@@ -84,7 +84,7 @@ class Account extends Service {
8484 return models.User .fromMap (res.data);
8585 }
8686
87- /// List Identities
87+ /// List identities
8888 ///
8989 /// Get the list of identities for the currently logged in user.
9090 Future <models.IdentityList > listIdentities ({List <String >? queries}) async {
@@ -186,7 +186,7 @@ class Account extends Service {
186186 return models.User .fromMap (res.data);
187187 }
188188
189- /// Create Authenticator
189+ /// Create authenticator
190190 ///
191191 /// Add an authenticator app to be used as an MFA factor. Verify the
192192 /// authenticator using the [verify
@@ -209,7 +209,7 @@ class Account extends Service {
209209 return models.MfaType .fromMap (res.data);
210210 }
211211
212- /// Verify Authenticator
212+ /// Verify authenticator
213213 ///
214214 /// Verify an authenticator app after adding it using the [add
215215 /// authenticator](/docs/references/cloud/client-web/account#createMfaAuthenticator)
@@ -233,7 +233,7 @@ class Account extends Service {
233233 return models.User .fromMap (res.data);
234234 }
235235
236- /// Delete Authenticator
236+ /// Delete authenticator
237237 ///
238238 /// Delete an authenticator for a user by ID.
239239 Future deleteMfaAuthenticator ({required enums.AuthenticatorType type}) async {
@@ -252,7 +252,7 @@ class Account extends Service {
252252 return res.data;
253253 }
254254
255- /// Create MFA Challenge
255+ /// Create MFA challenge
256256 ///
257257 /// Begin the process of MFA verification after sign-in. Finish the flow with
258258 /// [updateMfaChallenge] (/docs/references/cloud/client-web/account#updateMfaChallenge)
@@ -275,7 +275,7 @@ class Account extends Service {
275275 return models.MfaChallenge .fromMap (res.data);
276276 }
277277
278- /// Create MFA Challenge (confirmation)
278+ /// Create MFA challenge (confirmation)
279279 ///
280280 /// Complete the MFA challenge by providing the one-time password. Finish the
281281 /// process of MFA verification by providing the one-time password. To begin
@@ -301,7 +301,7 @@ class Account extends Service {
301301 return res.data;
302302 }
303303
304- /// List Factors
304+ /// List factors
305305 ///
306306 /// List the factors available on the account to be used as a MFA challange.
307307 Future <models.MfaFactors > listMfaFactors () async {
@@ -319,7 +319,7 @@ class Account extends Service {
319319 return models.MfaFactors .fromMap (res.data);
320320 }
321321
322- /// Get MFA Recovery Codes
322+ /// Get MFA recovery codes
323323 ///
324324 /// Get recovery codes that can be used as backup for MFA flow. Before getting
325325 /// codes, they must be generated using
@@ -340,7 +340,7 @@ class Account extends Service {
340340 return models.MfaRecoveryCodes .fromMap (res.data);
341341 }
342342
343- /// Create MFA Recovery Codes
343+ /// Create MFA recovery codes
344344 ///
345345 /// Generate recovery codes as backup for MFA flow. It's recommended to
346346 /// generate and show then immediately after user successfully adds their
@@ -362,7 +362,7 @@ class Account extends Service {
362362 return models.MfaRecoveryCodes .fromMap (res.data);
363363 }
364364
365- /// Regenerate MFA Recovery Codes
365+ /// Regenerate MFA recovery codes
366366 ///
367367 /// Regenerate recovery codes that can be used as backup for MFA flow. Before
368368 /// regenerating codes, they must be first generated using
@@ -843,9 +843,7 @@ class Account extends Service {
843843 /// [POST
844844 /// /v1/account/sessions/token](https://appwrite.io/docs/references/cloud/client-web/account#createSession)
845845 /// endpoint to complete the login process. The link sent to the user's email
846- /// address is valid for 1 hour. If you are on a mobile device you can leave
847- /// the URL parameter empty, so that the login completion will be handled by
848- /// your Appwrite instance by default.
846+ /// address is valid for 1 hour.
849847 ///
850848 /// A user is limited to 10 active sessions at a time by default. [Learn more
851849 /// about session
0 commit comments