Meenakshi Kamalaseshan Radha
|
2a37483b49
|
fix(auth)- Fix Redirect url flow in OidcCallback (#11878)
|
2024-11-20 14:07:07 -06:00 |
|
david-leifker
|
0e4b3c15c9
|
refactor(datahub-frontend): upgrade frontend pac4j (#11709)
|
2024-10-28 09:05:16 -05:00 |
|
RyanHolstien
|
a754d52b3f
|
fix(oidc): apply acr values to redirect url (#11447)
|
2024-09-20 14:43:41 -05:00 |
|
RyanHolstien
|
946b9f3745
|
feat(auth): grant type and acr values custom oidc parameters support (#11116)
|
2024-08-09 14:55:35 -05:00 |
|
Davi Arnaut
|
5a686c5f4c
|
feat(auth): improve authentication flow logging (#10428)
|
2024-05-03 11:54:51 -07:00 |
|
Davi Arnaut
|
15d0a0c8d2
|
fix(oidc settings): use correct path for preferredJwsAlgorithm (#10302)
|
2024-04-16 13:45:44 -07:00 |
|
david-leifker
|
731c29e675
|
feat(graph-retriever): implement graph retriever (#10241)
|
2024-04-16 10:12:48 -05:00 |
|
Davi Arnaut
|
23277f8dc4
|
fix(oidc settings): effective JWS algorithm setting (#9712)
|
2024-01-24 17:36:30 -08:00 |
|
RyanHolstien
|
651998de44
|
feat(frontend): align frontend sso code with refactors (#9506)
|
2023-12-26 14:34:10 -06:00 |
|
ethan-cartwright
|
1e64a75339
|
fix(frontend): Add JSON list oidc group extraction logic (#9495)
Co-authored-by: Ethan Cartwright <ethan.cartwright@acryl.io>
|
2023-12-26 19:34:05 +05:30 |
|
Aseem Bansal
|
e14474176f
|
feat(lint): add spotless for java lint (#9373)
|
2023-12-06 11:02:42 +05:30 |
|
RyanHolstien
|
60c1aab587
|
fix(frontend): update cookie module (#8862)
|
2023-10-17 15:50:32 -05:00 |
|
david-leifker
|
aef49b8fb2
|
feat(entity-client): enable client side cache for entity-client and usage-client (#8877)
|
2023-09-21 22:00:14 -05:00 |
|
Chris Collins
|
fd89047ee2
|
fix(sso) Retrieve cookie configs separately from SSO configs (#7330)
|
2023-02-14 13:36:47 -05:00 |
|
david-leifker
|
fcc9dbb7bc
|
feat(oidc): add options for preferred jws algorithm (#7245)
|
2023-02-07 19:21:21 -08:00 |
|
Chris Collins
|
0337110928
|
feat(auth) Update auth cookies to have same-site none for chrome extension (#6976)
|
2023-01-11 17:31:20 -05:00 |
|
david-leifker
|
10ea10ce85
|
fix(security): require signed/encrypted jwt tokens (#6565)
* fix(security): require unsigned/encrypted jwt tokens
* Add import
Co-authored-by: Pedro Silva <pedro@acryl.io>
|
2022-12-26 19:45:32 +00:00 |
|
david-leifker
|
bacc2f957b
|
fix(oidc): fix oidc authentication loop (#6848)
* fix(oidc): fix oidc authentication loop
|
2022-12-22 16:12:51 -06:00 |
|
david-leifker
|
2a182f4846
|
fix(pac4j-oidc): add verifier parameter (#6835)
* fix(pac4j-oidc): add verifier parameter
|
2022-12-21 20:11:11 -06:00 |
|
david-leifker
|
27ea3bf125
|
fix(security): play framework upgrade (#6626)
* fix(security): play framework upgrade
|
2022-12-08 20:27:51 -06:00 |
|
Aditya Radhakrishnan
|
d905cdffc1
|
fix(oidc): change default oidc username claim to be email (#6220)
|
2022-10-23 21:09:46 -07:00 |
|
chen4119
|
7bf27336ef
|
feat(frontend): Parse JWT access token claims (#5138)
|
2022-06-13 07:12:06 -07:00 |
|
RyanHolstien
|
21715957c8
|
feat(oidc): add configurable read timeout (#5088)
|
2022-06-06 13:39:44 -07:00 |
|
RyanHolstien
|
72eff249ad
|
chore(deps): play - upgrade for CVEs (#4891)
|
2022-05-10 16:15:53 -07:00 |
|
RyanHolstien
|
9422578e41
|
Revert "chore(deps): upgrade play to remove CVEs (#4864)" (#4868)
This reverts commit 84a026b1263ab91cd4010d905129a279523f413e.
|
2022-05-06 15:08:35 -07:00 |
|
RyanHolstien
|
84a026b126
|
chore(deps): upgrade play to remove CVEs (#4864)
|
2022-05-06 13:42:03 -07:00 |
|
RyanHolstien
|
ad7a92a098
|
Revert "chore(deps): upgrade play dependencies to remove CVE vulnerabilities (#4820)" (#4861)
This reverts commit fa4abeade750c487504976e13c7aad2789b9e49e.
|
2022-05-06 10:18:30 -07:00 |
|
RyanHolstien
|
fa4abeade7
|
chore(deps): upgrade play dependencies to remove CVE vulnerabilities (#4820)
|
2022-05-06 08:05:19 -07:00 |
|
chen4119
|
fc32e78ac1
|
fix(datahub-frontend): OIDC discovery URL will not have NONE as auth_methods_supported (#4710)
|
2022-04-26 14:01:18 -07:00 |
|
John Joyce
|
c69310522b
|
feat(metadata service): Introducing Platform Events (#4477)
|
2022-03-29 18:32:04 -07:00 |
|
Pedro Silva
|
db35aca869
|
feat(frontend) Adds multiple group claim support (#4450)
|
2022-03-21 13:33:53 -07:00 |
|
John Joyce
|
11f809abd2
|
feat(oidc): Adding support for extracting single string groups claim (#4419)
|
2022-03-15 17:41:19 -07:00 |
|
John Joyce
|
c713b60810
|
fix(oidc): Update group membership each login (and make group extraction disabled by default) (#4380)
|
2022-03-11 08:49:31 -08:00 |
|
John Joyce
|
ef31b0ee6a
|
fix(frontend): Fix common OIDC issues (#4351)
|
2022-03-08 14:27:19 -08:00 |
|
John Joyce
|
f49666a230
|
feat(auth): Metadata Service Authentication! (#3598)
|
2021-11-22 16:33:14 -08:00 |
|
John Joyce
|
710dc3db1c
|
fix(oidc): Fix the oidc lastModifiedAt bug (#3429)
|
2021-10-20 17:09:02 -07:00 |
|
John Joyce
|
a25434c81e
|
fix(oidc): add name claim extraction (#3384)
|
2021-10-13 18:56:20 -07:00 |
|
John Joyce
|
ed01b59a00
|
feat(users & groups): User & Groups Management GraphQL APIs + UI (#3318)
|
2021-10-07 16:14:35 -07:00 |
|
John Joyce
|
fe589a58b3
|
fix(oidc): Tolerate null emails (#3330)
|
2021-10-05 19:30:51 -07:00 |
|
John Joyce
|
c742cbd62d
|
Attach Client ID to token request in Authentication Mode none (#3308)
|
2021-09-29 10:28:28 -07:00 |
|
John Joyce
|
33f4d2ede0
|
fix(upgrade): Improving NoCodeUpgrade logic to account for Bootstrap logic (#3301)
|
2021-09-28 16:30:49 -07:00 |
|
John Joyce
|
add778c04a
|
feat(oidc): Support NONE client auth method in OIDC (stopgap) (#3305)
|
2021-09-28 16:30:17 -07:00 |
|
John Joyce
|
dfcfc6984d
|
Fixing response type bug (#3251)
|
2021-09-16 16:54:38 -07:00 |
|
Dexter Lee
|
bf6c2dcf0f
|
fix(oidc): add more oidc config (#3221)
|
2021-09-10 16:57:28 -07:00 |
|
John Joyce
|
ccb09a6966
|
feat(access control): Fine-Grained Access Control M1 (#3182)
|
2021-09-02 19:05:13 -07:00 |
|
John Joyce
|
2c5edd88ab
|
feat(graphql): migrating GraphQL API to metadata-service (nee GMS) (#3131)
|
2021-08-20 10:58:07 -07:00 |
|