Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve logon with 2FA (#114) #115

Closed
wants to merge 6 commits into from
Closed

Commits on Apr 16, 2021

  1. Fixes #108 add authn ldap support (#109)

    - Fixes #108 add authn ldap support (#109)
    infamousjoeg authored Apr 16, 2021
    Configuration menu
    Copy the full SHA
    71ff495 View commit details
    Browse the repository at this point in the history
  2. Adding 6 CEM sub-commands (#105) (#111)

    * Resolves #106
    
    Co-authored-by: Quincy Cheng <quincy.cheng@gmail.com>
    AndrewCopeland and quincycheng authored Apr 16, 2021
    Configuration menu
    Copy the full SHA
    e6d7b08 View commit details
    Browse the repository at this point in the history

Commits on Apr 20, 2021

  1. Configuration menu
    Copy the full SHA
    5ca3c8e View commit details
    Browse the repository at this point in the history
  2. update docs

    AndrewCopeland committed Apr 20, 2021
    Configuration menu
    Copy the full SHA
    1b02ee5 View commit details
    Browse the repository at this point in the history

Commits on May 7, 2021

  1. Improve logon with 2FA (#114)

    * V0.1.3 beta (#113)
    
    * Fixes #108 add authn ldap support (#109)
    * Fixes #106 Adding 6 CEM sub-commands (#105) (#111)
    
    Co-authored-by: Quincy Cheng <quincy.cheng@gmail.com>
    Co-authored-by: Joe Garcia <infamousjoeg@users.noreply.github.com>
    
    * Improve logon with 2FA
    
    Currenly when trying to autenticate against a CyberArk with 2FA enabled the
    request request fails with the following error:
    
        Failed to Logon to the PVWA. Failed to authenticate to the PAS REST API.
        Received non-200 status code '500'
    
    In function `httpjson.SendRequestRay` the response body isn't returned, so
    the caller function never finds the correct error code.
    
    After the previous fix, the second call, the one with the otp code still fails
    with 403. Debugging it seems that we need to store the cookies between the
    two logon calls. So a go context is added to the functions.
    
    * Fix lint errors and add missing file from previous commit
    
    This commit fixes the go  lint error related to key type in context and it
    adds a missing file from previous commit not uploaded by error.
    
    * Fix type error in comment
    
    * Missing comment on Cookie function
    
    Added missing comment
    
    * Fix panic when body response is nil
    
    Try to catch nil response body on httpjson.SendRequestRaw function
    
    Co-authored-by: Andrew Copeland <50109276+AndrewCopeland@users.noreply.github.com>
    Co-authored-by: Quincy Cheng <quincy.cheng@gmail.com>
    Co-authored-by: Joe Garcia <infamousjoeg@users.noreply.github.com>
    4 people authored May 7, 2021
    Configuration menu
    Copy the full SHA
    72941de View commit details
    Browse the repository at this point in the history

Commits on Nov 8, 2023

  1. Configuration menu
    Copy the full SHA
    8be996f View commit details
    Browse the repository at this point in the history