Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IAM Authentication #260

Merged
merged 18 commits into from
Feb 3, 2022
Merged

IAM Authentication #260

merged 18 commits into from
Feb 3, 2022

Conversation

sarahbyrnie
Copy link
Contributor

Integration with the IRIS IAM service. All changes can be viewed on https://host-172-16-114-81.nubes.stfc.ac.uk/

@gregcorbett gregcorbett self-assigned this Dec 9, 2020
@gregcorbett gregcorbett added this to the 5.9.0 milestone Dec 9, 2020
@tofu-rocketry tofu-rocketry requested review from a team and removed request for jrha, gregcorbett, GRyall, tofu-rocketry and a user December 9, 2020 09:35
htdocs/landing/index.php Outdated Show resolved Hide resolved
htdocs/landing/index.php Outdated Show resolved Hide resolved
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jan 28, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jan 28, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
- shib will still be the main SSO usecase for 5.9.0, so I want
  to have that activiated by default.
Copy link
Member

@gregcorbett gregcorbett left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🎆

@gregcorbett gregcorbett merged commit 9378d6b into GOCDB:dev Feb 3, 2022
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request May 24, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jul 4, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jul 8, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jul 8, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Jul 8, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Aug 4, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
gregcorbett added a commit to gregcorbett/gocdb that referenced this pull request Aug 9, 2022
- it's more technically correct, the best kind of correct
- brings API credentials in line with other (GOCDB#294) around
  user credentials and account linking
- this does "break" API access for existing credentials (until
  they next get edited), so we should release it:
  - after GOCDB#260
  - maybe after GOCDB#294
  - at the same as GOCDB#284, as users will have to edit API
    credentials anyway
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants