--
You received this message because you are subscribed to the Google Groups "TiddlyWikiDev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tiddlywikide...@googlegroups.com.
To post to this group, send email to tiddly...@googlegroups.com.
Visit this group at https://groups.google.com/group/tiddlywikidev.
To view this discussion on the web visit https://groups.google.com/d/msgid/tiddlywikidev/953D329D-CFAC-455A-9DC1-336CB610BC45%40gmail.com.
For more options, visit https://groups.google.com/d/optout.
* CSRF protection for both the browser messaging (plugin library) architecture as well as the PUT/DELETE rest api. It is scary to know that iframes or any other website that I visit can inject javascript tiddlers while running the server. This might work in tandem with the new authentication.
(Hint: the plugin library architecture uses the cookie variable already, but does not include/check for a nonce for some reason when getting a response)
* A module (route) that serves rendered tiddlers, instead of serving them as json. This is the unique ability of having the wiki run under node and while possibly obscure, there is a lot of creative things one can do with this with regards to browser integration (think tampermonkey) or access to formatted data in the wiki from say bash or other external programs.
* HTTPS support would be neat, not sure if its possible to include a self signed certificate, but node's built in http(s) server is fully able to serve over https as well.
Thank for tackling the server overhaul and also for reading,
/Andreas
--
You received this message because you are subscribed to the Google Groups "TiddlyWikiDev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tiddlywikide...@googlegroups.com.
To post to this group, send email to tiddly...@googlegroups.com.
Visit this group at https://groups.google.com/group/tiddlywikidev.
To view this discussion on the web visit https://groups.google.com/d/msgid/tiddlywikidev/d9a8d4dc-ac1d-f535-9643-d68454bae30a%40googlemail.com.
* Adding support for authentication via a trusted header, making it easier to integrate with corporate single sign on (and Windows authentication)
* Adding support for more fine grained authorisation (ie granting/denying individual users read/write permission to resources)
* Adding support for authentication via a trusted header, making it easier to integrate with corporate single sign on (and Windows authentication)I have looked into a few packages for my work. NodeSSPI is attractive to me as one option because I work in an environment with Windows servers and VMs.
* Adding support for more fine grained authorisation (ie granting/denying individual users read/write permission to resources)I think it would be nice to be able to organize users into groups for such permission also.
Is there anything I can do to assist in either of these areas? If I'm way off-base, please also let me know as this is my first post to this group.
--
You received this message because you are subscribed to the Google Groups "TiddlyWikiDev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tiddlywikide...@googlegroups.com.
To post to this group, send email to tiddly...@googlegroups.com.
Visit this group at https://groups.google.com/group/tiddlywikidev.
To view this discussion on the web visit https://groups.google.com/d/msgid/tiddlywikidev/becfbb12-cb51-4680-bb0b-ff09eb3240cc%40googlegroups.com.
password=tsettest) to make a good example. Maybe a passphrase like password=LetMeIn