-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add new system config to enforce strict login check for password in user backend #37569
Conversation
Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes. |
271ce01
to
ffd8af7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
https://drone.owncloud.com/owncloud/core/25508/3/2 |
ffd8af7
to
99d77a7
Compare
@C0rby Can you review and check the prio. |
https://drone.owncloud.com/owncloud/core/25509/3/2 Still not getting past the changelog parsing. |
title is limited to 80 chars |
config/config.sample.php
Outdated
@@ -236,6 +236,13 @@ | |||
*/ | |||
'token_auth_enforced' => false, | |||
|
|||
/** | |||
* Enforce strict login for password authentication that will enforce |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please see the other config entries regarding the title line.
The first sentence must end at the same line and is used as item in the table of contents.
You can put more description below that first line.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
pls see my comment on the changes below
Doc relevant, pls file a doc issue, because we need to do a config-to-docs run. |
What about the use case where only the log in via email address for LDAP users should be prevented (by unchecking the LDAP Login Attribute), while local users should still be able to normally log in with email? |
IMO @mmattel means just that - when this is merged we just need to do the "config-to-docs run" which will update the |
@pako81 @micbar I will check it, but again: strict login is strict login, if Local Users Backend has support only for UID that internally is not email, and LDAP allows only UID,MYSPECIALATTRIBUTE, we should only login on these ones.. |
@pako81 @micbar I can confirm that local user backend So as mentioned, whoever enables Personal Opinion: |
2a1826c
to
4ebbebd
Compare
Codecov Report
@@ Coverage Diff @@
## master #37569 +/- ##
============================================
- Coverage 64.70% 64.66% -0.04%
+ Complexity 19350 19348 -2
============================================
Files 1281 1279 -2
Lines 75607 75609 +2
Branches 1333 1333
============================================
- Hits 48920 48893 -27
- Misses 26295 26324 +29
Partials 392 392
Continue to review full report at Codecov.
|
4ebbebd
to
dbf9c06
Compare
When in LDAP config user login attributes are setuped disallowing login by email, verify settings as below work correctly:
However, as of at least OC9.X, when logging in with LDAP with loginname and password, OC always retries to get a user, and try login agains LDAP also with email. For some customers this should not be allowed.
This PR:
/occ config:system:set --type boolean --value true strict_login_enforced
that disallows to retry with email