summary refs log tree commit diff
path: root/synapse/handlers/oidc_handler.py (follow)
Commit message (Expand)AuthorAgeFilesLines
* Simplify the flow for SSO UIA (#8881)Richard van der Hoff2020-12-081-12/+32
* Fix a regression that mapping providers should be able to redirect users. (#8...Patrick Cloke2020-12-041-1/+1
* Fix a regression when grandfathering SAML users. (#8855)Patrick Cloke2020-12-021-2/+28
* Support trying multiple localparts for OpenID Connect. (#8801)Patrick Cloke2020-11-251-70/+50
* Properly report user-agent/IP during registration of SSO users. (#8784)Patrick Cloke2020-11-231-1/+1
* Improve error checking for OIDC/SAML mapping providers (#8774)Patrick Cloke2020-11-191-5/+20
* Abstract shared SSO code. (#8765)Patrick Cloke2020-11-171-59/+33
* Fix typos and spelling errors. (#8639)Patrick Cloke2020-10-231-3/+3
* Fix handling of User-Agent headers with bad utf-8. (#8632)Erik Johnston2020-10-231-3/+1
* Add config option for always using "userinfo endpoint" for OIDC (#7658)BBBSnowball2020-10-011-4/+7
* Allow additional SSO properties to be passed to the client (#8413)Patrick Cloke2020-09-301-3/+53
* Allow existing users to login via OpenID Connect. (#8345)Tdxdxoz2020-09-251-15/+27
* Improve SAML error messages (#8248)Patrick Cloke2020-09-141-2/+2
* Ensure that the OpenID Connect remote ID is a string. (#8190)Patrick Cloke2020-08-281-0/+3
* Allow denying or shadow banning registrations via the spam checker (#8034)Patrick Cloke2020-08-201-3/+18
* Be stricter about JSON that is accepted by Synapse (#8106)Patrick Cloke2020-08-191-3/+3
* Use the default templates when a custom template file cannot be found (#8037)Andrew Morgan2020-08-171-4/+1
* Change HomeServer definition to work with typing.Erik Johnston2020-08-111-3/+5
* Ensure that HTML pages served from Synapse include headers to avoid embedding.Patrick Cloke2020-07-021-9/+4
* Cleanups to the OpenID Connect integration (#7628)Richard van der Hoff2020-06-031-7/+20
* Support UI Authentication for OpenID Connect accounts (#7457)Patrick Cloke2020-05-151-19/+57
* Implement OpenID Connect-based login (#7256)Quentin Gliech2020-05-081-0/+998