Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow the master key to bypass email verification #8230

Open
3 tasks done
mstniy opened this issue Oct 13, 2022 · 3 comments · May be fixed by #8231
Open
3 tasks done

Allow the master key to bypass email verification #8230

mstniy opened this issue Oct 13, 2022 · 3 comments · May be fixed by #8231
Labels
type:feature New feature or improvement of existing feature

Comments

@mstniy
Copy link
Contributor

mstniy commented Oct 13, 2022

New Feature / Enhancement Checklist

Current Limitation

Currently email verification is either off, or Parse sends verification emails each time a user signs up or changes their email address.
Our team has a custom way of onboarding users, where they verify their email addresses out-of-band.
We would like the master key to be able to bypass email verification, suppress the sending of the verification email, and mark Parse users as emailVerified=true.

Feature / Enhancement Description

Signup requests as well as modifications to existing users where the email address is changed should not lead to a new email verification sequence, provided that the caller is the master key and the requests also sets the emailVerified field to true.

Example Use Case

  1. An existing user invites a new user to their organization
  2. Business logic sends an invitation email
  3. When a link in the email is clicked, a cloud function creates a Parse user for the email that is a member of the organization to which they were invited, without sending an additional verification email.

Alternatives / Workarounds

Turning off email verification for all users, implementing custom email verification logic.

3rd Party References

@parse-github-assistant
Copy link

Thanks for opening this issue!

  • 🎉 We are excited about your ideas for improvement!

mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 13, 2022

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
@mstniy mstniy linked a pull request Oct 13, 2022 that will close this issue
7 tasks
@mtrezza mtrezza added the type:feature New feature or improvement of existing feature label Oct 14, 2022
mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 14, 2022

Verified

This commit was signed with the committer’s verified signature.
eseidel Eric Seidel
mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 14, 2022
@mtrezza
Copy link
Member

mtrezza commented Oct 15, 2022

The feature design should consider #7144

mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 15, 2022
mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 17, 2022
@mtrezza mtrezza linked a pull request Oct 17, 2022 that will close this issue
7 tasks
@mtrezza
Copy link
Member

mtrezza commented Oct 17, 2022

Maybe incorporated into #7144 (comment)

mstniy added a commit to Ocell-io/parse-server that referenced this issue Oct 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type:feature New feature or improvement of existing feature
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants