16 Commits

Author SHA1 Message Date
7fe0862369 PKCE OAuth flow (#2266)
* feat: add auth prompt config option

* feat: add pkce oauth flow

When the oauth flow is initialized with a `code_verifier` the state cookie is optional and on hanko_token exchange the client must also send the `code_verifier` in addition to the `hanko_token`.

* fix: fix runtime errors & tests
2025-10-13 14:28:42 +02:00
ade86cc318 feat: add auth prompt config option (#2260) 2025-10-13 14:22:22 +02:00
7a78b8e172 fix: change module name corresponding to version 2025-09-25 19:15:20 +02:00
062aee4d45 fix: SAML issues (#2041)
Rename identities table columns for more clarity. Rename parameters,
arguments etc. to accommodate these changes.
    
Change that the SAML provider domain is persisted in the identities
table as the provider ID. Use the SAML Entity ID/Issuer ID of the
IdP instead.
    
Introduce saml identity entity (including migrations and a persister)
as a specialization of an identity to allow for determining the
correct provider name to return to the client/frontend and for assisting
in determining whether an identity is a SAML identity (i.e. SAML
identities should have a corresponding SAML Identity instance while
OAuth/OIDC entities do not).
2025-01-31 14:17:52 +01:00
38a11deffa fix: only use transaction connection in a transaction (#1598)
* fix: only use transaction connection in a transaction

* test: fix webhook tests
2024-08-28 11:56:09 +02:00
601ffaae92 Introduce Flowpilot - integration (#1532)
This pull request introduces the new Flowpilot system along with several new features and various improvements. The key enhancements include configurable authorization, registration, and profile flows, as well as the ability to enable and disable user identifiers (e.g., email addresses and usernames) and login methods.

---------

Co-authored-by: Frederic Jahn <frederic.jahn@hanko.io>
Co-authored-by: Lennart Fleischmann <lennart.fleischmann@hanko.io>
Co-authored-by: lfleischmann <67686424+lfleischmann@users.noreply.github.com>
Co-authored-by: merlindru <hello@merlindru.com>
2024-08-06 16:07:29 +02:00
7276db13bb fix: fix saml login for existing users (#1434) 2024-04-17 13:55:18 +02:00
8d745cc742 feat(webhooks): add webhooks trigger to thirdparty auth
* add user.create event trigger to thirdparty signup
* add user.update when an email is added to an identity
* add email.create when email is created

Closes: #1361
2024-02-27 11:17:32 +01:00
724013e56d feat(saml): implement enterprise saml feature
Co-authored-by: Stefan Jacobi <stefan.jacobi@adesso.de>
2023-10-18 10:50:58 +02:00
b59709d369 refactor: use echo.HTTPError instead of redundant own type. This way the prometheus mw shoul register the correct error codes. 2023-06-19 14:48:45 +02:00
fb67693a88 feat(thirdparty): sign in with apple 2023-04-28 13:31:12 +02:00
332f73dbd0 fix: fix merge conflicts. adapt to thirdparty-x-domain pr 2023-04-12 09:46:20 +02:00
f02e6c6790 feat: social login in a cross domain setting 2023-04-11 16:41:12 +02:00
500cc4e064 fix: remove manual settings of allowed headers 2023-03-09 12:00:13 +01:00
a820ccd3bb try: comment out Acces-Control-Expose-Header 2023-03-09 11:53:46 +01:00
eec7a473a5 feat: add third party integrations
add third party integrations
2023-02-23 13:05:05 +01:00