SAML2 Authentication
Project description
Let users log into Odoo via an SAML2 identity provider.
This module allows to deport the management of users and passwords in an external authentication system to provide SSO functionality (Single Sign On) between Odoo and other applications of your ecosystem.
Benefits:
Reducing the time spent typing different passwords for different accounts.
Reducing the time spent in IT support for password oversights.
Centralizing authentication systems.
Securing all input levels / exit / access to multiple systems without prompting users.
The centralization of access control information for compliance testing to different standards.
Table of contents
Installation
This addon requires the python module pysaml2.
pysaml2 requires the binary xmlsec1 (on Debian or Ubuntu you can install it with apt-get install xmlsec1)
Configuration
To use this module, you need an IDP server, properly set up.
Configure the module according to your IdP’s instructions (Settings > Users & Companies > SAML Providers).
Pre-create your users and set the SAML information against the user.
By default, the module let users have both a password and SAML ids. To increase security, disable passwords by using the option in Settings. Note that the admin account can still have a password, even if the option is activated. Setting the option immediately remove all password from users with a configured SAML ids.
If all the users have a SAML id in a single provider, you can set automatic redirection in the provider settings. The autoredirection will only be done on the active provider with the highest priority. It is still possible to access the login without redirection by using the query parameter disable_autoredirect, as in https://example.com/web/login?disable_autoredirect= The login is also displayed if there is an error with SAML login, in order to display any error message.
If you are using Office365 as identity provider, set up the federation metadata document rather than the document itself. This will allow the module to refresh the document when needed.
Usage
Users can login with the configured SAML IdP with buttons added in the login screen.
Known issues / Roadmap
clean up auth_saml.request
Changelog
15.0.1.1.0
Fix the module by adding a transaction to commit the token.
Fix the disallow password for users with SAML ids. Added tests to ensure the feature works correctly. Admin user is also an exception from not having a password. In Odoo 15.0, this is the standard user to connect for administrative task, not the super user.
Improve provider form and list views.
Add auto redirect on providers. Use disable_autoredirect as a parameter query to disable automatic redirection (for example https://example.com/web/login?disable_autoredirect=)
Add certificate file name fields to improve the UI.
Add required on several fields of the SAML provider; without them the server will crash and there is not enough information to make SAML work.
Split signing to have finer control and be compatible with more IDP.
Integrate token into res.users.saml, removing auth_saml.token. No need for a separate table, and no more need to create lines in the table.
Avoid server errors when user try metadata page without necessary parameters.
Replace method call from odoo.http.redirect_with_hash to request.redirect as the former does not exists in Odoo 15.0 anymore.
Improved the module documentation.
15.0.1.0.0
Bug Tracker
Bugs are tracked on GitHub Issues. In case of trouble, please check there if your issue has already been reported. If you spotted it first, help us to smash it by providing a detailed and welcomed feedback.
Do not contact contributors directly about support or help with technical issues.
Credits
Contributors
Florent Aide <florent.aide@xcg-consulting.fr>
Vincent Hatakeyama <vincent.hatakeyama@xcg-consulting.fr>
Alexandre Brun <alexandre.brun@xcg-consulting.fr>
Jeremy Co Kim Len <jeremy.cokimlen@vinci-concessions.com>
Houzéfa Abbasbhay <houzefa.abba@xcg-consulting.fr>
Jeffery Chen Fan <jeffery9@gmail.com>
Bhavesh Odedra <bodedra@opensourceintegrators.com>
-
Jairo Llopis
-
Karl Southern
-
Lorenzo Battistini
Maintainers
This module is maintained by the OCA.
OCA, or the Odoo Community Association, is a nonprofit organization whose mission is to support the collaborative development of Odoo features and promote its widespread use.
This module is part of the OCA/server-auth project on GitHub.
You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
Built Distribution
File details
Details for the file odoo14_addon_auth_saml-14.0.1.2.1-py3-none-any.whl
.
File metadata
- Download URL: odoo14_addon_auth_saml-14.0.1.2.1-py3-none-any.whl
- Upload date:
- Size: 67.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b0a446720ec054d65a97fa521dd943046b14b63380149a9876f2a809125b1445 |
|
MD5 | e2bd067386d9b33ad70e6f8f3c54047f |
|
BLAKE2b-256 | 13e72d7e57e83945896afd4646ef9069b332a55c6daea12bf39904b788a0cd30 |