Liferay CE Plugin for OAuth 2.0

OAuth 2.0 is an industry-standard authorization protocol. Users can seamlessly share select credentials from another website to log into yours. It works by authorizing password-less access to portions of user-owned resources (such as an email address, a user profile picture, or something else from your account) and other permissioned resources.

Latest Changes
  • LPS-104129 Refactor CTServicePublisher to avoid cascading updates from Hibernate on lazy columns
  • LPS-104435 Update publishing scripts to run against the master branch
  • LPS-74544 SourceFormatter improvements
  • LPS-77425 Create a task to increase all major versions of modules and portal artifacts
  • LPS-77699 Update Translations
  • LPS-79653 Portlet 3.0: Upgrade to the Portlet 3.0.0 API
  • LPS-79679 SourceFormatter improvements
  • LPS-80517 GREEDY @Reference must also be DYNAMIC to prevent tons of meaningless component activation/deactivation whi...
  • LPS-81723 Some categorizations of the configurations in System Settings are not matching user's expectations
  • LPS-81952 Gogo commands to show conflicts in JAX-RS whiteboard services
  • LPS-82252 Current defaults make necessary to create too many config files to use verifier and OAuth2
  • LPS-82343 Consolidate language keys
  • LPS-82460 Aries JAX-RS whiteboard doesn't log properly
  • LPS-84092 Apply Petra-String StringBundler to modules starting with H to O
  • LPS-84119 SourceFormatter improvements
  • LPS-85296 Clean up @Component annotation
  • LPS-86408 Set default Java version to 1.8 for OSGi projects
  • LPS-86806 Create Java Parser
  • LPS-87590 Add Kazakh as a Community Language
  • LPS-88171 Apply formatting for spring framework annotations
  • LPS-89123 Whiteboard: change the underlying JAXB impl to Jackson
  • LPS-90379 Always use javax.ws.rs-api 2.1 vs. 2.0.1
  • LPS-90412 Jaxb jackson MessageBodyWriter overrides one registered in Vulcan feature
  • LPS-91463 REST Builder generated files should not depend on OAuth at runtime
  • LPS-91514 CORS Application Support
  • LPS-92253 Rename *Rest* classes to REST for consistency's sake
  • LPS-94555 Add Tamil as a Community Language
  • LPS-95096 JavadocFormatter broken
  • LPS-95413 Remove lib/development/biz.aQute.bnd.jar
  • LPS-95555 Unify osgi.core versions in build.gradle files
  • LPS-96018 Optimize Proxy creation
  • LPS-96318 Upgrade JAX-RS whiteboard support to 1.0.5 release
  • LPS-96376 Update to liferay-npm-scripts v2.x (Prettier)
  • LPS-96802 Support OAuth2 for fragment entry render action
  • LPS-96830 Avoid initialization of _escapedModelProxyProviderFunction when not needed
  • LPS-97048 fragment-impl depends on oauth2-provider-api
  • LPS-97169 Deprecated CompanyProvider and remove its usages
  • LPS-97276 Migrate PorletFileRepository to OSGi
  • LPS-97321 "User" permission category in regular role does not have subdirectory
  • LPS-97971 @Context for JAX-RS is slowing down boot up
  • LPS-98032 Reactivate .jsp formatting
  • LPS-98143 Optimize LiferayAccessTokenServiceRegistrator
  • LPS-98426 Migrate external-reference-service to use DS instead of Spring
  • LPS-98877 Sync portlet-api version
  • LPS-98879 Sync servlet-api versions
  • LPS-99252 Change retrieveFromCache persistence variable to useFinderCache
  • LPS-99657 Enforce consistency for packages
  • LPS-99807 Move PersistenceConstants validation to static initializer to avoid component.
  • LPS-99903 Include Liferay.Segments.Asah.REST.everything into default scopes of Analytics Cloud oauth 2 App
  • LPS-99919 Remove support of terracotta
  • OAUTH2-124 Merge REST module to master
  • OAUTH2-126 OAuth2 scopes are not narrowed down when client requests
  • OAUTH2-127 CXF Configuration can be created multiple times
  • OAUTH2-128 Move OAuth2 into whiteboard
  • OAUTH2-131 Merge tests modules into master
  • OAUTH2-139 APIO can't define scopes for OAuth2 without developing custom components
  • OAUTH2-143 Applications using both OAuth2 and basic can't check scopes in OAuth2
  • OAUTH2-157 JSONWS scope names matching must correlate to SAP entry relationships
  • OAUTH2-161 Server error when multiple redirect URIs are specified but none provided
  • OAUTH2-168 Make sure no page needs to be created for Authorization Code grant flow
  • OAUTH2-170 "OAuth2" should not be present in ConfigurableScopeCheckerFeatureConfiguration localization
  • OAUTH2-172 Authorization Code grant flow is not honoring scope narrow down
  • OAUTH2-202 User must be Site Member to use OAuth2 Authorize portlet
  • OAUTH2-208 OAuth2 Applications is not translated to any other language
  • OAUTH2-209 Upgrade CXF OAuth2 modules to latest version
  • OAUTH2-210 Using wrong clientId with Authorization Code Flow Grant log and outputs an error message
  • OAUTH2-211 Getting token using authorization code flow results in a warn message being logged to the console
  • OAUTH2-227 Refresh Token Recycling
  • OAUTH2-229 Authorization request fails if server is using a proxy to redirect from https -> http (WeDeploy)
  • OAUTH2-236 Authorization flow breaks if referring to portal by IP not in redirect.url.ips.allowed
  • OAUTH2-238 Support ability to create custom RequiresScope annotations
  • OAUTH2-239 Rename property oauth2.scopechecker.type to oauth2.scope.checker.type
  • OAUTH2-240 Support scope annotations on implemented interfaces
  • OAUTH2-242 OAuth2 Authorization Code is not working in cluster environment
  • OAUTH2-243 ScopeMatcher should be applied before and after ScopeMapper and PrefixHandler
  • OAUTH2-251 Scope aliases to application permissions table loses information
  • OAUTH2-252 ScopeDescriptorLocator must support companyId
  • OAUTH2-258 Data too long for column 'RemoteIPInfo'
  • OAUTH2-259 Client credentials grant flow does not allow to specify the user that the token will be granted as
  • OAUTH2-266 HttpMethodFeature does not collect scopes dynamically
  • OAUTH2-271 Authorization code flow using a redirect uri with custom protocol doesn't work
  • OAUTH2-272 Incorrect scope count when assigning global scopes
  • OAUTH2-280 Unclear error when attempting to impersonate OAuth2 application creator
  • OAUTH2-282 Scope translation missing after disabling or deleting corresponding SAP entry
  • OAUTH2-289 Fail to grant authorizations
  • OAUTH2-292 Fail to check new scope when removed scope showing
  • OAUTH2-293 Add default permissions to "Analytics Cloud" OAuth2 Application
Show More

Customers Who Viewed This Also Bought