Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

16.0 mig auth sms #1

Draft
wants to merge 52 commits into
base: 16.0
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
52 commits
Select commit Hold shift + click to select a range
b875e4a
[DOC]Add option to configure
flotho Dec 23, 2023
21b32ea
[DOC]auth_oidc: more options for token maps
flotho Dec 25, 2023
6078367
Fix: move tenant id config step in readme
janikvonrotz May 14, 2024
149eba7
Translated using Weblate (Italian)
mymage Aug 17, 2024
5c3b6c8
Merge PR #650 into 16.0
OCA-git-bot Aug 18, 2024
98a33a3
[BOT] post-merge updates
OCA-git-bot Aug 18, 2024
9feb331
[FIX] vault_share: Button to share value not showed and not working
CarlosRoca13 Aug 20, 2024
6cd8435
Merge PR #679 into 16.0
OCA-git-bot Aug 20, 2024
2f13bb5
[BOT] post-merge updates
OCA-git-bot Aug 20, 2024
58472e1
[14.0][ADD] impersonate_login
Kev-Roche May 14, 2024
744c8f3
[MIG] impersonate_login: pre-commit
astirpe Aug 23, 2024
e40698a
[MIG] impersonate_login: migration to V17
astirpe Aug 23, 2024
fe2ae47
[UPD] Update impersonate_login.pot
Aug 29, 2024
07b7060
[BOT] post-merge updates
OCA-git-bot Aug 29, 2024
c6ee905
[16.0][MIG] impersonate_login: backport to V16
astirpe Aug 29, 2024
51eccf8
[MIG] Fix comodel_name
astirpe Sep 1, 2024
41b7492
Merge PR #683 into 16.0
OCA-git-bot Sep 4, 2024
16d094f
[UPD] Update impersonate_login.pot
Sep 4, 2024
4d90c0c
[BOT] post-merge updates
OCA-git-bot Sep 4, 2024
f712770
Added translation using Weblate (Italian)
mymage Sep 4, 2024
d0b241e
Translated using Weblate (Italian)
mymage Sep 5, 2024
50dfe7f
[FIX] password_security: Fix reset password when user doesn't have pa…
keylor2906 Sep 18, 2024
23138c1
Merge PR #690 into 16.0
OCA-git-bot Sep 18, 2024
99d7b5c
[BOT] post-merge updates
OCA-git-bot Sep 18, 2024
f178694
[IMP] password_security: Set password update date for already existin…
keylor2906 Sep 18, 2024
dfeb26a
[IMP] password_security: Set password update date for already existin…
keylor2906 Sep 18, 2024
f9ac439
[UPD] addons table in README.md
OCA-git-bot Sep 20, 2024
c75fc71
[UPD] README.rst
OCA-git-bot Sep 20, 2024
fc90688
Merge PR #691 into 16.0
OCA-git-bot Sep 20, 2024
6a92b3a
[16.0][FIX] users_ldap_groups: safe LDAP decode
oh2fih Jun 6, 2024
fa19c09
Merge PR #596 into 16.0
OCA-git-bot Sep 23, 2024
d4fee8b
[BOT] post-merge updates
OCA-git-bot Sep 23, 2024
559cc9f
Merge PR #595 into 16.0
OCA-git-bot Oct 21, 2024
d5dd994
[BOT] post-merge updates
OCA-git-bot Oct 21, 2024
035093d
Translated using Weblate (Italian)
mymage Oct 29, 2024
339f5aa
[ADD] auth_sms
hbrunn Sep 16, 2019
b3c9356
[IMP] auth_sms: pre-commit stuff
ntsirintanis Aug 9, 2024
2517988
[ADD] auth_sms_auth_signup
ntsirintanis Aug 9, 2024
d7c7218
[16.0][MIG] auth_sms, auth_sms_auth_signup
ntsirintanis Aug 12, 2024
872ffcf
[FIX} auth_sms: no longer need izip from itertools, just use zip
NL66278 Nov 6, 2024
49044e5
[FIX} update github actions
NL66278 Nov 7, 2024
19bdf3c
[FIX} auth_sms: refactor and make it work on Odoo 16.0
NL66278 Nov 6, 2024
b8369d2
[FIX] auth_sms: correct import of unittest.mock - patch
NL66278 Nov 8, 2024
733147d
[FIX] auth_sms: compatibility with auth_totp* modules
NL66278 Nov 11, 2024
2dfdd31
[FIX] auth_sms_auth_signup: prevent error in exception handling
NL66278 Nov 13, 2024
c7b6403
[FIX] auth_sms: always get config parm with sudo()
NL66278 Nov 28, 2024
a0518d6
Revert: pre-commit template changes, back to how it is on 16.0
thomaspaulb Dec 3, 2024
317fe99
[FIX] some permission problems; call super in order to have regular p…
thomaspaulb Dec 3, 2024
ae2c90e
[FIX] auth_sms: http.Root() ==> http.root
NL66278 Jan 10, 2025
6179af3
[FIX] auth_sms: should delete code when user deleted
NL66278 Jan 13, 2025
14b91b3
[FIX] auth_sms: template improvements
NL66278 Jan 17, 2025
4c73ed8
[TST] auth_sms[_auth_signup]: make tests great again
NL66278 Jan 16, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/pre-commit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ jobs:
pre-commit:
runs-on: ubuntu-22.04
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@v4
- uses: actions/setup-python@v2
with:
python-version: "3.11"
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ jobs:
runs-on: ubuntu-latest
name: Detect unreleased dependencies
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@v4
- run: |
for reqfile in requirements.txt test-requirements.txt ; do
if [ -f ${reqfile} ] ; then
Expand Down Expand Up @@ -62,7 +62,7 @@ jobs:
INCLUDE: "${{ matrix.include }}"
EXCLUDE: "${{ matrix.exclude }}"
steps:
- uses: actions/checkout@v3
- uses: actions/checkout@v4
with:
persist-credentials: false
- name: Install addons and dependencies
Expand Down
9 changes: 5 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,20 +31,21 @@ addon | version | maintainers | summary
[auth_ldaps](auth_ldaps/) | 16.0.1.0.0 | | Allows to use LDAP over SSL authentication
[auth_oauth_multi_token](auth_oauth_multi_token/) | 16.0.1.0.0 | | Allow multiple connection with the same OAuth account
[auth_oauth_ropc](auth_oauth_ropc/) | 16.0.1.0.0 | | Allow to login with OAuth Resource Owner Password Credentials Grant
[auth_oidc](auth_oidc/) | 16.0.1.2.0 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc](auth_oidc/) | 16.0.1.2.2 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc_environment](auth_oidc_environment/) | 16.0.1.0.0 | | This module allows to use server env for OIDC configuration
[auth_saml](auth_saml/) | 16.0.1.1.0 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication
[auth_session_timeout](auth_session_timeout/) | 16.0.1.0.0 | | This module disable all inactive sessions since a given delay
[auth_signup_verify_email](auth_signup_verify_email/) | 16.0.1.0.1 | | Force uninvited users to use a good email for signup
[auth_user_case_insensitive](auth_user_case_insensitive/) | 16.0.1.0.0 | | Makes the user login field case insensitive
[base_user_show_email](base_user_show_email/) | 16.0.1.0.0 | | Untangle user login and email
[password_security](password_security/) | 16.0.1.0.0 | | Allow admin to set password security requirements.
[impersonate_login](impersonate_login/) | 16.0.1.0.0 | [![Kev-Roche](https://github.com/Kev-Roche.png?size=30px)](https://github.com/Kev-Roche) | tools
[password_security](password_security/) | 16.0.1.0.2 | | Allow admin to set password security requirements.
[user_log_view](user_log_view/) | 16.0.1.0.0 | [![trojikman](https://github.com/trojikman.png?size=30px)](https://github.com/trojikman) | Allow to see user's actions log
[users_ldap_groups](users_ldap_groups/) | 16.0.1.0.0 | | Adds user accounts to groups based on rules defined by the administrator.
[users_ldap_groups](users_ldap_groups/) | 16.0.1.0.1 | | Adds user accounts to groups based on rules defined by the administrator.
[users_ldap_mail](users_ldap_mail/) | 16.0.1.0.0 | [![joao-p-marques](https://github.com/joao-p-marques.png?size=30px)](https://github.com/joao-p-marques) | LDAP mapping for user name and e-mail
[users_ldap_populate](users_ldap_populate/) | 16.0.1.0.0 | [![joao-p-marques](https://github.com/joao-p-marques.png?size=30px)](https://github.com/joao-p-marques) | LDAP Populate
[vault](vault/) | 16.0.1.0.3 | | Password vault integration in Odoo
[vault_share](vault_share/) | 16.0.1.0.0 | | Implementation of a mechanism to share secrets
[vault_share](vault_share/) | 16.0.1.0.1 | | Implementation of a mechanism to share secrets

[//]: # (end addons)

Expand Down
4 changes: 2 additions & 2 deletions auth_api_key/i18n/it.po
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ msgid ""
msgstr ""
"Project-Id-Version: Odoo Server 15.0\n"
"Report-Msgid-Bugs-To: \n"
"PO-Revision-Date: 2024-07-18 06:52+0000\n"
"PO-Revision-Date: 2024-08-17 18:58+0000\n"
"Last-Translator: mymage <stefano.consolaro@mymage.it>\n"
"Language-Team: none\n"
"Language: it\n"
Expand Down Expand Up @@ -40,7 +40,7 @@ msgstr "Creato da"
#. module: auth_api_key
#: model:ir.model.fields,field_description:auth_api_key.field_auth_api_key__create_date
msgid "Created on"
msgstr "Creata il"
msgstr "Creato il"

#. module: auth_api_key
#: model:ir.model.fields,field_description:auth_api_key.field_auth_api_key__display_name
Expand Down
6 changes: 3 additions & 3 deletions auth_oauth_ropc/i18n/it.po
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,15 @@ msgid ""
msgstr ""
"Project-Id-Version: Odoo Server 16.0\n"
"Report-Msgid-Bugs-To: \n"
"PO-Revision-Date: 2024-01-05 10:34+0000\n"
"PO-Revision-Date: 2024-10-29 12:06+0000\n"
"Last-Translator: mymage <stefano.consolaro@mymage.it>\n"
"Language-Team: none\n"
"Language: it\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: \n"
"Plural-Forms: nplurals=2; plural=n != 1;\n"
"X-Generator: Weblate 4.17\n"
"X-Generator: Weblate 5.6.2\n"

#. module: auth_oauth_ropc
#: model:ir.model.fields,field_description:auth_oauth_ropc.field_oauth_ropc_provider__active
Expand All @@ -29,7 +29,7 @@ msgstr "URL autorizzazione"
#. module: auth_oauth_ropc
#: model:ir.model.fields,field_description:auth_oauth_ropc.field_oauth_ropc_provider__client_id
msgid "Client ID"
msgstr "ID client"
msgstr "ID cliente"

#. module: auth_oauth_ropc
#: model:ir.model.fields,field_description:auth_oauth_ropc.field_oauth_ropc_provider__client_secret
Expand Down
7 changes: 5 additions & 2 deletions auth_oidc/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Authentication OpenID Connect
!! This file is generated by oca-gen-addon-readme !!
!! changes will be overwritten. !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! source digest: sha256:0fa6d13be474eeb0ba5716895f4fc42ded1b84285279efbe29a476cead7e5565
!! source digest: sha256:f94abf0fc8ee2d5c9fde9f36b0b3ece7a612d0e4338f01a71b5e8fc0d1be0f72
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png
Expand Down Expand Up @@ -79,14 +79,14 @@ companies can use their AzureAD login without an guest account.
- Client ID: Application (client) id
- Client Secret: Client secret
- Allowed: yes
- replace {tenant_id} in urls with your Azure tenant id

or

- Provider Name: Azure AD Multitenant
- Client ID: Application (client) id
- Client Secret: Client secret
- Allowed: yes
- replace {tenant_id} in urls with your Azure tenant id

|image2|

Expand All @@ -112,6 +112,9 @@ In Odoo, create a new Oauth Provider with the following parameters:
- Provider name: Keycloak (or any name you like that identify your
keycloak provider)
- Auth Flow: OpenID Connect (authorization code flow)
- Token Map : many options are possible like
``preferred_username:user_id`` or ``email:user_id`` . This can be
combined
- Client ID: the same Client ID you entered when configuring the client
in Keycloak
- Client Secret: found in keycloak on the client Credentials tab
Expand Down
2 changes: 1 addition & 1 deletion auth_oidc/__manifest__.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

{
"name": "Authentication OpenID Connect",
"version": "16.0.1.2.0",
"version": "16.0.1.2.2",
"license": "AGPL-3",
"author": (
"ICTSTUDIO, André Schenkels, "
Expand Down
4 changes: 3 additions & 1 deletion auth_oidc/readme/CONFIGURE.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,14 +27,14 @@ companies can use their AzureAD login without an guest account.
- Client ID: Application (client) id
- Client Secret: Client secret
- Allowed: yes
- replace {tenant_id} in urls with your Azure tenant id

or

- Provider Name: Azure AD Multitenant
- Client ID: Application (client) id
- Client Secret: Client secret
- Allowed: yes
- replace {tenant_id} in urls with your Azure tenant id

![image](../static/description/odoo-azure_ad_multitenant.png)

Expand All @@ -61,6 +61,8 @@ In Odoo, create a new Oauth Provider with the following parameters:
- Provider name: Keycloak (or any name you like that identify your
keycloak provider)
- Auth Flow: OpenID Connect (authorization code flow)
- Token Map : many options are possible like `preferred_username:user_id` or
`email:user_id` . This can be combined
- Client ID: the same Client ID you entered when configuring the client
in Keycloak
- Client Secret: found in keycloak on the client Credentials tab
Expand Down
18 changes: 12 additions & 6 deletions auth_oidc/static/description/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,11 @@

/*
:Author: David Goodger (goodger@python.org)
:Id: $Id: html4css1.css 8954 2022-01-20 10:10:25Z milde $
:Id: $Id: html4css1.css 9511 2024-01-13 09:50:07Z milde $
:Copyright: This stylesheet has been placed in the public domain.

Default cascading style sheet for the HTML output of Docutils.
Despite the name, some widely supported CSS2 features are used.

See https://docutils.sourceforge.io/docs/howto/html-stylesheets.html for how to
customize this style sheet.
Expand Down Expand Up @@ -274,7 +275,7 @@
margin-left: 2em ;
margin-right: 2em }

pre.code .ln { color: grey; } /* line numbers */
pre.code .ln { color: gray; } /* line numbers */
pre.code, code { background-color: #eeeeee }
pre.code .comment, code .comment { color: #5C6576 }
pre.code .keyword, code .keyword { color: #3B0D06; font-weight: bold }
Expand All @@ -300,7 +301,7 @@
span.pre {
white-space: pre }

span.problematic {
span.problematic, pre.problematic {
color: red }

span.section-subtitle {
Expand Down Expand Up @@ -366,7 +367,7 @@ <h1 class="title">Authentication OpenID Connect</h1>
!! This file is generated by oca-gen-addon-readme !!
!! changes will be overwritten. !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! source digest: sha256:0fa6d13be474eeb0ba5716895f4fc42ded1b84285279efbe29a476cead7e5565
!! source digest: sha256:f94abf0fc8ee2d5c9fde9f36b0b3ece7a612d0e4338f01a71b5e8fc0d1be0f72
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -->
<p><a class="reference external image-reference" href="https://odoo-community.org/page/development-status"><img alt="Beta" src="https://img.shields.io/badge/maturity-Beta-yellow.png" /></a> <a class="reference external image-reference" href="http://www.gnu.org/licenses/agpl-3.0-standalone.html"><img alt="License: AGPL-3" src="https://img.shields.io/badge/licence-AGPL--3-blue.png" /></a> <a class="reference external image-reference" href="https://github.com/OCA/server-auth/tree/16.0/auth_oidc"><img alt="OCA/server-auth" src="https://img.shields.io/badge/github-OCA%2Fserver--auth-lightgray.png?logo=github" /></a> <a class="reference external image-reference" href="https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_oidc"><img alt="Translate me on Weblate" src="https://img.shields.io/badge/weblate-Translate%20me-F47D42.png" /></a> <a class="reference external image-reference" href="https://runboat.odoo-community.org/builds?repo=OCA/server-auth&amp;target_branch=16.0"><img alt="Try me on Runboat" src="https://img.shields.io/badge/runboat-Try%20me-875A7B.png" /></a></p>
<p>This module allows users to login through an OpenID Connect provider
Expand Down Expand Up @@ -437,14 +438,14 @@ <h2><a class="toc-backref" href="#toc-entry-3">Setup for Microsoft Azure</a></h2
<li>Client ID: Application (client) id</li>
<li>Client Secret: Client secret</li>
<li>Allowed: yes</li>
<li>replace {tenant_id} in urls with your Azure tenant id</li>
</ul>
<p>or</p>
<ul class="simple">
<li>Provider Name: Azure AD Multitenant</li>
<li>Client ID: Application (client) id</li>
<li>Client Secret: Client secret</li>
<li>Allowed: yes</li>
<li>replace {tenant_id} in urls with your Azure tenant id</li>
</ul>
<p><img alt="image2" src="https://raw.githubusercontent.com/OCA/server-auth/16.0/auth_oidc/static/description/odoo-azure_ad_multitenant.png" /></p>
<ul class="simple">
Expand All @@ -469,6 +470,9 @@ <h2><a class="toc-backref" href="#toc-entry-4">Setup for Keycloak</a></h2>
<li>Provider name: Keycloak (or any name you like that identify your
keycloak provider)</li>
<li>Auth Flow: OpenID Connect (authorization code flow)</li>
<li>Token Map : many options are possible like
<tt class="docutils literal">preferred_username:user_id</tt> or <tt class="docutils literal">email:user_id</tt> . This can be
combined</li>
<li>Client ID: the same Client ID you entered when configuring the client
in Keycloak</li>
<li>Client Secret: found in keycloak on the client Credentials tab</li>
Expand Down Expand Up @@ -579,7 +583,9 @@ <h2><a class="toc-backref" href="#toc-entry-19">Contributors</a></h2>
<div class="section" id="maintainers">
<h2><a class="toc-backref" href="#toc-entry-20">Maintainers</a></h2>
<p>This module is maintained by the OCA.</p>
<a class="reference external image-reference" href="https://odoo-community.org"><img alt="Odoo Community Association" src="https://odoo-community.org/logo.png" /></a>
<a class="reference external image-reference" href="https://odoo-community.org">
<img alt="Odoo Community Association" src="https://odoo-community.org/logo.png" />
</a>
<p>OCA, or the Odoo Community Association, is a nonprofit organization whose
mission is to support the collaborative development of Odoo features and
promote its widespread use.</p>
Expand Down
5 changes: 4 additions & 1 deletion auth_saml/views/auth_saml.xml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,10 @@
</template>
<template id="auth_saml.login" inherit_id="web.login" name="Samlv2 Login buttons">
<xpath expr="//form" position="before">
<t t-set="form_small" t-value="len(saml_providers) &gt; 2" />
<t
t-set="form_small"
t-value="saml_providers and len(saml_providers) &gt; 2 or False"
/>
</xpath>
<xpath expr="//div[hasclass('o_login_auth')]" position="inside">
<t t-call="auth_saml.providers" />
Expand Down
132 changes: 132 additions & 0 deletions auth_sms/README.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,132 @@
=================================
Two factor authentication via SMS
=================================

..
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! This file is generated by oca-gen-addon-readme !!
!! changes will be overwritten. !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! source digest: sha256:744503b1e32edd0f7f70943a95a2bfff0489985e29584afa7934b48853b943dd
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png
:target: https://odoo-community.org/page/development-status
:alt: Beta
.. |badge2| image:: https://img.shields.io/badge/licence-AGPL--3-blue.png
:target: http://www.gnu.org/licenses/agpl-3.0-standalone.html
:alt: License: AGPL-3
.. |badge3| image:: https://img.shields.io/badge/github-OCA%2Fserver--auth-lightgray.png?logo=github
:target: https://github.com/OCA/server-auth/tree/16.0/auth_sms
:alt: OCA/server-auth
.. |badge4| image:: https://img.shields.io/badge/weblate-Translate%20me-F47D42.png
:target: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_sms
:alt: Translate me on Weblate
.. |badge5| image:: https://img.shields.io/badge/runboat-Try%20me-875A7B.png
:target: https://runboat.odoo-community.org/builds?repo=OCA/server-auth&target_branch=16.0
:alt: Try me on Runboat

|badge1| |badge2| |badge3| |badge4| |badge5|

This module allows you to use SMS as second factor for user authentication.

While SMS is not the most secure way of delivering a secret, it's still safer
than no multi factor authentication at all.

**Table of contents**

.. contents::
:local:

Configuration
=============

#. Go to Settings/Technical/SMS providers and configure a provider.
While you can configure multiple ones, the addon will always pick the
topmost active provider for authorization.
#. On a user, enable the `Use SMS verification` checkbox

The addon understands the following configuration parameters:

auth_sms.code_chars
The characters used to generate a code. Default is generated from
Python's string.ascii_letters + string.digits.

You can repeat characters here to make some more or less probable to be
used.

auth_sms.code_length
The length of a code to be sent to the user via SMS. Default is 8.

auth_sms.rate_limit_limit, auth_sms.rate_limit_hours
The amount of sms to send for one user within a certain amount of time.
Default is to send at most 10 SMS within 24 hours.

Usage
=====

After a user has filled in the correct credentials, she will be taken to a second form where she's asked for the code that has been sent via SMS.

Known issues / Roadmap
======================

* add a config wizard to configure parameters
* add a button to send another code
* make SMS codes time out (currently they live as long as the session they were
generated for)
* make being able to turn on 2FA depend on some security group
* create some auth_mfa_code module and move a lot of code there to have a
common base for all MFA modules that generate some extra code to fill in

Bug Tracker
===========

Bugs are tracked on `GitHub Issues <https://github.com/OCA/server-auth/issues>`_.
In case of trouble, please check there if your issue has already been reported.
If you spotted it first, help us to smash it by providing a detailed and welcomed
`feedback <https://github.com/OCA/server-auth/issues/new?body=module:%20auth_sms%0Aversion:%2016.0%0A%0A**Steps%20to%20reproduce**%0A-%20...%0A%0A**Current%20behavior**%0A%0A**Expected%20behavior**>`_.

Do not contact contributors directly about support or help with technical issues.

Credits
=======

Authors
~~~~~~~

* Therp BV

Contributors
~~~~~~~~~~~~

* Holger Brunn <hbrunn@therp.nl>

Other credits
~~~~~~~~~~~~~

* Odoo Community Association: `Icon <https://github.com/OCA/maintainer-tools/blob/master/template/module/static/description/icon.svg>`_.

Maintainers
~~~~~~~~~~~

This module is maintained by the OCA.

.. image:: https://odoo-community.org/logo.png
:alt: Odoo Community Association
:target: https://odoo-community.org

OCA, or the Odoo Community Association, is a nonprofit organization whose
mission is to support the collaborative development of Odoo features and
promote its widespread use.

.. |maintainer-NL66278| image:: https://github.com/NL66278.png?size=40px
:target: https://github.com/NL66278
:alt: NL66278

Current `maintainer <https://odoo-community.org/page/maintainer-role>`__:

|maintainer-NL66278|

This module is part of the `OCA/server-auth <https://github.com/OCA/server-auth/tree/16.0/auth_sms>`_ project on GitHub.

You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.
4 changes: 4 additions & 0 deletions auth_sms/__init__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
# License AGPL-3.0 or later (https://www.gnu.org/licenses/agpl.html).
from . import models
from . import controllers
from . import exceptions
Loading
Loading