Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | fix vs2010 build | UbitUmarov | 2012-08-16 | 1 | -1/+0 |
| | |||||
* | Add a real_id field to the login response if impersonation is used. The wrapper | Melanie | 2012-08-15 | 1 | -0/+7 |
| | | | | script needs this for proper logging. | ||||
* | Merge branch 'master' into careminster-presence-refactor | Melanie | 2011-03-27 | 1 | -4/+35 |
|\ | |||||
| * | Altering log feedback | SignpostMarv Martin | 2011-03-26 | 1 | -11/+12 |
| | | |||||
| * | InfoFormat > DebugFormat | SignpostMarv Martin | 2011-03-26 | 1 | -1/+1 |
| | | | | | | | | Signed-off-by: SignpostMarv Martin <me@signpostmarv.name> | ||||
| * | WebkeyAuthenticationService is now no longer a stub! | SignpostMarv Martin | 2011-03-26 | 1 | -5/+35 |
| | | | | | | | | Signed-off-by: SignpostMarv Martin <me@signpostmarv.name> | ||||
* | | Add the ability for gods to impersonate users. For this, bit 6 needs to be | Melanie | 2010-11-25 | 1 | -0/+5 |
|/ | | | | | | set in the target's UserFlags and the impersonator must have UserLevel 200 or above. The user can then log in using the target's name and their own password. | ||||
* | minor: remove some mono compiler warnings | Justin Clark-Casey (justincc) | 2009-09-25 | 1 | -3/+3 |
| | |||||
* | Remove the encryption from the IAuthenticationService interface. That | Melanie | 2009-09-06 | 1 | -5/+0 |
| | | | | | is too high up for that type of stuff. It needs to be at the connector/handler level | ||||
* | Implement plain password authentication partway. Tested, but no user | Melanie | 2009-09-04 | 1 | -11/+1 |
| | | | | functionality yet. | ||||
* | Flech out the Authentication service. Add the database loader. Introduce | Melanie | 2009-09-04 | 1 | -13/+12 |
| | | | | | inheritance to deal with common tasks like crypto. Still untested. | ||||
* | Remove the distinction between password and login key in the authentication | Melanie | 2009-09-03 | 1 | -0/+76 |
service. This will be done in the login service instead, it's out of scope for an authenticator |