Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] occ command to manage user app passcodes #31540

Closed
mmattel opened this issue May 27, 2018 · 9 comments
Closed

[Feature Request] occ command to manage user app passcodes #31540

mmattel opened this issue May 27, 2018 · 9 comments

Comments

@mmattel
Copy link
Contributor

mmattel commented May 27, 2018

This Feature Request is about to extend the ./occ user command to manage app passcodes

user:app-passcode <user> --list
user:app-passcode <user> --create <app-name>
user:app-passcode <user> --delete <app-name>

Intention:
Automation for rollouts especially in enterprises.

@patrickjahns @PVince81 @pmaier1 @hodyroff

@ownclouders
Copy link
Contributor

GitMate.io thinks possibly related issues are #8569 (Feature requests), #12530 (Feature Request), #22635 (Feature Request: OCC Change Password Using Hash), #29960 ([Feature Request] extend ./occ user to list logged on users), and #14252 (feature request : Occ need new commands).

@hodyroff
Copy link

Hm, oAuth2 with proper management for admins is not sufficient? Why? There might be a good reason, please let me know.

@phil-davis
Copy link
Contributor

--list will just list the "names" of the app passcodes (the actual values are encrypted) - I guess it would be useful to know what is there to delete.
--create will need to output the created app passcode, then the administrator will need to communicate it somehow to the user. Is there a use case example for when this would be used?
--delete would be useful so the administrator can delete app passcodes that are known to have been compromised, when the user themselves is not in a position to do it.

@PVince81
Copy link
Contributor

or would it be enough to revoke all the tokens of the user in case the account is compromised ?

@PVince81 PVince81 added this to the maybe some day milestone May 29, 2018
@mmattel
Copy link
Contributor Author

mmattel commented May 29, 2018

maybe only a device got lost and you want to revoke access to that particular device only.
revoke all is possible but maybe too much

@pmaier1
Copy link
Contributor

pmaier1 commented Jun 1, 2018

Actually OAuth2 is the way to go to provide such functionality in a proper, automated and standardized way. I'm aware that we need some enhancements to the OAuth2 implementation like an admin management interface (including occ commands) and also more granular options in the UI (e.g. ability to distinguish between particular clients). Considering the benefits of OAuth2 I'm very hesitant to invest in app passwords.

@patrickjahns
Copy link
Contributor

patrickjahns commented Jun 1, 2018

@pmaier1
that is very short sighted - consider that webdav clients do not necessarily have oauth as authentication mechanism integrated (example: cadaver)
having app-passwords means to be able to use ownCloud as an storage integration that can be talked to by any webdav client without exposing your users password

it needs to be hover discussed, if for automation the cli is the way to go - or we rather invest in a proper API that provides this functionality

@pmaier1
Copy link
Contributor

pmaier1 commented Jun 1, 2018

consider that webdav clients do not necessarily speak oauth.

I'm fully aware.

that is very short sighted

I consider our focus to be on the native clients which have OAuth2 support and would like to cover the mentioned requirements there first.

@stale
Copy link

stale bot commented Sep 21, 2021

This issue has been automatically closed.

@stale stale bot closed this as completed Sep 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants