Page MenuHomePhabricator
Feed Advanced Search

Jul 12 2019

epriestley closed T5955: Refactor Conduit auth to be stateless, token-based, and support wire encodings as Resolved.

Deprecate conduit sessions and conduit.connect.
Support direct token-based auth (?token=abdef123) and make this the standard.

Jul 12 2019, 4:28 PM · Restricted Project, Auth, Conduit

Jul 10 2019

amckinley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: D20645: Actually enforce auth.lock-config.
Jul 10 2019, 3:05 PM · Auth, Security

Jun 25 2019

epriestley added a comment to T5955: Refactor Conduit auth to be stateless, token-based, and support wire encodings.

Support multiple request encodings (likely BSON, protobuf, or messagepack). Leave JSON as the default, but in cases where messages can not be represented in JSON this gives us a plausible way forward.

Jun 25 2019, 4:55 PM · Restricted Project, Auth, Conduit

Jun 17 2019

epriestley closed T13310: Users with no access to Spaces can not log out as Resolved by committing rP4af73a625fe1: Don't require users be logged in to access the Logout controller, so users with….
Jun 17 2019, 8:44 PM · Auth, Spaces
epriestley closed T13307: "Sign With MFA" requires "CAN_EDIT" permission, but should only require "CAN_INTERACT" permission as Resolved by committing rPd3112392d1e8: Allow "Sign with MFA" to be applied as a comment action without requiring….
Jun 17 2019, 5:41 PM · Auth

Jun 13 2019

epriestley added a revision to T13310: Users with no access to Spaces can not log out: D20578: Don't require users be logged in to access the Logout controller, so users with no Spaces can log out.
Jun 13 2019, 11:59 PM · Auth, Spaces
epriestley created T13310: Users with no access to Spaces can not log out.
Jun 13 2019, 11:49 PM · Auth, Spaces

Jun 6 2019

epriestley added a project to T13307: "Sign With MFA" requires "CAN_EDIT" permission, but should only require "CAN_INTERACT" permission: Auth.
Jun 6 2019, 2:23 AM · Auth

Apr 18 2019

epriestley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: Restricted Differential Revision.
Apr 18 2019, 2:05 PM · Auth, Security
epriestley added a comment to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI.

This could be made slightly cleaner with a setSummary() to set a shorter summary:

Apr 18 2019, 2:02 PM · Auth, Security
epriestley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: D20447: Don't warn about a locked database value after users run "bin/auth lock".
Apr 18 2019, 12:24 AM · Auth, Security
epriestley added a comment to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI.

hmmmmmm

Apr 18 2019, 12:21 AM · Auth, Security

Apr 11 2019

amckinley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: D20400: Some formatting changes for showing auth provider config guidance.
Apr 11 2019, 8:16 PM · Auth, Security

Apr 10 2019

amckinley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: D20394: Add a workflow and a new config option for locking authentication providers.
Apr 10 2019, 10:35 PM · Auth, Security

Mar 29 2019

leoluk moved T13190: Plans: User Accounts, Profiles, Registration and Imports from Next to Backlog on the Plans board.
Mar 29 2019, 4:08 PM · Auth, People, Plans
leoluk moved T13190: Plans: User Accounts, Profiles, Registration and Imports from Backlog to Next on the Plans board.
Mar 29 2019, 4:07 PM · Auth, People, Plans

Mar 16 2019

epriestley placed T9515: Build a "quorum" mechanism and associated UI up for grabs.
Mar 16 2019, 8:41 PM · Restricted Project, Notifications, Phacility, Auth

Mar 1 2019

epriestley closed T13260: Google auth fails and throws exception about missing client state parameter as Resolved by committing rPbfe8f43f1a6f: Use "QUERY_STRING", not "REQUEST_URI", to parse raw request parameters.
Mar 1 2019, 3:50 AM · Auth

Feb 28 2019

epriestley added a comment to T13260: Google auth fails and throws exception about missing client state parameter.

I'll update the documentation/setup guidance in the upstream.

Feb 28 2019, 6:44 PM · Auth
epriestley added a revision to T13260: Google auth fails and throws exception about missing client state parameter: D20227: Use "QUERY_STRING", not "REQUEST_URI", to parse raw request parameters.
Feb 28 2019, 6:42 PM · Auth
epriestley claimed T13260: Google auth fails and throws exception about missing client state parameter.
Feb 28 2019, 6:36 PM · Auth
epriestley added a comment to T13260: Google auth fails and throws exception about missing client state parameter.

Great! Thanks for the report, and for your help tracking this down by going through the diagnostic steps.

Feb 28 2019, 6:29 PM · Auth
reed added a comment to T13260: Google auth fails and throws exception about missing client state parameter.

https://phabricator.example.com/debug/?a=b returns:

Feb 28 2019, 6:20 PM · Auth
epriestley added a comment to T13260: Google auth fails and throws exception about missing client state parameter.

I can't immediately reproduce this: I can log into my local development install and into secure.phabricator.com using Google OAuth without any issues right now.

Feb 28 2019, 1:41 PM · Auth
reed updated the task description for T13260: Google auth fails and throws exception about missing client state parameter.
Feb 28 2019, 9:05 AM · Auth
reed added a comment to T13260: Google auth fails and throws exception about missing client state parameter.

I thought rPHU4d21f105b17f250aaaeb8937142ae4cbc978389f was meant to fix this, but apparently not.

Feb 28 2019, 9:03 AM · Auth
reed updated the task description for T13260: Google auth fails and throws exception about missing client state parameter.
Feb 28 2019, 9:02 AM · Auth
reed created T13260: Google auth fails and throws exception about missing client state parameter.
Feb 28 2019, 8:56 AM · Auth

Feb 23 2019

epriestley closed T13254: "Login with Facebook" may fail CSP after redirect to "m.facebook.com" as Resolved by committing rP701a9bc339b9: Fix Facebook login on mobile violating CSP after form redirect.
Feb 23 2019, 1:25 PM · Auth
epriestley added a revision to T13254: "Login with Facebook" may fail CSP after redirect to "m.facebook.com": D20206: Fix Facebook login on mobile violating CSP after form redirect.
Feb 23 2019, 12:58 AM · Auth

Feb 21 2019

epriestley triaged T13254: "Login with Facebook" may fail CSP after redirect to "m.facebook.com" as Low priority.
Feb 21 2019, 5:22 PM · Auth

Feb 14 2019

epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: Restricted Differential Revision.
Feb 14 2019, 12:29 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20167: Allow a DAO object storage namespace to be forced to a particular value.
Feb 14 2019, 12:27 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: Restricted Differential Revision.
Feb 14 2019, 12:05 PM · Auth
epriestley added a comment to T6703: Allow multiple copies of the same auth provider type.

For Phacility impact on the ExternalAccount changes so far, these callsites don't seem impacted yet (but might be worth keeping in mind in the future):

Feb 14 2019, 11:50 AM · Auth

Feb 13 2019

epriestley closed T7441: Support OAuth providers in the cluster as Resolved.

I think there's not much actionable here and this has all more or less resolved:

Feb 13 2019, 12:16 PM · Auth, Phacility

Feb 12 2019

epriestley closed T9512: "Change Password" should prompt users to "Reset Password" if no password has been set as Resolved by committing rP5a89da12e293: When users have no password on their account, guide them through the "reset….
Feb 12 2019, 11:19 PM · Restricted Project, Auth
epriestley closed T10071: New account e-mail invites do not allow registration on auth providers that do not allow registration as Resolved by committing rP3f35c0068ad1: Allow users to register with non-registration providers if they are invited to….
Feb 12 2019, 11:19 PM · Auth, Bug Report
epriestley added a comment to T6703: Allow multiple copies of the same auth provider type.

I'm going to dump everything I've got into master now that T13250 is mostly stabilized so it at least gets a couple of days of testing. I don't think I'm breaking anything in rP, but instances/ may require changes to instance initialization before this stuff can deploy.

Feb 12 2019, 10:45 PM · Auth

Feb 7 2019

epriestley closed T5351: Phabricator shows "Anyone can register an account" even if no registration-enabled auth providers exist as Resolved by committing rPa4bab60ad0ae: Don't show "registration might be too open" warnings unless an auth provider….
Feb 7 2019, 11:32 PM · Restricted Project, Auth
epriestley closed T8029: make it possible to "approve" a user from the profile view as Resolved by committing rP7469075a8315: Allow users to be approved from the profile "Manage" page, alongside other….
Feb 7 2019, 11:04 PM · Auth, People
epriestley closed T8907: Auto-focus first login field on login page as Resolved by committing rP949afb02fd19: On login forms, autofocus the "username" field.
Feb 7 2019, 11:03 PM · Auth
epriestley renamed T6115: Allow multi-factor authentication to be a requirement for user subgroups, including administrators from Allow multi-factor authentication to be a requirement for administrators to Allow multi-factor authentication to be a requirement for user subgroups, including administrators.
Feb 7 2019, 3:09 PM · Haskell.org, Auth
epriestley added a revision to T8029: make it possible to "approve" a user from the profile view: D20123: Allow users to be approved from the profile "Manage" page, alongside other similar actions.
Feb 7 2019, 3:08 PM · Auth, People
epriestley added a comment to T8029: make it possible to "approve" a user from the profile view.

Screen Shot 2019-02-07 at 7.05.48 AM.png (854×1 px, 203 KB)

Feb 7 2019, 3:06 PM · Auth, People
epriestley added a comment to T6703: Allow multiple copies of the same auth provider type.

Legalpad uses ExternalAccount to store arbitrary email addresses as an identity.

Feb 7 2019, 2:38 PM · Auth
epriestley added a revision to T8907: Auto-focus first login field on login page: D20122: On login forms, autofocus the "username" field.
Feb 7 2019, 4:55 AM · Auth
epriestley added a revision to T9512: "Change Password" should prompt users to "Reset Password" if no password has been set: D20120: When users have no password on their account, guide them through the "reset password" flow in the guise of "set password".
Feb 7 2019, 3:25 AM · Restricted Project, Auth
epriestley added a revision to T5351: Phabricator shows "Anyone can register an account" even if no registration-enabled auth providers exist: D20119: Don't show "registration might be too open" warnings unless an auth provider actually allows registration.
Feb 7 2019, 2:14 AM · Restricted Project, Auth
epriestley added a revision to T10071: New account e-mail invites do not allow registration on auth providers that do not allow registration: D20118: Allow users to register with non-registration providers if they are invited to an instance.
Feb 7 2019, 2:04 AM · Auth, Bug Report
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20117: Make external link/refresh use provider IDs, switch external account MFA to one-shot.
Feb 7 2019, 1:43 AM · Auth
epriestley added a comment to T6703: Allow multiple copies of the same auth provider type.

(Misfire in the plain text of D20105.)

Feb 7 2019, 1:40 AM · Auth
epriestley reopened T6703: Allow multiple copies of the same auth provider type as "Open".
Feb 7 2019, 1:40 AM · Auth
epriestley closed T7732: Convoluted flow when locked out of account with only one auth provider as Resolved by committing rPfc3b90e1d1b1: Allow users to unlink their last external account with a warning, instead of….
Feb 7 2019, 1:07 AM · Restricted Project, Auth
epriestley closed T6703: Allow multiple copies of the same auth provider type as Resolved by committing rPd6f691cf5d5d: In "External Accounts", replace hard-to-find tiny "link" icon with a nice….
Feb 7 2019, 12:07 AM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20113: Make external account unlinking use account IDs, not "providerType + providerDomain" nonsense.
Feb 7 2019, 12:02 AM · Auth

Feb 6 2019

epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20112: Give ExternalAccount a providerConfigPHID, tying it to a particular provider.
Feb 6 2019, 11:50 PM · Auth
epriestley closed T6479: Manual account creation without Username+Password auth unclear to users and administrators as Wontfix.

This task is kind of all over the place, but I expect it to be functionally resolved by changes attached to T13244 in service of (internal) PHI774.

Feb 6 2019, 11:49 PM · LDAP, Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20111: During first-time setup, create an administrator account with no authentication instead of weird, detached authentication.
Feb 6 2019, 11:33 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20110: Remove the highly suspect "Import from LDAP" workflow.
Feb 6 2019, 11:19 PM · Auth
epriestley added a project to T13190: Plans: User Accounts, Profiles, Registration and Imports: Auth.
Feb 6 2019, 11:18 PM · Auth, People, Plans
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20109: Convert a manual query against external accounts into a modern Query.
Feb 6 2019, 11:13 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20108: Remove weird integration between Legalpad and the ExternalAccount table.
Feb 6 2019, 6:49 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20107: Make two ancient migrations fatal if they affect data.
Feb 6 2019, 4:57 PM · Auth
epriestley added a comment to T7732: Convoluted flow when locked out of account with only one auth provider.

I've marked D20106 as resolving this. Although all possible permutations of this situation aren't completely fixed, I believe we've added enough tools that this situation can be resolved by clicking a couple of things, and usually resolved by users without administrator intervention:

Feb 6 2019, 4:35 PM · Restricted Project, Auth
epriestley added a revision to T7732: Convoluted flow when locked out of account with only one auth provider: D20106: Allow users to unlink their last external account with a warning, instead of preventing the action.
Feb 6 2019, 4:20 PM · Restricted Project, Auth
epriestley added a comment to T6703: Allow multiple copies of the same auth provider type.

Here are some general technical blockers here:

Feb 6 2019, 4:05 PM · Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20105: In "External Accounts", replace hard-to-find tiny "link" icon with a nice button with text on it.
Feb 6 2019, 3:26 PM · Auth

Feb 5 2019

epriestley added a revision to T7732: Convoluted flow when locked out of account with only one auth provider: D20102: Remove one-time login from username change email.
Feb 5 2019, 7:01 PM · Restricted Project, Auth
epriestley added a revision to T6703: Allow multiple copies of the same auth provider type: D20095: Replace "Add Auth Provider" radio buttons with a more modern "click to select" UI.
Feb 5 2019, 2:10 PM · Auth
epriestley moved T4289: JIRA authenticator JIRA version 5 compatibility from Backlog to JIRA is Special Too on the Auth board.
Feb 5 2019, 2:07 PM · Auth
epriestley moved T10961: JIRA instructions are a bit out of date with modern JIRA from Backlog to JIRA is Special Too on the Auth board.
Feb 5 2019, 2:07 PM · Auth, Documentation
epriestley moved T6479: Manual account creation without Username+Password auth unclear to users and administrators from Backlog to Next on the Auth board.
Feb 5 2019, 2:06 PM · LDAP, Auth
epriestley moved T7732: Convoluted flow when locked out of account with only one auth provider from Backlog to Next on the Auth board.
Feb 5 2019, 2:06 PM · Restricted Project, Auth
epriestley moved T9512: "Change Password" should prompt users to "Reset Password" if no password has been set from Backlog to Next on the Auth board.
Feb 5 2019, 2:06 PM · Restricted Project, Auth

Jan 30 2019

figroc added a comment to T4256: Support Azure as an auth provider.

@epriestley Sorry bringing up this ancient task. I am also interested in this Azure OAuth feature. Would you kindly point me to some third-party extension coding guideline/documents? I've dug around for the docs, but not found any.

Jan 30 2019, 6:19 AM · Auth
epriestley added a revision to T13231: Duo MFA Support: D20065: Improve handling of "Deny" responses from Duo.
Jan 30 2019, 5:18 AM · Auth

Jan 28 2019

epriestley closed T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019 as Resolved by committing rPHU9456d6683d33: Update Google OAuth adapter to move away from deprecated "Google+" APIs.
Jan 28 2019, 5:40 PM · Auth

Jan 25 2019

epriestley added a revision to T13231: Duo MFA Support: D20039: Bring Duo MFA upstream.
Jan 25 2019, 9:22 PM · Auth
epriestley added a revision to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI: D20038: Require MFA to edit MFA providers.
Jan 25 2019, 6:45 PM · Auth, Security
epriestley added a comment to T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI.

After T13222, this is more relevant:

Jan 25 2019, 6:31 PM · Auth, Security
epriestley added a comment to T13237: Stripping MFA configs with `bin/auth strip` should disable, not delete, the factor configurations.

For now, I'm continuing to allow users to "Remove" the last active factor on their account when security.require-multi-factor-auth is enabled. This will kick them to the MFA enrollment screen.

Jan 25 2019, 1:39 PM · Auth
epriestley added a revision to T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019: D20030: Update Google OAuth adapter to move away from deprecated "Google+" APIs.
Jan 25 2019, 1:48 AM · Auth
epriestley added a comment to T13231: Duo MFA Support.

I think I have this working fairly reasonably, now. There are four major cases:

Jan 25 2019, 12:52 AM · Auth
aeiser added a comment to T13231: Duo MFA Support.

Another issue here is that Duo doesn't seem to have a way to prevent new user creation. YIf you /preauth a user, they get an enroll link whether they already have an account in Duo or not, and there's no apparent way to distinguish between "this creates a new user" and "this encourages an existing user, who has already been created but has not enrolled a device yet, to enroll".

Jan 25 2019, 12:25 AM · Auth
epriestley added a comment to T13231: Duo MFA Support.

Another issue is that we apparently (???) only get one shot at learning the user's (internal-to-Duo) User ID, and only if we're allowed to enroll them. The first call to /enroll gives us a user ID, subsequent calls do not and there's no other way to do the lookup. This isn't really a problem, it just means we're forced to use usernames everywhere (which are mutable/aliasable/etc/etc) when we could otherwise use nice stable user IDs.

Jan 25 2019, 12:13 AM · Auth

Jan 24 2019

epriestley added a comment to T13231: Duo MFA Support.

Another issue here is that Duo doesn't seem to have a way to prevent new user creation. If you /preauth a user, they get an enroll link whether they already have an account in Duo or not, and there's no apparent way to distinguish between "this creates a new user" and "this encourages an existing user, who has already been created but has not enrolled a device yet, to enroll".

Jan 24 2019, 11:43 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

Thanks, that's quite helpful!

Jan 24 2019, 11:26 PM · Auth
aeiser added a comment to T13231: Duo MFA Support.

If we want to synchronize to existing accounts, I think it's not good enough for us to pick the user's email address unless that's also the username the organization already uses -- in your case, is it?

Jan 24 2019, 10:56 PM · Auth
epriestley added a revision to T13231: Duo MFA Support: D20028: Add CSRF to SMS challenges, and pave the way for more MFA types (including Duo).
Jan 24 2019, 10:21 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

I'm imaging that one use case is that you just want everyone to use MFA, and Duo is a more attractive approach than TOTP (since it's easier to use) or SMS (since it's more secure). In this case, you might just be using Duo as "Better TOTP", and the enrollment/management side isn't as important. For example, if we deployed Duo on secure or in the Phacility cluster as a default option, we'd use it in this mode.

Jan 24 2019, 7:53 PM · Auth
aeiser added a comment to T13231: Duo MFA Support.

FWIW - most users of this feature (especially after T13229) will be organizations that already have DUO in their environment, and likely already have users defined in DUO. Creating random usernames, or PHID's is probably not going to work for most of those organizations. Phabricator does require email's to be unique (no reuse) so that might be a better choice for initial userid setting?

Jan 24 2019, 7:16 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

When you delete a Duo factor from your phone app, you still get prompted to "auth", Duo just reports that you have no enrolled devices which support push.

Jan 24 2019, 6:54 PM · Auth
epriestley added a comment to T13237: Stripping MFA configs with `bin/auth strip` should disable, not delete, the factor configurations.

Striping should probably "revoke" (disable + can not be re-enabled), vs the user "remove" button becoming a "disable" action.

Jan 24 2019, 3:30 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

Duo wants us to <img src="..." /> a QR code.

Jan 24 2019, 2:59 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

With a 15-second TTL, the user doesn't vanish or anything, and Duo does not let us do another enroll attempt even after the enroll time expires:

Jan 24 2019, 2:21 PM · Auth
epriestley added a comment to T13231: Duo MFA Support.

If you try to /enroll the same user PHID twice, the second /enroll fails:

Jan 24 2019, 2:12 PM · Auth
epriestley moved T13237: Stripping MFA configs with `bin/auth strip` should disable, not delete, the factor configurations from Backlog to MFA on the Auth board.
Jan 24 2019, 1:39 PM · Auth

Jan 23 2019

epriestley closed T920: Provide SMS Support, a subtask of T4398: Implement two-factor authentication, as Resolved.
Jan 23 2019, 11:07 PM · Auth
epriestley added a revision to T13231: Duo MFA Support: D20026: Add a Duo API future.
Jan 23 2019, 9:33 PM · Auth