30 Commits

Author SHA1 Message Date
miloschwartz
2f2c2b4222 improved org idp login flow 2026-01-14 19:15:19 -08:00
miloschwartz
4c8d2266ec clean up login page 2026-01-09 14:41:22 -08:00
Owen
f9b03943c3 Format all files 2025-12-09 10:56:14 -05:00
miloschwartz
e888b76747 complete web device auth flow 2025-11-03 11:10:17 -08:00
Owen
d92b87b7c8 Chungus 2.0 2025-10-10 11:27:15 -07:00
Owen
c2c907852d Chungus 2025-10-04 18:36:44 -07:00
Adrian Astles
69baa6785f feat: Add setup token security for initial server setup
- Add setupTokens database table with proper schema
- Implement setup token generation on first server startup
- Add token validation endpoint and modify admin creation
- Update initial setup page to require setup token
- Add migration scripts for both SQLite and PostgreSQL
- Add internationalization support for setup token fields
- Implement proper error handling and logging
- Add CLI command for resetting user security keys

This prevents unauthorized access during initial server setup by requiring
a token that is generated and displayed in the server console.
2025-08-03 21:17:18 +08:00
Milo Schwartz
9075ecb007 Merge branch 'dev' into feat/internal-user-passkey-support 2025-07-14 17:43:01 -04:00
miloschwartz
915ccdc007 server admin enforce 2fa per user 2025-07-13 21:58:37 -07:00
Adrian Astles
c9f5ffae42 Merge branch 'dev' into feat/internal-user-passkey-support 2025-07-14 07:20:33 +08:00
J. Newing
2a6298e9eb Admins can enable 2FA
Added the feature for admins to force 2FA on accounts. The next time the
user logs in they will have to setup 2FA on their account.
2025-07-08 10:21:24 -04:00
Adrian Astles
5009906385 renamed passkey to security key to stay aligned with the UI and other backend naming. 2025-07-05 21:51:31 +08:00
Adrian Astles
db76558944 refactor: rename passkeyChallenge to webauthnChallenge
- Renamed table for consistency with webauthnCredentials
- Created migration script 1.8.1.ts for table rename
- Updated schema definitions in SQLite and PostgreSQL
- Maintains WebAuthn standard naming convention
2025-07-03 21:53:07 +08:00
miloschwartz
d03f45279c remove server admin from config and add onboarding ui 2025-06-19 22:11:05 -04:00
Milo Schwartz
8178dd1525 set resource session as base domain cookie 2024-11-27 00:07:40 -05:00
Milo Schwartz
c565c14aa0 move middlewares out of auth 2024-11-16 22:48:10 -05:00
Milo Schwartz
b1e53ed8d7 set users on resource working 2024-11-15 23:38:08 -05:00
Owen Schwartz
e5e78ff1bf Basic websocket and auth for newt 2024-11-10 17:08:11 -05:00
Milo Schwartz
03051878ef rename super user to admin and middleware refactoring 2024-11-05 22:38:57 -05:00
Milo Schwartz
fadfaf1f0b ability to remove user from org 2024-11-03 17:28:12 -05:00
Owen Schwartz
4facb91d7a Add user endpoints 2024-10-12 22:31:24 -04:00
Owen Schwartz
364b2c26c3 Add role aware updates & endpoints 2024-10-12 21:36:30 -04:00
Milo Schwartz
7d66a6ff66 added reset password workflow 2024-10-05 17:01:49 -04:00
Milo Schwartz
e7080c4aa8 added change password endpoint 2024-10-05 15:11:51 -04:00
Milo Schwartz
76eeb335a3 verify email workflow working 2024-10-04 23:14:40 -04:00
Owen Schwartz
a8f944fc78 Add verify middleware 2024-10-03 22:31:20 -04:00
Milo Schwartz
f88cb71e62 disable 2fa endpoint 2024-10-02 23:39:07 -04:00
Milo Schwartz
637007e060 finished totp endpoints 2024-10-02 21:55:49 -04:00
Milo Schwartz
cfd0a15e2c added logout endpoint 2024-10-02 20:05:08 -04:00
Milo Schwartz
1a91dbb89c organized routes and routes and added rate limiter 2024-10-02 00:04:40 -04:00