feat: setting to force oauth2/oidc login & refactor #1131
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This change does not affect normal installations by default. However, by setting
PASSWORD_LOGIN_DISABLED=true
, all endpoints related to password-based login can be disabled.This feature is intended for scenarios where you want users to authenticate exclusively through OIDC or other OAuth2 providers, ensuring centralized password management and enabling features like obligatory two-factor authentication. Disabling endpoints also prevents users from bypassing OAuth by setting their own passwords.
If there is only one OAuth provider configured, the program will automatically redirect users to it during login. If multiple OAuth providers are configured, the normal table page will appear, but the login form will be hidden.