Skip to main content

Installable OpenLXP Authentication that adds support for SAML

Project description

OpenLXP-Authentication

This is a Django package built on the social-auth-app-django package to allow additional authentication options for the OpenLXP project.

Currently this package adds support for storing SAML configurations in the database used by Django, to allow for site administrators to set SAML configurations through the admin app.

Setup

To install this package install the dependencies from the requirements file (this should happen automatically if using pip) (make sure libxml2-dev libxmlsec1-dev are installed if running in Docker).

Add the required settings to the Django settings file, social_django settings may also be used.

Add the included URLs to Django (this will add the social_django URLs for you).

urlpatterns = [
    ...
    url('', include('openlxp_authentication.urls')),
]

Access the /saml/metadata/ endpoint to view the configuration XML and verify it is correct (if AssertionConsumerService Location is incorrect, there are optional settings to fix it).

Upload the XML to needed IDPs.

Login to the admin module to add IDP configurations (the name setting will be used to identify which configuration to use).

To test the login configuration:

  1. Logout if you are already logged in

  2. Access /login/samldb/?idp=nameFromConfig

  3. You should be redirected to your chosen IDP

  4. Login with your IDP

  5. You will be returned to the application and sent to the REDIRECT_URL if set

Settings

Required Settings

JSONFIELD_ENABLED

The JSONFIELD_ENABLED setting is required as it allows storing the attribute mapping as JSON in the database.

JSONFIELD_ENABLED = True

USER_MODEL

The USER_MODEL setting sets what model should be used when authenticating a User.

USER_MODEL = 'core.XDSUser'

SP_ENTITY_ID

The SP_ENTITY_ID setting sets Entity ID that IDPs should use for identifying the service. This settings should be unique to your service.

SP_ENTITY_ID = 'http://localhost:8000'

SP_PUBLIC_CERT

The SP_PUBLIC_CERT setting sets the public key to be used when authenticating users.

SP_PUBLIC_CERT = "******"

SP_PRIVATE_KEY

The SP_PRIVATE_KEY setting sets the private key to be used when authenticating users.

SP_PRIVATE_KEY = "******"

Contact Info

Contact information is set in three settings to provide to IDPs; ORG_INFO, TECHNICAL_CONTACT, and SUPPORT_CONTACT.

ORG_INFO = {
    "en-US": {
        "name": "example",
        "displayname": "Example Inc.",
        "url": "http://localhost",
    }
}
TECHNICAL_CONTACT = {
    "givenName": "Tech Gal",
    "emailAddress": "technical@localhost.com"
}
SUPPORT_CONTACT = {
    "givenName": "Support Guy",
    "emailAddress": "support@localhost.com",
}

USER_ATTRIBUTES

The USER_ATTRIBUTES setting list the attributes of the User model that should be retrieved from the IDP.

This setting is used to set the default value for the attribute map in the IDP configuration

USER_ATTRIBUTES = ["user_permanent_id",
        "first_name",
        "last_name",
        "email"]

AUTHENTICATION_BACKENDS

The AUTHENTICATION_BACKENDS setting sets what authentication services should be available.

This setting must include 'openlxp_authentication.models.SAMLDBAuth', but others can included as desired.

AUTHENTICATION_BACKENDS = (
    ...
    'django.contrib.auth.backends.ModelBackend',
    'openlxp_authentication.models.SAMLDBAuth',
)

INSTALLED_APPS

The INSTALLED_APPS setting sets what apps Django should load.

Both social_django and openlxp_authentication must be added for this package to work correctly.

INSTALLED_APPS = [
    ...
    'social_django',
    'openlxp_authentication',
]

Optional Settings

SESSION_EXPIRATION

The SESSION_EXPIRATION setting has the Django session expiration match an expiration supplied by the IDP.

SESSION_EXPIRATION = True

LOGIN_REDIRECT_URL

The LOGIN_REDIRECT_URL setting is used by the application to redirect the user upon a successful login.

LOGIN_REDIRECT_URL = 'http://www.google.com'

OVERIDE_HOST

The OVERIDE_HOST setting is used when Django is not able to accurately determine the host and port being used (this can occur in certain reverse proxy configurations).

The setting must follow the format http://www.hostname.com:port, https:// may be used instead.

If this setting is supplied, SOCIAL_AUTH_STRATEGY and BAD_HOST should also be set.

OVERIDE_HOST = 'http://localhost:8000'

BAD_HOST

The BAD_HOST setting is used to remove part of the host and port string if the automatically detected configuration is incorrect.

Similar to OVERIDE_HOST, this setting should also start with either http:// or https://.

The setting is required if using the OVERIDE_HOST setting.

BAD_HOST = 'http://localhost'

SOCIAL_AUTH_STRATEGY

The SOCIAL_AUTH_STRATEGY setting is required if using the OVERIDE_HOST setting. OpenLXP-Authentication provides a strategy but custom solutions can be created and referenced in this setting.

SOCIAL_AUTH_STRATEGY = 'openlxp_authentication.models.SAMLDBStrategy'

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

openlxp_authentication-1.1.2.tar.gz (12.0 kB view details)

Uploaded Source

Built Distribution

openlxp_authentication-1.1.2-py3-none-any.whl (11.4 kB view details)

Uploaded Python 3

File details

Details for the file openlxp_authentication-1.1.2.tar.gz.

File metadata

File hashes

Hashes for openlxp_authentication-1.1.2.tar.gz
Algorithm Hash digest
SHA256 547c636161a188b16c8951e55459cb827cf9c14215a1cf4cb5ab4ef9172f8367
MD5 adbd7684c4f7a47c14de9bec0a7c3734
BLAKE2b-256 22e72a52436179456b544a0d7a8a4a5c43f4be945ebbf40d925e32e726b5361f

See more details on using hashes here.

File details

Details for the file openlxp_authentication-1.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for openlxp_authentication-1.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 07d63ea1f363df1c53028791d640e554ccfd312895baf0f48b7b9790da34ff00
MD5 fcee4aaaeb26cf52ab3881055a648906
BLAKE2b-256 1b405eb26ffa7353f63e8b0da159b351a87c09d505d1426cf2f949327434fc18

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page