Skip to content

Expire any admin console sessions if user admin rights revoked#1331

Merged
GregDThomas merged 1 commit intoigniterealtime:masterfrom
danielhams:adminrevokedenial
Apr 14, 2019
Merged

Expire any admin console sessions if user admin rights revoked#1331
GregDThomas merged 1 commit intoigniterealtime:masterfrom
danielhams:adminrevokedenial

Conversation

@danielhams
Copy link
Copy Markdown
Contributor

@danielhams danielhams commented Apr 12, 2019

How to reproduce on HEAD:

(1) Create a second administrator account "dan"
(2) Using web browser 1 log in as "dan" and open up the sessions list in the admin console
(3) User web browser 2 log in as other admin, and revoke the admin permission for "dan"
(4) Dan can still refresh and use the admin console

I've tested the regular paths with admin console users - but in all honesty I haven't tested the "auth token" path (although the code seems OK to my eyes).

How is the auth-token path exercised? (Clustering maybe?)

@danielhams danielhams marked this pull request as ready for review April 12, 2019 17:25
@GregDThomas
Copy link
Copy Markdown
Contributor

The one-time token is created by editing the conf/openfire.xml file; it provides a way for an administrator to login when they've forgotten the admin password.

@GregDThomas
Copy link
Copy Markdown
Contributor

Many thanks! I've tracked this as https://issues.igniterealtime.org/browse/OF-1734

@GregDThomas GregDThomas merged commit 46751d8 into igniterealtime:master Apr 14, 2019
@danielhams danielhams deleted the adminrevokedenial branch April 15, 2019 07:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants