- 07 Feb, 2017 2 commits
-
-
rithu leena john authored
server: clean up test comments and code flow
-
Eric Chiang authored
-
- 06 Feb, 2017 3 commits
-
-
Eric Chiang authored
Documentation: warn admins not to edit dex ThirdPartyResources manually
-
rithu leena john authored
Fixes #706
-
Eric Chiang authored
-
- 03 Feb, 2017 1 commit
-
-
Eric Chiang authored
{web,server}: use html/template and reduce use of auth request ID
-
- 02 Feb, 2017 2 commits
-
-
Eric Chiang authored
Switch from using "text/template" to "html/template", which provides basic XSS preventions. We haven't identified any particular place where unsanitized user data is rendered to the frontend. This is just a preventative step. At the same time, make more templates take pure URL instead of forming an URL themselves using an "authReqID" argument. This will help us stop using the auth req ID in certain places, preventing garbage collection from killing login flows that wait too long at the login screen. Also increase the login session window (time between initial redirect and the user logging in) from 30 minutes to 24 hours, and display a more helpful error message when the session expires. How to test: 1. Spin up dex and example with examples/config-dev.yaml. 2. Login through both the password prompt and the direct redirect. 3. Edit examples/config-dev.yaml removing the "connectors" section. 4. Ensure you can still login with a password. (email/password is "admin@example.com" and "password")
-
rithu leena john authored
Documentation: Minor changes to SAML connector doc.
-
- 01 Feb, 2017 3 commits
-
-
rithu john authored
-
rithu leena john authored
Improve SAML Signature and Response Validation
-
rithu leena john authored
connector: add GitLab connecor
-
- 27 Jan, 2017 6 commits
-
-
Ali Javadi authored
-
Eric Chiang authored
server: support POSTing to authorization endpoint
-
Eric Chiang authored
Fixes #791
-
rithu leena john authored
Documentation/proposals: Add a proposal for refresh token revocation.
-
rithu john authored
-
Ali Javadi authored
-
- 26 Jan, 2017 2 commits
-
-
Holger Koser authored
-
Holger Koser authored
* Improve Order of Namespace Declarations and Attributes in Canonical XML. This is related to an issue in goxmldsig for which I created an [pull request](https://github.com/russellhaering/goxmldsig/pull/17). * Do not compress the AuthnRequest if `HTTP-POST` binding is used. * SAML Response is valid if the Message and/or the Assertion is signed. * Add `AssertionConsumerServiceURL` to `AuthnRequest` * Validate Status on the Response * Validate Conditions on the Assertion * Validation SubjectConfirmation on the Subject
-
- 24 Jan, 2017 1 commit
-
-
rithu leena john authored
cmd/dex: make connector name field mandatory in dex configuration.
-
- 23 Jan, 2017 5 commits
-
-
rithu john authored
-
Eric Chiang authored
Docs: Added a name to the LDAP connector
-
Eric Chiang authored
Update kubernetes.md - correct typo
-
Marian Steinbach authored
Without a name, the example app's login form will only show `Log in with` as a button label.
-
Andrew Johnstone authored
-
- 17 Jan, 2017 3 commits
-
-
rithu leena john authored
Documentation: add docs on patch release process.
-
rithu john authored
-
rithu leena john authored
Allow CORS on keys and token endpoints
-
- 14 Jan, 2017 1 commit
-
-
Simon HEGE authored
-
- 13 Jan, 2017 2 commits
-
-
Eric Chiang authored
server: add at_hash claim support
-
Eric Chiang authored
The "at_hash" claim, which provides hash verification for the "access_token," is a required claim for implicit and hybrid flow requests. Previously we did not include it (against spec). This PR implements the "at_hash" logic and adds the claim to all responses. As a cleanup, it also moves some JOSE signing logic out of the storage package and into the server package. For details see: https://openid.net/specs/openid-connect-core-1_0.html#ImplicitIDToken
-
- 11 Jan, 2017 9 commits
-
-
Eric Chiang authored
Removed extra o typo
-
y2kenny authored
-
Eric Chiang authored
*: update refresh tokens instead of deleting and creating another
-
Eric Chiang authored
-
Eric Chiang authored
-
Eric Chiang authored
The server implements a strategy called "Refresh Token Rotation" to ensure refresh tokens can only be claimed once. ref: https://tools.ietf.org/html/rfc6819#section-5.2.2.3 Previously "refresh_token" values in token responses where just the ID of the internal refresh object. To implement rotation, when a client redeemed a refresh token, the object would be deleted, a new one created, and the new ID returned as the new "refresh_token". However, this means there was no consistent ID for refresh tokens internally, making things like foreign keys very hard to implement. This is problematic for revocation features like showing all the refresh tokens a user or client has out. This PR updates the "refresh_token" to be an encoded protobuf message, which holds the internal ID and a nonce. When a refresh token is used, the nonce is updated to prevent reuse, but the ID remains the same. Additionally it adds the timestamp of each token's last use.
-
Eric Chiang authored
-
Eric Chiang authored
server: fixes for the implicit and hybrid flow
-
Eric Chiang authored
Accept the following response_type for the implicit flow: id_token token id_token And the following for hybrid flow code id_token code token code token id_token This corrects the previous behavior of the implicit flow, which only accepted "token" (now correctly rejected).
-