Commit Graph

64 Commits

Author SHA1 Message Date
55ad73d92e Merge pull request #800 from cyso/pr/oidc-account
OIDC User and Account management during login
2020-10-10 14:32:14 +02:00
a679073928 Merge pull request #773 from terbolous/azure-oauth
Add Account creation/permission handling based on Azure oAuth group membership
2020-10-10 14:20:26 +02:00
b5fc9045f2 Merge pull request #766 from frei-style/sort_accounts
Sort accounts by name on 'New Domain' and domain 'Admin'
2020-10-10 14:18:02 +02:00
b8ffb1dae9 Merge pull request #804 from RoeiGanor/api_key
Add API Key to the UI
2020-10-10 14:11:09 +02:00
cf62658e19 do not fail with wildcard PTRs 2020-09-10 01:18:07 +07:00
74b89b1b7e Add API Key to the UI 2020-08-08 13:41:18 +00:00
f9f966df75 Allow for configuration of logout url 2020-08-06 15:29:02 +02:00
27f5c89f70 Manage Account membership on oidc login 2020-08-06 15:28:54 +02:00
ab6480a4b4 Update user with info from oidc during login 2020-08-06 15:28:27 +02:00
22eabef06a Use the correct matching group 2020-07-03 11:01:17 +02:00
e993422106 Add regex matching for group/account description 2020-07-03 10:55:06 +02:00
25db119d02 Add Account creation/permission handling based on Azure oAuth group membership 2020-07-03 08:55:31 +02:00
9946f72a85 Order accounts by name on 'New Domain' and domain admin 2020-06-28 01:59:12 +02:00
a3fd856dd8 Code refactoring and bug fixes 2020-06-19 08:47:51 +07:00
4e39d5a461 Fix session clearing 2020-05-29 17:41:20 +02:00
cfc8567180 Merge pull request #742 from nfantone/feat/remote-user
Support authenticating using REMOTE_USER environment variable
2020-05-26 15:36:47 +07:00
52298f8289 Support login in through REMOTE_USER environment variable
Support redirecting remote users to logout URL and clearing remote login cookies
2020-05-22 15:31:24 +01:00
3476c8a9ec SJS Sort rrset members by content before comparison to ensure correct compare. Also default comment to blank entry rather than missing entry, to allow sorting to work correctly. 2020-05-20 16:21:28 +12:00
fd0485d897 Merge remote-tracking branch 'keesbos/mgmt' 2020-05-17 19:43:45 +07:00
78245d339f Merge pull request #717 from RoeiGanor/master
OIDC custom claims
2020-05-17 13:44:52 +07:00
2044ce4737 oidc custom claims 2020-05-04 07:12:48 +00:00
33eff6313f Fix loading zone with Slave type 2020-05-02 09:41:01 +07:00
b03cbdea65 Azure oauth: Graph api calls it mail, not email 2020-04-30 12:15:19 +02:00
b8442c4c5c Azure oauth: remove preferredName from query 2020-04-30 12:14:32 +02:00
02692c7759 Code formating 2020-04-30 10:17:08 +07:00
0e093d4eec Support only having one auth method enabled (which isn't ldap/local) 2020-04-16 16:04:10 +08:00
e550b0a109 SAML debug attributes 2020-03-25 21:05:30 +00:00
31d19b19ab Merge remote-tracking branch 'eht16/add_ssl_verify_setting' 2020-01-29 22:33:24 +07:00
dbb181d575 Merge pull request #647 from eht16/fix_typos
Fiy typos in logging messages
2020-01-29 22:21:29 +07:00
4d391ccb34 Extend api with account and user management 2020-01-27 14:04:15 +00:00
ccaf74646d Fiy typos in logging messages 2020-01-27 00:05:28 +01:00
68843d9664 Add new setting to verify outgoing SSL connections
The new setting 'verify_ssl_connections' tells the requests library to
verify secured outgoing HTTP connections.
Usually verifying is desired and helps to reveal configuration
problems. It also disables an ugly warning when HTTPS connections
are made without verification.
2020-01-25 19:44:11 +01:00
b4b5673cf1 Merge branch 'master' of github.com:johnwarburton/PowerDNS-Admin into feat/groupofnames
Signed-off-by: mathieu.brunot <mathieu.brunot@monogramm.io>
2020-01-08 23:19:51 +01:00
cff4d0af53 Fix some formatting issues 2020-01-03 15:57:07 +13:00
765eab999a Azure OAuth - add Group mappings to Roles 2020-01-03 15:36:38 +13:00
3bf6e6e9f1 Merge pull request #622 from ngoduykhanh/email_verification
Add user email verification
2019-12-22 10:06:43 +07:00
462190a913 Fix API key query 2019-12-22 10:06:02 +07:00
4bdd433079 Fix migration script and LGTM 2019-12-21 22:26:56 +07:00
7739bf7cfc Add user email verification 2019-12-21 21:43:03 +07:00
5567886aa3 Fix #614. Can not enable dnssec 2019-12-19 21:50:15 +07:00
93cd64ac75 Fix #613. Create domain from template with SOA record enabled 2019-12-19 21:43:53 +07:00
7205b4a01b User session improvement
- Add session handler on other blueprint's before request
- Adjustment in using jTimeout to close warning popup on
other tabs when we extend the session
2019-12-18 15:25:20 +07:00
9a1b92fbc2 Add session timeout warning 2019-12-17 23:46:34 +07:00
103bf176ed Fix dashboard domain sorting 2019-12-17 13:34:52 +07:00
3e961d7b21 LGTM fixes 2019-12-16 16:27:18 +07:00
f5b88ebc73 Merge branch 'master' into record_adjustment 2019-12-16 15:54:38 +07:00
3196297f57 Fix domain template. Drop PDNS 3.x support 2019-12-16 14:23:17 +07:00
a891ed38e2 Add more log and history data 2019-12-16 11:01:16 +07:00
37f24f9fde Correction of redirect URL after successful SAML login
From my perspective, if agreed, this change can be merged, because the basic SAM auth. functionality is now present
and was tested with "samlidp.io" iDP.

However, there are further improvements which I would like to integrate, but as a separate features in separate pull requests
2019-12-15 01:15:30 +01:00
cd3535dcd2 - Variable references inside SAML class were fixed
- Function signatures inside SAML class were fixed
    - Redirect URL for /saml/login path was modified (saml_authorized -> index.saml_authorized)

    Current status is that SAML metadata can be generated under /saml/metadata and communication to SAML iDP is working

    Problems remaining:
        - SAML Response doesn't contain any attributes (There is no AttributeStatement on the Response). It can be that problem is on iDP side
        - Background thread in retrieve_idp_data() cannot be spawned, this part is currently commented out, old code needs to be revisited
2019-12-14 18:59:59 +01:00