Commit Graph

2076 Commits

Author SHA1 Message Date
Christophe Maudoux
26233106a5 Set _updateTime session value (#1771) 2019-05-26 11:56:58 +02:00
Christophe Maudoux
3dd4c52c65 Update version (#1766) 2019-05-26 10:33:39 +02:00
Christophe Maudoux
0e47cb4f5b Fix warning message 2019-05-23 15:52:11 +02:00
Maxime Besson
0babf4c6c3 Fix non-sso session removal in SoapServer
closes #1762
2019-05-21 17:30:37 +02:00
Christophe Maudoux
59f07b7b8f Avoid to renew double cookie sessions for refresh request (#1747) 2019-05-20 23:03:10 +02:00
Christophe Maudoux
29b7341345 Change code order (#1749) 2019-05-19 13:40:46 +02:00
Christophe Maudoux
006f862a69 Cleaning code (#1755) 2019-05-17 22:18:09 +02:00
Clément OUDOT
c024952b8f Do not fail if no RP or no OP configured (#1759) 2019-05-17 16:00:33 +02:00
Xavier
b91d1d4b87 Tidy 2019-05-16 20:45:14 +02:00
Xavier
a2e78c88c3 Set versions 2019-05-16 20:42:31 +02:00
Xavier
1186aba52b lmError(): return JSON if wanted (#1745) 2019-05-16 06:50:13 +02:00
Christophe Maudoux
e46fac82b2 CheckUser with tokenGlobalStorage & Warn if SSO groups are merged 2019-05-15 23:45:06 +02:00
Maxime Besson
1f1eeab9c8 Do not log a warning when displaying form with Combination
When form-based authentication methods return PE_FIRSTLOGIN, do not log
a warning because it's normal behavior to show the form.
2019-05-14 19:47:28 +02:00
Christophe Maudoux
fc034ad4bf Impersonation with doubleCookie (#1746) 2019-05-12 22:59:21 +02:00
Clément OUDOT
05cd4d4a58 Fix update token with global storage (#1742) 2019-05-12 20:39:25 +02:00
Clément OUDOT
682b193477 Use TOKEN kind for mail password reset sessions (#1743) 2019-05-12 20:04:38 +02:00
Clément OUDOT
07de622e83 Fix getRegisterSession and getMailSession (#1743) 2019-05-12 17:36:14 +02:00
Xavier
9a71709f44 Tidy 2019-05-11 23:03:48 +02:00
Christophe Maudoux
8737fc0808 Impersonation with doubleCookie & Append unit test (#1746) 2019-05-11 22:57:52 +02:00
Xavier
f3c4ea0afb Tydy 2019-05-11 20:18:43 +02:00
Christophe Maudoux
aeead582d8 Restore _httpSession (#1746) 2019-05-11 19:07:07 +02:00
Xavier
000db1536b Update versions 2019-05-11 17:37:56 +02:00
Xavier
2ce7396bf2 Don't filter on session_kind with SOAP (#1742) 2019-05-11 15:41:14 +02:00
Xavier
6235b303b3 #1742 in progress... 2019-05-11 09:31:17 +02:00
Xavier Guimard
1cd50bb353 Fix Auth::Remote session kind (#1742) 2019-05-10 18:02:56 +02:00
Xavier Guimard
638a0de81a Don't use SSO session type for tokens (Fixes security part of #1742) 2019-05-10 17:35:10 +02:00
Clément OUDOT
fce270408e Improve log in plugin GrantSession (#1739) 2019-05-06 19:10:26 +02:00
Clément OUDOT
755b1ace78 Add some debug in Ext2F (#1738) 2019-05-06 14:28:28 +02:00
Clément OUDOT
a7c8b9d466 Fix error handling in Ext2F (#1738) 2019-05-06 14:07:42 +02:00
Christophe Maudoux
c8dd4554aa Test if required secret elements are set to sign JWT 2019-05-02 14:33:56 +02:00
Christophe Maudoux
f4938f3489 Grant access only if required Impersonation succeeds (#1664) 2019-04-30 14:57:45 +02:00
Christophe Maudoux
321fe29c35 Update version 2019-04-29 22:33:11 +02:00
Christophe Maudoux
2e9092d2bd Clean code 2019-04-29 22:33:11 +02:00
Christophe Maudoux
a89b92f265 Improve code (#1386) 2019-04-29 22:33:11 +02:00
Christophe Maudoux
2e3c2e1a16 Sort by spoofed and real attributes (#1658) 2019-04-29 22:33:11 +02:00
Clément OUDOT
926262170b Implement PKCE in OIDC provider (#1722) 2019-04-29 17:18:16 +02:00
Clément OUDOT
8e6f678be7 Create a configuration option to allow a Relying Party to be a public client
Allow unauthenticated requests on OAuth2 token endoint

#1725
2019-04-29 10:02:16 +02:00
Maxime Besson
2f9e6aa623 Allow override of username attribute for CAS apps
Global CAS options allows the admistrator to set the session attribute
that gets exported to all CAS application as the main identifier
(cas:user)

This commit adds the ability to override this configuration for a
particular CAS application.

OIDC already allows this

Fixes #1713
2019-04-28 21:06:34 +02:00
Maxime Besson
62f16721ff Send username when calling CAS1.0 validation
Fixes #1724
2019-04-28 19:29:54 +02:00
Maxime Besson
64cc4ea0e6 Do not sent Kerberos js twice when using Combination
Fixes #1720
2019-04-25 17:17:03 +02:00
Christophe Maudoux
c86b76cb9c Init. rules by using accessors (#1658) 2019-04-21 11:56:29 +02:00
maudoux
9b711e6c81 Update version 2019-04-13 22:57:30 +02:00
maudoux
cfa98b2723 Fix logo display 2019-04-13 21:02:47 +02:00
Clément OUDOT
259f9d8d94 Use same JSON fields for failure and success (#1711) 2019-04-13 15:23:40 +02:00
Clément OUDOT
9256571f25 Return session id with successful REST authentication (#1711) 2019-04-12 16:57:22 +02:00
maudoux
026fcd9f76 Fix warnings (#1704) 2019-04-10 22:14:46 +02:00
maudoux
1d08372a8c Sort CAS servers & update langs (#1704) 2019-04-10 21:58:37 +02:00
Xavier
4a21e96426 Fix warning 2019-04-10 21:54:03 +02:00
Xavier
1bcf828a89 Merge remote-tracking branch 'arosier/idpsort' into v2.0 2019-04-10 19:48:26 +02:00
Antoine ROSIER
8875a4e985 perltidy 2019-04-10 17:21:33 +02:00
Antoine ROSIER
f7b296b032 Sorting OIDc (#1704) 2019-04-10 17:06:41 +02:00
Antoine ROSIER
8636da45be Sorting SAML idp (#1704) 2019-04-10 17:06:41 +02:00
Clément OUDOT
ae3a728378 Manage template inclusion when file is not in configured portal theme (#1653) 2019-04-10 15:42:58 +02:00
Christophe Maudoux
413cc98fba perltidy 2019-04-10 09:21:55 +02:00
Antoine ROSIER
6352dc6ac8 Sort idp and op (#1704) 2019-04-10 09:01:55 +02:00
Xavier
af707c5b1f Clear pdata on lmerror access 2019-04-10 07:14:36 +02:00
maudoux
4ff20f2d76 Fix Yubikey userLogger (#1702) 2019-04-09 23:40:16 +02:00
Xavier
a187e5c59b Fix some userLogger message (#1702) 2019-04-09 21:48:59 +02:00
Christophe Maudoux
f1cb8d236e Checkuser case unsensitive for URL only & Improve unit test (1667) 2019-04-09 16:56:00 +02:00
maudoux
1bc519d11d Fix warning (#1694) 2019-04-06 14:09:58 +02:00
Maxime Besson
666e59ad6e Fix #1698 by clearing saml request token on unauth issuer flow
Add some unit tests to make sure relevant pdata is cleared after authentication
2019-04-05 23:27:21 +02:00
maudoux
c573ec9625 Typo & upadte version 2019-04-05 22:58:48 +02:00
maudoux
956d934a93 Append GPG authentication level (#1699) 2019-04-05 22:38:20 +02:00
maudoux
85551ba5e1 Append REST authentication level (#1699) 2019-04-05 22:38:01 +02:00
Christophe Maudoux
cf36b44162 Cleaning code (#1664) 2019-04-05 20:04:17 +02:00
Christophe Maudoux
dc1f36daf0 Use OTT rule (#1664) 2019-04-05 20:03:42 +02:00
Christophe Maudoux
f4801f3587 Use OTT rule (#1664) 2019-04-05 20:03:37 +02:00
Christophe Maudoux
01006fc984 Use OTT rule (#1664) 2019-04-05 20:03:25 +02:00
Christophe Maudoux
cb53973881 Use OTT rule (#1694) 2019-04-05 17:24:16 +02:00
Christophe Maudoux
5a8a7d483f Use OTT rule (#1694) 2019-04-05 17:24:07 +02:00
Christophe Maudoux
2b818a9c02 Append specific ottRule dependency (#1694) 2019-04-05 17:23:09 +02:00
Xavier Guimard
10e8d51449 Fix Perl::Critic changes 2019-04-05 10:46:43 +02:00
Xavier Guimard
2159957c34 Update versions 2019-04-05 09:54:43 +02:00
maudoux
5b67f1f743 Use rule to enable OTT (#1694) 2019-04-03 23:28:45 +02:00
Clément OUDOT
8859fe342b Fix setHiddenFormValue (#1692) 2019-04-03 17:54:58 +02:00
Clément OUDOT
8be0817363 Send optional SAML attributes if they have a value (#1681) 2019-04-03 16:40:41 +02:00
Xavier Guimard
ece9b21219 Remove trailing whitespaces 2019-04-03 14:15:16 +02:00
Xavier Guimard
141ba96c92 Update version 2019-04-03 13:53:56 +02:00
Clément OUDOT
9a454fbb7a Manage SLO termination if there is no RelayState (#1671) 2019-04-03 12:26:01 +02:00
Maxime Besson
d44a042fd5 Revert 8f5fbb077e and change the way logout errors are handled
Relating to issue #1668, the proposed fix works when there is only one
service provider to logout of.

Now that multiple service provider logout is starting to work again on
2.0, we cannot read the remote_ProviderID from the logout object because
it is only filled by lasso when actually building the response.

Instead, we ignore any error that could occur when building the
response, log a warning and show the portal instead. Still better than
an internal server error.
2019-04-03 11:20:24 +02:00
maudoux
ae28ea3169 Append Conf domain to url if missing - Fix port (#1664) 2019-04-02 22:08:15 +02:00
maudoux
ec214c75c2 Append Conf domain to url if missing (#1664) 2019-04-02 22:08:15 +02:00
Clément OUDOT
a805a5a00b Manage SLO responses (#1671) 2019-04-02 17:27:47 +02:00
Clément OUDOT
4e76ee9582 Avoid warning during SAML SLO (#1671) 2019-04-02 16:13:45 +02:00
Clément OUDOT
bac2eb564c Remove antiframe protection in portal javascript (#1696) 2019-04-02 15:05:41 +02:00
Clément OUDOT
c4b4e95e9d Display password or login template after password modification (#1654) 2019-04-02 11:12:33 +02:00
Clément OUDOT
4af47ad6a4 Allow iframe from portal to be able to load saml SLO return page (#1671) 2019-04-01 18:09:31 +02:00
Clément OUDOT
5a30a82fa6 Add SLO Termination endpoint (#1671) 2019-04-01 18:02:38 +02:00
Clément OUDOT
59bc0642fc Always display info (#1693) 2019-04-01 17:18:28 +02:00
Clément OUDOT
502a32e257 Add unit test and fix code for ppolicy grace (#1691) 2019-04-01 09:58:56 +02:00
Xavier
01ab88ba57 Fix for #1691 2019-04-01 06:52:21 +02:00
Clément OUDOT
a1f5fb5170 Test return of getUser (#1654) 2019-03-29 11:53:52 +01:00
Xavier
906db8daa6 Merge branch 'antoinerosier/lemonldap-ng-logs' into v2.0 2019-03-27 21:44:25 +01:00
Antoine ROSIER
b79c9659cb Add user logs informations (#1687) 2019-03-27 16:00:39 +01:00
Clément OUDOT
4bab684e2d Refresh entry after password modification (#1654) 2019-03-27 09:59:22 +01:00
Xavier
5a5572ec1f Fix WSDL generation (Closes: #1686) 2019-03-26 21:47:14 +01:00
Clément OUDOT
39020e003e Fix server error on SAML SLO (#1671) 2019-03-26 17:15:01 +01:00
Clément OUDOT
aa139df89d Change criticity of password must be reset message (#1654) 2019-03-26 16:45:19 +01:00
Xavier Guimard
af4f123916 Fix cspScrip (Closes: #1683) 2019-03-26 09:56:46 +01:00
Xavier Guimard
99afd7243a Fix #1675 2019-03-26 08:06:55 +01:00