mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-02 12:32:24 +00:00
# Which Problems Are Solved - Users were unable to sign in via LDAP when their password contained special characters (%, #, &), because URI validation rejected valid credentials #10798 - This occurs specifically when using a custom login implementation for LDAP authentication during the LDAP user intent flow. # How the Problems Are Solved Removed the URI validation from LDAP password handling, allowing all special characters. # Additional Changes - Applied changes in v2 and v2beta LDAP flows. - Verified other authentication flows remain unaffected. # Additional Context - Closes #10798
This commit is contained in:
@@ -416,7 +416,7 @@ message LDAPCredentials {
|
||||
];
|
||||
// Password used to login through LDAP.
|
||||
string password = 2 [
|
||||
(validate.rules).string = {min_len: 1, max_len: 200, uri_ref: true},
|
||||
(validate.rules).string = {min_len: 1, max_len: 200},
|
||||
(google.api.field_behavior) = REQUIRED,
|
||||
(grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = {
|
||||
min_length: 1;
|
||||
|
||||
@@ -20,7 +20,7 @@ message LDAPCredentials {
|
||||
}
|
||||
];
|
||||
string password = 2[
|
||||
(validate.rules).string = {min_len: 1, max_len: 200, uri_ref: true},
|
||||
(validate.rules).string = {min_len: 1, max_len: 200},
|
||||
(grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = {
|
||||
description: "Password used to login through LDAP"
|
||||
min_length: 1;
|
||||
|
||||
@@ -20,7 +20,7 @@ message LDAPCredentials {
|
||||
}
|
||||
];
|
||||
string password = 2[
|
||||
(validate.rules).string = {min_len: 1, max_len: 200, uri_ref: true},
|
||||
(validate.rules).string = {min_len: 1, max_len: 200},
|
||||
(grpc.gateway.protoc_gen_openapiv2.options.openapiv2_field) = {
|
||||
description: "Password used to login through LDAP"
|
||||
min_length: 1;
|
||||
|
||||
Reference in New Issue
Block a user