policies: improve wording on denied tempaltes

This commit is contained in:
Jens Langhammer 2020-09-19 15:24:52 +02:00
parent 5e6acee2a5
commit 438250b3a9
4 changed files with 6 additions and 5 deletions

View file

@ -39,7 +39,6 @@ This designates a flow for unenrollment. This flow can contain any amount of ver
This designates a flow for recovery. This flow normally contains an [**identification**](stages/identification/index.md) stage to find the user. It can also contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md). This designates a flow for recovery. This flow normally contains an [**identification**](stages/identification/index.md) stage to find the user. It can also contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md).
Afterwards, use the [**prompt**](stages/prompt/index.md) stage to ask the user for a new password and the [**user_write**](stages/user_write.md) stage to update the password. Afterwards, use the [**prompt**](stages/prompt/index.md) stage to ask the user for a new password and the [**user_write**](stages/user_write.md) stage to update the password.
### Change Password ### Setup
This designates a flow for password changes. This flow can contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md). This designates a flow for general setup. This designation doesn't have any constraints in what you can do. For example, by default this designation is used to configure Factors, like change a password and setup TOTP.
Afterwards, use the [**prompt**](stages/prompt/index.md) stage to ask the user for a new password and the [**user_write**](stages/user_write.md) stage to update the password.

View file

@ -19,7 +19,7 @@
<div class="pf-c-form__group"> <div class="pf-c-form__group">
<p> <p>
<i class="pf-icon pf-icon-error-circle-o"></i> <i class="pf-icon pf-icon-error-circle-o"></i>
{% trans 'Access denied' %} {% trans 'Request has been denied.' %}
</p> </p>
{% if error %} {% if error %}
<hr> <hr>

View file

@ -10,6 +10,7 @@ from redis.exceptions import RedisError
from rest_framework.exceptions import APIException from rest_framework.exceptions import APIException
from structlog import get_logger from structlog import get_logger
from websockets.exceptions import WebSocketException from websockets.exceptions import WebSocketException
from ldap3.core.exceptions import LDAPException
LOGGER = get_logger() LOGGER = get_logger()
@ -39,6 +40,7 @@ def before_send(event, hint):
SentryIgnoredException, SentryIgnoredException,
WebSocketException, WebSocketException,
CeleryError, CeleryError,
LDAPException,
) )
if "exc_info" in hint: if "exc_info" in hint:
_, exc_value, _ = hint["exc_info"] _, exc_value, _ = hint["exc_info"]

View file

@ -19,7 +19,7 @@
<div class="pf-c-form__group"> <div class="pf-c-form__group">
<p> <p>
<i class="pf-icon pf-icon-error-circle-o"></i> <i class="pf-icon pf-icon-error-circle-o"></i>
{% trans 'Access denied' %} {% trans 'Request has been denied.' %}
</p> </p>
{% if error %} {% if error %}
<hr> <hr>