DAML: I am prompted to login to Bintray Edit Profile even after SAML Slgn In - daml

After signing into Bintray via SAML authentication, when I click on the link or go to the following URL: https://bintray.com/login?targetUri=/profile/edit I am prompted to sign in again. I am trying to get the Bintray username and API key so that I can configure Maven.

I was able to get the API key using my windows device instead,

Related

PingFederate login mechanism - authorization code flow

My application is configured to get the access_token from the authorization code sent by the IDP. Below is the flow:
I request an organization application(sp).
Organization application redirects me to the IDP login page, Here I enter the username and password.
After successful authentication, IDP redirects me to the organization application URL with auth code appended in the request param.
Now organization application saves this code in the application session and then gets the access_token using the auth code provided by IDP.
if I again request the organization application(SP), the application checks if the session has the auth code, and if it has, it will not redirect me to the IDP login page to get the auth token. This is how the application works in the context of login.
Now if the session expires, and we request the organization application, this time application directly redirects me to the IDP to get the authorization code, without a username and password.
My question is how this magic is happening, How does it get the user info from my browser?
I thought it might be using cookies to get user info, but after deleting all cookies from the browser, it could still get auth code without asking me to put username and password.
From where it is getting the user information? I tried it with chrome and edge browsers and the result is the same for both.
Using the PingFederate for IDP.
The IDP (or authorization server, or both, depending on the exact setup) issues a session cookie after the user authenticates. If you perform an RP initiated logout, or clear all IDP cookies, this force a re-login.
If the IDP session cookie remains valid, the user will not be prompted for credentials the next time they are redirected to authenticate. Eg if the application session / token lifetime is shorter than the IDP session time.
Often this is best resolved by configuring the app's refresh token and IDP session time to be the same. Applications can also send the OpenID Connect prompt=none parameter at any time to force re-authentication.

Windows "Insert Smart Card" pop-up appears when connecting to Active Directory using ldap_connect

Whenever the ldap_connect is attempted some users receive a "Insert Smart Card" pop-up box.
They have not logged in with a smart card in this session, but it appears that Windows certificate manager has cached certs from a previously used card.
Canceling the card prompt is causing failure with ldap_connect/ldap_bind, often no card is available to be presented.
This TechNet discussion seemed related, but ended only in 2 options
manually clear out certs
insert the smartcard
As ldap_connect is supposed to be indicating if the service is accessible, and we have a valid windows login with a session key that should have access to not only connect but authenticate for ldap_bind, the puzzle we have is why is it trying to do anything with a certificate at all
Is there a configuration that can be made so that AD LDAP doesn't try to use the cached cert for whatever it's using it for
LDAP API options?
Active directory LDAP service configuration?
Domain policy?

ReplyUrl of Authorization Server not found

I am self-hosting the api management developer portal using a custom domain name via a Azure CDN and storage account. Authentication is provided using Azure AAD B2C. We have configured an authorization server to request access token using authorization code flow. When we access the managed site it correctly requests the access token and processes it using the reply url "https://apim-instance-name.developer.azure-api.net/signin-oauth/code/callback/name-of-auth-server", however, when we use the custom domain name it returns 404 not found when AAD B2C redirects the browser to https://custom-domain-name.com/signin-oauth/code/callback/name-of-auth-server". Is there something I'm missing?
Screenshot of redirected browser not finding reply url

Oauth2 chrome extension different user

Can I authorize and get oauth2 access token in chrome extension for currently logged in user in gmail instead of chrome user.
Thank you
You can follow this documentation for the user authentication.
Use the Chrome Identity API to authenticate users: the getAuthToken for users logged into their Google Account and the launchWebAuthFlow for users logged into a non-Google account. If your app uses its own server to authenticate users, you will need to use the latter.
Here are the five steps you need to complete for Google account authentication:
Add permissions to your manifest and upload your app.
Copy key in the installed manifest.json to your source manifest, so that your application ID will stay constant during development.
Get an OAuth2 client ID for your Chrome App.
Update your manifest to include the client ID and scopes.
Get the authentication token.
Apps can get OAuth2 tokens for these users using the getAuthToken API.
You can also check these tutorials:
Using OAuth 2.0 for Client-side Web Applications
OAuth 2.0 from chrome extensions

user reamins login in social networking site using my application

I want to develop an app. I want to integrate linkedIn account with my app. As the user logs in my app he one authenticate his linkedIn account and next time whenever he logs in he automatically login with linkedIn also
How I can achieve this.
either saving the id and password of user or the only access token???
After allowing a user to connect with LinkedIn (via their OAuth API), you need to store the LinkedIn OAuth token in your database, separate from the user's session. Then when the user logs in again you can just get the token from your database and continue making authenticated requests to LinkedIn.