summaryrefslogtreecommitdiffstats
path: root/lib/private/Authentication
Commit message (Expand)AuthorAgeFilesLines
* Handle token insert conflictsChristoph Wurst2019-11-261-9/+24
* Add return type hint to credential store and make it strictChristoph Wurst2019-11-251-3/+4
* Some php-cs fixesRoeland Jago Douma2019-11-224-2/+4
* Make renewSessionToken return the new tokenRoeland Jago Douma2019-10-094-7/+14
* Cache the public key tokensRoeland Jago Douma2019-10-081-5/+42
* Use the actual password to update the tokensRoeland Jago Douma2019-09-181-1/+1
* Add uid to delete temp token queryDaniel Kesselberg2019-09-181-1/+2
* Use Symfony's new contract Event class instead of the deprecated oneChristoph Wurst2019-09-121-4/+3
* Pass $configargs to openssl_pkey_exportDaniel Kesselberg2019-07-211-1/+4
* Error with exception on SSL errorMorris Jobke2019-07-183-0/+13
* Update unit testsJoas Schilling2019-07-161-1/+1
* Fix new core notifierJoas Schilling2019-07-151-1/+20
* Make it possible to wipe all tokens/devices of a userChristoph Wurst2019-07-091-6/+36
* Refactor: move remote wipe token logic to RW serviceChristoph Wurst2019-07-092-1/+20
* Send emails when remote wipe starts/finishesChristoph Wurst2019-07-021-0/+171
* Decouple remote wipe notifcation channels with eventsChristoph Wurst2019-06-276-47/+269
* Remote wipe supportRoeland Jago Douma2019-05-209-1/+319
* Allow 2FA to be setup on first loginRoeland Jago Douma2019-05-172-3/+32
* Add a login chain to reduce the complexity of LoginController::tryLoginChristoph Wurst2019-05-0716-0/+1051
* Add interface INamedTokenDaniel Kesselberg2019-02-023-4/+44
* Clean pending 2FA authentication on password resetRoeland Jago Douma2019-01-291-0/+9
* Read openssl error and logDaniel Kesselberg2018-12-061-1/+11
* Move ExpiredTokenException to the correct namespaceRoeland Jago Douma2018-10-305-2/+6
* Catch more occurences where ExpiredTokenException can be thrownRoeland Jago Douma2018-10-211-1/+5
* Expired PK tokens should not fall back to legacy tokensRoeland Jago Douma2018-10-211-0/+2
* Make it possible to enforce mandatory 2FA for groupsChristoph Wurst2018-10-153-6/+158
* Add testsRoeland Jago Douma2018-10-021-1/+4
* Update all the publickey tokens if needed on web loginRoeland Jago Douma2018-10-025-1/+48
* Mark token as invalid if the password doesn't matchRoeland Jago Douma2018-10-025-0/+40
* Emit event on enablign or disabling of 2FA providerRoeland Jago Douma2018-10-011-1/+15
* Add mandatory 2FA service/classChristoph Wurst2018-09-302-2/+60
* Merge pull request #11240 from nextcloud/feature/noid/consider-openssl-settin...Morris Jobke2018-09-251-2/+2
|\
| * Consider openssl settings from config.phpDaniel Kesselberg2018-09-161-2/+2
* | Only allow 2FA state changs if providers support the operationChristoph Wurst2018-09-255-25/+149
* | Also adjust the expiration of PublicKeyTokenProviderJoas Schilling2018-09-201-2/+2
* | Copy the expiration from 480864b3e32d88361b17b70d238f986f64579757 to getToken...Joas Schilling2018-09-191-1/+1
|/
* Expire tokens hardeningRoeland Jago Douma2018-09-071-1/+1
* Fix handlng of concurrent inserts of the 2FA provider registry DAOChristoph Wurst2018-08-311-20/+9
* Fix 2FA being enforced if only backup codes provider is activeChristoph Wurst2018-08-101-4/+9
* Fix double-inserts of the same provider stateChristoph Wurst2018-08-091-6/+19
* Rename providerset method to get primary providersChristoph Wurst2018-08-081-1/+1
* Fix login redirection if only one 2FA provider is activeChristoph Wurst2018-08-081-0/+11
* Fix 2FA provider registry population on loginChristoph Wurst2018-08-081-1/+3
* Fix duplicate inserts in the 2fa provider registry DAOChristoph Wurst2018-07-311-10/+18
* Make new classes strict and fix license headerChristoph Wurst2018-06-252-0/+2
* Make 2FA providers statefulChristoph Wurst2018-06-205-72/+391
* CommentsRoeland Jago Douma2018-06-195-6/+20
* Add getProvider helper functionRoeland Jago Douma2018-06-181-35/+17
* Use constant for token versionRoeland Jago Douma2018-06-186-20/+22
* Add more testsRoeland Jago Douma2018-06-183-3/+14