#
fe49fd82 |
| 01-Sep-2025 |
Andreas Gohr <gohr@cosmocode.de> |
option to enforce oauth for some users
|
#
290e9b1f |
| 05-Mar-2024 |
Andreas Gohr <andi@splitbrain.org> |
automatic style fixes and new workflows
|
#
d1826331 |
| 15-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
better translation handling on exceptions
|
#
39730c7e |
| 15-Dec-2021 |
Anna Dabrowska <dabrowska@cosmocode.de> |
Fix check of valid email domains
|
#
c82ad624 |
| 06-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
use refresh token when AccessToken is about to expire
|
#
04a78b87 |
| 03-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
renamed our Service to Adapter to avoid confusion
Also added a mechanism to register Services from an adapter
|
#
e170f465 |
| 03-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
removed lots of now unused code
|
#
6d9a8a49 |
| 03-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
make cookie login work, some more cleanup
|
#
74b4d4a4 |
| 03-Dec-2021 |
Andreas Gohr <andi@splitbrain.org> |
another major refactoring
The new OAuthManager is now the main flow manager and should make it easier to follow the flow. The Session class encapsulates all session and cookie accesses. A new guid p
another major refactoring
The new OAuthManager is now the main flow manager and should make it easier to follow the flow. The Session class encapsulates all session and cookie accesses. A new guid paradigma should make invisible relogins possible when the session expired. Needs all major cleanup but a first login worked.
show more ...
|
#
0be109c2 |
| 13-Aug-2020 |
Andreas Gohr <andi@splitbrain.org> |
minor cleanup
|
#
3e7ac5b1 |
| 30-Jul-2020 |
Andreas Gohr <andi@splitbrain.org> |
more fixes and cleanup
somewhat works already
|
#
98a36116 |
| 30-Jul-2020 |
Andreas Gohr <andi@splitbrain.org> |
initial begin of refactoring
using composer for the oauth lib dependency, autoloading for our own classes. Services are now their own action plugins to inherit from our Service class.
All still unt
initial begin of refactoring
using composer for the oauth lib dependency, autoloading for our own classes. Services are now their own action plugins to inherit from our Service class.
All still untested and broken
show more ...
|
#
4c7f12a8 |
| 05-May-2016 |
Steve Nolen <technolengy@gmail.com> |
Add keycloak as identity provider
|
#
69d9f829 |
| 29-Jan-2016 |
German Lena <german.lena@gmail.com> |
Added Auth0 as an Oauth2 IdP (Oauth2)
|
#
f2e164b0 |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Only force relogins during GET request to doku.php
|
#
3c0c1b14 |
| 08-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Make getValidDomains more consistent and intuitive
|
#
ebf681d1 |
| 08-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Use more existing functions
|
#
d9818adb |
| 08-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Allow mailRestriction to multiple domains
|
#
9683193c |
| 06-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Add option for custom redirect URI
If the wiki has per default a local TLD, it may be necessary to specifies a public redirect URI for some services , e.g. Google, to work.
|
#
551dc731 |
| 28-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
Added Yahoo! as another provider
this also adds our own storage class
|
#
a90c044e |
| 28-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
added a generic oAuth2 Adapter and implemented a Doorkeeper example
|
#
2e94f0b8 |
| 28-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
store no information in the redirect URL
Some providers need an exact matching redirect URL configured (Google) so we can not keep any dynamic info in the URL. Instead we store it in the user's sess
store no information in the redirect URL
Some providers need an exact matching redirect URL configured (Google) so we can not keep any dynamic info in the URL. Instead we store it in the user's session.
show more ...
|
#
3c0138db |
| 26-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
Allow logins to existing accounts only with associated accounts
To prevent people can log into existing account with a newly created social account with a forged email address. We only allow logins
Allow logins to existing accounts only with associated accounts
To prevent people can log into existing account with a newly created social account with a forged email address. We only allow logins with previously approved service providers.
When a user logs in for the first time, eg. the email does not exists, then the user is created and the social account is approved automatically.
show more ...
|
#
67e2b52d |
| 24-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
got Facebook working
|
#
63b91737 |
| 23-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
renamed AuthService to Adapter
|