom profile fields in a single request (max 20 items).
logto.logto_create_domain Write write 0 Create a new domain with the given data. The maximum domain number is 1, once created, can not be modified, you'll have to delete and recreate one.
logto.logto_create_enterprise_sso_verification Write write 0 Create a new EnterpriseSSO verification record and return the provider's authorization URI for the given connector.
logto.logto_create_hook Write write 0 Create a new hook with the given data.
logto.logto_create_hook_test Write write 0 Test the specified hook with the given events and config.
logto.logto_create_new_password_identity_verification Write write 0 Create a NewPasswordIdentity verification record for the new user registration use. The verification record includes a unique user identifier and a password that can be used to create a new user account.
logto.logto_create_or_replace_totp_mfa_verification Write write 0 Create or replace the user's TOTP MFA verification with a new authenticator app binding. If the user already has a TOTP verification, it will be replaced; otherwise, a new one will be created. Requires a logto-verification-id header for sensitive permission checks, a valid TOTP secret, and a valid TOTP code generated from the secret.
logto.logto_create_organization Write write 0 Create a new organization with the given data.
logto.logto_create_organization_invitation Write write 0 Create an organization invitation and optionally send it via email. The tenant should have an email connector configured if you want to send the invitation via email at this point.
logto.logto_create_organization_invitation_message Write write 0 Resend the invitation message to the invitee.
logto.logto_create_organization_jit_email_domain Write write 0 Add a new email domain for just-in-time provisioning of users in the organization.
logto.logto_create_organization_jit_role Write write 0 Add new organization roles that will be assigned to users during just-in-time provisioning.
logto.logto_create_organization_jit_sso_connector Write write 0 Add new enterprise SSO connectors for just-in-time provisioning of users in the organization.
logto.logto_create_organization_role Write write 0 Create a new organization role with the given data.
logto.logto_create_organization_role_resource_scope Write write 0 Assign resource scopes to the specified organization role
logto.logto_create_organization_role_scope Write write 0 Assign organization scopes to the specified organization role
logto.logto_create_organization_scope Write write 0 Create a new organization scope with the given data.
logto.logto_create_password_verification Write write 0 Create and verify a new Password verification record. The verification record can only be created if the provided user credentials are correct.
logto.logto_create_resource Write write 0 Create an API resource in the current tenant.
logto.logto_create_resource_scope Write write 0 Create a new scope (permission) for an API resource.
logto.logto_create_role Write write 0 Create a new role with the given data.
logto.logto_create_role_application Write write 0 Assign a role to a list of applications. The role must have the type `Application`.
logto.logto_create_role_scope Write write 0 Link a list of API resource scopes (permissions) to a role. The original linked scopes will be kept.
logto.logto_create_role_user Write write 0 Assign a role to a list of users. The role must have the type `User`.
logto.logto_create_saml_application Write write 0 Create a new SAML application with the given configuration. A default signing certificate with 3 years lifetime will be automatically created.
logto.logto_create_saml_application_secret Write write 0 Create a new signing certificate for the SAML application.
logto.logto_create_saml_authn Write write 0 Process SAML authentication request using HTTP POST binding.
logto.logto_create_sign_in_passkey_authentication Write write 0 Create WebAuthn authentication options for passkey sign-in. The user will be resolved later by the credential during verification.
logto.logto_create_sign_in_passkey_authentication_with_identifier Write write 0 Create WebAuthn authentication options for passkey sign-in with an identifier. The identifier is used to look up the user's WebAuthn credentials and generate non-discoverable authentication options.
logto.logto_create_social_verification Write write 0 Create a new SocialVerification record and return the provider's authorization URI for the given connector.
logto.logto_create_sso_connector Write write 0 Create an new SSO connector instance for a given provider.
logto.logto_create_subject_token Write write 0 Create a new subject token for the use of impersonating the user.
logto.logto_create_totp_secret Write write 0 Create a new TOTP verification record and generate a new TOTP secret for the user. This secret can be used to bind a new TOTP verification to the user's profile. The verification record must be verified before the secret can be used to bind a new TOTP verification to the user's profile.
logto.logto_create_user Write write 0 Create a new user with the given data.
logto.logto_create_user_asset Write write 0 Upload a user asset.
logto.logto_create_user_identity Write write 0 Link authenticated user identity from a social platform to a Logto user. The usage of this API is usually coupled with `POST /connectors/:connectorId/authorization-uri`. With the help of these pair of APIs, you can implement a user profile page with the link social account feature in your application. Note: Currently due to technical limitations, this API does not support the following connectors that rely on Logto interaction session: `@logto/connector-apple`, `@logto/connector-saml`, `@logto/c
logto.logto_create_user_mfa_verification Write write 0 Create a new MFA verification for a given user ID.
logto.logto_create_user_personal_access_token Write write 0 Add a new personal access token for the user.
logto.logto_create_verification_by_password Write write 0 Create a verification record by verifying the password.
logto.logto_create_verification_by_social Write write 0 Create a social verification record and return the authorization URI.
logto.logto_create_verification_by_verification_code Write write 0 Create a verification record and send the code to the specified identifier. The code verification can be used to verify the given identifier.
logto.logto_create_verification_code Write write 0 Request a verification code for the provided identifier (email/phone). if you're using email as the identifier, you need to setup your email connector first. if you're using phone as the identifier, you need to setup your SMS connector first.
logto.logto_create_web_authn_authentication_verification Write write 0 Create a new WebAuthn authentication verification record based on the user's existing WebAuthn credential. This verification record can be used to verify the user's WebAuthn credential.
logto.logto_create_web_authn_registration_verification Write write 0 Create a new WebAuthn registration verification record. The verification record can be used to bind a new WebAuthn credential to the user's profile.
logto.logto_delete_application Write write 0 Delete application by ID.
logto.logto_delete_application_legacy_secret Write write 0 Delete the legacy secret for the application and replace it with a new internal secret. Note: This operation does not "really" delete the legacy secret because it is still needed for internal validation. We may remove the display of the legacy secret (the `secret` field in the application response) in the future.
logto.logto_delete_application_protected_app_metadata_custom_domain Write write 0 Remove custom domain from the specified application.
logto.logto_delete_application_role Write write 0 Remove a API resource role from the specified application.
logto.logto_delete_application_secret Write write 0 Delete a secret for the application by name.
logto.logto_delete_application_user_consent_organization Write write 0 Revoke a user's access to an organization for a application by application id, user id and organization id.
logto.logto_delete_application_user_consent_scope Write write 0 Remove the user consent scope from an application by application id, scope type and scope id
logto.logto_delete_captcha_provider Write write 0 Delete the captcha provider.
logto.logto_delete_connector Write write 0 Delete connector by ID.
logto.logto_delete_custom_phrase Write write 0 Delete custom phrases for the specified language tag.
logto.logto_delete_custom_profile_field_by_name Write write 0 Delete a custom profile field by name.
logto.logto_delete_domain Write write 0 Delete domain by ID.
logto.logto_delete_email_template Write write 0 Delete an email template by its ID.
logto.logto_delete_email_templates Write write 0 Bulk delete email templates by their language tag and template type.
logto.logto_delete_grant_by_id Write write 0 Revoke a specific user application grant by grant ID and remove the related session authorization. A logto-verification-id in header is required for revoking grants.
logto.logto_delete_hook Write write 0 Delete hook by ID.
logto.logto_delete_identity Write write 0 Delete an identity (social identity) from the user, a logto-verification-id in header is required for checking sensitive permissions. The request is rejected if it would remove the user's last identifier.
logto.logto_delete_jwt_customizer Write write 0 Delete the JWT customizer for the given token type.
logto.logto_delete_mfa_verification Write write 0 Delete an MFA verification, a logto-verification-id in header is required for checking sensitive permissions.
logto.logto_delete_oidc_key Write write 0 Delete an OIDC signing key by key type and key ID.
logto.logto_delete_one_time_token Write write 0 Delete a one-time token by its ID.
logto.logto_delete_organization Write write 0 Delete organization by ID.
logto.logto_delete_organization_application Write write 0 Remove an application from the organization.
logto.logto_delete_organization_application_role Write write 0 Remove a role from the application in the organization.
logto.logto_delete_organization_invitation Write write 0 Delete an organization invitation by ID.
logto.logto_delete_organization_jit_email_domain Write write 0 Remove an email domain for just-in-time provisioning of users in the organization.
logto.logto_delete_organization_jit_role Write write 0 Remove an organization role that will be assigned to users during just-in-time provisioning.
logto.logto_delete_organization_jit_sso_connector Write write 0 Remove an enterprise SSO connector for just-in-time provisioning of users in the organization.
logto.logto_delete_organization_role Write write 0 Delete organization role by ID.
logto.logto_delete_organization_role_resource_scope Write write 0 Remove a resource scope assignment from the specified organization role.
logto.logto_delete_organization_role_scope Write write 0 Remove a organization scope assignment from the specified organization role.
logto.logto_delete_organization_scope Write write 0 Delete organization scope by ID.
logto.logto_delete_organization_user Write write 0 Remove a user's membership from the specified organization.
logto.logto_delete_organization_user_role Write write 0 Remove a role assignment from a user in the specified organization.
logto.logto_delete_personal_access_token_post Write write 0 Delete a token for the user by name.
logto.logto_delete_primary_email Write write 0 Delete primary email for the user, a logto-verification-id header is required for checking sensitive permissions. The request is rejected if it would remove the user's last identifier.
logto.logto_delete_primary_phone Write write 0 Delete primary phone for the user, a logto-verification-id header is required for checking sensitive permissions. The request is rejected if it would remove the user's last identifier.
logto.logto_delete_resource Write write 0 Delete an API resource by ID.
logto.logto_delete_resource_scope Write write 0 Delete an API resource scope (permission) from the given resource.
logto.logto_delete_role Write write 0 Delete a role with the given ID.
logto.logto_delete_role_application Write write 0 Remove the role from an application with the given ID.
logto.logto_delete_role_scope Write write 0 Unlink an API resource scope (permission) from a role with the given ID.
logto.logto_delete_role_user Write write 0 Remove a role from a user with the given ID.
logto.logto_delete_saml_application Write write 0 Delete a SAML application by ID.
logto.logto_delete_saml_application_secret Write write 0 Delete a signing certificate of the SAML application. Active certificates cannot be deleted.
logto.logto_delete_secret Write write 0 Delete a secret by its ID.
logto.logto_delete_sentinel_activities Write write 0 Remove sentinel activity reports based on the provided target value(identifier).Use this endpoint to unblock users who may be locked out due to too many failed authentication attempts.
logto.logto_delete_session_by_id Write write 0 Revoke a specific user session by its ID, optionally revoking target associated grants and tokens. A logto-verification-id in header is required for revoking sessions.
logto.logto_delete_sso_connector Write write 0 Delete an SSO connector by ID.
logto.logto_delete_user Write write 0 Delete user with the given ID. Note all associated data will be deleted cascadingly.
logto.logto_delete_user_grant Write write 0 Revoke a specific grant and its associated token chain by grant ID. Also removes the matching session authorization entry for this grant from the related active session. The grant must belong to the user.
logto.logto_delete_user_identity Write write 0 Delete a social identity from the user.
logto.logto_delete_user_mfa_verification Write write 0 Delete an MFA verification for the user with the given verification ID. The verification ID must be associated with the given user ID.
logto.logto_delete_user_personal_access_token Write write 0 Delete a token for the user by name using the legacy path parameter. Deprecated: use the POST /delete endpoint instead to avoid url name encoding issues.
logto.logto_delete_user_role Write write 0 Remove an API resource role from the user.
logto.logto_delete_user_session Write write 0 Revoke a specific user session by its ID, optionally revoking associated target grants and tokens.
logto.logto_generate_backup_codes Write write 0 Create a new BackupCode verification record with new backup codes generated. This verification record will be used to bind the backup codes to the user's profile.
logto.logto_generate_my_account_backup_codes Write write 0 Generate backup codes for the user.
logto.logto_generate_totp_secret Write write 0 Generate a TOTP secret for the user.
logto.logto_generate_web_authn_registration_options Write write 0 Generate WebAuthn registration options for the user to register a new WebAuthn device.
logto.logto_get_account_center_settings Read read 0 Get the account center settings.
logto.logto_get_active_user_counts Read read 0 Get active user data, including daily active user (DAU), weekly active user (WAU) and monthly active user (MAU). It also includes an array of DAU in the past 30 days.
logto.logto_get_admin_console_config Read read 0 Get the global configuration object for Logto Console.
logto.logto_get_application Read read 0 Get application details by ID.
logto.logto_get_application_sign_in_experience Read read 0 Get application level sign-in experience for a given application. - Only branding properties and terms links customization is supported for now. - Only third-party applications can have the sign-in experience customization for now.
logto.logto_get_backup_codes Read read 0 Get all backup codes for the user with their usage status. Requires identity verification.
logto.logto_get_captcha_provider Read read 0 Get the captcha provider, you can only have one captcha provider.
logto.logto_get_connector Read read 0 Get connector data by ID
logto.logto_get_connector_factory Read read 0 Get connector factory by the given ID.
logto.logto_get_custom_phrase Read read 0 Get custom phrases for the specified language tag.
logto.logto_get_custom_profile_field_by_name Read read 0 Get a custom profile field by name.
logto.logto_get_domain Read read 0 Get domain details by ID, by calling this API, the domain status will be synced from remote provider.
logto.logto_get_email_template Read read 0 Get the email template by its ID.
logto.logto_get_enabled_sso_connectors Read read 0 Extract the email domain from the provided email address. Returns all the enabled SSO connectors that match the email domain.
logto.logto_get_enterprise_sso_identity_access_token Read read 0 This API retrieves the access token issued by a third-party enterprise SSO provider for a given SSO connector ID. Access is only available if token storage is enabled for the corresponding connector. When a user authenticates through a SSO provider, Logto automatically stores the provider's tokens in an encrypted form. You can use this API to securely retrieve the stored access token and use it to access third-party APIs on behalf of the user.
logto.logto_get_grants Read read 0 Retrieve all active application grants for the user. A logto-verification-id in header is required for checking grant details.
logto.logto_get_hasura_auth Read read 0 The `HASURA_GRAPHQL_AUTH_HOOK` endpoint for Hasura auth. Use this endpoint to integrate Hasura's [webhook authentication flow](https://hasura.io/docs/latest/auth/authentication/webhook/).
logto.logto_get_hook Read read 0 Get hook details by ID.
logto.logto_get_id_token_config Read read 0 Get the ID token extended claims configuration for the tenant. This configuration controls which extended claims (e.g., `custom_data`, `identities`, `roles`, `organizations`, `organization_roles`) are included in ID tokens.
logto.logto_get_interaction Read read 0 Get the public interaction data.
logto.logto_get_jwt_customizer Read read 0 Get the JWT customizer for the given token type.
logto.logto_get_log Read read 0 Get log details by ID.
logto.logto_get_logto_config Read read 0 Retrieve the exposed portion of the current user's logto config. This includes MFA states (enabled, skipped, skipMfaOnSignIn) and passkey sign-in binding states (skipped). Passkey is a WebAuthn MFA factor and shares the same account center field access control as MFA.
logto.logto_get_mfa_settings Read read 0 Get MFA settings for the user. This endpoint requires the Identities scope. Returns current MFA configuration preferences.
logto.logto_get_mfa_verifications Read read 0 Get MFA verifications for the user.
logto.logto_get_new_user_counts Read read 0 Get new user count in the past 7 days.
logto.logto_get_oidc_keys Read read 0 Get OIDC signing keys by key type. The actual key will be redacted from the result.
logto.logto_get_oidc_session_config Read read 0 Get the OIDC session configuration for the tenant.
logto.logto_get_one_time_token Read read 0 Get a one-time token by its ID.
logto.logto_get_organization Read read 0 Get organization details by ID.
logto.logto_get_organization_invitation Read read 0 Get an organization invitation by ID.
logto.logto_get_organization_role Read read 0 Get organization role details by ID.
logto.logto_get_organization_scope Read read 0 Get organization scope details by ID.
logto.logto_get_profile Read read 0 Get profile for the user.
logto.logto_get_resource Read read 0 Get an API resource details by ID.
logto.logto_get_role Read read 0 Get role details by ID.
logto.logto_get_saml_application Read read 0 Get SAML application details by ID.
logto.logto_get_saml_application_callback Read read 0 Handle the OIDC callback for SAML application and generate SAML response.
logto.logto_get_saml_authn Read read 0 Process SAML authentication request using HTTP Redirect binding.
logto.logto_get_sessions Read read 0 Retrieve all non-expired sessions for the user, including session metadata and interaction details when available. A logto-verification-id in header is required for checking sensitive session details.
logto.logto_get_sign_in_exp Read read 0 Get the default sign-in experience settings.
logto.logto_get_sign_in_experience_config Read read 0 Get the full sign-in experience configuration.
logto.logto_get_sign_in_experience_phrases Read read 0 Get localized phrases based on the specified language.
logto.logto_get_social_identity_access_token Read read 0 This API retrieves the access token issued by a third-party social provider for a given social target. Access is only available if token storage is enabled for the corresponding social connector. When a user authenticates through a social provider, Logto automatically stores the provider's tokens in an encrypted form. You can use this API to securely retrieve the stored access token and use it to access third-party APIs on behalf of the user.
logto.logto_get_sso_connector Read read 0 Get SSO connector data by ID. In addition to the raw SSO connector data, a copy of fetched or parsed IdP configs and a copy of connector provider's data will be attached.
logto.logto_get_status Read read 0 The traditional health check API. No authentication needed. > **Note** > Even if 204 is returned, it does not guarantee all the APIs are working properly since they may depend on additional resources or external services.
logto.logto_get_swagger_json Read read 0 The endpoint for the current JSON document. The JSON conforms to the [OpenAPI v3.0.1](https://spec.openapis.org/oas/v3.0.1) (a.k.a. Swagger) specification.
logto.logto_get_system_application_config Read read 0 Get the application constants.
logto.logto_get_total_user_count Read read 0 Get total user count in the current tenant.
logto.logto_get_user Read read 0 Get user data for the given ID.
logto.logto_get_user_asset_service_status Read read 0 Get user assets service status.
logto.logto_get_user_has_password Read read 0 Check if the user with the given ID has a password set.
logto.logto_get_user_identity Read read 0 This API retrieves the social identity and its associated token set for the specified user from the Logto Secret Vault. The token set will only be available if token storage is enabled for the corresponding social connector.
logto.logto_get_user_session Read read 0 Retrieve a non-expired session for the user by session ID, including session metadata and interaction details when available.
logto.logto_get_user_sso_identity Read read 0 This API retrieves the user's enterprise SSO identity and associated token set record from the Logto Secret Vault. The token set will only be available if token storage is enabled for the corresponding SSO connector.
logto.logto_get_well_known_account_center Read read 0 Get the default account center configuration.
logto.logto_get_well_known_experience Read read 0 Get the full sign-in experience configuration.
logto.logto_get_well_known_experience_openapi_json Read read 0 The endpoint for the Experience API JSON document. The JSON conforms to the [OpenAPI v3.0.1](https://spec.openapis.org/oas/v3.0.1) (a.k.a. Swagger) specification.
logto.logto_get_well_known_management_openapi_json Read read 0 The endpoint for the Management API JSON document. The JSON conforms to the [OpenAPI v3.0.1](https://spec.openapis.org/oas/v3.0.1) (a.k.a. Swagger) specification.
logto.logto_get_well_known_user_openapi_json Read read 0 The endpoint for the User API JSON document. The JSON conforms to the [OpenAPI v3.0.1](https://spec.openapis.org/oas/v3.0.1) (a.k.a. Swagger) specification.
logto.logto_identify_user Write write 0 This API identifies the user based on the verificationId within the current experience interaction: - `SignIn` and `ForgotPassword` interactions: Verifies the user's identity using the provided `verificationId`. - `Register` interaction: Creates a new user account using the profile data from the current interaction. If a verificationId is provided, the profile data will first be updated with the verification record before creating the account. If not, the account is created directly from the sto
logto.logto_init_interaction Write write 0 Init a new experience interaction with the given interaction type. Any existing interaction data will be cleared.
logto.logto_list_application_organizations Read read 0 Get the list of organizations that an application is associated with.
logto.logto_list_application_protected_app_metadata_custom_domains Read read 0 Get custom domains of the specified application, the application type should be protected app.
logto.logto_list_application_roles Read read 0 Get API resource roles assigned to the specified application with pagination.
logto.logto_list_application_secrets Read read 0 Get all the secrets for the application.
logto.logto_list_application_user_consent_organizations Read read 0 List all the user consented organizations for a application by application id and user id.
logto.logto_list_application_user_consent_scopes Read read 0 List all the user consent scopes of an application by application id
logto.logto_list_applications Read read 0 Get applications that match the given query with pagination.
logto.logto_list_connector_factories Read read 0 Get all connector factories data available in Logto.
logto.logto_list_connectors Read read 0 Get all connectors in the current tenant.
logto.logto_list_custom_phrases Read read 0 Get all custom phrases for all languages.
logto.logto_list_custom_profile_fields Read read 0 Get all custom profile fields.
logto.logto_list_domains Read read 0 Get all of your custom domains.
logto.logto_list_email_templates Read read 0 Get the list of email templates.
logto.logto_list_hook_recent_logs Read read 0 Get recent logs that match the given query for the specified hook with pagination.
logto.logto_list_hooks Read read 0 Get a list of hooks with optional pagination.
logto.logto_list_jwt_customizers Read read 0 Get all JWT customizers for the tenant.
logto.logto_list_logs Read read 0 Get logs that match the given query with pagination.
logto.logto_list_one_time_tokens Read read 0 Get a list of one-time tokens, filtering by email and status, with optional pagination.
logto.logto_list_organization_application_roles Read read 0 Get roles associated with the application in the organization.
logto.logto_list_organization_applications Read read 0 Get applications associated with the organization.
logto.logto_list_organization_invitations Read read 0 Get organization invitations.
logto.logto_list_organization_jit_email_domains Read read 0 Get email domains for just-in-time provisioning of users in the organization.
logto.logto_list_organization_jit_roles Read read 0 Get organization roles that will be assigned to users during just-in-time provisioning.
logto.logto_list_organization_jit_sso_connectors Read read 0 Get enterprise SSO connectors for just-in-time provisioning of users in the organization.
logto.logto_list_organization_role_resource_scopes Read read 0 Get resource scopes that are assigned to the specified organization role with optional pagination.
logto.logto_list_organization_role_scopes Read read 0 Get organization scopes that are assigned to the specified organization role with optional pagination.
logto.logto_list_organization_roles Read read 0 Get organization roles with pagination.
logto.logto_list_organization_scopes Read read 0 Get organization scopes that match with optional pagination.
logto.logto_list_organization_user_roles Read read 0 Get roles assigned to a user in the specified organization with pagination.
logto.logto_list_organization_user_scopes Read read 0 Get scopes assigned to a user in the specified organization tailored by the organization roles. The scopes are derived from the organization roles assigned to the user.
logto.logto_list_organization_users Read read 0 Get users that are members of the specified organization for the given query with pagination.
logto.logto_list_organizations Read read 0 Get organizations that match the given query with pagination.
logto.logto_list_resource_scopes Read read 0 Get scopes (permissions) defined for an API resource.
logto.logto_list_resources Read read 0 Get API resources in the current tenant with pagination.
logto.logto_list_role_applications Read read 0 Get applications that have the role assigned with pagination.
logto.logto_list_role_scopes Read read 0 Get API resource scopes (permissions) linked with a role.
logto.logto_list_role_users Read read 0 Get users who have the role assigned with pagination.
logto.logto_list_roles Read read 0 Get roles with filters and pagination.
logto.logto_list_saml_application_metadata Read read 0 Get the SAML metadata XML for the application.
logto.logto_list_saml_application_secrets Read read 0 Get all signing certificates of the SAML application.
logto.logto_list_sso_connector_providers Read read 0 Get a complete list of supported SSO connector providers.
logto.logto_list_sso_connectors Read read 0 Get SSO connectors with pagination. In addition to the raw SSO connector data, a copy of fetched or parsed IdP configs and a copy of connector provider's data will be attached.
logto.logto_list_user_all_identities Read read 0 This API retrieves all identities (social and enterprise SSO) for a user, along with their associated token set records from the Logto Secret Vault. The token sets will only be available if token storage is enabled for the corresponding identity connector.
logto.logto_list_user_custom_data Read read 0 Get custom data for the given user ID.
logto.logto_list_user_grants Read read 0 Retrieve all non-expired grants of the user. Optionally filter by application type via `appType`; when omitted, grants from all application types are returned.
logto.logto_list_user_logto_configs Read read 0 Retrieve the exposed portion of a user's logto config. Includes MFA states (enabled, skipped, skipMfaOnSignIn) and passkey sign-in states (skipped).
logto.logto_list_user_mfa_verifications Read read 0 Get a user's existing MFA verifications for a given user ID.
logto.logto_list_user_organizations Read read 0 Get all organizations that the user is a member of. In each organization object, the user's roles in that organization are included in the `organizationRoles` array.
logto.logto_list_user_personal_access_tokens Read read 0 Get all personal access tokens for the user.
logto.logto_list_user_roles Read read 0 Get API resource roles assigned to the user with pagination.
logto.logto_list_user_sessions Read read 0 Retrieve all non-expired sessions for the user, including session metadata and interaction details when available.
logto.logto_list_users Read read 0 Get users with filters and pagination. Logto provides a very flexible way to query users. You can filter users by almost any fields with multiple modes. To learn more about the query syntax, please refer to [Advanced user search](https://docs.logto.io/docs/recipes/manage-users/advanced-user-search/).
logto.logto_mark_mfa_enabled Write write 0 Mark the user's MFA as enabled for the current interaction and persist in DB user configs upon successful submission.
logto.logto_replace_application_roles Write write 0 Update API resource roles assigned to the specified application. This will replace the existing API resource roles.
logto.logto_replace_application_sign_in_experience Write write 0 Update application level sign-in experience for the specified application. Create a new sign-in experience if it does not exist. - Only branding properties and terms links customization is supported for now. - Only third-party applications can be customized for now. - Application level sign-in experience customization is optional, if provided, it will override the default branding and terms links.
logto.logto_replace_application_user_consent_organizations Write write 0 Grant a list of organization access of a user for a application by application id and user id. The user must be a member of all the organizations. Only third-party application needs to be granted access to organizations, all the other applications can request for all the organizations' access by default.
logto.logto_replace_custom_phrase Write write 0 Upsert custom phrases for the specified language tag. Upsert means that if the custom phrases already exist, they will be updated. Otherwise, they will be created.
logto.logto_replace_email_templates Write write 0 Create or replace a list of email templates. If an email template with the same language tag and template type already exists, its details will be updated.
logto.logto_replace_one_time_token_status Write write 0 Update the status of a one-time token by its ID. This can be used to mark the token as consumed or expired.
logto.logto_replace_organization_application_roles Write write 0 Replace all roles associated with the application in the organization with the given data.
logto.logto_replace_organization_applications Write write 0 Replace all applications associated with the organization with the given data.
logto.logto_replace_organization_invitation_status Write write 0 Update the status of an organization invitation by ID.
logto.logto_replace_organization_jit_email_domains Write write 0 Replace all just-in-time provisioning email domains for the organization with the given data.
logto.logto_replace_organization_jit_roles Write write 0 Replace all organization roles that will be assigned to users during just-in-time provisioning with the given data.
logto.logto_replace_organization_jit_sso_connectors Write write 0 Replace all enterprise SSO connectors for just-in-time provisioning of users in the organization with the given data.
logto.logto_replace_organization_role_resource_scopes Write write 0 Replace all resource scopes that are assigned to the specified organization role with the given resource scopes. This effectively removes all existing organization scope assignments and replaces them with the new ones.
logto.logto_replace_organization_role_scopes Write write 0 Replace all organization scopes that are assigned to the specified organization role with the given organization scopes. This effectively removes all existing organization scope assignments and replaces them with the new ones.
logto.logto_replace_organization_user_roles Write write 0 Update roles assigned to a user in the specified organization with the provided data.
logto.logto_replace_organization_users Write write 0 Replace all user members for the specified organization with the given users. This effectively removing all existing user memberships in the organization and adding the new users as members.
logto.logto_replace_user_identity Write write 0 Directly update a social identity of the user.
logto.logto_replace_user_roles Write write 0 Update API resource roles assigned to the user. This will replace the existing roles.
logto.logto_reset_user_password Write write 0 Reset the user's password. (`ForgotPassword` interaction only)
logto.logto_rotate_oidc_keys Write write 0 A new key will be generated and prepend to the list of keys. Only two recent keys will be kept. The oldest key will be automatically removed if there are more than two keys.
logto.logto_skip_mfa_binding_flow Write write 0 Skip MFA verification binding flow. If the MFA is enabled in the sign-in experience settings and marked as `UserControlled`, the user can skip the MFA verification binding flow by calling this API.
logto.logto_skip_mfa_suggestion Write write 0 Mark the optional additional MFA binding suggestion as skipped for the current interaction. When multiple MFA factors are enabled and only an email/phone factor is configured, a suggestion to add another factor may be shown; this endpoint records the choice to skip.
logto.logto_skip_passkey_binding Write write 0 Skip passkey binding flow. The users can temporarily skip the passkey binding flow by calling this API during sign-up. On sign-in, the skip flag will be persisted to user config.
logto.logto_submit_interaction Write write 0 Submit the current interaction. - Submit the verified user identity to the OIDC provider for further authentication (SignIn and Register). - Update the user's profile data if any (SignIn and Register). - Reset the password and clear all the interaction records (ForgotPassword).
logto.logto_test_jwt_customizer Write write 0 Test the JWT customizer script with the given sample context and sample token payload.
logto.logto_update_account_center_settings Write write 0 Update the account center settings with the provided settings.
logto.logto_update_admin_console_config Write write 0 Update the global configuration object for Logto Console. This method performs a partial update.
logto.logto_update_application Write write 0 Update application details by ID with the given data.
logto.logto_update_application_custom_data Write write 0 Update the custom data of an application.
logto.logto_update_application_secret Write write 0 Update a secret for the application by name.
logto.logto_update_captcha_provider Write write 0 Update the captcha provider with the provided settings.
logto.logto_update_connector Write write 0 Update connector by ID with the given data. This methods performs a partial update.
logto.logto_update_custom_profile_field_by_name Write write 0 Update a custom profile field by name.
logto.logto_update_custom_profile_fields_sie_order Write write 0 Update the display order of the custom profile fields in Sign-in Experience.
logto.logto_update_email_template_details Write write 0 Update the details of an email template by its ID.
logto.logto_update_hook Write write 0 Update hook details by ID with the given data.
logto.logto_update_hook_signing_key Write write 0 Update the signing key for the specified hook.
logto.logto_update_interaction_event Write write 0 Update the current experience interaction event to the given event type. This API is used to switch the interaction event between `SignIn` and `Register`, while keeping all the verification records data.
logto.logto_update_jwt_customizer Write write 0 Update the JWT customizer for the given token type.
logto.logto_update_logto_config Write write 0 Update the exposed portion of the current user's logto config. Supports updating MFA states (enabled, skipped, skipMfaOnSignIn) and passkey sign-in binding states (skipped). Passkey is a WebAuthn MFA factor and shares the same account center field access control as MFA.
logto.logto_update_mfa_settings Write write 0 Update MFA settings for the user. This endpoint requires identity verification and the Identities scope. Controls whether MFA verification is required during sign-in when the user has MFA configured.
logto.logto_update_mfa_verification_name Write write 0 Update a MFA verification name, a logto-verification-id in header is required for checking sensitive permissions. Only WebAuthn is supported for now.
logto.logto_update_oidc_session_config Write write 0 Update the OIDC session configuration for the tenant. This method performs a partial update. If the configuration does not exist, it will be created.
logto.logto_update_organization Write write 0 Update organization details by ID with the given data.
logto.logto_update_organization_role Write write 0 Update organization role details by ID with the given data.
logto.logto_update_organization_scope Write write 0 Update organization scope details by ID with the given data.
logto.logto_update_other_profile Write write 0 Update other profile for the user, only the fields that are passed in will be updated, to update the address, the user must have the address scope.
logto.logto_update_password Write write 0 Update password for the user, a logto-verification-id in header is required for checking sensitive permissions.
logto.logto_update_personal_access_token_name Write write 0 Update a token for the user by name.
logto.logto_update_primary_email Write write 0 Update primary email for the user, a logto-verification-id in header is required for checking sensitive permissions, and a new identifier verification record is required for the new email ownership verification.
logto.logto_update_primary_phone Write write 0 Update primary phone for the user, a logto-verification-id in header is required for checking sensitive permissions, and a new identifier verification record is required for the new phone ownership verification.
logto.logto_update_profile Write write 0 Update profile for the user, only the fields that are passed in will be updated. Updating or deleting username requires a logto-verification-id header for checking sensitive permissions. Removing any sign-in identifier, including username, is rejected if it would remove the user's last identifier.
logto.logto_update_resource Write write 0 Update an API resource details by ID with the given data. This method performs a partial update.
logto.logto_update_resource_is_default Write write 0 Set an API resource as the default resource for the current tenant. Each tenant can have only one default API resource. If an API resource is set as default, the previously set default API resource will be set as non-default. See [this section](https://docs.logto.io/docs/references/resources/#default-api) for more information.
logto.logto_update_resource_scope Write write 0 Update an API resource scope (permission) for the given resource. This method performs a partial update.
logto.logto_update_role Write write 0 Update role details. This method performs a partial update.
logto.logto_update_saml_application Write write 0 Update SAML application details by ID.
logto.logto_update_saml_application_secret Write write 0 Update the status of a signing certificate.
logto.logto_update_sign_in_exp Write write 0 Update the default sign-in experience settings with the provided data.
logto.logto_update_social_identity_access_token_by_verification_id Write write 0 This API updates the token storage for a social identity by a given social verification ID. It is used to fetch a new access token from the social provider and store it securely in Logto.
logto.logto_update_sso_connector Write write 0 Update an SSO connector by ID. This method performs a partial update.
logto.logto_update_user Write write 0 Update user data for the given ID. This method performs a partial update.
logto.logto_update_user_custom_data Write write 0 Update custom data for the given user ID. This method performs a partial update of the custom data object.
logto.logto_update_user_is_suspended Write write 0 Update user suspension status for the given ID.
logto.logto_update_user_logto_configs Write write 0 Update the exposed portion of a user's logto config. Supports updating MFA states (enabled, skipped, skipMfaOnSignIn) and passkey sign-in states (skipped). All fields are optional - only provided fields will be updated.
logto.logto_update_user_password Write write 0 Update user password for the given ID.
logto.logto_update_user_personal_access_token Write write 0 Update a token for the user by name using the legacy path parameter. Deprecated: use the PATCH /personal-access-tokens endpoint instead to avoid url name encoding issues.
logto.logto_update_user_profile Write write 0 Update profile for the given user ID. This method performs a partial update of the profile object.
logto.logto_upload_custom_ui_assets Write write 0 Upload a zip file containing custom web assets such as HTML, CSS, and JavaScript files, then replace the default sign-in experience with the custom UI assets.
logto.logto_upsert_id_token_config Write write 0 Create or update the ID token extended claims configuration for the tenant. This controls which extended claims are included in ID tokens when the corresponding scopes are requested.
logto.logto_upsert_jwt_customizer Write write 0 Create or update a JWT customizer for the given token type.
logto.logto_verify_backup_code Write write 0 Create a new BackupCode verification record and verify the provided backup code against the user's backup codes. The verification record will be marked as verified if the code is correct.
logto.logto_verify_enterprise_sso_verification Write write 0 Verify the SSO authorization response data and get the user's identity from the SSO provider.
logto.logto_verify_mfa_verification_code Write write 0 Verify the provided MFA verification code. The verification code must have been sent using the MFA verification code endpoint. This endpoint verifies the code against the user's bound identifier and marks the verification as complete if successful.
logto.logto_verify_one_time_token Write write 0 Verify a one-time token associated with an email address. If the token is valid and not expired, it will be marked as consumed.
logto.logto_verify_one_time_token_verification Write write 0 Verify the provided one-time token against the user's email. If successful, the verification record will be marked as verified.
logto.logto_verify_sign_in_passkey_authentication Write write 0 Verify the passkey sign-in WebAuthn authentication response against the stored authentication challenge. When `verificationId` is provided, it verifies against the challenge generated by the identifier-based authentication endpoint. When omitted, it verifies against the preflight authentication options stored in the interaction. Upon successful verification, the verification record will be marked as verified and the user will be resolved by the credential if not provided earlier.
logto.logto_verify_social_verification Write write 0 Verify the social authorization response data and get the user's identity data from the social provider.
logto.logto_verify_totp_verification Write write 0 Verifies the provided TOTP code against the new created TOTP secret or the existing TOTP secret. If a verificationId is provided, this API will verify the code against the TOTP secret that is associated with the verification record. Otherwise, a new TOTP verification record will be created and verified against the user's existing TOTP secret.
logto.logto_verify_user_password Write write 0 Test if the given password matches the user's password.
logto.logto_verify_verification_by_social Write write 0 Verify a social verification record by callback connector data, and save the user information to the record.
logto.logto_verify_verification_by_verification_code Write write 0 Verify the provided verification code against the identifier. If successful, the verification record will be marked as verified.
logto.logto_verify_verification_code Write write 0 Verify a verification code for a specified identifier. if you're using email as the identifier, you need to setup your email connector first. if you're using phone as the identifier, you need to setup your SMS connector first.
logto.logto_verify_verification_code_verification Write write 0 Verify the provided verification code against the user's identifier. If successful, the verification record will be marked as verified.
logto.logto_verify_web_authn_authentication_verification Write write 0 Verifies the WebAuthn authentication response against the user's authentication challenge. Upon successful verification, the verification record will be marked as verified.
logto.logto_verify_web_authn_registration Write write 0 Verify the WebAuthn registration by the user's response.
logto.logto_verify_web_authn_registration_verification Write write 0 Verify the WebAuthn registration response against the user's WebAuthn registration challenge. If the response is valid, the WebAuthn registration record will be marked as verified.