| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2020-05-12 | Initial migration code | Patrick Barron | |
| 2020-04-23 | Merge pull request #2861 from mark-monteiro/fix-auth-response-codes | dkanada | |
| Fix Auth Response Codes | |||
| 2020-04-22 | Merge branch 'master' into fix-auth-response-codes | Bond-009 | |
| 2020-04-20 | Merge remote-tracking branch 'upstream/master' into register-services-correctly | Mark Monteiro | |
| 2020-04-13 | Return correct status codes for authentication and authorization errors | Mark Monteiro | |
| - Use AuthenticatonException to return 401 - Use SecurityException to return 403 - Update existing throws to throw the correct exception for the circumstance | |||
| 2020-04-08 | Log message for each exception during login | dafo90 | |
| 2020-04-06 | Fix Authentication request log | dafo90 | |
| 2020-04-04 | Register and construct IUserManager and IUserRepository correctly | Mark Monteiro | |
| 2020-04-02 | Authentication request log with IP | Didier Dafond | |
| 2020-03-24 | Remove unused usings | Bond_009 | |
| 2020-02-23 | Fix some warnings | Bond_009 | |
| * Add analyzers to MediaBrowser.XbmcMetadata * Enable TreatWarningsAsErrors for MediaBrowser.XbmcMetadata * Add analyzers to MediaBrowser.WebDashboard * Enable TreatWarningsAsErrors for MediaBrowser.WebDashboard * Disable SA1600 in favor of CS1591 | |||
| 2020-02-03 | Merge pull request #2359 from Bond-009/username | dkanada | |
| Allow changing capitalization of usernames | |||
| 2020-02-01 | update some comments | dkanada | |
| Co-Authored-By: Bond-009 <bond.009@outlook.com> | |||
| 2020-02-01 | improve scan progress and fix a few bugs | dkanada | |
| 2020-01-31 | Allow changing capitalization of usernames | Bond_009 | |
| 2020-01-10 | Merge branch 'master' into warn12 | Bond_009 | |
| 2020-01-04 | Merge pull request #2206 from Bond-009/userconfig | dkanada | |
| Delete user config dir on user deletion | |||
| 2019-12-29 | Delete user config dir on user deletion | Bond_009 | |
| 2019-12-13 | Enable TreatWarningsAsErrors for some projects | Bond_009 | |
| Analyzers are only run in debug build, so setting TreatWarningsAsErrors for release build will catch the compiler warnings until we resolve all analyzer warnings. | |||
| 2019-12-11 | More warnings (removed) | Bond_009 | |
| 2019-12-11 | Merge pull request #2041 from Bond-009/warn11 | dkanada | |
| Fix more warnings | |||
| 2019-12-10 | Apply suggestions from code review | Bond-009 | |
| Co-Authored-By: dkanada <dkanada@users.noreply.github.com> | |||
| 2019-11-27 | Fix more warnings | Bond_009 | |
| 2019-11-25 | * Add support for multi segment base urls | Bond_009 | |
| * Make baseurl case-insensitive | |||
| 2019-11-23 | Merge pull request #1926 from Bond-009/auth | dkanada | |
| Add clearer exceptions, warnings and docs | |||
| 2019-11-21 | Fix easy password | Bond-009 | |
| 2019-11-01 | Rewrite hex encoder/decoder | Bond_009 | |
| 2019-10-29 | Fix more warnings | Bond_009 | |
| 2019-10-20 | Add clearer exceptions, warnings and docs | Bond_009 | |
| 2019-09-23 | Fix multiple mistakes and warnings | Bond_009 | |
| 2019-09-17 | Remove legacy auth code (#1677) | Bond-009 | |
| * Remove legacy auth code * Adds tests so we don't break PasswordHash (again) * Clean up interfaces * Remove duplicate code * Use auto properties * static using * Don't use 'this' * Fix build | |||
| 2019-09-13 | Reset invalid login counter on successfull login | Bond-009 | |
| 2019-08-18 | Fix UserNotFoundError | Bond_009 | |
| 2019-08-16 | Improvements to UserManager | Bond_009 | |
| 2019-07-06 | Streamline authentication proccess | Bond_009 | |
| 2019-06-28 | Reduce amount of raw sql | Bond_009 | |
| 2019-06-09 | Revert "Don't set a default reset provider" | Joshua M. Boniface | |
| This reverts commit c230d49d7c37d4fbe77676b835c3afd6c8cb56e7. This reenables an edge case where an admin might want to reset, with the default auth provider, the password of an externally-provided user so they could "unlock" the account while it was failing. There might be minor security implications to this, but the malicious actor would need FS access to do it (as they would with any password resets) so it's probably best to keep it as-is. Removing this in the first place was due to a misunderstanding anyways so no harm. | |||
| 2019-06-09 | Remove superfluous conditional | Joshua M. Boniface | |
| This wasn't needed to prevent updating the policy on-disk from my tests and can be removed as suggested by @Bond-009 | |||
| 2019-06-09 | Don't set a default reset provider | Joshua M. Boniface | |
| 2019-06-09 | Apply suggestions from code review | Joshua M. Boniface | |
| Co-Authored-By: Claus Vium <cvium@users.noreply.github.com> Co-Authored-By: Bond-009 <bond.009@outlook.com> | |||
| 2019-06-09 | Add nicer log message and comment | Joshua M. Boniface | |
| 2019-06-08 | Implement InvalidAuthProvider | Joshua M. Boniface | |
| Implements the InvalidAuthProvider, which acts as a fallback if a configured authentication provider, e.g. LDAP, is unavailable due to a load failure or removal. Until the user or the authentication plugin is corrected, this will cause users with the missing provider to be locked out, while throwing errors in the logs about the issue. Fixes #1445 part 2 | |||
| 2019-05-25 | Format correctly the PIN when updating it | DrPandemic | |
| 2019-05-11 | Fix pin bug introduced in 10.3.z. | DrPandemic | |
| The issue is that the new easyPassword format prepends the hash function. This PR extract the hash from "$SHA1$_hash_". | |||
| 2019-04-30 | Fix incorrect hasPassword flag when easy pin set | bugfixin | |
| 2019-04-07 | Override username with AuthenticationProvider | Joshua Boniface | |
| Pass back the Username directive returned by an AuthenticationProvider to the calling code, so we may override the user-provided Username value if the authentication provider passes this back. Useful for instance in an LDAP scenario where what the user types may not necessarily be the "username" that is mapped in the system, e.g. the user providing 'mail' while 'uid' is the "username" value. Could also then be extensible to other authentication providers as well, should they wish to do a similar thing. | |||
| 2019-03-25 | Apply minor suggestions from code review | LogicalPhallacy | |
| Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com> | |||
| 2019-03-24 | removes needless dictionary | Phallacy | |
| 2019-03-24 | Update Emby.Server.Implementations/Library/UserManager.cs | Claus Vium | |
| Co-Authored-By: LogicalPhallacy <44458166+LogicalPhallacy@users.noreply.github.com> | |||
| 2019-03-22 | made password resets an interface and per user | Phallacy | |
