description | layout | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
In this section of the Authgear documentation, you'll learn about all the GraphQL queries and mutations the Admin API supports. |
|
Authgear provides a GraphQL API that you can use to manage users and other resources right from your application or using the GraphiQL Explorer in Authgear Portal > Advanced > Admin API.
The following section shows a detailed description and examples of supported queries and mutations.
The auditLogs query returns a list of all activities (logs) from the audit log.
Schema:
auditLogs(
first: Int
last: Int
userIDs: [ID!]
sortDirection: SortDirection
before: String
after: String
rangeFrom: DateTime
rangeTo: DateTime
activityTypes: [AuditLogActivityType!]
): AuditLogConnection
Example:
{% tabs %} {% tab title="Query" %}
query {
auditLogs(first: 4) {
edges {
node {
id
activityType
createdAt
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"auditLogs": {
"edges": [
{
"node": {
"activityType": "USER_AUTHENTICATED",
"createdAt": "2023-09-11T09:23:51Z",
"id": "QXVkaXRMb2c6MDAwMDAwMDAwMDA0ZDVjOQ"
}
}
]
}
}
}
{% endtab %} {% endtabs %}
You can use this query to fetch all registered users on your application. The users query returns a list of type User.
Schema:
users(
first: Int
last: Int
searchKeyword: String
sortBy: UserSortBy
sortDirection: SortDirection
before: String
after: String
): UserConnection
Example:
{% tabs %} {% tab title="Query" %}
query {
users(first: 2) {
edges {
node {
id
standardAttributes
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"users": {
"edges": [
{
"node": {
"id": "VXNlcjo4ZGM4ZDgyjjkoKA0LTRjZGEtODZiOC03OTY4MGUwYzA5OGM",
"standardAttributes": {
"email": "[email protected]",
"email_verified": true,
"family_name": "John",
"given_name": "Doe",
"updated_at": 1686820949
}
}
},
{
"node": {
"id": "VXNlcjplMzA3OTAyaxKJuILTRjMjQtOTFjMS1jMmNkNjNhNmE0YWY",
"standardAttributes": {
"email": "[email protected]",
"email_verified": true,
"family_name": "Eliano",
"given_name": "Don",
"updated_at": 1694359032
}
}
}
]
}
}
}
{% endtab %} {% endtabs %}
A node represents a single object of different Types. The node query allows you to query a single object using the node ID. You learn more about node ID here: https://docs.authgear.com/reference/apis/admin-api/node-id.
Schema:
node(id: ID!): Node
Example:
You can specify different object types to the node query to fetch an item of that type. Examples of node Types include User
, AuditLog
, Session
, Authenticator
, Authorization
, and Identity
.
The following example uses the AuditLog node type.
{% tabs %} {% tab title="Query" %}
query {
node(id: "QXVkaXRMb2c6MDAwHJKwMDAwMDA0ZDViOQ") {
id
... on AuditLog {
id
activityType
createdAt
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"node": {
"activityType": "USER_AUTHENTICATED",
"createdAt": "2023-09-11T09:23:51Z",
"id": "QXVkaXRMb2c6MDAwHJKwMDAwMDA0ZDViOQ"
}
}
}
{% endtab %} {% endtabs %}
The nodes query returns a list of nodes. This works similarly to the node query except that instead of supplying a single ID, you can provide a list of IDs for the objects you are querying for.
Schema:
nodes(ids: [ID!]!): [Node]!
Example:
{% tabs %} {% tab title="Query" %}
query {
nodes(ids: ["<NODE ID1>","<NODE ID2>"]) {
id
... on AuditLog {
id
activityType
createdAt
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"nodes": [
{
"activityType": "USER_AUTHENTICATED",
"createdAt": "2023-09-11T09:23:51Z",
"id": "QXKytXRMb4n6MDAwMDAwMDAwMDA0ZDVjUK"
},
{
"activityType": "USER_PROFILE_UPDATED",
"createdAt": "2023-09-14T06:57:27Z",
"id": "QXVkaXABb7c6MDAwMDAwMDAwMDA0ZGKkZA"
}
]
}
}
{% endtab %} {% endtabs %}
The groups query returns a list of all groups in an Authgear project. It will return nothing if no group has been created yet. Groups can be a field in the roles
query.
Schema:
groups(
searchKeyword: String
excludedIDs: [ID!]
after: String
first: Int
last: Int
before: String
): GroupConnection
Example:
{% tabs %} {% tab title="Query" %}
query {
groups(first: 10) {
edges {
cursor
node {
id
key
description
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"groups": {
"edges": [
{
"cursor": "b2Zmc2V0OjA",
"node": {
"description": "Staff members with super admin permissions",
"id": "R3JvdXA6OTU4YTA2ODIXRMb4n6MDAwMDAwMDAwMDA0ZDVjUKx",
"key": "admin_staff"
}
},
{
"cursor": "b2Zmc2V0OjE",
"node": {
"description": "Group for quickly applying team_member role to batch users.",
"id": "R3JvdXA6XRMb4n6MDAwMDAwMDAwMDA0ZDVjUKJl",
"key": "regular_staff"
}
}
]
}
}
}
{% endtab %} {% endtabs %}
You can use this query to get all the roles available in an Authgear project. The roles query will return nothing if no roles have been created for the Authgear project. Roles can also be a field in the node of the groups
query. See Manage Users Roles and Groups to learn more about roles and groups.
Schema:
roles(
excludedIDs: [ID!]
last: Int
before: String
after: String
first: Int
searchKeyword: String
): RoleConnection
Example:
{% tabs %} {% tab title="Query" %}
query {
roles(first: 10) {
edges {
cursor
node {
id
key
description
groups {
edges{
node {
key
}
}
}
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"roles": {
"edges": [
{
"cursor": "b2Zmc2V0OjA",
"node": {
"description": "Leads a specific department where they also work.",
"groups": {
"edges": []
},
"id": "Um9sZTozMjc5NWRiNhOTgtOTzMzZkZGNi1hOWVkLTE2MC0RlOWFkMTM",
"key": "department_lead"
}
},
{
"cursor": "b2Zmc2V0OjE",
"node": {
"description": "Regular staff working in a specific department.",
"groups": {
"edges": [
{
"node": {
"key": "regular_staff"
}
}
]
},
"id": "Um9sZToyMjc5NWRiNhOTgtOTzMzZkZGNi1hOWVkLTE2MC0RlOWFkZTA",
"key": "team_member"
}
}
]
}
}
}
{% endtab %} {% endtabs %}
With mutations, you can modify data from your application using the Admin API GraphQL. For example, you can use mutation to update
Calling this mutation will change a specific user account to an anonymous account. In other words, this query anonymizes a specific user. This action will delete the user's data like name and gender.
Schema:
anonymizeUser(input: AnonymizeUserInput!): AnonymizeUserPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
anonymizeUser(input: {userID: "<ENCODED USER ID>"}) {
anonymizedUserID
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"anonymizeUser": {
"anonymizedUserID": "XYQlcjo4ZGM4ZDg5OC1jNjA0ERRjZGEtODZiOC134TY4MGUwYzA5OGM"
}
}
}
{% endtab %} {% endtabs %}
The createIdentity mutation creates a new identity for a user.
Schema:
createIdentity(input: CreateIdentityInput!): CreateIdentityPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
createIdentity(input: {userID: "<ENCODED USER ID>", definition: {loginID: {key: "email", value: "[email protected]"}}, password: "@x1ujD-9$"}) {
identity {
id
claims
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"createIdentity": {
"identity": {
"claims": {
"email": "[email protected]",
"https://authgear.com/claims/login_id/key": "email",
"https://authgear.com/claims/login_id/original_value": "[email protected]",
"https://authgear.com/claims/login_id/type": "email",
"https://authgear.com/claims/login_id/value": "[email protected]"
},
"id": "SWRlbnRpdHk6YjHiZGVhNjctABCwMy00OWU2LWIyOTMtNTIwMGU3KKUkMTBl"
}
}
}
}
{% endtab %} {% endtabs %}
The createUser mutation makes it possible to create a new user account from the Admin API.
Schema:
createUser(input: CreateUserInput!): CreateUserPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
createUser(input: {definition: {loginID: {key: "email", value: "[email protected]"}}, password:"my$ecurepa55"}) {
user{
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"createUser": {
"user": {
"id": "VXNlciklODRkMzdjZi1hZDQ5LTRiZDItOTMzZJ2tOGY1YThlYjc34RE",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694713743
}
}
}
}
}
{% endtab %} {% endtabs %}
This mutation deletes an authenticator for a specific user.
Schema:
deleteAuthenticator(input: DeleteAuthenticatorInput!): DeleteAuthenticatorPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteAuthenticator(input: {authenticatorID: "<ENCODED AUTHENTICATOR ID>"}) {
user {
authenticators {
edges {
node {
id
}
}
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"deleteAuthenticator": {
"user": {
"authenticators": {
"edges": [
{
"node": {
"id": "QXV0aGVudGljYXRvcjpkGHczOGM0Yy0yNmY2LTQyOWMtODc0OS1kYTA3NjYxZjE0ABC"
}
}
]
}
}
}
}
{% endtab %} {% endtabs %}
You can use the deleteAuthorization mutation to delete an existing authorization for a user.
Schema:
deleteAuthorization(input: DeleteAuthorizationInput!): DeleteAuthorizationPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteAuthorization(input: {authorizationID: "<ENCODED AUTHORIZATION ID>"}) {
user {
authorizations {
edges {
node {
id
}
}
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"deleteAuthorization": {
"user": {
"authorizations": {
"edges": [
{
"node": {
"id": "QXV0aG9yaXphdGlvbjpkHFczOGM0Yy0yNmY2LTQyOWMtODc0OS1kYTA3NjYxZjE0EFG"
}
}
]
}
}
}
}
{% endtab %} {% endtabs %}
The deleteIdentity mutation deletes the identity of a user.
Schema:
deleteIdentity(input: DeleteIdentityInput!): DeleteIdentityPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteIdentity(
input: {identityID: "<ENCODED IDENTITY ID>"}) {
user {
identities {
edges {
node {
id
}
}
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"deleteIdentity": {
"user": {
"identities": {
"edges": [
{
"node": {
"id": "SWRlbgsgdggGj7776JJkDc1My00ZTM2LWEyNTktZjg0ZjUyOER4NWJi"
}
}
]
}
}
}
}
}
{% endtab %} {% endtabs %}
This mutation allows you to delete a specific user using the Admin API.
Schema:
deleteUser(input: DeleteUserInput!): DeleteUserPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteUser(input: { userID: "<ENCODED USER ID>"}) {
deletedUserID
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"deleteUser": {
"deletedUserID": "VXNxcjowOKKcMzdjZi1hZDQ5LTRiZDItOTMzZC0yOGY1YThlYja86DQ"
}
}
}
{% endtab %} {% endtabs %}
Calling the generateOOBOTPCode mutation will generate a new OOB OTP Code for a user. This mutation allows you to specify the purpose and target of the OTP as input.
Schema:
generateOOBOTPCode(input: GenerateOOBOTPCodeInput!): GenerateOOBOTPCodePayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
generateOOBOTPCode(input: {purpose: LOGIN, target: "[email protected]"}) {
code
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"generateOOBOTPCode": {
"code": "552660"
}
}
}
{% endtab %} {% endtabs %}
The resetPassword mutation lets you rest a user's password from the Admin API.
Schema:
resetPassword(input: ResetPasswordInput!): ResetPasswordPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
resetPassword(input: {userID: "<ENCODED USER ID>", password: "n3w-p4$s"}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"resetPassword": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694742340
}
}
}
}
}
{% endtab %} {% endtabs %}
With the revokeAllSessions mutation, you can revoke all sessions for a specific user.
Schema:
revokeAllSessions(input: RevokeAllSessionsInput!): RevokeAllSessionsPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
revokeAllSessions(input: {userID: "<ENCODED USER ID>"}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"revokeAllSessions": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694742340
}
}
}
}
}
{% endtab %} {% endtabs %}
This mutation revokes a specific user session. You can specify the session using the session ID.
Schema:
revokeSession(input: RevokeSessionInput!): RevokeSessionPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
revokeSession(input: {sessionID: "<ENCODED SESSION ID>"}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"revokeSession": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694742340
}
}
}
}
}
{% endtab %} {% endtabs %}
The scheduleAccountAnonymization mutation provides a means to schedule a user account anonymization from the Admin API.
Schema:
scheduleAccountAnonymization(input: ScheduleAccountAnonymizationInput!): ScheduleAccountAnonymizationPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
scheduleAccountAnonymization(input: {userID: "<ENCODED USER ID>"}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"scheduleAccountAnonymization": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694742340
}
}
}
}
}
{% endtab %} {% endtabs %}
The scheduleAccountDeletion mutation provides a means to schedule a user account deletion from the Admin API.
Schema:
scheduleAccountDeletion(input: ScheduleAccountDeletionInput!): ScheduleAccountDeletionPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
scheduleAccountDeletion(input: {userID: "<ENCODED USER ID>"}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"scheduleAccountDeletion": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"updated_at": 1694742340
}
}
}
}
}
{% endtab %} {% endtabs %}
You can send a password reset message to a user from the Admin API using the sendResetPasswordMessage mutation.
Schema:
sendResetPasswordMessage(input: SendResetPasswordMessageInput!): Boolean
Example:
{% tabs %} {% tab title="Query" %}
mutation {
sendResetPasswordMessage(input: {loginID: "<USER LOGIN ID LIKE EMAIL>"})
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"sendResetPasswordMessage": null
}
}
{% endtab %} {% endtabs %}
The setDisabledStatus mutation enables you to enable or disable a user's account.
Schema:
setDisabledStatus(input: SetDisabledStatusInput!): SetDisabledStatusPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
setDisabledStatus(input: {userID: "<ENCODED USER ID>", isDisabled: true, reason: "Test"}) {
user {
id
isDeactivated
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"setDisabledStatus": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"isDeactivated": false
}
}
}
}
{% endtab %} {% endtabs %}
You can use the setVerifiedStatus mutation to set a user as verified and unveried from the Admin API.
Schema:
setVerifiedStatus(input: SetVerifiedStatusInput!): SetVerifiedStatusPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
setVerifiedStatus(input: {userID: "<ENCODED USER ID>", claimName: "email", claimValue: "[email protected]", isVerified: true}) {
user {
id
verifiedClaims {
name
value
}
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"setVerifiedStatus": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"verifiedClaims": [
{
"name": "email",
"value": "[email protected]"
}
]
}
}
}
}
{% endtab %} {% endtabs %}
This mutation allows you to cancel a previously scheduled mutation.
Schema:
unscheduleAccountAnonymization(input: UnscheduleAccountAnonymizationInput!): UnscheduleAccountAnonymizationPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
unscheduleAccountAnonymization(input: {userID: "<ENCODED USER ID>"}) {
user {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"unscheduleAccountAnonymization": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse"
}
}
}
}
{% endtab %} {% endtabs %}
This mutation allows you to cancel a previously scheduled deletion.
Schema:
unscheduleAccountDeletion(input: UnscheduleAccountDeletionInput!): UnscheduleAccountDeletionPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
unscheduleAccountDeletion(input: {userID: "<ENCODED USER ID>"}) {
user {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"unscheduleAccountDeletion": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse"
}
}
}
}
{% endtab %} {% endtabs %}
The updateIdentity mutation updates an existing identiy of a user.
Schema:
updateIdentity(input: UpdateIdentityInput!): UpdateIdentityPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
updateIdentity(input: { definition: {loginID: {key: "email", value: "[email protected]"}}, userID: "<ENCODED USER ID>", identityID: "<ENCODED IDENTITY ID>"}) {
user {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"updateIdentity": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse"
}
}
}
}
{% endtab %} {% endtabs %}
You can use this mutation to update an existing user's details. You can update standard attributes such as email and phone for the user. Or you can modify custom fields using the customAttributes
argument.
Schema:
updateUser(input: UpdateUserInput!): UpdateUserPayload!
Example 1 (Standard Attributes):
For this updateUser
example, we will be updating the standard attributes for a user. The first thing to do is to extract all the current values of the user's standard attributes into a variable. Then, add new fields or modify existing fields in the variable with new values.
Note: It is important to include the current values of the fields that you don't wish to update but still want to keep. The Admin API will delete any existing fields you omit in the variable.
The following block of code shows an example variable. If you're using GraphiQL, simply create the variable in the variable tab of GraphiQL like this:
{
"standardAttributes": {
"family_name": "John",
"given_name": "Doe",
"gender": "male"
}
}
{% tabs %} {% tab title="Query" %}
mutation ($standardAttributes: UserStandardAttributes) {
updateUser(input: {userID: "<ENCODED USER ID>", standardAttributes: $standardAttributes}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"updateUser": {
"user": {
"id": "VXNlcjowNGUyJJO4Mi04NmEzLTRjYjItOGQxNy14ZWU0Y2FlNzQ5Kse",
"standardAttributes": {
"email": "[email protected]",
"email_verified": true,
"family_name": "John",
"gender": "male",
"given_name": "Doe",
"updated_at": 1694947082
}
}
}
}
}
{% endtab %} {% endtabs %}
Example 2 (Custom Attributes)
The following example shows how to update custom attributes.
Note: You must have created the custom attributes you wish to update in Authgear Portal > User Profile > Custom Attributes.
Create a variable and extract the current custom attributes into it. Modify the values of the attributes you wish to update or add new attributes.
Note: Again, it is important to include the current values of the fields that you don't wish to update but still want to keep. The Admin API will delete any existing fields you omit in the variable.
The following block of code shows an example of the variable. You can set the variable in the variable tab of GraphiQL.
{
"customAttributes": {
"town": "Lagos"
}
}
{% tabs %} {% tab title="Query" %}
mutation ($customAttributes: UserCustomAttributes) {
updateUser(input: {userID: "<ENCODED USER ID>", customAttributes: $customAttributes}) {
user {
id
customAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"updateUser": {
"user": {
"customAttributes": {
"town": "John"
},
"id": "VABlcjo2Y2I3KBU9Zi0zNGYwLTRhNTPdYjQ3ZS0wYWWeMWYzNzQyA1A"
}
}
}
}
{% endtab %} {% endtabs %}
Run this mutation to add a new access management group to your Authgear application.
Schema:
createGroup(input: CreateGroupInput!): CreateGroupPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
createGroup(input: {key: "test_group", name: "Test group", description: "This is a test group created using the Admin API"}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"createGroup": {
"group": {
"id": "R3JvdXA6YTUxYTNmMWQtMDE0ZC00N2JmLTgwNDQtMjEzOTczZDJlMTkx"
}
}
}
}
{% endtab %} {% endtabs %}
Note: The value of key
can not be empty, must be between 1 and 40 characters long, accepted characters are [a-zA-Z0-9:_]
and the prefix authgear:
is reserved for Authgear internal use.
You can use this mutation to add a new access management role to your Authgear application.
Schema:
createRole(input: CreateRoleInput!): CreateRolePayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
createRole(input: {key: "test_role", name: "Test role", description: "This is a test role created using the Admin API"}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"createRole": {
"role": {
"id": "Um9sZTo2NzNhZGE3Mi1mYWI1LTRiMmMtOTBmYy1hMjY1YmQxY2Q2YjA"
}
}
}
}
{% endtab %} {% endtabs %}
Note: The value of key
can not be empty, must be between 1 and 40 characters long, accepted characters are [a-zA-Z0-9:_]
and the prefix authgear:
is reserved for Authgear internal use.
Use this mutation to add a role to one or more groups in a single operation.
Schema:
addRoleToGroups(input: AddRoleToGroupsInput!): AddRoleToGroupsPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addRoleToGroups(input: {roleKey: "test_role", groupKeys: ["test_group", "another_group"]}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addRoleToGroups": {
"role": {
"id": "Um9sZTo2NzNhZGE3Mi1mYWI1LTRiMmMtOTBmYy1hMjY1YmQxY2Q2YjA"
}
}
}
}
{% endtab %} {% endtabs %}
Adds a group to one or more roles in a single operation.
Schema:
addGroupToRoles(input: AddGroupToRolesInput!): AddGroupToRolesPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addGroupToRoles(input: {groupKey: "test_group", roleKeys: ["test_role", "another_role"]}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addGroupToRoles": {
"group": {
"id": "R3JvdXA6YTUxYTNmMWQtMDE0ZC00N2JmLTgwNDQtMjEzOTczZDJlMTkx"
}
}
}
}
{% endtab %} {% endtabs %}
Adds a user to one or more roles in a single operation.
Schema:
addUserToRoles(input: AddUserToRolesInput!): AddUserToRolesPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addUserToRoles(input: {userID: "<ENCODED USER ID>", roleKeys: ["test_role", "another_role"]}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addUserToRoles": {
"user": {
"id": "VXNlcjomMyOS02ZGIzlmZWQxN2LTRhMTgtYWE3My03NzQxM5YzcxZmQ",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"family_name": "Doe",
"given_name": "John",
"name": "John Doe",
"updated_at": 1712213796
}
}
}
}
}
{% endtab %} {% endtabs %}
Adds a role to one or more users in a single operation.
Schema:
addRoleToUsers(input: AddRoleToUsersInput!): AddRoleToUsersPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addRoleToUsers(input: {roleKey: "test_role", userIDs: ["<ENCODED USER ID>", "<ANOTHER ENCODED USER ID>"]}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addRoleToUsers": {
"role": {
"id": "Um9sZTo2NzNhZGE3Mi1mYWI1LTRiMmMtOTBmYy1hMjY1YmQxY2Q2YjA"
}
}
}
}
{% endtab %} {% endtabs %}
Adds a user to one or more groups in a single operation.
Schema:
addUserToGroups(input: AddUserToGroupsInput!): AddUserToGroupsPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addUserToGroups(input: {userID: "<ENCODED USER ID>", groupKeys: ["test_group", "another_group"]}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addUserToGroups": {
"user": {
"id": "VXNlcjo5YzcxZmMyOS02ZGI2LTRhMTgtYWE3My03NzQxMzlmZWQxNmQ",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"family_name": "Doe",
"given_name": "John",
"name": "John Doe",
"updated_at": 1712213796
}
}
}
}
}
{% endtab %} {% endtabs %}
Adds a group to one or more user in a single operation.
Schema:
addGroupToUsers(input: AddGroupToUsersInput!): AddGroupToUsersPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
addGroupToUsers(input: {groupKey: "test_group", userIDs: ["<ENCODED USER ID>", "<ANOTHER ENCODED USER ID>"]}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"addGroupToUsers": {
"group": {
"id": "R3JvdXA6YTUxYTNmMWQtMDE0ZC00N2JmLTgwNDQtMjEzOTczZDJlMTkx"
}
}
}
}
{% endtab %} {% endtabs %}
Updates details about an existing role.
Schema:
updateRole(input: UpdateRoleInput!): UpdateRolePayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
updateRole(input: {id:"<ENCODED ROLE ID>", key: "test_role_updated", name: "Test Role Updated", description: "Updated version of this role"}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"updateRole": {
"role": {
"id": "Um9sZTo2ODk1YWVhZi0yM2U4LTQ5ODYtYWQ3NC1mY2VlZWEwNWQwMzU"
}
}
}
}
{% endtab %} {% endtabs %}
Note: Pass null
as the value of key
, name
or description
if you do not wish to update them and pass and empty string (""
) to delete the value of name and description. Also, some GrahpQL libraries may not allow you to pass a literal null
directly in the query, in such cases, use a variable to defind the value of input
.
Updates details about an existing group.
Schema:
updateGroup(input: UpdateGroupInput!): UpdateGroupPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
updateGroup(input: {id:"<ENCODED GROUP ID>", key: "test_group_updated", name: "Test Group Updated", description: "Updated version of this group"}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"updateGroup": {
"group": {
"id": "R3JvdXA6NzI3MTMxNDgtMzIzMy00ZWVjLTlhOGMtYWNiYjg2MWY5OTlk"
}
}
}
}
{% endtab %} {% endtabs %}
Note: Pass null
as the value of key
, name
or description
if you do not wish to update them and pass and empty string (""
) to delete the value of name and description. Also, some GrahpQL libraries may not allow you to pass a literal null
directly in the query, in such cases, use a variable to defind the value of input
.
Removes a user from one or more groups they're currently in.
Schema:
removeUserFromGroups(input: RemoveUserFromGroupsInput!): RemoveUserFromGroupsPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeUserFromGroups(input: {userID: "<ENCODED USER ID>", groupKeys: ["test_group", "another_group"]}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeUserFromGroups": {
"user": {
"id": "VXNlcjo5YzcxZmMyOS02ZGI2LTRhMTgtYWE3My03NzQxMzlmZWQxNmQ",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"family_name": "Doe",
"given_name": "John",
"name": "John Doe",
"updated_at": 1712213796
}
}
}
}
}
{% endtab %} {% endtabs %}
Removes a role from one or more groups.
Schema:
removeRoleFromGroups(input: RemoveRoleFromGroupsInput!): RemoveRoleFromGroupsPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeRoleFromGroups(input: {roleKey: "test_role", groupKeys: ["test_group", "another_role"]}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeRoleFromGroups": {
"role": {
"id": "Um9sZToyOWIwMDM3Yy01ZDEyLTQ3ZjQtYWVhOS1mMGRjMGJiYjk2ZTA",
}
}
}
}
{% endtab %} {% endtabs %}
Removes a user from one or more roles.
Schema:
removeUserFromRoles(input: RemoveUserFromRolesInput!): RemoveUserFromRolesPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeUserFromRoles(input: {userID: "<ENCODED USER ID>", roleKeys: ["test_role", "another_role"]}) {
user {
id
standardAttributes
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeUserFromRoles": {
"user": {
"id": "VXNlcjo5YzcxZmMyOS02ZGI2LTRhMTgtYWE3My03NzQxMzlmZWQxNmQ",
"standardAttributes": {
"email": "[email protected]",
"email_verified": false,
"family_name": "Doe",
"given_name": "John",
"name": "John Doe",
"updated_at": 1712213796
}
}
}
}
}
{% endtab %} {% endtabs %}
Removes a group from one or more roles in a single operation.
Schema:
removeGroupFromRoles(input: RemoveGroupFromRolesInput!): RemoveGroupFromRolesPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeGroupFromRoles(input: {groupKey: "test_group", roleKeys: ["test_role", "another_role"]}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeGroupFromRoles": {
"group": {
"id": "R3JvdXA6OTU4YTA2ODItMDU3ZS00ZmJjLTg3MzItNGRhMDliNWQxNTAx",
}
}
}
}
{% endtab %} {% endtabs %}
Removes a role from one or more users in a single operation.
Schema:
removeRoleFromUsers(input: RemoveRoleFromUsersInput!): RemoveRoleFromUsersPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeRoleFromUsers(input: {roleKey: "test_role", userIDs: ["<ENCODED USER ID>", "<ANOTHER ENCODED USER ID>"]}) {
role {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeRoleFromUsers": {
"role": {
"id": "Um9sZTozMjc5NWRiNi1hOWVkLTRhOTgtOTE2MC0zMzZkZGNlOWFkMTM",
}
}
}
}
{% endtab %} {% endtabs %}
Removes group from one or more users in a single operation.
Schema:
removeGroupFromUsers(input: RemoveGroupFromUsersInput!): RemoveGroupToUsersPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
removeGroupFromUsers(input: {groupKey: "test_group", userIDs: ["<ENCODED USER ID>", "<ANOTHER ENCODED USER ID>"]}) {
group {
id
}
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"removeGroupFromUsers": {
"group": {
"id": "R3JvdXA6OTU4YTA2ODItMDU3ZS00ZmJjLTg3MzItNGRhMDliNWQxNTAx",
}
}
}
}
{% endtab %} {% endtabs %}
Use this mutation to delete an existing group.
Schema:
deleteGroup(input: DeleteGroupInput!): DeleteGroupPayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteGroup(input: {id: "<ENCODED GROUP ID>"}) {
ok
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"deleteGroup": {
"ok": true
}
}
}
{% endtab %} {% endtabs %}
Use this mutation to delete an existing role.
Schema:
deleteRole(input: DeleteRoleInput!): DeleteRolePayload!
Example:
{% tabs %} {% tab title="Query" %}
mutation {
deleteRole(input: {id: "<ENCODED ROLE ID>"}) {
ok
}
}
{% endtab %}
{% tab title="Response" %}
{
"data": {
"deleteRole": {
"ok": true
}
}
}
{% endtab %} {% endtabs %}