Skip to content

Document managed auth updates from PR #1306#288

Draft
masnwilliams wants to merge 1 commit intomainfrom
hypeship/doc-managed-auth-updates
Draft

Document managed auth updates from PR #1306#288
masnwilliams wants to merge 1 commit intomainfrom
hypeship/doc-managed-auth-updates

Conversation

@masnwilliams
Copy link
Contributor

Summary

  • auth/overview.mdx: Added error codes reference table with all new error codes (network_error, unsupported_auth_method, awaiting_input_timeout, external_action_timeout, max_steps_exceeded). Updated feature list to mention connection updates, improved SSO/bot detection capabilities.
  • auth/programmatic.mdx: Documented PATCH /auth/connections/{id} endpoint for updating existing connections. Added SSO provider selection (sso_provider) and sign-in options (sign_in_options/sign_in_option_id) as new submit types with code examples.
  • auth/faq.mdx: Added FAQs for sign-in options, connection updates. Expanded failure FAQ with all error codes. Added credential sufficiency to can_reauth checks.

Reflects changes from kernel/kernel PR #1306 (mason/ma-cua branch).

What's NOT documented (intentional)

  • CUA engine internals — presented as transparent improvements, not user-facing config
  • Skill system — internal optimization, no user-facing API
  • PostHog feature flag details — internal rollout mechanism

Test plan

  • Verify Mintlify build passes with npx mintlify dev
  • Check all internal links resolve (error codes anchor, programmatic flow anchors)
  • Review code examples for SDK consistency

🤖 Generated with Claude Code

… codes

- auth/overview.mdx: Add error codes reference table, mention connection
  updates and improved SSO/bot detection capabilities
- auth/programmatic.mdx: Document PATCH /auth/connections/{id} endpoint,
  SSO provider selection (sso_provider), sign-in options
  (sign_in_options/sign_in_option_id) submit types, updating connections section
- auth/faq.mdx: Add FAQs for sign-in options, connection updates, expand
  error codes in failure FAQ, add credential sufficiency to can_reauth checks

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant