diff --git a/Jellyfin.Api/Controllers/UserController.cs b/Jellyfin.Api/Controllers/UserController.cs
new file mode 100644
index 0000000000..ff9373c2db
--- /dev/null
+++ b/Jellyfin.Api/Controllers/UserController.cs
@@ -0,0 +1,424 @@
+using System;
+using System.Collections.Generic;
+using System.ComponentModel.DataAnnotations;
+using System.Linq;
+using System.Threading.Tasks;
+using Jellyfin.Api.Constants;
+using Jellyfin.Data.Enums;
+using MediaBrowser.Common.Extensions;
+using MediaBrowser.Common.Net;
+using MediaBrowser.Controller.Authentication;
+using MediaBrowser.Controller.Configuration;
+using MediaBrowser.Controller.Devices;
+using MediaBrowser.Controller.Library;
+using MediaBrowser.Controller.Net;
+using MediaBrowser.Controller.Session;
+using MediaBrowser.Model.Dto;
+using MediaBrowser.Model.Users;
+using Microsoft.AspNetCore.Authorization;
+using Microsoft.AspNetCore.Mvc;
+using Microsoft.AspNetCore.Mvc.ModelBinding;
+
+namespace Jellyfin.Api.Controllers
+{
+ ///
+ /// User controller.
+ ///
+ [Route("/Users")]
+ public class UserController : BaseJellyfinApiController
+ {
+ private readonly IUserManager _userManager;
+ private readonly ISessionManager _sessionManager;
+ private readonly INetworkManager _networkManager;
+ private readonly IDeviceManager _deviceManager;
+ private readonly IAuthorizationContext _authContext;
+ private readonly IServerConfigurationManager _config;
+
+ ///
+ /// Initializes a new instance of the class.
+ ///
+ /// Instance of the interface.
+ /// Instance of the interface.
+ /// Instance of the interface.
+ /// Instance of the interface.
+ /// Instance of the interface.
+ /// Instance of the interface.
+ public UserController(
+ IUserManager userManager,
+ ISessionManager sessionManager,
+ INetworkManager networkManager,
+ IDeviceManager deviceManager,
+ IAuthorizationContext authContext,
+ IServerConfigurationManager config)
+ {
+ _userManager = userManager;
+ _sessionManager = sessionManager;
+ _networkManager = networkManager;
+ _deviceManager = deviceManager;
+ _authContext = authContext;
+ _config = config;
+ }
+
+ ///
+ /// Gets a list of users.
+ ///
+ /// Optional filter by IsHidden=true or false.
+ /// Optional filter by IsDisabled=true or false.
+ /// Optional filter by IsGuest=true or false.
+ ///
+ [HttpGet]
+ [Authorize]
+ public ActionResult> GetUsers(
+ [FromQuery] bool? isHidden,
+ [FromQuery] bool? isDisabled,
+ [FromQuery] bool? isGuest)
+ {
+ return Ok(Get(isHidden, isDisabled, isGuest, false, false));
+ }
+
+ ///
+ /// Gets a list of publicly visible users for display on a login screen.
+ ///
+ ///
+ [HttpGet("Public")]
+ public ActionResult> GetPublicUsers()
+ {
+ // If the startup wizard hasn't been completed then just return all users
+ if (!_config.Configuration.IsStartupWizardCompleted)
+ {
+ return GetUsers(null, false, null);
+ }
+
+ return Ok(Get(false, false, false, true, true));
+ }
+
+ ///
+ /// Gets a user by Id.
+ ///
+ /// The user id.
+ ///
+ [HttpGet("{id}")]
+ // TODO: authorize escapeParentalControl
+ public ActionResult GetUserById([FromRoute] Guid id)
+ {
+ var user = _userManager.GetUserById(id);
+
+ if (user == null)
+ {
+ throw new ResourceNotFoundException("User not found");
+ }
+
+ var result = _userManager.GetUserDto(user, HttpContext.Connection.RemoteIpAddress.ToString());
+
+ return Ok(result);
+ }
+
+ ///
+ /// Deletes a user.
+ ///
+ /// The user id.
+ /// A indicating success.
+ [HttpDelete("{id}")]
+ [Authorize(Policy = Policies.RequiresElevation)]
+ public ActionResult DeleteUser([FromRoute] Guid id)
+ {
+ var user = _userManager.GetUserById(id);
+
+ if (user == null)
+ {
+ throw new ResourceNotFoundException("User not found");
+ }
+
+ _sessionManager.RevokeUserTokens(user.Id, null);
+ _userManager.DeleteUser(user);
+ return NoContent();
+ }
+
+ ///
+ /// Authenticates a user.
+ ///
+ /// The user id.
+ ///
+ ///
+ ///
+ [HttpPost("{id}/Authenticate")]
+ public async Task> AuthenticateUser(
+ [FromRoute, Required] Guid id,
+ [FromQuery, BindRequired] string pw,
+ [FromQuery, BindRequired] string password)
+ {
+ var user = _userManager.GetUserById(id);
+
+ if (user == null)
+ {
+ return NotFound("User not found");
+ }
+
+ if (!string.IsNullOrEmpty(password) && string.IsNullOrEmpty(pw))
+ {
+ throw new MethodNotAllowedException();
+ }
+
+ // Password should always be null
+ return await AuthenticateUserByName(user.Username, null, pw).ConfigureAwait(false);
+ }
+
+ ///
+ /// Authenticates a user by name.
+ ///
+ /// The username.
+ ///
+ ///
+ ///
+ [HttpPost("AuthenticateByName")]
+ public async Task> AuthenticateUserByName(
+ [FromQuery, BindRequired] string username,
+ [FromQuery, BindRequired] string pw,
+ [FromQuery, BindRequired] string password)
+ {
+ var auth = _authContext.GetAuthorizationInfo(Request);
+
+ try
+ {
+ var result = await _sessionManager.AuthenticateNewSession(new AuthenticationRequest
+ {
+ App = auth.Client,
+ AppVersion = auth.Version,
+ DeviceId = auth.DeviceId,
+ DeviceName = auth.Device,
+ Password = pw,
+ PasswordSha1 = password,
+ RemoteEndPoint = HttpContext.Connection.RemoteIpAddress.ToString(),
+ Username = username
+ }).ConfigureAwait(false);
+
+ return Ok(result);
+ }
+ catch (SecurityException e)
+ {
+ // rethrow adding IP address to message
+ throw new SecurityException($"[{HttpContext.Connection.RemoteIpAddress}] {e.Message}", e);
+ }
+ }
+
+ ///
+ /// Updates a user's password.
+ ///
+ ///
+ ///
+ ///
+ ///
+ /// Whether to reset the password.
+ /// A indicating success.
+ [HttpPost("{id}/Password")]
+ [Authorize]
+ public async Task UpdateUserPassword(
+ [FromRoute] Guid id,
+ [FromQuery] string currentPassword,
+ [FromQuery] string currentPw,
+ [FromQuery] string newPw,
+ [FromQuery] bool resetPassword)
+ {
+ AssertCanUpdateUser(_authContext, _userManager, id, true);
+
+ var user = _userManager.GetUserById(id);
+
+ if (user == null)
+ {
+ return NotFound("User not found");
+ }
+
+ if (resetPassword)
+ {
+ await _userManager.ResetPassword(user).ConfigureAwait(false);
+ }
+ else
+ {
+ var success = await _userManager.AuthenticateUser(
+ user.Username,
+ currentPw,
+ currentPassword,
+ HttpContext.Connection.RemoteIpAddress.ToString(),
+ false).ConfigureAwait(false);
+
+ if (success == null)
+ {
+ throw new ArgumentException("Invalid user or password entered.");
+ }
+
+ await _userManager.ChangePassword(user, newPw).ConfigureAwait(false);
+
+ var currentToken = _authContext.GetAuthorizationInfo(Request).Token;
+
+ _sessionManager.RevokeUserTokens(user.Id, currentToken);
+ }
+
+ return NoContent();
+ }
+
+ ///
+ /// Updates a user's easy password.
+ ///
+ ///
+ ///
+ ///
+ ///
+ /// A indicating success.
+ [HttpPost("{id}/EasyPassword")]
+ [Authorize]
+ public ActionResult UpdateUserEasyPassword(
+ [FromRoute] Guid id,
+ [FromQuery] string newPassword,
+ [FromQuery] string newPw,
+ [FromQuery] bool resetPassword)
+ {
+ AssertCanUpdateUser(_authContext, _userManager, id, true);
+
+ var user = _userManager.GetUserById(id);
+
+ if (user == null)
+ {
+ return NotFound("User not found");
+ }
+
+ if (resetPassword)
+ {
+ _userManager.ResetEasyPassword(user);
+ }
+ else
+ {
+ _userManager.ChangeEasyPassword(user, newPw, newPassword);
+ }
+
+ return NoContent();
+ }
+
+ ///
+ /// Updates a user.
+ ///
+ /// A indicating success.
+ [HttpPost("{id}")]
+ [Authorize]
+ public ActionResult UpdateUser() // TODO: missing UserDto
+ {
+ throw new NotImplementedException();
+ }
+
+ ///
+ /// Updates a user policy.
+ ///
+ /// The user id.
+ /// A indicating success.
+ [HttpPost("{id}/Policy")]
+ [Authorize]
+ public ActionResult UpdateUserPolicy([FromRoute] Guid id) // TODO: missing UserPolicy
+ {
+ throw new NotImplementedException();
+ }
+
+ ///
+ /// Updates a user configuration.
+ ///
+ /// The user id.
+ /// A indicating success.
+ [HttpPost("{id}/Configuration")]
+ [Authorize]
+ public ActionResult UpdateUserConfiguration([FromRoute] Guid id) // TODO: missing UserConfiguration
+ {
+ throw new NotImplementedException();
+ }
+
+ ///
+ /// Creates a user.
+ ///
+ /// The username.
+ /// The password.
+ /// A indicating success.
+ [HttpPost("/Users/New")]
+ [Authorize(Policy = Policies.RequiresElevation)]
+ public async Task CreateUserByName(
+ [FromBody] string name,
+ [FromBody] string password)
+ {
+ var newUser = _userManager.CreateUser(name);
+
+ // no need to authenticate password for new user
+ if (password != null)
+ {
+ await _userManager.ChangePassword(newUser, password).ConfigureAwait(false);
+ }
+
+ var result = _userManager.GetUserDto(newUser, HttpContext.Connection.RemoteIpAddress.ToString());
+
+ return Ok(result);
+ }
+
+ ///
+ /// Initiates the forgot password process for a local user.
+ ///
+ /// The entered username.
+ ///
+ [HttpPost("ForgotPassword")]
+ public async Task> ForgotPassword([FromBody] string enteredUsername)
+ {
+ var isLocal = HttpContext.Connection.RemoteIpAddress.Equals(HttpContext.Connection.LocalIpAddress)
+ || _networkManager.IsInLocalNetwork(HttpContext.Connection.RemoteIpAddress.ToString());
+
+ var result = await _userManager.StartForgotPasswordProcess(enteredUsername, isLocal).ConfigureAwait(false);
+
+ return Ok(result);
+ }
+
+ ///
+ /// Redeems a forgot password pin.
+ ///
+ /// The pin.
+ ///
+ [HttpPost("ForgotPassword/Pin")]
+ public async Task> ForgotPasswordPin([FromBody] string pin)
+ {
+ var result = await _userManager.RedeemPasswordResetPin(pin).ConfigureAwait(false);
+ return Ok(result);
+ }
+
+ private IEnumerable Get(bool? isHidden, bool? isDisabled, bool? isGuest, bool filterByDevice, bool filterByNetwork)
+ {
+ var users = _userManager.Users;
+
+ if (isDisabled.HasValue)
+ {
+ users = users.Where(i => i.HasPermission(PermissionKind.IsDisabled) == isDisabled.Value);
+ }
+
+ if (isHidden.HasValue)
+ {
+ users = users.Where(i => i.HasPermission(PermissionKind.IsHidden) == isHidden.Value);
+ }
+
+ if (filterByDevice)
+ {
+ var deviceId = _authContext.GetAuthorizationInfo(Request).DeviceId;
+
+ if (!string.IsNullOrWhiteSpace(deviceId))
+ {
+ users = users.Where(i => _deviceManager.CanAccessDevice(i, deviceId));
+ }
+ }
+
+ if (filterByNetwork)
+ {
+ if (!_networkManager.IsInLocalNetwork(HttpContext.Connection.RemoteIpAddress.ToString()))
+ {
+ users = users.Where(i => i.HasPermission(PermissionKind.EnableRemoteAccess));
+ }
+ }
+
+ var result = users
+ .OrderBy(u => u.Username)
+ .Select(i => _userManager.GetUserDto(i, HttpContext.Connection.RemoteIpAddress.ToString()))
+ .ToArray();
+
+ return result;
+ }
+ }
+}