core-jgi/org.adempiere.ui.zk/admin.zul

50 lines
1.7 KiB
Plaintext
Raw Normal View History

IDEMPIERE-5346 : Adding SSO support (#1571) * IDEMPIERE-5346 : Adding SSO support * IDEMPIERE-5346 : Fix as per peer review feedback. Valid user should have password not null removing #SSO_IS_ALREADY_AUTHENTICATE context variable due to security risk Cross site scripting issue on error.htm Making show role panel as system configurable Adding language selection on role panel Adding SSO support on iDempiere monitor and osgi console * IDEMPIERE-5346: Redirect to console using static URL to avoid security vulenarabilit * Committing patch from Carlos pr1571PR * IDEMPIERE-5565: fixing NPE issue on Role change * IDEMPIERE-5346: Appling pr1571PR2 from Carlos * 1. IDEMPIERE-5346: Fix idempiereMonitor goes in a loop of sign-in - Fix NPE when changing role - Fix NPE when a user with single role & sysconfig: SSO_SELECT_ROLE is 'N' * IDEMPIERE-5346 : IDempiere Monitor, use out of box login when SSO is not configured. * IDEMPIERE-5346: Adding Authorization type on User and Tenant window. Created /webui/admin page for login with application credential. * IDEMPIERE-5346: Implementing Hengsi's Code review comments Showing meaning full error when Identity Provider returns error In SSO filter, ignoreing css, zkau, images and resource URL Correcting typo in Principal name. Updated Documentation * IDEMPIERE-5346 : Fixed documentation, typo and pending review comments * IDEMPIERE-5346: Use token & SSO principal service to validate in Login.GetClient * IDEMPIERE-5346: Remove the Domain URL column and refactor the code. * IDEMPIERE-5346: Adding flag ENABLE_SSO_IDEMPIERE_MONITOR and ENABLE_SSO_OSGI_CONSOLE, using cache for SSOService, defaulting Authentication type on client to “Application and SSO” * IDEMPIERE-5346: Fixed issue of User SSO type not respected and support for Zoom URL
2023-09-21 15:43:49 +07:00
<?xml version="1.0" encoding="UTF-8"?>
<!--
Copyright (C) 2007 Ashley G Ramdass.
-->
<?page style="height:100%"?>
<?init zscript="theme.zs" ?>
<?meta http-equiv="X-UA-Compatible" content="IE=edge" ?>
<?meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no, minimum-scale=1.0, maximum-scale=1.0" ?>
<?meta name="apple-mobile-web-app-capable" content="yes"?>
<?meta name="mobile-web-app-capable" content="yes"?>
<?link rel="icon" type="image/png" href="${browserIcon}"?>
<?link rel="stylesheet" type="text/css" href="${themeStyleSheet}"?>
<?link rel="stylesheet" type="text/css" href="${themeStyleSheetByBrowser}"?>
<?link rel="stylesheet" type="text/css" href="css/PAPanel.css"?>
<?link rel="manifest" href="manifest.json"?>
<?style content="
.z-grid-header > table > tbody > tr.z-columns > th.z-column.hiddencol > .z-column-content {
white-space: nowrap !important;
text-overflow: unset !important;
}
"?>
<zk>
<script><![CDATA[
if (window.location.protocol == 'https:') {
zk.load("jawwa.atmosphere");
zk.load("org.idempiere.websocket");
zk.load("adempiere.local.storage");
zk.load("html2canvas");
zk.load("org.idempiere.commons");
zk.load("jquery.maskedinput");
zk.load("photobooth");
zk.load("dragdrop.attachment");
zk.afterLoad(function() {
zk._Erbx.push = function(msg) {
if (console) console.log(msg);
};
});
} //window.location.protocol check
else {
alert("Direct http:// is forbidden - please use https:// instead with the SSL port used in your installation");
}
]]>
</script>
<include src="${themePreference}" if="${execution.getScheme() == 'https'}"/>
<window use="org.adempiere.webui.AdempiereWebUI" if="${execution.getScheme() == 'https'}"/>
</zk>