OpenID authentication support for PAS
OpenID PAS support
Using this package everyone with an OpenID authentity will be able to login on your Zope site. OpenID accounts are not given any extra roles beyond the standard Authenticated role. This allows you to make a distinction between people that have explicitly signed up to your site and people who are unknown but have succesfully verified their identity.
The OpenID authentication flow goes like this:
- user submits a OpenID identity (which is a URL) to you site. This is done through a HTTP POST using a form variable called __ac_identity_url
- the PAS plugin sees this variable during credential extraction and initiates a OpenID challenge. This results in a transaction commit and a redirect to an OpenID server.
- the OpenID server takes care of authenticating the user and redirect the user back to the Zope site.
- the OpenID PAS plugin extracts the information passed in via the OpenID server redirect and uses that in its authentication code to complete the OpenID authentication
The PAS plugin only takes care of authenticating users. In almost all environments it will be needed to also setup a session so users stay logged in when they visit another page. This can be done via a special session management PAS plugin, for example plone.session.
- Use system random when available. This is part of the fix for https://plone.org/products/plone/security/advisories/20121106/24 [davisagli]
- Fixed extractCredentials to strip whitespaces around __ac_identity_url. This fixes http://dev.plone.org/plone/ticket/11044 [datakurre]
- Fixed to store timestamp as part of nonce. This fixes http://dev.plone.org/plone/ticket/11987 [datakurre]
- Add MANIFEST.in. [WouterVH]
2.0 - 2010-07-18
- Package metadata cleanup and definition of all package dependencies. [hannosch]
- Relicense to BSD. [Plone Foundation]
- Refactor tests to be simple python test cases. This removes all dependencies on Plone code. [wichert]
- Specify package dependencies. [hannosch]
- Handle the case where the handles for a given domain are empty but a request for them is made anyway. This fixes http://dev.plone.org/plone/ticket/9178 [jvloothuis]
1.2 - 2008-08-19
- Fixed bug where you could not log in via OpenID, immediately log out, and then immediately log in again. [davisagli]
- Upgraded to python-openid>=2.2.1 to fix handling of OpenID providers that use identifier recycling. (c.f. http://developer.yahoo.com/openid/faq.html) This closes http://dev.plone.org/plone/ticket/8051. [davisagli]
- Use the OpenID “claimed identifier” so that the proper identity URL is displayed when using delegation. [davisagli]
1.1 - 2008-04-21
- Writing test and fixes for bug #7176 whereby a traceback was produced when an empty string identity was placed in the openid login form. [andrewb]
- Do not enable OpenID support if python has no SSL support. [wichert]
1.0.1 - 2007-11-09
- Also accept https URLs as valid identifiers. This fixes http://dev.plone.org/plone/ticket/7298 [wichert]
1.0 - 2007-08-15
- First stable release [wichert]