Add new system config to enforce strict login check for password in user backend#37569
Add new system config to enforce strict login check for password in user backend#37569phil-davis merged 1 commit intomasterfrom
Conversation
|
Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes. |
271ce01 to
ffd8af7
Compare
|
https://drone.owncloud.com/owncloud/core/25508/3/2 |
ffd8af7 to
99d77a7
Compare
|
@C0rby Can you review and check the prio. |
|
https://drone.owncloud.com/owncloud/core/25509/3/2 Still not getting past the changelog parsing. |
|
title is limited to 80 chars |
config/config.sample.php
Outdated
| 'token_auth_enforced' => false, | ||
|
|
||
| /** | ||
| * Enforce strict login for password authentication that will enforce |
There was a problem hiding this comment.
Please see the other config entries regarding the title line.
The first sentence must end at the same line and is used as item in the table of contents.
You can put more description below that first line.
There was a problem hiding this comment.
pls see my comment on the changes below
|
Doc relevant, pls file a doc issue, because we need to do a config-to-docs run. |
|
What about the use case where only the log in via email address for LDAP users should be prevented (by unchecking the LDAP Login Attribute), while local users should still be able to normally log in with email? |
|
IMO @mmattel means just that - when this is merged we just need to do the "config-to-docs run" which will update the |
@pako81 @micbar I will check it, but again: strict login is strict login, if Local Users Backend has support only for UID that internally is not email, and LDAP allows only UID,MYSPECIALATTRIBUTE, we should only login on these ones.. |
|
@pako81 @micbar I can confirm that local user backend So as mentioned, whoever enables Personal Opinion: |
2a1826c to
4ebbebd
Compare
Codecov Report
@@ Coverage Diff @@
## master #37569 +/- ##
============================================
- Coverage 64.70% 64.66% -0.04%
+ Complexity 19350 19348 -2
============================================
Files 1281 1279 -2
Lines 75607 75609 +2
Branches 1333 1333
============================================
- Hits 48920 48893 -27
- Misses 26295 26324 +29
Partials 392 392
Continue to review full report at Codecov.
|
4ebbebd to
dbf9c06
Compare
When in LDAP config user login attributes are setuped disallowing login by email, verify settings as below work correctly:
However, as of at least OC9.X, when logging in with LDAP with loginname and password, OC always retries to get a user, and try login agains LDAP also with email. For some customers this should not be allowed.
This PR:
/occ config:system:set --type boolean --value true strict_login_enforcedthat disallows to retry with email