#
fb75804e |
| 17-Jul-2025 |
Andreas Gohr <gohr@cosmocode.de> |
Parse AD bind error messages for more info for the user
This is mainly to tell users when their password expired or needs to be changed.
|
#
8de38791 |
| 02-Apr-2025 |
Andreas Gohr <andi@splitbrain.org> |
fix potential issue where attributes return null
|
#
208fe81a |
| 05-Dec-2023 |
Andreas Gohr <andi@splitbrain.org> |
automatic code style fixes
|
#
fde03b26 |
| 21-Aug-2023 |
Andreas Gohr <andi@splitbrain.org> |
better debugging and handling of suffix
People tend to configure the suffix with a prepended @. This will fail logins in non-obvious ways. We now strip the @ prefix and also give the connecting user
better debugging and handling of suffix
People tend to configure the suffix with a prepended @. This will fail logins in non-obvious ways. We now strip the @ prefix and also give the connecting user in the debug message
show more ...
|
#
0f498d06 |
| 03-Aug-2023 |
Andreas Gohr <andi@splitbrain.org> |
implement password expiry warnings. fixes #4
|
#
08ace392 |
| 02-Aug-2023 |
Andreas Gohr <andi@splitbrain.org> |
support password changes
Internally this also changes the behviour to stay authenticated as the actual user if the user logged in. This is needed to allow self-service password changes.
This commit
support password changes
Internally this also changes the behviour to stay authenticated as the actual user if the user logged in. This is needed to allow self-service password changes.
This commit also contains a few cleanups.
show more ...
|
#
5dcabeda |
| 30-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
make use of file system caching optional
|
#
22654fde |
| 21-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
disable logout for SSO setups
|
#
bf69b89c |
| 21-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
first go at SSO
This basically copies the functionality from authAD
|
#
1a4f0e1f |
| 15-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
avoid duplicating defaults
We need the defaults in the Client for better testability, but instead of defining them twice, we can simply load the defaults file ourselves.
|
#
c2500b44 |
| 15-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
make the primary group configurable
Because the Domain Users group can be localized, this makes it configurable. The authAD library had a config to use "real" primary groups where it would look up t
make the primary group configurable
Because the Domain Users group can be localized, this makes it configurable. The authAD library had a config to use "real" primary groups where it would look up the primary group by calculating the SID and doing another check. We could copy that mechanism if needed later on.
show more ...
|
#
204fba68 |
| 15-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
group handling improvements
* properly handle uppercase group names * use constants for filter types * properly handle Domain Users lookups
|
#
c872f0e3 |
| 08-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
improve logging mechanisms
Makes use of the new error logging mechanism when running on master, uses allowdebug to print end user messages.
|
#
a1128cc0 |
| 08-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
rework username handling
Background Info ---------------
Active Directory has at least three different way how users are identified:
1) sAMAccountName: user
The sAMAccountName is what users usual
rework username handling
Background Info ---------------
Active Directory has at least three different way how users are identified:
1) sAMAccountName: user
The sAMAccountName is what users usually know as their username. It's what they usually log in with on their workstation. It is however lacking the actual domain to which to login. Typically it is prefixed by a netbios domain for login. Eg. DOMAIN\user
Note: The samaccount name is also limited to 20 characters because of legacy reasons.
2) userPrincipalName: user@domain.something
The userPrincipalName contains something that looks like a domain. But it may be actually different to the Domain managed by the AD. Because of... reasons? See https://serverfault.com/a/928116
3) bind ID: user@domain.ext
Now, loggin in (eg. doing a LDAP bind) can use different mechanisms. The userPrincipalName works, user@domain (different from the UPN) should work too.
DokuWiki requirements: ----------------------
In DokuWiki we need a unique username, that stays the same on every login. (logging in with or without the domain part should identify the same user).
We also need this name to be usable to run additional LDAP queries. Eg. find groups with this user name.
We also want users to be able to login without having to type the domain part.
This patch ----------
So with this patch we use the samaccount name to identify a user. For logging in, we add the configured account suffix (aka the domain). After that we only use the domainless user name everywhere.
In a future update we may (re)introduce the multidomain support from authAD. When we do, this will probably force us to use the suffix part in the usernames to different different domain users (something the authAD plugin doesn't do which is probably wrong). But for most people the single suffix approach should be fine.
show more ...
|
#
9c590892 |
| 07-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
only fetch the attributes we need
this should lower the memory requirements and might speed things up a bit
|
#
b914569f |
| 07-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
allow fetching of additional user attributes
Currently we reuqest all attributes from the server and only filter later. This needs fixing.
|
#
9446f9ef |
| 07-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
fix admin user access
|
#
8b2677ed |
| 07-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
give hint on failing admin access
|
#
6d90d5c8 |
| 07-Jul-2021 |
Andreas Gohr <andi@splitbrain.org> |
some cleanup for the options
|
#
80ac552f |
| 01-Apr-2020 |
Andreas Gohr <andi@splitbrain.org> |
convert between simple and complex usernames
|
#
85916a2d |
| 29-Mar-2020 |
Andreas Gohr <andi@splitbrain.org> |
actually use the bulk retrieval in usermanager
|
#
b21740b4 |
| 29-Mar-2020 |
Andreas Gohr <andi@splitbrain.org> |
added bulk data retrieval
|
#
da369b60 |
| 29-Mar-2020 |
Andreas Gohr <andi@splitbrain.org> |
differntiate between fatal errors and debugging output
|
#
5a3b9122 |
| 27-Mar-2020 |
Andreas Gohr <andi@splitbrain.org> |
added group reading
|
#
8595f73e |
| 27-Mar-2020 |
Andreas Gohr <andi@splitbrain.org> |
avoid IDE warning about debugging exceptions
|