Revision 2.2.6 (2021-12-01)
About: Provides various ways to sign in your gallery.
Supported services :
Facebook, Google, Instagram, LinkedIn, Tumblr, Twitter, Windows Live, Yahoo, OpenID, Flickr, Steam Community, Wordpress, 500px, Vkontakte.
Each authentication provider needs to be registered first, necessary help is available on the plugin configuration page.
Changes: Compatibility Piwigo 12
Revision 1.0.4 (2021-09-24)
About: OpenID Connect is a Piwigo plugin which allows single sign-on logins using the OpenID Connect protocol. The protocol utilizes both the OpenID Connect Core and the OpenID Connect Discovery specifications. The plugin supports both the authorization code flow, as well as the (legacy) resource owner credentials flow, otherwise known as the password flow. Although legacy and recommended against, by enabling this flow, login through the Piwigo webservice API is enabled.
Changes: Added compatibility with Piwigo 12
Added the 'pwg.session.login_oidc' webservice for token authentication
Revision 2.10d (2021-08-11)
About: This extension is an updated version of ldap_login by kipjr. The goal of this plugin is to refresh the existing code to be compatible with Piwigo v11.x.
Original work by kipjr: https://github.com/Kipjr/
Original plugin (ldap_login v2.10c)
Revision 0.1.0 (2021-07-16)
About: Provides a way to sign in your Piwigo gallery with your Microsoft 365 account.
The email address of the Piwigo user must match the email address of the Microsoft 365 account.
You have to declare your Piwigo App in the the Azure portal first (explanations on the plugin configuration page).
Original plugin : Piwigo Social Connect by mistic100
Changes: First version
Revision 0.4.1 (2020-05-18)
About: The External Authentication plugin supports login based on the identity provided by the webserver (aka the Remote User), which is usually supplied via proxy servers or webserver modules (eg. "Basic Auth"). It differs from the Piwigo "apache_authentication" option by providing a greater degree of flexibility, including:
- Control over which variable(s) are used for authentication
- Piwigo login will always follow changes in (recognized) Remote Users
- Native Piwigo logins possible when the Remote User is considered a guest
- Option to copy webserver supplied passwords to Piwigo accounts
- External login/logout URLs replacing or co-existing with native ones
- Possibily to auto-register unknown Remote Users as new Piwigo users
- Control over auto-registration profiles, passwords, status and notifications
- Flexible list of Remote Users considered guests
This plugin is incompatible with the $conf['apache_authentication'] option, and will auto-disable if it's set.
Fallback Authentication is optional, and permits native Piwigo logins when the current Remote User is considered a guest. NOTE: If Remote User auto-registration is disabled, any Remote User unknown to Piwigo is considered a guest. If Fallback is disabled, Piwigo logins will always match the current Remote User.
The plugin makes every effort to prevent un-intentional account lockout, and is always disabled upon activation to permit configuration before login enforcement is enabled (which may immediately log the current session out!).
Debug logging can be enabled on the plugin's admin page, or by setting $conf['externalauth_debug'] = true
Changes: Updated tag to fix Piwigo version checking