issues
search
bengler
/
checkpoint
Centralized identity store and authentication broker for web applications. It supports a number of authentication mechanisms and is provided via a http-interface.
MIT License
31
stars
2
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
login/anonymous api
#34
simen
closed
11 years ago
1
use the request scheme instead of hardcoding http
#33
prognostikos
closed
11 years ago
0
Documentation/Usage/Concepts questions
#32
prognostikos
opened
11 years ago
7
Update README & ./bin/bootstrap
#31
prognostikos
closed
11 years ago
0
Make domain search string factory more permissive
#30
prognostikos
closed
11 years ago
1
Add Travis CI support
#29
prognostikos
closed
11 years ago
2
test for 409 response
#28
prognostikos
closed
11 years ago
1
ignore results of bundling with --binstubs
#27
prognostikos
closed
11 years ago
1
Unable to `bundle` - omniauth-vanilla looks like it's not a public repo?
#26
prognostikos
closed
11 years ago
2
/identities/:id/accounts/:provider/:uid should only be for gods
#25
simen
opened
11 years ago
0
/identities/:id/accounts is open to anybody
#24
simen
closed
11 years ago
0
Fix 201 and some minor stuff
#23
atombender
closed
11 years ago
0
Logging when ips are hot
#22
simen
opened
11 years ago
0
Easier to set up config of application keys
#21
skogsmaskin
opened
11 years ago
0
checkpoint CLI could use some more output from `help`
#20
kytrinyx
opened
12 years ago
0
IDN encoding of hostnames in redirects
#19
simen
closed
11 years ago
2
Development: relative path to override.yml might be different
#18
skogsmaskin
closed
12 years ago
2
Group should be renamed to something more spesific
#17
skogsmaskin
opened
12 years ago
1
Deny accessing stuff across realms unless god of root
#16
simen
opened
12 years ago
0
Common handling of Account::InUseError
#15
simen
closed
12 years ago
0
Unique session keys
#14
skogsmaskin
closed
12 years ago
1
Scary refactoring of account declaration that ensures correct handling of data races and idempotency
#13
simen
closed
11 years ago
0
Action can be used to hijack accounts
#12
simen
closed
12 years ago
0
Accounts used to be unique by identity, but really needs to be unique per realm
#11
simen
closed
12 years ago
0
Better handling of data races when violating unique constraints
#10
simen
closed
12 years ago
2
Don't require environment in CLI unless it's actually needed
#9
kytrinyx
opened
12 years ago
0
Reorganize cli
#8
bjoerge
closed
12 years ago
0
Nested group_subtrees must be disallowed
#7
simen
opened
12 years ago
0
Check god credentials must respect root authoritahhh
#6
kytrinyx
closed
12 years ago
2
Implement strict validations for cross-realm violations
#5
kytrinyx
closed
12 years ago
1
Implement access groups
#4
simen
closed
12 years ago
0
Session key should be unique
#3
thomax
closed
12 years ago
1
PSM discussion
#2
thomax
opened
12 years ago
0
Let checkpoint lookup trusted domains from db (instead of http)
#1
bjoerge
closed
12 years ago
0
Previous