-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feat: add Identity Provider to Frontend #99
Conversation
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
Requested IP checks:
As time goes on, I downgraded eslint again and commented accordingly a dependabot issue |
7bbcf50
to
4191985
Compare
…ed out / token expiry
# Conflicts: # frontend/DEPENDENCIES # frontend/src/App.vue # frontend/src/router/index.js
… during key setup
# Conflicts: # frontend/src/router/index.js
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The >1000 LOC are described in detail in the PR description due to an overhead of documentation and configuration files. Therefore, merging looks good to me.
Description
As discussed in the security assessment, the Frontend should at least be secured using an Identity Provider. Keykloak is common in CX (also used by the portal), therfore I integrated it with two basic users and basic capabilities for Authentication and Access in the Frontend.
Please note: The code only around 793 lines of actual change (includes license headers) in code artifacts.
Pre-review checks
Please ensure to do as many of the following checks as possible, before asking for committer review: