Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion: Status after oauth user deactivation #56

Open
col-panic opened this issue Oct 29, 2024 · 2 comments
Open

Discussion: Status after oauth user deactivation #56

col-panic opened this issue Oct 29, 2024 · 2 comments
Labels
enhancement New feature or request

Comments

@col-panic
Copy link

If a user is added through Oauth, or merges to oauth login and is subsequently deactivated in the central
IdP this deactivation does not propagate to Redmine.

Imagine this case:

  1. User exists in Redmine
  2. Admin migrates to oauth login (by tightening password rules that much, its uncomfortable to login using password)
  3. User gets centrally deactivated in the Oauth provider
  4. User still is able to change its password and login to redmine

I don't know what a proper solution would be to propagate the deactivation of the user to redmine,
and its interesting for other SSO services too. You would expect, that by centrally disabling a user
it becomes inactive on all connected services, or wouldn't you?

@col-panic
Copy link
Author

It seems there exists a specification for a user synchronization in https://scim.cloud/

It would however be already of advantage, if we could FORCE users to use oauth2 login only. Lets say,
users have to use oauth2 login. This plugin could feature a ruby script that enables/disables this feature.

Lets say I execute

  • ruby lockdown on the system as script - now login is generally only possible via oauth2
  • ruby release on the system as script - both login paths are open again

@tuzumkuru
Copy link

tuzumkuru commented Oct 29, 2024

If i get it correctly, I support this issue too.

Maybe there could be some sort of login type restriction for users implemented, so that oauth users (the users created with oauth or merged and logged in with oauth) are restricted from logging in with the password. i can't think of how it can be imlemented for now.

@picman picman added the enhancement New feature or request label Nov 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants