Index: lams_central/web/login.jsp
===================================================================
diff -u -r302268a60857c087e3e335320d109ddced439c80 -r6cea41c13ae7d7ef330284fa195209b9c201e5d2
--- lams_central/web/login.jsp (.../login.jsp) (revision 302268a60857c087e3e335320d109ddced439c80)
+++ lams_central/web/login.jsp (.../login.jsp) (revision 6cea41c13ae7d7ef330284fa195209b9c201e5d2)
@@ -3,15 +3,22 @@
<%@ taglib uri="tags-fmt" prefix="fmt"%>
<%@ taglib uri="tags-core" prefix="c"%>
<%@ taglib uri="tags-lams" prefix="lams"%>
-<%@ page import="org.lamsfoundation.lams.security.JspRedirectStrategy"%>
<%@ page import="org.lamsfoundation.lams.util.Configuration"%>
<%@ page import="org.lamsfoundation.lams.util.ConfigurationKeys"%>
-<%-- If you change this file, remember to update the copy made for CNG-21 --%>
-
+<%-- Attributes in request come from sysadmin LoginAs action
+ while in session from LoginRequestServlet
+--%>
+
+
+
+
+<%-- If credentials came from attributes, no need for encrypting --%>
+<%= request.getAttribute("login") == null && session.getAttribute("login") == null && Configuration.getAsBoolean(ConfigurationKeys.LDAP_ENCRYPT_PASSWORD_FROM_BROWSER) %>
<%
- if (JspRedirectStrategy.loginPageRedirected(request, response)) {
- return;
+ if (request.getAttribute("login") != null || session.getAttribute("login") != null) {
+ // invalidate session so a new user can be logged in
+ session.invalidate();
}
%>
@@ -22,7 +29,6 @@
j_security_login_page
-->
-<%= Configuration.getAsBoolean(ConfigurationKeys.LDAP_ENCRYPT_PASSWORD_FROM_BROWSER) %>
@@ -32,13 +38,9 @@