aboutsummaryrefslogtreecommitdiff
path: root/Emby.Server.Implementations/Library/UserManager.cs
AgeCommit message (Collapse)Author
2020-05-12Initial migration codePatrick Barron
2020-04-23Merge pull request #2861 from mark-monteiro/fix-auth-response-codesdkanada
Fix Auth Response Codes
2020-04-22Merge branch 'master' into fix-auth-response-codesBond-009
2020-04-20Merge remote-tracking branch 'upstream/master' into register-services-correctlyMark Monteiro
2020-04-13Return correct status codes for authentication and authorization errorsMark Monteiro
- Use AuthenticatonException to return 401 - Use SecurityException to return 403 - Update existing throws to throw the correct exception for the circumstance
2020-04-08Log message for each exception during logindafo90
2020-04-06Fix Authentication request logdafo90
2020-04-04Register and construct IUserManager and IUserRepository correctlyMark Monteiro
2020-04-02Authentication request log with IPDidier Dafond
2020-03-24Remove unused usingsBond_009
2020-02-23Fix some warningsBond_009
* Add analyzers to MediaBrowser.XbmcMetadata * Enable TreatWarningsAsErrors for MediaBrowser.XbmcMetadata * Add analyzers to MediaBrowser.WebDashboard * Enable TreatWarningsAsErrors for MediaBrowser.WebDashboard * Disable SA1600 in favor of CS1591
2020-02-03Merge pull request #2359 from Bond-009/usernamedkanada
Allow changing capitalization of usernames
2020-02-01update some commentsdkanada
Co-Authored-By: Bond-009 <bond.009@outlook.com>
2020-02-01improve scan progress and fix a few bugsdkanada
2020-01-31Allow changing capitalization of usernamesBond_009
2020-01-10Merge branch 'master' into warn12Bond_009
2020-01-04Merge pull request #2206 from Bond-009/userconfigdkanada
Delete user config dir on user deletion
2019-12-29Delete user config dir on user deletionBond_009
2019-12-13Enable TreatWarningsAsErrors for some projectsBond_009
Analyzers are only run in debug build, so setting TreatWarningsAsErrors for release build will catch the compiler warnings until we resolve all analyzer warnings.
2019-12-11More warnings (removed)Bond_009
2019-12-11Merge pull request #2041 from Bond-009/warn11dkanada
Fix more warnings
2019-12-10Apply suggestions from code reviewBond-009
Co-Authored-By: dkanada <dkanada@users.noreply.github.com>
2019-11-27Fix more warningsBond_009
2019-11-25* Add support for multi segment base urlsBond_009
* Make baseurl case-insensitive
2019-11-23Merge pull request #1926 from Bond-009/authdkanada
Add clearer exceptions, warnings and docs
2019-11-21Fix easy passwordBond-009
2019-11-01Rewrite hex encoder/decoderBond_009
2019-10-29Fix more warningsBond_009
2019-10-20Add clearer exceptions, warnings and docsBond_009
2019-09-23Fix multiple mistakes and warningsBond_009
2019-09-17Remove legacy auth code (#1677)Bond-009
* Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build
2019-09-13Reset invalid login counter on successfull loginBond-009
2019-08-18Fix UserNotFoundErrorBond_009
2019-08-16Improvements to UserManagerBond_009
2019-07-06Streamline authentication proccessBond_009
2019-06-28Reduce amount of raw sqlBond_009
2019-06-09Revert "Don't set a default reset provider"Joshua M. Boniface
This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm.
2019-06-09Remove superfluous conditionalJoshua M. Boniface
This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009
2019-06-09Don't set a default reset providerJoshua M. Boniface
2019-06-09Apply suggestions from code reviewJoshua M. Boniface
Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com>
2019-06-09Add nicer log message and commentJoshua M. Boniface
2019-06-08Implement InvalidAuthProviderJoshua M. Boniface
Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2
2019-05-25Format correctly the PIN when updating itDrPandemic
2019-05-11Fix pin bug introduced in 10.3.z.DrPandemic
The issue is that the new easyPassword format prepends the hash function. This PR extract the hash from "$SHA1$_hash_".
2019-04-30Fix incorrect hasPassword flag when easy pin setbugfixin
2019-04-07Override username with AuthenticationProviderJoshua Boniface
Pass back the Username directive returned by an AuthenticationProvider to the calling code, so we may override the user-provided Username value if the authentication provider passes this back. Useful for instance in an LDAP scenario where what the user types may not necessarily be the "username" that is mapped in the system, e.g. the user providing 'mail' while 'uid' is the "username" value. Could also then be extensible to other authentication providers as well, should they wish to do a similar thing.
2019-03-25Apply minor suggestions from code reviewLogicalPhallacy
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-24removes needless dictionaryPhallacy
2019-03-24Update Emby.Server.Implementations/Library/UserManager.csClaus Vium
Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com>
2019-03-22made password resets an interface and per userPhallacy