-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
option to 401 basic auth users to handle incorrect passwords #12
Comments
These changes disallow the continuous retries and provide for significantly better behavior when used with Chrome Fixes #9
this patch is merged. why not close it? |
There is no patch merged that fixes this. The current behavior does not prompt again when an incorrect password is provided, which is the behavior requested in the ticket. |
@stnoonan you mean changed from 403 to 401? |
Yes, but only for basic auth. If we're properly doing negotiate, 403 is correct. If they're doing basic auth, they may have typed a password in wrong, so there should be at least one additional round of 401 responses. |
Looking forward to having this for those who don't do SPNEGO. Will it continue asking after each failed attempt unless they give up/cancel? Also, I found I had to specify my realm setting in order for basic to work (only tested Firefox so far). |
Hi! |
+1 this issue bother me too. |
We use this plugin in a multi environment park and many users don't use SSO.
This change asks for password to users not in the SSO domain but don't ask again in case of mistake.
It's possible to add the two different behaviors with a new parameter for example ?
d335e08#commitcomment-4856316
The text was updated successfully, but these errors were encountered: