Installable OpenLXP Authentication that adds support for SAML
Project description
OpenLXP-Authentication
This is a Django package built on the social-auth-app-django package to allow additional authentication options for the OpenLXP project.
Currently this package adds support for storing SAML configurations in the database used by Django, to allow for site administrators to set SAML configurations through the admin app.
Setup
To install this package install the dependencies from the requirements file (this should happen automatically if using pip) (make sure libxml2-dev libxmlsec1-dev are installed if running in Docker).
Add the required settings to the Django settings file, social_django settings may also be used.
Add the included URLs to Django (this will add the social_django URLs for you).
urlpatterns = [
...
url('', include('openlxp_authentication.urls')),
]
Access the /saml/metadata/
endpoint to view the configuration XML and verify it is correct (if AssertionConsumerService Location is incorrect, there are optional settings to fix it).
Upload the XML to needed IDPs.
Login to the admin module to add IDP configurations (the name setting will be used to identify which configuration to use).
To test the login configuration:
-
Logout if you are already logged in
-
Access
/login/samldb/?idp=nameFromConfig
-
You should be redirected to your chosen IDP
-
Login with your IDP
-
You will be returned to the application and sent to the REDIRECT_URL if set
Settings
Required Settings
JSONFIELD_ENABLED
The JSONFIELD_ENABLED setting is required as it allows storing the attribute mapping as JSON in the database.
JSONFIELD_ENABLED = True
USER_MODEL
The USER_MODEL setting sets what model should be used when authenticating a User.
USER_MODEL = 'core.XDSUser'
SP_ENTITY_ID
The SP_ENTITY_ID setting sets Entity ID that IDPs should use for identifying the service. This settings should be unique to your service.
SP_ENTITY_ID = 'http://localhost:8000'
SP_PUBLIC_CERT
The SP_PUBLIC_CERT setting sets the public key to be used when authenticating users.
SP_PUBLIC_CERT = "******"
SP_PRIVATE_KEY
The SP_PRIVATE_KEY setting sets the private key to be used when authenticating users.
SP_PRIVATE_KEY = "******"
Contact Info
Contact information is set in three settings to provide to IDPs; ORG_INFO, TECHNICAL_CONTACT, and SUPPORT_CONTACT.
ORG_INFO = {
"en-US": {
"name": "example",
"displayname": "Example Inc.",
"url": "http://localhost",
}
}
TECHNICAL_CONTACT = {
"givenName": "Tech Gal",
"emailAddress": "technical@localhost.com"
}
SUPPORT_CONTACT = {
"givenName": "Support Guy",
"emailAddress": "support@localhost.com",
}
USER_ATTRIBUTES
The USER_ATTRIBUTES setting list the attributes of the User model that should be retrieved from the IDP.
This setting is used to set the default value for the attribute map in the IDP configuration
USER_ATTRIBUTES = ["user_permanent_id",
"first_name",
"last_name",
"email"]
AUTHENTICATION_BACKENDS
The AUTHENTICATION_BACKENDS setting sets what authentication services should be available.
This setting must include 'openlxp_authentication.models.SAMLDBAuth'
, but others can included as desired.
AUTHENTICATION_BACKENDS = (
...
'django.contrib.auth.backends.ModelBackend',
'openlxp_authentication.models.SAMLDBAuth',
)
INSTALLED_APPS
The INSTALLED_APPS setting sets what apps Django should load.
Both social_django and openlxp_authentication must be added for this package to work correctly.
INSTALLED_APPS = [
...
'social_django',
'openlxp_authentication',
]
Optional Settings
SESSION_EXPIRATION
The SESSION_EXPIRATION setting has the Django session expiration match an expiration supplied by the IDP.
SESSION_EXPIRATION = True
LOGIN_REDIRECT_URL
The LOGIN_REDIRECT_URL setting is used by the application to redirect the user upon a successful login.
LOGIN_REDIRECT_URL = 'http://www.google.com'
OVERIDE_HOST
The OVERIDE_HOST setting is used when Django is not able to accurately determine the host and port being used (this can occur in certain reverse proxy configurations).
The setting must follow the format http://www.hostname.com:port
, https://
may be used instead.
If this setting is supplied, SOCIAL_AUTH_STRATEGY and BAD_HOST should also be set.
OVERIDE_HOST = 'http://localhost:8000'
BAD_HOST
The BAD_HOST setting is used to remove part of the host and port string if the automatically detected configuration is incorrect.
Similar to OVERIDE_HOST, this setting should also start with either http://
or https://
.
The setting is required if using the OVERIDE_HOST setting.
BAD_HOST = 'http://localhost'
SOCIAL_AUTH_STRATEGY
The SOCIAL_AUTH_STRATEGY setting is required if using the OVERIDE_HOST setting. OpenLXP-Authentication provides a strategy but custom solutions can be created and referenced in this setting.
SOCIAL_AUTH_STRATEGY = 'openlxp_authentication.models.SAMLDBStrategy'
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file openlxp_authentication-1.1.2.tar.gz
.
File metadata
- Download URL: openlxp_authentication-1.1.2.tar.gz
- Upload date:
- Size: 12.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 547c636161a188b16c8951e55459cb827cf9c14215a1cf4cb5ab4ef9172f8367 |
|
MD5 | adbd7684c4f7a47c14de9bec0a7c3734 |
|
BLAKE2b-256 | 22e72a52436179456b544a0d7a8a4a5c43f4be945ebbf40d925e32e726b5361f |
File details
Details for the file openlxp_authentication-1.1.2-py3-none-any.whl
.
File metadata
- Download URL: openlxp_authentication-1.1.2-py3-none-any.whl
- Upload date:
- Size: 11.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 07d63ea1f363df1c53028791d640e554ccfd312895baf0f48b7b9790da34ff00 |
|
MD5 | fcee4aaaeb26cf52ab3881055a648906 |
|
BLAKE2b-256 | 1b405eb26ffa7353f63e8b0da159b351a87c09d505d1426cf2f949327434fc18 |