@@ -84,7 +84,7 @@ class Account extends Service {
84
84
return models.User .fromMap (res.data);
85
85
}
86
86
87
- /// List Identities
87
+ /// List identities
88
88
///
89
89
/// Get the list of identities for the currently logged in user.
90
90
Future <models.IdentityList > listIdentities ({List <String >? queries}) async {
@@ -186,7 +186,7 @@ class Account extends Service {
186
186
return models.User .fromMap (res.data);
187
187
}
188
188
189
- /// Create Authenticator
189
+ /// Create authenticator
190
190
///
191
191
/// Add an authenticator app to be used as an MFA factor. Verify the
192
192
/// authenticator using the [verify
@@ -209,7 +209,7 @@ class Account extends Service {
209
209
return models.MfaType .fromMap (res.data);
210
210
}
211
211
212
- /// Verify Authenticator
212
+ /// Verify authenticator
213
213
///
214
214
/// Verify an authenticator app after adding it using the [add
215
215
/// authenticator](/docs/references/cloud/client-web/account#createMfaAuthenticator)
@@ -233,7 +233,7 @@ class Account extends Service {
233
233
return models.User .fromMap (res.data);
234
234
}
235
235
236
- /// Delete Authenticator
236
+ /// Delete authenticator
237
237
///
238
238
/// Delete an authenticator for a user by ID.
239
239
Future deleteMfaAuthenticator ({required enums.AuthenticatorType type}) async {
@@ -252,7 +252,7 @@ class Account extends Service {
252
252
return res.data;
253
253
}
254
254
255
- /// Create MFA Challenge
255
+ /// Create MFA challenge
256
256
///
257
257
/// Begin the process of MFA verification after sign-in. Finish the flow with
258
258
/// [updateMfaChallenge] (/docs/references/cloud/client-web/account#updateMfaChallenge)
@@ -275,7 +275,7 @@ class Account extends Service {
275
275
return models.MfaChallenge .fromMap (res.data);
276
276
}
277
277
278
- /// Create MFA Challenge (confirmation)
278
+ /// Create MFA challenge (confirmation)
279
279
///
280
280
/// Complete the MFA challenge by providing the one-time password. Finish the
281
281
/// process of MFA verification by providing the one-time password. To begin
@@ -301,7 +301,7 @@ class Account extends Service {
301
301
return res.data;
302
302
}
303
303
304
- /// List Factors
304
+ /// List factors
305
305
///
306
306
/// List the factors available on the account to be used as a MFA challange.
307
307
Future <models.MfaFactors > listMfaFactors () async {
@@ -319,7 +319,7 @@ class Account extends Service {
319
319
return models.MfaFactors .fromMap (res.data);
320
320
}
321
321
322
- /// Get MFA Recovery Codes
322
+ /// Get MFA recovery codes
323
323
///
324
324
/// Get recovery codes that can be used as backup for MFA flow. Before getting
325
325
/// codes, they must be generated using
@@ -340,7 +340,7 @@ class Account extends Service {
340
340
return models.MfaRecoveryCodes .fromMap (res.data);
341
341
}
342
342
343
- /// Create MFA Recovery Codes
343
+ /// Create MFA recovery codes
344
344
///
345
345
/// Generate recovery codes as backup for MFA flow. It's recommended to
346
346
/// generate and show then immediately after user successfully adds their
@@ -362,7 +362,7 @@ class Account extends Service {
362
362
return models.MfaRecoveryCodes .fromMap (res.data);
363
363
}
364
364
365
- /// Regenerate MFA Recovery Codes
365
+ /// Regenerate MFA recovery codes
366
366
///
367
367
/// Regenerate recovery codes that can be used as backup for MFA flow. Before
368
368
/// regenerating codes, they must be first generated using
@@ -843,9 +843,7 @@ class Account extends Service {
843
843
/// [POST
844
844
/// /v1/account/sessions/token](https://appwrite.io/docs/references/cloud/client-web/account#createSession)
845
845
/// endpoint to complete the login process. The link sent to the user's email
846
- /// address is valid for 1 hour. If you are on a mobile device you can leave
847
- /// the URL parameter empty, so that the login completion will be handled by
848
- /// your Appwrite instance by default.
846
+ /// address is valid for 1 hour.
849
847
///
850
848
/// A user is limited to 10 active sessions at a time by default. [Learn more
851
849
/// about session
0 commit comments