summaryrefslogtreecommitdiffstats
path: root/etc/inc/openvpn.auth-user.php
Commit message (Collapse)AuthorAgeFilesLines
* nuke trailing carriage returnsScott Ullrich2010-12-221-1/+1
|
* Ticket #1037. Move environment manipulation to the authentication script ↵Ermal2010-11-261-1/+7
| | | | since escaping slashes is not so easz on dynamic built paths.
* Remove trailing carriage returnScott Ullrich2010-11-101-1/+1
|
* Add backend code to verify username against cn on login if set by user. ↵jim-p2010-10-121-0/+7
| | | | Needs GUI code to set the option yet. Ticket #887
* Add the neccesary foo for radius.inc to work.Ermal Luçi2010-03-021-0/+35
|
* Add copyrights of myself.Ermal Luçi2010-03-021-0/+1
|
* Take care of local authentication. Also when the user authenticates do not ↵Ermal Luçi2010-03-021-1/+3
| | | | serach on other authentication sources.
* Allow the GUI auth API to be used for doing authentication against ↵Ermal Luçi2010-03-021-4/+15
| | | | authentication servers specified. Teach Openvpn to use this API. Allow openvpn to authenticate against multiple servers that can be selected on the server configuration page.
* Do not allow login for expired and disabled users. Fix this even in openvpn ↵Ermal Luçi2010-03-021-20/+4
| | | | authentication script. While here clean up the code quite a bit.
* Revert "fix OpenVPN user auth"Chris Buechler2009-12-291-3/+3
| | | | This reverts commit f67a48ccda79386b5628e746e43bdf55a4f54ed6.
* fix OpenVPN user authChris Buechler2009-12-291-3/+3
|
* Add pfSense_BUILDER_BINARIES: and pfSense_MODULE: additionsScott Ullrich2009-09-121-1/+4
|
* Use the correct syslog LOG_ERR constant and make this file executable.Matthew Grooms2008-10-061-1/+3
|
* Minor re-work of OpenVPN configuration. Use operational modes to determineMatthew Grooms2008-09-061-0/+79
what configuration options are appropriate. The operational mode dictates the authentication method. They are defines as follows ... Peer to Peer ( SSL/TLS ) Peer to Peer ( Shared Key ) Remote Access ( SSL/TLS ) Remote Access ( User Auth ) Remote Access ( SSL/TLS + User Auth ) Some of these modes allow for user authentication using passwords. We now use the etc/inc/openvpn.auth-user.php file to facilitate this by checking the username and password supplied by OpenVPN against our centralized user database. The Server and Client user interfaces have also been updated to support TLS packet authentication. This is an additional security option that is optional.
OpenPOWER on IntegriCloud