Skip to content

Releases: ufirstgroup/spryker-second-factor-auth

2.1.0

04 Apr 09:32
89df77f
Compare
Choose a tag to compare

Add new feature to reset 2fa for other users in the backoffice with a new column and action in the users table.

2.0.3

16 Jan 10:19
b04576b
Compare
Choose a tag to compare

fix trust device FIELD_TRUST_DEVICE checkbox optional
minor translation & visual fixes:
-Use zed gui layout when 2FA is enforced and user has to setup (instead of layout-plain).
-Add css class to login

2.0.2

16 Dec 11:21
55026cf
Compare
Choose a tag to compare

Bugfix release: (missing default parameter for SecondFactorAuthConstants::SECOND_FACTOR_AUTH_IGNORABLE_USERS at \SprykerUFirst\Zed\SecondFactorAuth\SecondFactorAuthConfig::getIgnorableUsers() )

2.0.1

13 Dec 13:55
ac9fa69
Compare
Choose a tag to compare
  • added an option to have ignorable users by username in the config file (instead of checking against system users). This was done in prior versions by checking if the user was authenticated via token (removed in the 2.0 version).
  • added LICENSE information (MIT)
  • changed deprecated codeception paths.log setting to paths.output and fixed tests

2.0.0

20 Jul 14:38
8453cb7
Compare
Choose a tag to compare

Drop abandoned "spryker/auth"
Drop usage of "sonata-project/google-authenticator" in favor of "pragmarx/google2fa"
Refactor to account for Spryker updates.
UI Improvements regarding QR Code

What's Changed

New Contributors

Full Changelog: 1.2.1...v2.0.0

1.2.1

19 Jan 12:38
11435c7
Compare
Choose a tag to compare

check for 'form_group_class'

1.2.0

19 Jan 10:29
Compare
Choose a tag to compare

Replace spaceless with apply spaceless in Twig template.

1.1.0 - Display 2FA Status in User Table

03 Apr 11:56
Compare
Choose a tag to compare

This release adds 2 expander plugins to be added to the UserDependencyProvider in order to display the 2FA status in the admin UI.

1.0.3

30 Jan 11:01
Compare
Choose a tag to compare
  • Fix: null values on isIgnorable() not supported

1.0.2

03 Dec 15:48
Compare
Choose a tag to compare

FIX: Don't require 2FA if authenticated with Auth Header Token