On 11/05/12 19:18 Tomas Doran wrote:
On 11 May 2012, at 17:45, Robert Rothenberg wrote:
We're working on an application with a lot of users, and where the passwords
are encrypted (and future versions may also allow OpenID logins).
Developers would like the ability for the root user to be
Wait a minute: would your solution work with $c-check_any_user_role?
On 12/05/12 11:09 Robert Rothenberg wrote:
On 11/05/12 19:18 Tomas Doran wrote:
On 11 May 2012, at 17:45, Robert Rothenberg wrote:
We're working on an application with a lot of users, and where the passwords
are encrypted
Actually, I came across
Catalyst::Plugin::Authentication::Credential::NoPassword
in the latest version, which is apparently intended for the purpose of sudoing.
With a bit of fiddling, I was able to get it to work.
___
List:
No need to use a plugin, just use an authentication realm that requires no
password.
Store the current user in a persistent session cookie and go back and forth
with a single -authenticate method
Sent from my iPhone
On May 12, 2012, at 6:01 AM, Robert Rothenberg rob...@gmail.com wrote:
Using the standard Authentication plugin:
Plugin::Authentication
default_realm default
default
class SimpleDB
user_model MySchema::Login
id_field name
password_field password
password_type crypted
/default
admin
class SimpleDB
user_model MySchema::Login
id_field name
password_type none
We're working on an application with a lot of users, and where the passwords
are encrypted (and future versions may also allow OpenID logins).
Developers would like the ability for the root user to be able to become
another user, for the purposes of debugging problems that real users might
be
On 11 May 2012, at 17:45, Robert Rothenberg wrote:
We're working on an application with a lot of users, and where the passwords
are encrypted (and future versions may also allow OpenID logins).
Developers would like the ability for the root user to be able to become
another user, for the