This is a bugfix imo:
If you have 2 server admins, where only Admin1 has access to a specific app and Admin2 goes to edit the policies, the mapping would be overwritten to "None" .
This PR exposes all apps on all stores to this mapping dropdown irrespective of user. I think it makes sense to leak this minor data here to server admins.
* added View App button to POS settings
updated POS settings form group buttons to match Crowdfund settings from group buttons, addressing #854
* added View App button to POS settings #947
Fixed "Save Settings" Redirect
* Part 1 & Part 2 squashed commits
pr changes
pr fixes
remove config for openid -- no need for it for now
Part 1: OpenIddict - Minor Changes & Config prep
Part2: Openiddict: Init OpenIddict & Database Migration & Auth Policies
pr changes
fix merge
fix compile
fix compile #2
Part 1: OpenIddict - Minor Changes & Config prep
add missing nuget
Part2: Openiddict: Init OpenIddict & Database Migration & Auth Policies
* Part3: OpenIddict: Add Flows Event Handlers
* pr changes
* fix merge
* fix rebase
* fix imports
* cleanup
* do not allow u2f enabled accounts to log in
* start better tests for flows
* add tests
* fixes
* reintroduce dynamic policy as policies on jwt do not work without it
* reduce logs
* fix incorrect endpoint definitions
* Add implicit flow e2e test
* add code flow and refresh flow
* do not allow jwt bearer auth for all requests( only those under /api)
* remove commentedt code
* make sure authorize attr is marked with scheme
* remove dynamic policy and set claims in jwt handler
* cleanup
* change serversettings policy to not need a claim
* Add test to checkadmin verification
* revert server setting claim removal
* fix test
* switch back to claim
* unit test fixes
* try fix build with weird references to csprojes
* start fixing rebase
* remove https requirement to handle tor
* reformat tests correctly
* fix csproj
* fix ut formatting
* PR Changes
* do not show selenium browser