summaryrefslogtreecommitdiff
path: root/lib/web/auth (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix typoCloudYu2018-11-272-4/+4
| | | | Signed-off-by: CloudYu <cloudyu322@gmail.com>
* InternalOAuthError is not part of passport, but of passport-oauth2Claudius Coenen2018-11-141-4/+4
| | | | | | | This fixes part of #1056: an error while obtaining the profile would have `502`-crashed the server. Signed-off-by: Claudius Coenen <opensource@amenthes.de>
* Add OpenID to CodiMDSheogorath2018-10-052-0/+62
| | | | | | | | With OpenID every OpenID capable provider can provide authentication for users of a CodiMD instance. This means we have federated authentication. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* Update passport-ldapSheogorath2018-06-301-1/+1
| | | | Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* Merge pull request #784 from pferreir/add-oauth2-supportChristoph (Sheogorath) Kern2018-06-042-0/+107
|\ | | | | Add "generic" OAuth2 support
| * Add support for generic OAuth2 providersPedro Ferreira2018-03-262-0/+107
| | | | | | | | Signed-off-by: Pedro Ferreira <pedro.ferreira@cern.ch>
* | Fix typo of "grouptAttribute" in saml auth moduleMax Wu2018-04-271-2/+2
|/ | | Signed-off-by: Max Wu <jackymaxj@gmail.com>
* Change config to camel case with backwards compatibilitySheogorath2018-03-2511-35/+35
| | | | | | | | This refactors the configs a bit to now use camel case everywhere. This change should help to clean up the config interface and make it better understandable. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* Add check for undefined UUIDSheogorath2018-03-181-1/+8
| | | | | | | | | | | | This check is needed at there are tons of LDAP implementations out there and none has at least one guaranteed unique field. As we currently check three fields and added an option to select one yourself, it's still not said that any of these fields is set. This will now create an error and fail the authentication instead of letting people may get access to other people's notes which are stored under a this way deterministic wrong userid named `LDAP-undefined`. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* Multiple emails from LDAP are already an ArrayFelix Schäfer2018-03-091-1/+1
| | | | Signed-off-by: Felix Schäfer <felix@thegcat.net>
* Introduce ldap.useridFieldDustin Frisch2018-03-011-1/+4
| | | | Signed-off-by: Dustin Frisch <fooker@lab.sh>
* Fix uncaught exception for non-existent userSheogorath2018-01-301-0/+5
| | | | | | | Since we added user management it's possible to get non-existent users which can cause a crash of the Backend server. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* Add setting `ldap.usernameField`Lukas Kalbertodt2017-12-091-1/+7
| | | | | | | | This determines which ldap field is used as the username on HackMD. By default, the "id" is used as username, too. The id is taken from the fields `uidNumber`, `uid` or `sAMAccountName`. To give the user more flexibility, they can now choose the field used for the username instead.
* added guide for SAML settingsNorihito Nakae2017-12-041-1/+0
|
* fixed the SAML callback URL to unconfigurable.Norihito Nakae2017-11-291-1/+1
|
* Initial support for SAML authenticationNorihito Nakae2017-11-282-0/+97
|
* Add mattermost authenticationChristoph Witzany2017-10-312-0/+50
|
* Merge pull request #562 from SISheogorath/fix/LDAPSheogorath2017-10-271-2/+3
|\ | | | | Fix LDAP problem about missing uidNumber
| * Fix LDAP problem about missing uidNumberSheogorath2017-10-121-2/+3
| | | | | | | | Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
* | Give google the correct name.Kaiyu Shi2017-09-041-3/+3
|/
* fix: export to gist occurred 404 not foundMax Wu2017-05-171-0/+4
|
* refactor(config.js): Extract config fileBoHong Li2017-05-081-8/+8
| | | | | * Separate different config source to each files * Freeze config object
* refactor(auth.js): Remove base pathBoHong Li2017-05-081-8/+8
|
* refactor(app.js): Move passport serialize and deserialize to auth moduleBoHong Li2017-05-081-0/+22
|
* refactor(app.js, auth.js): Extract all auth method to individual modulesBoHong Li2017-05-0810-0/+405