Open
Conversation
COMPARE TO
|
| Name | Diff |
|---|---|
| .changeset/fluffy-dancers-sing.md | 📈 +471 Bytes |
| .changeset/friendly-crews-ring.md | 📈 +643 Bytes |
| .changeset/gold-sloths-hope.md | 📈 +130 Bytes |
| .changeset/kind-eels-march.md | 📈 +907 Bytes |
| .changeset/soft-ways-switch.md | 📈 +1.96 KB |
| .changeset/spotty-bobcats-guess.md | 📈 +753 Bytes |
| .changeset/thin-squids-sit.md | 📈 +136 Bytes |
| .changeset/tidy-bananas-jog.md | 📈 +124 Bytes |
| .changeset/two-steaks-invite.md | 📈 +1.52 KB |
| packages/account/CHANGELOG.md | 📈 +141 Bytes |
| packages/account/package.json | 0 Bytes |
| packages/api/CHANGELOG.md | 📈 +11 Bytes |
| packages/api/package.json | 0 Bytes |
| packages/cli/CHANGELOG.md | 📈 +119 Bytes |
| packages/cli/package.json | 0 Bytes |
| packages/connectors/connector-twilio-sms/CHANGELOG.md | 📈 +134 Bytes |
| packages/connectors/connector-twilio-sms/package.json | 0 Bytes |
| packages/console/CHANGELOG.md | 📈 +3.17 KB |
| packages/console/package.json | 0 Bytes |
| packages/core/CHANGELOG.md | 📈 +5.4 KB |
| packages/core/package.json | 0 Bytes |
| packages/create/CHANGELOG.md | 📈 +51 Bytes |
| packages/create/package.json | 0 Bytes |
| packages/experience/CHANGELOG.md | 📈 +2.44 KB |
| packages/experience/package.json | 0 Bytes |
| packages/integration-tests/CHANGELOG.md | 📈 +2.44 KB |
| packages/integration-tests/package.json | 0 Bytes |
| packages/phrases-experience/CHANGELOG.md | 📈 +93 Bytes |
| packages/phrases-experience/package.json | 0 Bytes |
| packages/schemas/CHANGELOG.md | 📈 +130 Bytes |
| packages/schemas/alterations/1.38.0-1772615848-add-oidc-model-instances-grant-id-partial-index.ts | 📈 +793 Bytes |
| packages/schemas/alterations/1.38.0-1772619963-tune-oidc-model-instances-autovacuum.ts | 📈 +758 Bytes |
| packages/schemas/alterations/next-1772615848-add-oidc-model-instances-grant-id-partial-index.ts | 📈 +793 Bytes |
| packages/schemas/alterations/next-1772619963-tune-oidc-model-instances-autovacuum.ts | 📈 +758 Bytes |
| packages/schemas/package.json | 0 Bytes |
| packages/toolkit/core-kit/CHANGELOG.md | 📈 +485 Bytes |
| packages/toolkit/core-kit/package.json | 0 Bytes |
| packages/translate/CHANGELOG.md | 📈 +130 Bytes |
| packages/translate/package.json | 0 Bytes |
| packages/tunnel/CHANGELOG.md | 📈 +92 Bytes |
| packages/tunnel/package.json | 0 Bytes |
| pnpm-lock.yaml | 📈 +1.36 KB |
da024ec to
28fb5f5
Compare
28fb5f5 to
783544e
Compare
783544e to
5de51e9
Compare
5de51e9 to
2cc344b
Compare
2cc344b to
e695b85
Compare
e695b85 to
833188f
Compare
833188f to
7e2a939
Compare
7e2a939 to
d18979b
Compare
d18979b to
054a186
Compare
6f4593b to
960476e
Compare
960476e to
cf2e3c5
Compare
cf2e3c5 to
bd9668f
Compare
bd9668f to
9509811
Compare
9509811 to
2168246
Compare
2168246 to
afbbf55
Compare
afbbf55 to
c2c2093
Compare
c2c2093 to
342c915
Compare
342c915 to
f92c9e2
Compare
f92c9e2 to
d72ebee
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and publish to npm yourself or setup this action to publish automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to master, this PR will be updated.
Releases
@logto/core-kit@2.8.0
Minor Changes
74c993a: introduce new
UserScope.SessionsscopeThis change introduces a new
urn:logto:scope:sessionsuser scope to the Logto system.This new scope does not issue any additional user claims, but serves as a permission marker for accessing session-related endpoints in the user account API. By including this scope in the user's permissions, applications can enable features such as session management and session revocation for that user.
@logto/cli@1.38.0
Patch Changes
@logto/connector-twilio-sms@1.4.2
Patch Changes
Toformatting by normalizing non-E.164 numbers to include a leading+.@logto/create@1.38.0
Patch Changes
@logto/phrases-experience@1.12.3
Patch Changes
@logto/schemas@1.38.0
Patch Changes
@logto/translate@0.2.11
Patch Changes
@logto/tunnel@0.3.6
Patch Changes
@logto/api@1.38.0
@logto/account@0.3.0
Minor Changes
@logto/console@1.35.0
Minor Changes
a023a97: add a new MFA onboarding page for users to explicitly enable optional MFA
For users who are not required to set up MFA, we added a new page after credential verification in the sign-in flow to explicitly ask whether they want to enable optional MFA for better account security.
This is especially important when the passkey sign-in feature is available, since passkeys can be used for both sign-in and MFA verification, and users who set up a passkey for sign-in might not want to enable it as an MFA factor at the same time.
a023a97: support passkey sign-in authentication method
Summary
Passkey sign-in provides a faster, passwordless sign-in experience that reduces friction for end users and helps improve account security. It removes repeated password entry for returning users, works with platform authenticators users already trust (for example Face ID, Touch ID, Windows Hello), and offers a smoother path from account creation to subsequent sign-ins.
Bind passkey for sign-in
After passkey sign-in is enabled, new users are prompted to bind a passkey during registration. Existing users who have not bound a passkey (WebAuthn) factor yet can be guided to bind one in a later sign-in flow. If a user already has a WebAuthn credential from MFA setup, that credential can be reused directly for passkey sign-in without requiring another registration step.
Various sign-in flows to support different user journeys and preferences
Check out our documentation for more details.
74c993a: introduce user session management in Console.
Account center settings:
sessionpermission control for account API access, withoff,readOnly, andeditoptions.User sessions page:
Managebutton or a session entry.User session details page:
@logto/core@1.38.0
Minor Changes
a023a97: add a new MFA onboarding page for users to explicitly enable optional MFA
For users who are not required to set up MFA, we added a new page after credential verification in the sign-in flow to explicitly ask whether they want to enable optional MFA for better account security.
This is especially important when the passkey sign-in feature is available, since passkeys can be used for both sign-in and MFA verification, and users who set up a passkey for sign-in might not want to enable it as an MFA factor at the same time.
6dbafe5: support access token exchange for service-to-service delegation
The standard
subject_token_typevalueurn:ietf:params:oauth:token-type:access_tokennow supports access token exchange. This allows services to exchange access tokens (both opaque and JWT formats) issued by Logto for new access tokens with different audiences, enabling service-to-service delegation scenarios.Token validation order:
sub_prefix, treat as legacy impersonation token (backward compatibility)Access tokens are not consumption-tracked, allowing the same token to be exchanged multiple times (e.g., by different services).
Additionally, a new
urn:logto:token-type:impersonation_tokentype has been added for explicit impersonation token handling.a023a97: support passkey sign-in authentication method
Summary
Passkey sign-in provides a faster, passwordless sign-in experience that reduces friction for end users and helps improve account security. It removes repeated password entry for returning users, works with platform authenticators users already trust (for example Face ID, Touch ID, Windows Hello), and offers a smoother path from account creation to subsequent sign-ins.
Bind passkey for sign-in
After passkey sign-in is enabled, new users are prompted to bind a passkey during registration. Existing users who have not bound a passkey (WebAuthn) factor yet can be guided to bind one in a later sign-in flow. If a user already has a WebAuthn credential from MFA setup, that credential can be reused directly for passkey sign-in without requiring another registration step.
Various sign-in flows to support different user journeys and preferences
Check out our documentation for more details.
74c993a: introduce session management endpoints for account and management APIs, with optional grants revocation and richer session context.
Account APIs:
GET /my-account/sessions.DELETE /my-account/sessions/:sessionId.revokeGrantsTarget:allrevokes grants for all apps;firstPartyrevokes only first-party app grants.sessionwithoff,readOnly, andeditto control access to the session management account APIs.urn:logto:scope:sessionsuser scope (UserScope.Sessions). Only tokens with this scope granted can access these endpoints.Management APIs:
GET /users/:userId/sessions.GET /users/:userId/sessions/:sessionId.DELETE /users/:userId/sessions/:sessionId.revokeGrantsTarget:allrevokes grants for all apps;firstPartyrevokes only first-party app grants.Session context:
session.lastSubmission.Patch Changes
hex:-prefixed PBKDF2 salt values in legacy password verification during user import@logto/experience@1.19.0
Minor Changes
a023a97: add a new MFA onboarding page for users to explicitly enable optional MFA
For users who are not required to set up MFA, we added a new page after credential verification in the sign-in flow to explicitly ask whether they want to enable optional MFA for better account security.
This is especially important when the passkey sign-in feature is available, since passkeys can be used for both sign-in and MFA verification, and users who set up a passkey for sign-in might not want to enable it as an MFA factor at the same time.
a023a97: support passkey sign-in authentication method
Summary
Passkey sign-in provides a faster, passwordless sign-in experience that reduces friction for end users and helps improve account security. It removes repeated password entry for returning users, works with platform authenticators users already trust (for example Face ID, Touch ID, Windows Hello), and offers a smoother path from account creation to subsequent sign-ins.
Bind passkey for sign-in
After passkey sign-in is enabled, new users are prompted to bind a passkey during registration. Existing users who have not bound a passkey (WebAuthn) factor yet can be guided to bind one in a later sign-in flow. If a user already has a WebAuthn credential from MFA setup, that credential can be reused directly for passkey sign-in without requiring another registration step.
Various sign-in flows to support different user journeys and preferences
Check out our documentation for more details.
@logto/integration-tests@1.20.0
Minor Changes
a023a97: add a new MFA onboarding page for users to explicitly enable optional MFA
For users who are not required to set up MFA, we added a new page after credential verification in the sign-in flow to explicitly ask whether they want to enable optional MFA for better account security.
This is especially important when the passkey sign-in feature is available, since passkeys can be used for both sign-in and MFA verification, and users who set up a passkey for sign-in might not want to enable it as an MFA factor at the same time.
a023a97: support passkey sign-in authentication method
Summary
Passkey sign-in provides a faster, passwordless sign-in experience that reduces friction for end users and helps improve account security. It removes repeated password entry for returning users, works with platform authenticators users already trust (for example Face ID, Touch ID, Windows Hello), and offers a smoother path from account creation to subsequent sign-ins.
Bind passkey for sign-in
After passkey sign-in is enabled, new users are prompted to bind a passkey during registration. Existing users who have not bound a passkey (WebAuthn) factor yet can be guided to bind one in a later sign-in flow. If a user already has a WebAuthn credential from MFA setup, that credential can be reused directly for passkey sign-in without requiring another registration step.
Various sign-in flows to support different user journeys and preferences
Check out our documentation for more details.