|
9f0eaa8675
|
config.py: remove obsolete setting
|
2025-08-22 12:30:39 +02:00 |
|
|
287b62f7b8
|
minor fixes
|
2025-08-09 15:23:40 +02:00 |
|
|
bc2b0aaa2c
|
minor config / testing fixes
|
2025-08-08 23:16:35 +02:00 |
|
|
d5616b207e
|
add simple (dummy) test for external (zitadel) user creation
|
2025-08-08 10:10:16 +02:00 |
|
|
94365602ca
|
OIDC auth: directly use sub from JWT if appropriate; optionally add groups from calling application
|
2025-08-06 17:51:15 +02:00 |
|
|
775603046a
|
org.user: save intermediate state (create / update grants not working: 404 Not Found)
|
2025-08-06 09:45:56 +02:00 |
|
|
3e43c25d84
|
org.user, web.client: user update on zitadel working
|
2025-08-04 18:39:18 +02:00 |
|
|
7427370b5c
|
org.user, web.client: user creation via zitadel API basically working
|
2025-07-31 17:24:17 +02:00 |
|
|
c23069a3c1
|
work in progress. send user data to identity provider: basic fixes, prepare tests
|
2025-07-26 17:43:58 +02:00 |
|
|
2698a578df
|
work in progress: send user data to external identity provider (zitadel)
|
2025-07-25 19:53:26 +02:00 |
|
|
626ff6e673
|
move API client authentication to auth.oidc
|
2025-07-22 19:07:02 +02:00 |
|
|
b425462f12
|
API authentication on zitadel server working
|
2025-07-22 09:41:24 +02:00 |
|
|
1b58c7fb22
|
rename organize to org; work in progress: user management with access to auth provider
|
2025-07-21 11:07:51 +02:00 |
|
|
722b258103
|
fix base_url references
|
2025-05-14 17:02:23 +02:00 |
|
|
05499d5d41
|
auth: use form['camefrom'] as requested URI, store in initial session and use for final redirect
|
2025-05-14 16:25:34 +02:00 |
|
|
2f87493144
|
auth: fully functional logout
|
2025-05-14 09:03:15 +02:00 |
|
|
a2c529e6d3
|
storage test: save session message, may be used as session storage
|
2025-05-14 09:02:38 +02:00 |
|
|
b55191dab3
|
storage.message: definitions, start with tests
|
2025-04-30 18:08:45 +02:00 |
|
|
ee5a76a808
|
auth improvements (JWT stuff, esp tests); new: storage.message (event store)
|
2025-04-30 16:42:40 +02:00 |
|
|
5eb9531997
|
auth: directly use user data from id_token (no user_info request)
|
2025-04-29 17:36:02 +02:00 |
|
|
99f717a816
|
provide some example data + code (for JWT encoding/decoding) in 'scratch' module
|
2025-04-29 15:05:03 +02:00 |
|
|
258baa88b2
|
auth fixes (fetch keys via request); collect responses for testing in separate file
|
2025-04-29 09:18:57 +02:00 |
|
|
6857601ab8
|
work in progress: oidc auth tests
|
2025-04-28 15:29:21 +02:00 |
|
|
01fc7d2874
|
auth, work in progress: decode id_token, + other improvements
|
2025-04-25 20:34:52 +02:00 |
|
|
87310b9798
|
auth: improve loading of oidc provider data, provide and check in test
|
2025-04-23 09:10:43 +02:00 |
|
|
b2d1c7888b
|
work in progress: dummy oidc data handler for testing
|
2025-04-22 11:10:43 +02:00 |
|
|
f21910e675
|
auth: get OIDC provider URIs, endpoints, and keys from OP config URLs
|
2025-04-21 11:53:23 +02:00 |
|
|
96afb631e0
|
rename server to web
|
2025-04-20 16:42:13 +02:00 |
|
|
bba081156b
|
create package server.auth with module oidc (former server.auth module)
|
2025-04-20 11:10:05 +02:00 |
|
|
67985a6bdb
|
auth: logout: start implementation (expire cookie)
|
2025-04-20 10:42:42 +02:00 |
|
|
d128c5f138
|
auth: use logger.debug instead of print
|
2025-04-16 16:51:32 +02:00 |
|
|
1918183c59
|
basic logging set-up
|
2025-04-16 10:54:25 +02:00 |
|
|
cae934c2d7
|
fix pyproject: +requests
|
2025-04-15 18:33:37 +02:00 |
|
|
4b791cf83b
|
auth: principal with correct groups => login and auth basically working
|
2025-04-07 10:21:25 +02:00 |
|
|
2a52d8a481
|
auth: user info -> principal
|
2025-04-06 22:39:10 +02:00 |
|
|
35cf8884bf
|
auth: unauthorized: call login()
|
2025-04-05 17:33:36 +02:00 |
|
|
8d3ff5b667
|
auth: store user data in cookie, retrieve in authenticate()
|
2025-04-05 12:31:26 +02:00 |
|
|
7bca60e74c
|
auth: basic OIDC flow with cookie encryption and final redirect working
|
2025-04-04 16:48:53 +02:00 |
|
|
ec80be5f97
|
use waitress as http server; provide simple shell script; auth improvments
|
2025-03-27 22:35:19 +01:00 |
|
|
f911dbf590
|
oidc auth: get rid of pyoidc (oid) - provide random and crypt functionality in scopes.util
|
2025-03-27 08:27:02 +01:00 |
|
|
950fcb4174
|
oidc auth: login and retrieval of user data basically working
|
2025-03-26 18:15:38 +01:00 |
|
|
c1f07effee
|
oidc auth: improvements, store info in cookie
|
2025-03-26 15:43:50 +01:00 |
|
|
0207d12b46
|
work in progress: oidc auth - redirect to oidc provider OK, start processing callback
|
2025-03-25 11:08:14 +01:00 |
|
|
87c0c1db2e
|
work in progress: oidc authentication: start login processing
|
2025-03-24 22:26:17 +01:00 |
|
|
3e25b5e593
|
work in progress: entry points for OpenID Connect (oidc) authentication
|
2025-03-24 12:04:53 +01:00 |
|
|
b4051147ee
|
server.browser.register: allow for explicit string prefixes as context types
|
2025-03-22 11:02:36 +01:00 |
|
|
f04297d570
|
provide DummyMailDelivery for testing; fix auth
|
2025-03-09 09:31:59 +01:00 |
|
|
efd47419a0
|
allow additional db parameters when setting up storage
|
2025-02-11 11:31:56 +01:00 |
|
|
1eff3d2c8b
|
fix auth: don't raise Unauthorized
|
2024-11-22 11:34:40 +01:00 |
|
|
eaa2055c76
|
work in progress: JWT authentication: baseAuth as property, remove registration function
|
2024-11-16 09:27:01 +01:00 |
|