Index: lams_central/web/login.jsp =================================================================== diff -u -r302268a60857c087e3e335320d109ddced439c80 -r6cea41c13ae7d7ef330284fa195209b9c201e5d2 --- lams_central/web/login.jsp (.../login.jsp) (revision 302268a60857c087e3e335320d109ddced439c80) +++ lams_central/web/login.jsp (.../login.jsp) (revision 6cea41c13ae7d7ef330284fa195209b9c201e5d2) @@ -3,15 +3,22 @@ <%@ taglib uri="tags-fmt" prefix="fmt"%> <%@ taglib uri="tags-core" prefix="c"%> <%@ taglib uri="tags-lams" prefix="lams"%> -<%@ page import="org.lamsfoundation.lams.security.JspRedirectStrategy"%> <%@ page import="org.lamsfoundation.lams.util.Configuration"%> <%@ page import="org.lamsfoundation.lams.util.ConfigurationKeys"%> -<%-- If you change this file, remember to update the copy made for CNG-21 --%> - +<%-- Attributes in request come from sysadmin LoginAs action + while in session from LoginRequestServlet +--%> + + + + +<%-- If credentials came from attributes, no need for encrypting --%> +<%= request.getAttribute("login") == null && session.getAttribute("login") == null && Configuration.getAsBoolean(ConfigurationKeys.LDAP_ENCRYPT_PASSWORD_FROM_BROWSER) %> <% - if (JspRedirectStrategy.loginPageRedirected(request, response)) { - return; + if (request.getAttribute("login") != null || session.getAttribute("login") != null) { + // invalidate session so a new user can be logged in + session.invalidate(); } %> @@ -22,7 +29,6 @@ j_security_login_page --> -<%= Configuration.getAsBoolean(ConfigurationKeys.LDAP_ENCRYPT_PASSWORD_FROM_BROWSER) %> <fmt:message key="title.login.window" /> @@ -32,13 +38,9 @@