Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support self-vetting using a self-asserted token #284

Merged
merged 2 commits into from
Feb 16, 2023

Conversation

MKodde
Copy link
Member

@MKodde MKodde commented Feb 16, 2023

For details read the story: https://www.pivotaltracker.com/story/show/184292087
For the MW accompanying this change see: OpenConext/Stepup-Middleware#401

MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 16, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
@MKodde MKodde force-pushed the feature/allow-self-vetting-with-sat-authoring-token branch 3 times, most recently from 659400a to 8ad6a03 Compare February 16, 2023 14:44
@MKodde MKodde changed the title WIP Support self-vetting using a self-asserted token Feb 16, 2023
@MKodde MKodde force-pushed the feature/allow-self-vetting-with-sat-authoring-token branch from 8ad6a03 to 5d618fe Compare February 16, 2023 14:52
@MKodde MKodde merged commit c9ab903 into develop Feb 16, 2023
MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 16, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 16, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 20, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
Copy link

@Shaky212 Shaky212 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just found a minor dev left-over!

@@ -52,6 +52,14 @@ class SelfVetMarshallerTest extends TestCase
* @var InstitutionConfigurationOptionsService
*/
private $institutionConfigService;
/**

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some left-over?

MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 20, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

Also:
- Security updates where installed
- Composer and Symfony lockfiles where updated

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 20, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

Also:
- Security updates where installed
- Composer and Symfony lockfiles where updated

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
MKodde added a commit to OpenConext/Stepup-Middleware that referenced this pull request Feb 20, 2023
When an Identity is in possession of a vetted self-asserted token. It
should be allowed to self-vet successive tokens using that SAT. But only
when all tokens are of the SAT type. Once an Identity is in possession
of an idenity vetted token (vetted on-premise), all following self
vetting tokens must be done with the identity vetted token.

Also:
- Security updates where installed
- Composer and Symfony lockfiles where updated

For details see: https://www.pivotaltracker.com/story/show/184292087
And: OpenConext/Stepup-SelfService#284
@MKodde MKodde deleted the feature/allow-self-vetting-with-sat-authoring-token branch October 18, 2023 05:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants