Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix a regression that mapping providers should be able to redirect users. ↵ | Patrick Cloke | 2020-12-04 | 1 | -2/+1 |
| | | | | | (#8878) This was broken in #8801. | ||||
* | Fix a regression when grandfathering SAML users. (#8855) | Patrick Cloke | 2020-12-02 | 1 | -0/+8 |
| | | | | | | This was broken in #8801 when abstracting code shared with OIDC. After this change both SAML and OIDC have a concept of grandfathering users, but with different implementations. | ||||
* | Add basic SAML tests for mapping users. (#8800) | Patrick Cloke | 2020-12-02 | 1 | -17/+17 |
| | |||||
* | Support trying multiple localparts for OpenID Connect. (#8801) | Patrick Cloke | 2020-11-25 | 1 | -1/+87 |
| | | | | Abstracts the SAML and OpenID Connect code which attempts to regenerate the localpart of a matrix ID if it is already in use. | ||||
* | Improve error checking for OIDC/SAML mapping providers (#8774) | Patrick Cloke | 2020-11-19 | 1 | -20/+69 |
| | | | | | | Checks that the localpart returned by mapping providers for SAML and OIDC are valid before registering new users. Extends the OIDC tests for existing users and invalid data. | ||||
* | Abstract shared SSO code. (#8765) | Patrick Cloke | 2020-11-17 | 1 | -7/+7 |
| | | | De-duplicates code between the SAML and OIDC implementations. | ||||
* | Fix handling of User-Agent headers with bad utf-8. (#8632) | Erik Johnston | 2020-10-23 | 1 | -6/+18 |
| | |||||
* | Add config option for always using "userinfo endpoint" for OIDC (#7658) | BBBSnowball | 2020-10-01 | 1 | -2/+8 |
| | | | This allows for connecting to certain IdPs, e.g. GitLab. | ||||
* | Allow additional SSO properties to be passed to the client (#8413) | Patrick Cloke | 2020-09-30 | 1 | -55/+105 |
| | |||||
* | Allow existing users to login via OpenID Connect. (#8345) | Tdxdxoz | 2020-09-25 | 1 | -0/+35 |
| | | | | | | | Co-authored-by: Benjamin Koch <bbbsnowball@gmail.com> This adds configuration flags that will match a user to pre-existing users when logging in via OpenID Connect. This is useful when switching to an existing SSO system. | ||||
* | Ensure that the OpenID Connect remote ID is a string. (#8190) | Patrick Cloke | 2020-08-28 | 1 | -2/+39 |
| | |||||
* | Allow denying or shadow banning registrations via the spam checker (#8034) | Patrick Cloke | 2020-08-20 | 1 | -3/+15 |
| | |||||
* | Support UI Authentication for OpenID Connect accounts (#7457) | Patrick Cloke | 2020-05-15 | 1 | -5/+10 |
| | |||||
* | Implement OpenID Connect-based login (#7256) | Quentin Gliech | 2020-05-08 | 1 | -0/+565 |