- 28 Feb, 2018 1 commit
-
-
Stephan Renatus authored
As sketched here: https://developer.okta.com/blog/2018/02/27/a-breakdown-of-the-new-saml-authentication-bypass-vulnerability Thought it was interesting to see how our SAML connector behaved. And it seems to be behaving well. :) Signed-off-by: Stephan Renatus <srenatus@chef.io>
-
- 27 Feb, 2018 1 commit
-
-
Eric Chiang authored
Add missing word
-
- 24 Feb, 2018 1 commit
-
-
Simon Knott authored
-
- 03 Feb, 2018 2 commits
-
-
Eric Chiang authored
New id_provider scope that adds the connector ID and user ID to the ID token claims
-
Vy-Shane Xie authored
Add new federated:id scope that causes Dex to add a federated_claims claim containing the connector_id and user_id to the ID token
-
- 01 Feb, 2018 2 commits
-
-
Eric Chiang authored
handlers/connector_login: update AuthRequest irregardless of method
-
Eric Chiang authored
1170 - Fix comment typos
-
- 14 Jan, 2018 1 commit
-
-
pmcgrath authored
BsaeDN should be BaseDN
-
- 08 Jan, 2018 1 commit
-
-
Eric Chiang authored
automated PR: update CoC and legalese
-
- 05 Jan, 2018 2 commits
-
-
Eric Chiang authored
README: expand connector docs and assign each a level of support
-
Eric Chiang authored
-
- 04 Jan, 2018 3 commits
-
-
Eric Chiang authored
Documentation: restructure connector docs to a single folder
-
Eric Chiang authored
-
Eric Chiang authored
-
- 21 Dec, 2017 5 commits
-
-
Eric Chiang authored
Add Prometheus metrics
-
Frederic Branczyk authored
-
Frederic Branczyk authored
-
Eric Chiang authored
document limitations in the OpenID Connect connector
-
Eric Chiang authored
-
- 19 Dec, 2017 2 commits
-
-
Eric Chiang authored
license: add bill of materials.
-
Diego Pontoriero authored
-
- 17 Dec, 2017 2 commits
-
-
Eric Chiang authored
Clarify email scope description
-
Eric Buth authored
-
- 11 Dec, 2017 1 commit
-
-
Stephan Renatus authored
Signed-off-by: Stephan Renatus <srenatus@chef.io>
-
- 08 Dec, 2017 3 commits
-
-
Eric Chiang authored
Update slapd.sh
-
Pavel Moukhataev authored
-
Stephan Renatus authored
Before, you could not POST your credentials to a password-connector's endpoint without GETing that endpoint first. While this makes sense for browser clients; automated interactions with Dex don't need to look at the password form to fill it in. A symptom of that missing GET was that the POST succeeded (!) with login successful: connector "", username="admin", email="admin@example.com", groups=[] Note the connector "". A subsequent call to finalizeLogin would then fail with connector with ID "" not found: failed to get connector object from storage: not found Now, the connector ID of an auth request will be updated for both GETs and POSTs. Signed-off-by: Stephan Renatus <srenatus@chef.io>
-
- 05 Dec, 2017 2 commits
-
-
Eric Chiang authored
Correct "Verifier" method name in using-dex doc
-
Wyatt Alt authored
Change provider.NewVerifier to provider.Verifier per the godocs: https://godoc.org/github.com/coreos/go-oidc#Provider.Verifier
-
- 04 Dec, 2017 1 commit
-
-
Eric Chiang authored
Bugfix: Set a proper status code before sending an error status page
-
- 01 Dec, 2017 5 commits
-
-
rithu leena john authored
*: fix proto build
-
Eric Chiang authored
-
Eric Chiang authored
-
Eric Chiang authored
-
Kazumasa Kohtaka authored
-
- 28 Nov, 2017 3 commits
-
-
Eric Chiang authored
Implement Microsoft (Azure AD) connector
-
Eric Chiang authored
Specify Java package for dex Protobuf API
-
Vy-Shane Xie authored
-
- 23 Nov, 2017 2 commits
-
-
Pavel Borzenkov authored
Microsoft connector now provides support for 'groups' claim in case 'tenant' is configured in Dex config for the connector. It's possible to deny user authentication if the user is not a member of at least one configured groups. Signed-off-by: Pavel Borzenkov <pavel.borzenkov@gmail.com>
-
Pavel Borzenkov authored
connector/microsoft implements authorization strategy via Microsoft's OAuth2 endpoint + Graph API. It allows to choose what kind of tenants are allowed to authenticate in Dex via Microsoft: * common - both personal and business/school accounts * organizations - only business/school accounts * consumers - only personal accounts * <tenant uuid> - only account of specific tenant Signed-off-by: Pavel Borzenkov <pavel.borzenkov@gmail.com>
-