aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Support authentication using SSH.Michał Górny2013-08-251-0/+1
|
* Initial SSH server support.Michał Górny2013-08-251-0/+4
|
* Move crypto-related stuff to okupy.crypto.Michał Górny2013-08-211-1/+1
|
* Move RevokedToken to common and make it more universal.Michał Górny2013-08-211-1/+1
|
* Move SSL verification into a dedicated backend.Michał Górny2013-08-121-1/+1
|
* Use session storage for messages.Michał Górny2013-08-111-0/+2
|
* Use cache backend for sessions.Michał Górny2013-08-111-0/+2
|
* Move settings around, so they can actually be overwrittenTheo Chatzimichos2013-08-111-47/+47
|
* Remove Modelbackend, it is uselessTheo Chatzimichos2013-08-101-1/+0
|
* Re-use TOTPDevice for handling 'OTP disabled'.Michał Górny2013-08-091-1/+0
| | | | | There's no point in having a special device that checks if TOTP secret is set. Let's just do that in TOTPDevice.
* Revoke used tokens atomically.Michał Górny2013-08-091-0/+1
| | | | This should prevent replay attacks on TOTP and SOTP.
* Support SOTP recovery keys.Michał Górny2013-08-091-0/+1
|
* Support TOTP with database storage (temporarily).Michał Górny2013-08-091-0/+1
| | | | | A dedicated database model is used to store the secrets. If user does not have a secret, it is assumed that he disabled OTP.
* Introduce initial code for two-phase auth support.Michał Górny2013-08-091-0/+2
| | | | | | | This commit adds a simple NoOTPDevice model that currently serves the purpose of responding successfully to any request. The login view has been extended with proper OTP device setup and initial verification support.
* Move middleware & installed app settings to common.Michał Górny2013-08-091-0/+25
| | | | | | Keeping them split into all those samples is not really beneficial, and makes bisecting painful. Instead, keep the common middleware & apps common, and override as necessary in devel/prod.
* Set session expiration in settings.Michał Górny2013-08-081-1/+1
|
* Introduce ExternalBackend for handling external auth.Michał Górny2013-08-051-0/+1
| | | | | | | Whenever external authentication doesn't really fit the simple auth model django has, ExternalBackend can be used to inject successful authentication. This is done through the additional 'ext_authed' argument which determines the result of the authentication.
* as pointed out by dastergon, instance_name key is not used in non-verbose ↵Theo Chatzimichos2013-07-291-1/+1
| | | | formatter
* trivial fixTheo Chatzimichos2013-07-161-1/+1
|
* Add TLS and CONNECTION_OPTIONS for ldapdbTheo Chatzimichos2013-07-101-0/+2
|
* whitespaceTheo Chatzimichos2013-07-101-1/+0
|
* Add django-ldapdb in settings and dependency listTheo Chatzimichos2013-07-101-0/+10
| | | | | django-ldapdb is a library that uses LDAP server as Database backend. This way we will be able to use ORM by mapping LDAP users to python objects
* Merge branch 'openid-week2'Theo Chatzimichos2013-06-301-0/+4
|\ | | | | | | | | | | Conflicts: okupy/accounts/urls.py okupy/accounts/views.py
| * Disable OpenID application.Michał Górny2013-06-261-3/+3
| | | | | | | | The code from it will be moved into accounts app.
| * Merge remote-tracking branch 'origin/master' into openid-week2Michał Górny2013-06-261-4/+4
| |\
| * | [OpenID] Explicitly note that login is requested by OpenID request.Michał Górny2013-06-191-0/+4
| | |
| * | [OpenID] Support minimal site auth.Michał Górny2013-06-191-3/+3
| | |
* | | minor improvements/renames to the LOGGING contentsTheo Chatzimichos2013-06-291-12/+16
| | |
* | | Move AUTH_LDAP_USER_DN_TEMPLATE to settings/__init__Theo Chatzimichos2013-06-271-0/+2
| | | | | | | | | | | | | | | | | | The variable is meant to be constructed always from AUTH_LDAP_USER_ATTR and AUTH_LDAP_USER_BASE_DN, and never be touched
* | | Merge remote-tracking branch 'tampakrap/local_settings_rename'Theo Chatzimichos2013-06-271-4/+4
|\ \ \ | |_|/ |/| | | | | | | | Conflicts: okupy/settings/__init__.py
| * | Rename local_settings to just localTheo Chatzimichos2013-06-251-4/+4
| | | | | | | | | | | | | | | | | | | | | The name local_settings was used when there was settings/ directory, so I needed a way to separate settings.py from local_settings.py The _settings suffix is useless though, we can refer this file as settings/local
* | | Use relative imports.Michał Górny2013-06-261-3/+3
| | |
* | | Fix typo in vim modeline.Michał Górny2013-06-261-1/+1
|/ / | | | | | | It obviously was supposed to be 'sw=4', not 'tw=4'.
* / Include vim modelines in all code files.Michał Górny2013-06-251-1/+1
|/ | | | | Modelines enforce project-specific indent, help vim recognize django templates and provide encoding information for Python.
* Add ModelBackend for future use of mapping django and ldap groupsTheo Chatzimichos2013-06-061-0/+1
| | | | | | | | Enabling it does not affect the authentication, users that are in DB but not in LDAP (or if connection to LDAP is impossible) can still not authenticate. Also, remove useless debug symbols
* Additions / fixes in settings:Theo Chatzimichos2013-06-061-1/+1
| | | | | | | | | | | - Introduce AUTH_LDAP_ADMIN_BIND_{DN_PASSWORD} for the admin account It will be used for new user creation - Introduce AUTH_LDAP_USER_OBJECTCLASS with the objectClasses that the new user should belong to - Construct AUTH_LDAP_USER_DN_TEMPLATE from AUTH_LDAP_USER_{ATTR,BASE_DN} so that the two other vars can be reused later for the signup - Add SERVER_EMAIL in tests/settings - Typos
* Add django_auth_ldap logging settingsTheo Chatzimichos2013-05-111-1/+20
|
* Move stuff from identity to okupyTheo Chatzimichos2013-05-111-0/+95