Commit graph

147 commits

Author SHA1 Message Date
miloschwartz
ff5e12655f
add pretty apple device names 2026-01-15 17:59:45 -08:00
miloschwartz
2f2c2b4222
improved org idp login flow 2026-01-14 19:15:19 -08:00
miloschwartz
4c8d2266ec
clean up login page 2026-01-09 14:41:22 -08:00
miloschwartz
da112d3417
add stripPortFromHost and reuse everywhere 2025-12-23 12:35:03 -05:00
Owen
f9b03943c3
Format all files 2025-12-09 10:56:14 -05:00
miloschwartz
048ce850a8
get coutry using maxmind and clear stale device codes 2025-12-08 21:12:19 -05:00
miloschwartz
8726a7f931
remove device code ip check and fix edit resource dialog state issue 2025-12-05 11:47:59 -05:00
miloschwartz
8c62dfa706
respond with relative code expiration time 2025-12-01 12:36:13 -05:00
miloschwartz
5bd31f87f0
only allow one device auth per session 2025-11-26 15:48:49 -05:00
Owen
ceae787cf5
Attempt to handle creating/deleting clients and role 2025-11-25 18:20:02 -05:00
miloschwartz
ac68dbd545
add my-device and force login 2025-11-25 10:51:53 -05:00
Owen
806949879a
Merge branch 'dev' into clients-user 2025-11-18 13:53:12 -05:00
miloschwartz
02fbc279b5
add email consent and update audience 2025-11-17 20:37:24 -05:00
Owen
97312343e4
Merge branch 'dev' into clients-user 2025-11-17 11:28:47 -05:00
Lokowitz
7db99a7dd5 used zod codemod 2025-11-16 14:18:17 +00:00
miloschwartz
0790f37f5e
hash device codes 2025-11-03 17:03:46 -08:00
miloschwartz
e888b76747
complete web device auth flow 2025-11-03 11:10:17 -08:00
miloschwartz
da0196a308
no reset password for external users 2025-10-30 22:24:07 -07:00
Owen
6b18a24f9b
@server/private -> #dynamic 2025-10-27 13:46:54 -07:00
Owen
b59a6b82ef
Merge branch 'dev' into user-compliance 2025-10-27 10:37:53 -07:00
miloschwartz
460df46abc
update translation and send password reset email 2025-10-24 17:18:34 -07:00
miloschwartz
1e70e4289b
add password expiry enforcement 2025-10-24 17:11:39 -07:00
Owen
f6de61968d
Merge branch 'dev' into audit-logs 2025-10-24 10:31:54 -07:00
Owen
0211f75cb6
Access logs working 2025-10-22 17:42:27 -07:00
miloschwartz
1baa987016
update resend ids 2025-10-22 15:14:57 -07:00
Owen
f17a957058
Cleaning up more imports 2025-10-11 20:46:49 -07:00
Owen
2c63851130
Separate types & fix #private import 2025-10-11 19:02:15 -07:00
Owen
d92b87b7c8
Chungus 2.0 2025-10-10 11:27:15 -07:00
Owen
e5f4da9a99
Fix lint errors 2025-10-05 15:22:54 -07:00
Owen
c2c907852d
Chungus 2025-10-04 18:36:44 -07:00
Lokowitz
1352316492 update securityKey 2025-09-23 17:44:34 +00:00
Lokowitz
73cd82081a fix securitykey 2025-09-23 16:51:08 +00:00
Marvin
76da2ee324 cleanup 2025-09-22 12:19:35 +00:00
Marvin
31896c9be9 cleanup 2025-09-22 12:12:46 +00:00
Marvin
08c930e6cf update webauthen 2025-09-21 18:32:18 +00:00
Owen
907dab7d05
Move docker podman question and add hybird question
Allow empty config

Continue to adjust config for hybrid
2025-08-20 11:20:34 -07:00
Adrian Astles
69baa6785f feat: Add setup token security for initial server setup
- Add setupTokens database table with proper schema
- Implement setup token generation on first server startup
- Add token validation endpoint and modify admin creation
- Update initial setup page to require setup token
- Add migration scripts for both SQLite and PostgreSQL
- Add internationalization support for setup token fields
- Implement proper error handling and logging
- Add CLI command for resetting user security keys

This prevents unauthorized access during initial server setup by requiring
a token that is generated and displayed in the server console.
2025-08-03 21:17:18 +08:00
miloschwartz
114ce8997f
add tos and pp consent 2025-07-21 16:57:21 -07:00
miloschwartz
053acef728
allow using password to log in if security keys are available 2025-07-21 14:28:32 -07:00
Owen
3dc79da2fa
Merge branch 'dev' into clients-pops-dev 2025-07-14 16:59:00 -07:00
miloschwartz
3505342a8d
style consistency changes to add security key form 2025-07-14 15:43:33 -07:00
Milo Schwartz
9075ecb007
Merge branch 'dev' into feat/internal-user-passkey-support 2025-07-14 17:43:01 -04:00
Owen
a35add3fc6
Consolidate imports 2025-07-14 10:56:24 -07:00
miloschwartz
915ccdc007
server admin enforce 2fa per user 2025-07-13 21:58:37 -07:00
Owen
98a261e38c
Pull up downstream changes 2025-07-13 21:57:24 -07:00
Adrian Astles
c9f5ffae42
Merge branch 'dev' into feat/internal-user-passkey-support 2025-07-14 07:20:33 +08:00
J. Newing
2a6298e9eb Admins can enable 2FA
Added the feature for admins to force 2FA on accounts. The next time the
user logs in they will have to setup 2FA on their account.
2025-07-08 10:21:24 -04:00
Adrian Astles
f97b133c8c Resolved build error. 2025-07-08 22:04:24 +08:00
Adrian Astles
f0a1c10ec5 fix(auth): improve security key login flow.
- Fix login to verify password before showing security key prompt
- Add proper 2FA verification flow when deleting security keys

Previously, users with security keys would see the security key prompt
even if they entered an incorrect password. Now the password is verified
first. Additionally, security key deletion now properly handles 2FA
verification when enabled.
2025-07-07 17:48:23 +08:00
Adrian Astles
5009906385 renamed passkey to security key to stay aligned with the UI and other backend naming. 2025-07-05 21:51:31 +08:00