u2f
Here are 125 public repositories matching this topic...
-
Updated
Nov 9, 2021 - Go
-
Updated
Oct 1, 2021 - C
-
Updated
Sep 21, 2021 - TypeScript
-
Updated
Oct 26, 2021 - Java
-
Updated
Nov 10, 2021 - Java
-
Updated
Nov 15, 2021 - PHP
Describe the bug
I have noticed that app-link URLs like: https://company.okta.com/home/amazon_aws/0obm6u4wyuVYgbLdJ0x7/172 cause parsing error in okta_auth_config.py at line 45 (version 0.4.4).
It is caused by an underscore character '_' that should be encoded prior verification like '%5F'.
Traceback (most recent call last):
File "/Users/nowam1/Library/Python/3.7/bin/okta-awsc
Re-registering with the same site should reset the authentication counter to zero. However this is lowpri as it has little functional impact. Starting at a non-zero number is still within the spec.
Potentially we could also change the dialog to warn this registration will replace an existing one.
-
Updated
Aug 22, 2019 - C
-
Updated
Nov 11, 2021 - JavaScript
-
Updated
Sep 11, 2021 - Rust
-
Updated
Oct 11, 2021 - TypeScript
Improve this page
Add a description, image, and links to the u2f topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the u2f topic, visit your repo's landing page and select "manage topics."
Percona is quite strict on having primary keys on all tables (and rightly so).
Please add primary keys to all tables, even if it's just an auto-increment.
It's mostly just the following tables:
authentication_logs (could just get a auto-increment primary key added)
identity_verification_tokens (could just set the token as primary key)