@lightalakanzam Not with standard fusionauth, because the hosted login pages don't know that the login has occurred.
You could perhaps set a cookie on login with the login API and then look for that cookie in an http proxy in front of FusionAuth, and deny access to the login pages at that time.
Or, you could, if you are only using the login API, set up the theme to have a blank login page.
and/or detect that the user was an IdP managed user?
In the reconcile lambda from the IdP (here's the docs for the OIDC lambda), you can set whatever data you want on the user.data field, so you could set user.data.idpUser = true. Then you can access that value from the self edit page freemarker template and decide to show or hide the password field.
I get that this isn't as straightforward as it would be if the original feature request was implemented 🙂 . But I think there's a path forward here that doesn't wait on that.
Elasticsearch access is not available for FusionAuth cloud deployments.
I would recommend running FusionAuth locally, which should display similar results as your cloud deployment for how the user and the entities are mapped.
Users can be deactivated and reactivated using the User API. The following FusionAuth documentation outlines deactivation (or soft-delete) and reactivation:
Delete A User (soft-delete them, don't hard delete them)
It looks like we can transport with the API using Theme Update Endpoints and sharing environment API keys so one environment can see the next environment to copy the themes over.
Yes, that's what I'd recommend. You could have different API keys for each environment and have the script that promotes the theme pull the API key from a secrets store. Make sure you limit the API key to the themes endpoint.
@omryc3 Have you tested the authentication tokens and seeing if the password policy applies to them? I'm not sure myself, but it should be an easy test to run.
It is not possible to have different password rules apply to users in the same tenant, since they are tenant level policies and apply to every user within a tenant.
You could have the users that you want to have no password expiration use OIDC to login against a third party server. (And that server could be a different FusionAuth instance.)
Hmmm. A few more details would be helpful. Are you using the basic self service registration form? And the mobilePhoneNumber field? Or is it some other field that you are using?
What is the exception you are seeing? Where does it show up? What does the end user see?
@maciej-wisniowski Thanks for your help. I was able to connect but had some trouble from then on. I will create an issue on github and see if official support can be added.
Is there a recommended way of running fusion auth on a clustered database?
In addition to what @maciej-wisniowski suggested, if you have a paid license you can now have application specific themes (one theme per application; if no application theme is specified, it defaults to the tenant).
You can see how that works in the sandbox environment (sandbox.fusionauth.io). I believe that feature landed in 1.27.0.