On 23/10/18 10:49, Lukas Funk wrote:

Hi Francesco

I’ve created a JIRA issue - https://issues.apache.org/jira/browse/SYNCOPE-1388

But I tend to disagree with the behavior about allowing to get the user information.

IMHO whenever the flag is set, any request should return 403 except the paths /accesstoken  and /users/self/mustChangePassword

If an application only requires the user information, it will never be enforced that the password is changed. And this is usually the intension of an administrator if this flag is used.

I intend to use this flag in a custom password policy, which requires to change the password every eg. 90 days. (A requirement which still exists in many company policies today.)

If the password change is not enforced then the policy is somewhat useless.

What do you think?

I see your point - and that you've already reported as such in SYNCOPE-1388, ok.

Regards.

On 23/10/18 08:34, Francesco Chicchiriccò wrote:

Hi Lukas,

On 22/10/18 15:37, Lukas Funk wrote:

    Hi,

    I’ve a question regarding «mustChangePassword» flag for users.

    How is the behavior for this flag intended?

    I’d expect, that if this flag is set, I can obtain a temporary
    access token but I can’t perform any actions other than
    “/users/self/mustChangePassword”.

    So I must change the password before I can even get my own user
    information.

I would say this is the intended feature.

    The observed behavior is quite different using the REST API:

    (We’re using 2.0.8 but I verified the same behavior in the demo
    environment which is 2.1.2-snapshot)

    Given the admin has set the “mustChangePassword” flag to “true”
    for user “rossini”

    When the user “rossini” acquire an accesstoken, then the access
    token is returned. (I haven’t tested the behavior with basic Auth.)

This is expected: if no authentication occurs (either basic authentication or JWT) there is no way to enforce authorization - e.g. recognize the user, get owned entitlements, apply security rules.

    When the user “rossini” queries GET /users/self, then the user
    object is returned and the header “x-syncope-entitlements:
    {"MUST_CHANGE_PASSWORD":[]}” is set.

Correct.
I don't see reasons to restrict reading own profile, in this case.

    When the user “rossini” uses PATCH /users/self and sets the
    “mustChangePassword” flag to “false”, then the user object is
    updated (status 200).

I see two problems here: first, one shouldn't be allowed to reset his own mustChangePassword flag; and second, PATCH (or PUT, or whatever self-modifying operation) shouldn't be allowed when the MUST_CHANGE_PASSWORD entitlement is owned.

    Especially the last step is somewhat strange in my opinion and the
    question arouse how is the use of this flag intended.

Please open an issue on JIRA for the defects above.

--
Francesco Chicchiriccò

Tirasa - Open Source Excellence
http://www.tirasa.net/

Member at The Apache Software Foundation
Syncope, Cocoon, Olingo, CXF, OpenJPA, PonyMail
http://home.apache.org/~ilgrosso/

Reply via email to