miloschwartz
ff5e12655f
add pretty apple device names
2026-01-15 17:59:45 -08:00
miloschwartz
2f2c2b4222
improved org idp login flow
2026-01-14 19:15:19 -08:00
miloschwartz
4c8d2266ec
clean up login page
2026-01-09 14:41:22 -08:00
miloschwartz
da112d3417
add stripPortFromHost and reuse everywhere
2025-12-23 12:35:03 -05:00
Owen
f9b03943c3
Format all files
2025-12-09 10:56:14 -05:00
miloschwartz
048ce850a8
get coutry using maxmind and clear stale device codes
2025-12-08 21:12:19 -05:00
miloschwartz
8726a7f931
remove device code ip check and fix edit resource dialog state issue
2025-12-05 11:47:59 -05:00
miloschwartz
8c62dfa706
respond with relative code expiration time
2025-12-01 12:36:13 -05:00
miloschwartz
5bd31f87f0
only allow one device auth per session
2025-11-26 15:48:49 -05:00
Owen
ceae787cf5
Attempt to handle creating/deleting clients and role
2025-11-25 18:20:02 -05:00
miloschwartz
ac68dbd545
add my-device and force login
2025-11-25 10:51:53 -05:00
Owen
806949879a
Merge branch 'dev' into clients-user
2025-11-18 13:53:12 -05:00
miloschwartz
02fbc279b5
add email consent and update audience
2025-11-17 20:37:24 -05:00
Owen
97312343e4
Merge branch 'dev' into clients-user
2025-11-17 11:28:47 -05:00
Lokowitz
7db99a7dd5
used zod codemod
2025-11-16 14:18:17 +00:00
miloschwartz
0790f37f5e
hash device codes
2025-11-03 17:03:46 -08:00
miloschwartz
e888b76747
complete web device auth flow
2025-11-03 11:10:17 -08:00
miloschwartz
da0196a308
no reset password for external users
2025-10-30 22:24:07 -07:00
Owen
6b18a24f9b
@server/private -> #dynamic
2025-10-27 13:46:54 -07:00
Owen
b59a6b82ef
Merge branch 'dev' into user-compliance
2025-10-27 10:37:53 -07:00
miloschwartz
460df46abc
update translation and send password reset email
2025-10-24 17:18:34 -07:00
miloschwartz
1e70e4289b
add password expiry enforcement
2025-10-24 17:11:39 -07:00
Owen
f6de61968d
Merge branch 'dev' into audit-logs
2025-10-24 10:31:54 -07:00
Owen
0211f75cb6
Access logs working
2025-10-22 17:42:27 -07:00
miloschwartz
1baa987016
update resend ids
2025-10-22 15:14:57 -07:00
Owen
f17a957058
Cleaning up more imports
2025-10-11 20:46:49 -07:00
Owen
2c63851130
Separate types & fix #private import
2025-10-11 19:02:15 -07:00
Owen
d92b87b7c8
Chungus 2.0
2025-10-10 11:27:15 -07:00
Owen
e5f4da9a99
Fix lint errors
2025-10-05 15:22:54 -07:00
Owen
c2c907852d
Chungus
2025-10-04 18:36:44 -07:00
Lokowitz
1352316492
update securityKey
2025-09-23 17:44:34 +00:00
Lokowitz
73cd82081a
fix securitykey
2025-09-23 16:51:08 +00:00
Marvin
76da2ee324
cleanup
2025-09-22 12:19:35 +00:00
Marvin
31896c9be9
cleanup
2025-09-22 12:12:46 +00:00
Marvin
08c930e6cf
update webauthen
2025-09-21 18:32:18 +00:00
Owen
907dab7d05
Move docker podman question and add hybird question
...
Allow empty config
Continue to adjust config for hybrid
2025-08-20 11:20:34 -07:00
Adrian Astles
69baa6785f
feat: Add setup token security for initial server setup
...
- Add setupTokens database table with proper schema
- Implement setup token generation on first server startup
- Add token validation endpoint and modify admin creation
- Update initial setup page to require setup token
- Add migration scripts for both SQLite and PostgreSQL
- Add internationalization support for setup token fields
- Implement proper error handling and logging
- Add CLI command for resetting user security keys
This prevents unauthorized access during initial server setup by requiring
a token that is generated and displayed in the server console.
2025-08-03 21:17:18 +08:00
miloschwartz
114ce8997f
add tos and pp consent
2025-07-21 16:57:21 -07:00
miloschwartz
053acef728
allow using password to log in if security keys are available
2025-07-21 14:28:32 -07:00
Owen
3dc79da2fa
Merge branch 'dev' into clients-pops-dev
2025-07-14 16:59:00 -07:00
miloschwartz
3505342a8d
style consistency changes to add security key form
2025-07-14 15:43:33 -07:00
Milo Schwartz
9075ecb007
Merge branch 'dev' into feat/internal-user-passkey-support
2025-07-14 17:43:01 -04:00
Owen
a35add3fc6
Consolidate imports
2025-07-14 10:56:24 -07:00
miloschwartz
915ccdc007
server admin enforce 2fa per user
2025-07-13 21:58:37 -07:00
Owen
98a261e38c
Pull up downstream changes
2025-07-13 21:57:24 -07:00
Adrian Astles
c9f5ffae42
Merge branch 'dev' into feat/internal-user-passkey-support
2025-07-14 07:20:33 +08:00
J. Newing
2a6298e9eb
Admins can enable 2FA
...
Added the feature for admins to force 2FA on accounts. The next time the
user logs in they will have to setup 2FA on their account.
2025-07-08 10:21:24 -04:00
Adrian Astles
f97b133c8c
Resolved build error.
2025-07-08 22:04:24 +08:00
Adrian Astles
f0a1c10ec5
fix(auth): improve security key login flow.
...
- Fix login to verify password before showing security key prompt
- Add proper 2FA verification flow when deleting security keys
Previously, users with security keys would see the security key prompt
even if they entered an incorrect password. Now the password is verified
first. Additionally, security key deletion now properly handles 2FA
verification when enabled.
2025-07-07 17:48:23 +08:00
Adrian Astles
5009906385
renamed passkey to security key to stay aligned with the UI and other backend naming.
2025-07-05 21:51:31 +08:00