Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

App Passwords / Tokens for legacy WebDAV clients #197

Closed
michaelstingl opened this issue Apr 8, 2020 · 14 comments
Closed

App Passwords / Tokens for legacy WebDAV clients #197

michaelstingl opened this issue Apr 8, 2020 · 14 comments
Labels

Comments

@michaelstingl
Copy link
Contributor

After removing support for Basic Auth (see #196), legacy WebDAV clients would need App Passwords / Tokens to connect, similar to the feature in oC10:
https://doc.owncloud.org/server/user_manual/personal_settings/security.html#app-passwords-tokens

@refs
Copy link
Member

refs commented Jan 12, 2021

see #196 (comment)

@refs refs closed this as completed Jan 12, 2021
@michaelstingl
Copy link
Contributor Author

see #196 (comment)

I don't get it? Basic auth will be disabled in prod environment? Can't use 3rd party WebDAV clients with with prod oCIS?

@refs refs reopened this Jan 12, 2021
@refs
Copy link
Member

refs commented Jan 12, 2021

@michaelstingl my bad, had a fast finger on the trigger.

AFAIK basic auth is intended only for testing, so work on getting basic auth production-ready needs to happen to also account for app passwords / tokens.

@michaelstingl
Copy link
Contributor Author

To clarify (similar to oC 10 implementation), real account credentials should not work with basic auth, but users can create additional credentials that allow basic auth with 3rd party WebDAV clients. Perfect would be, if those additional credentials can only be used for file operations, and don't grant access to user or admin settings.

@refs
Copy link
Member

refs commented Jan 12, 2021

thanks for the input @michaelstingl ! I'm unfamiliar with the feature, but it looks like this needs a concept for an implementation in OCIS. Will bring it up when I finish this grooming round with the team.

@michaelstingl
Copy link
Contributor Author

closed accidentally?

@michaelstingl michaelstingl reopened this Mar 4, 2021
@micbar
Copy link
Contributor

micbar commented Mar 4, 2021

yes, closed accidentally

@wkloucek
Copy link
Contributor

wkloucek commented Oct 6, 2021

User story:

Problem:

  • check how common WebDav clients deal with OIDC login flow

@stale
Copy link

stale bot commented Dec 5, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 10 days if no further activity occurs. Thank you for your contributions.

@wkloucek
Copy link
Contributor

wkloucek commented Dec 7, 2021

Rclone supports OIDC -> see our docs here: https://owncloud.dev/clients/rclone/webdav-sync-oidc/

@stale
Copy link

stale bot commented Feb 5, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 10 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the Status:Stale label Feb 5, 2022
@wkloucek wkloucek removed the Category:Enhancement Add new functionality label Feb 7, 2022
@stale stale bot removed the Status:Stale label Feb 7, 2022
@wkloucek wkloucek added the Category:Enhancement Add new functionality label Feb 7, 2022
@stale
Copy link

stale bot commented Apr 8, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 10 days if no further activity occurs. Thank you for your contributions.

@stale
Copy link

stale bot commented Jun 10, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 10 days if no further activity occurs. Thank you for your contributions.

@dragotin
Copy link
Contributor

Closing this as now handled in #7711

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants