summaryrefslogtreecommitdiffstats
path: root/authentic/admin/settings.ptl
Commit message (Collapse)AuthorAgeFilesLines
* admin/settings: fix last commitHEADmasterThomas NOEL2014-05-021-1/+1
|
* admin/settings: make qommon.admin.translations optionalBenjamin Dauvergne2014-04-251-5/+10
|
* admin/settings: plug new custom translation setting pageBenjamin Dauvergne2014-01-091-1/+5
|
* [admin setting] catch invalid provider id and return 404Benjamin Dauvergne2011-01-131-4/+11
|
* [settings providers] add a default_name_id_format setting for service providersBenjamin Dauvergne2010-12-231-2/+17
|
* [admin identities] convert identity.id to string before passing it to ↵Benjamin Dauvergne2010-12-091-2/+2
| | | | urllib.quote
* Add the possibility to redirect to another URL when accessing the homepageBenjamin Dauvergne2010-12-011-1/+3
|
* Add a setting to remove the federations management user pageBenjamin Dauvergne2010-12-011-1/+7
|
* [admin settings] extract new provider form into its own methodBenjamin Dauvergne2010-11-231-1/+5
|
* [admin settings] extract service's edit form building into its own methodBenjamin Dauvergne2010-11-231-1/+8
| | | | | In order to be able to overload the default service form we need to extract it into its own method.
* [Settings] fix exported_attributes field in new liberty provider formBenjamin Dauvergne2010-07-271-2/+2
| | | | | | - When creating a new provider there is no pre-existing configuration, so default content for the field is the empty string. - the field name is exported_attributes not 'Exported Attributes'
* [Misc] only load provider of the other kind, and do not stop on error for ↵Benjamin Dauvergne2010-07-201-1/+1
| | | | one provider, log it
* [Settings] add an exported attributes settings for each providerBenjamin Dauvergne2010-07-191-2/+12
|
* [Settings] fix bad handling of idff_proxyBenjamin Dauvergne2010-06-251-3/+3
|
* [Identities] move fields definition inside Identity store classBenjamin Dauvergne2010-06-181-2/+1
|
* Plug CAS setting pageBenjamin Dauvergne2010-06-091-0/+16
|
* remove debugging printBenjamin Dauvergne2010-05-281-1/+0
|
* Settings IdP: set proper prefix for the liberty endpointsBenjamin Dauvergne2010-05-201-4/+24
| | | | | | | | * SP descriptor for an IdP is used for proxying authentication to another IdP, the endpoints contains a 'proxy' prefix, Qommon metadata generator would produce fixed name, but it now allows to specify other names, this commit use this possibility to restore good metadata for proxying.
* Use schema module for the login settingsBenjamin Dauvergne2010-05-101-21/+0
|
* Add support for CAS 1.0 and 2.0 as a providerBenjamin Dauvergne2010-05-101-1/+1
| | | | | | | | | | | * authentic/cas.py: implement CAS 1.0 and 2.0 endpoints under the root /cas. The proxied ticket mode is also supported. Currently no control is made on the asking providers, an ACL configuration must be added for the support to be useful (especially for the CAS proxy support). By default support is disabled, you must enabled it in /admin/settings/cas.
* Move schema to their own directory, start idp branch of the configuration schemaBenjamin Dauvergne2010-03-251-232/+16
|
* Use new way of generating admin pagesBenjamin Dauvergne2010-03-251-2/+7
|
* Import RSA key generation logic from qommon/admin/settings.ptlBenjamin Dauvergne2010-02-041-2/+6
|
* Use qommon module to produce metadatas and to create key pairsBenjamin Dauvergne2010-02-041-265/+85
| | | | | | | | | | * authentic/admin/settings.ptl: - remove methods to generate metadatas using qommon.saml2utils and qommon.libertyutils. - add a button to generate RSA key pairs using qommon.x509utils - be more resilient to errors during configuration (revert to old configuration tree if something fails), check key pairs for consistency.
* use x509utils in idp configuration pageBenjamin Dauvergne2010-02-041-55/+59
|
* Show certificates content in IDP configuration pageBenjamin Dauvergne2010-02-041-4/+29
| | | | | | * authentic/admin/settings.ptl: show content of private and publick key files under the concerned fields.
* Fix import of certificatesBenjamin Dauvergne2010-02-041-15/+62
| | | | | | | | | | * authentic/admin/settings.ptl: str.strip() is not made to crop string ! bad dlaniel ! do not permit to import things that do not look like proper PEM files. we still need to add automatic generatic of pair of keys and proper checking that public and private keys match, to remove the biggest problem that people encounters with configuration of authentic.
* Sync themes support with wcsFrédéric Péters2009-12-141-29/+63
|
* Add an dn_to_id_regexp to SSL configuration optionsBenjamin Dauvergne2009-04-121-0/+3
| | | | * auhthentic/admin/settings.ptl:
* Add an allow_certificate_federation to SSL configuration optionsBenjamin Dauvergne2009-04-121-0/+3
| | | | * auhthentic/admin/settings.ptl:
* Add an require_ssl configuration optionBenjamin Dauvergne2009-04-121-0/+3
| | | | * auhthentic/admin/settings.ptl:
* Add allow_ssl_login ssl optionBenjamin Dauvergne2009-04-121-0/+3
| | | | * auhthentic/admin/settings.ptl:
* Add an SSL configuration panel to settings panelBenjamin Dauvergne2009-04-121-1/+20
| | | | * authentic/admin/settings.ptl:
* display a message on successful metadata update from remoteFrédéric Péters2008-12-031-1/+7
|
* Build correct metadatas (wrt Organization element)Benjamin Dauvergne2008-11-281-0/+4
| | | | | | - /authentic/admin/settings.ptl (get_saml_metadata, get_metadata): add empty OrganizationDisplayName and OrganizationURL to fulfill the XSchema of metadata for ID-FF 1.2 and SAML 2.0.
* added possibility to hide service providers from idp initiated sso listFrédéric Péters2008-10-151-4/+3
|
* do not long wrong passwords by default; kept the possibility as an optionFrédéric Péters2008-10-151-1/+5
|
* nothing importantDamien Laniel2008-05-301-1/+1
|
* Improved metadata generation code :Damien Laniel2008-05-301-175/+167
| | | | | | | | * made generated metadatas compatibles with most other implementations * added some missing keydescriptors * made generated metadatas more readable * cleaned up code
* fixed changing templateFrédéric Péters2008-05-291-1/+1
|
* updated to new-binding lasso.Provider exception raising (and compatibility withFrédéric Péters2008-02-211-18/+28
| | | | swig binding from qommon/__init.py)
* added 'Only used for SAML 2' in new provider configuration and removed it ↵Damien Laniel2007-12-051-4/+4
| | | | for NameIDs as they can be encrypted in ID-FF 1.2 too now
* added support for encrypting name identifiers with id-ff 1.2Damien Laniel2007-12-051-12/+23
|
* added sitename configuration optionFrédéric Péters2007-11-251-1/+24
|
* added support for AssertionConsumerService over HTTP-RedirectFrédéric Péters2007-11-211-0/+3
|
* new setting to allow direct proxying, without any stop at proxying IdP;Frédéric Péters2007-10-191-10/+16
| | | | and fixed a lot of issues with SAMLv2 proxying (basic SSO is working)
* first go at SAMLv2 proxying, untestedFrédéric Péters2007-10-181-3/+27
|
* check postgresql database connection during configurationDamien Laniel2007-08-221-4/+22
|
* possibility to set SOAP endpoints on different URLs, useful to get soapFrédéric Péters2007-08-211-6/+19
| | | | | | requests on another hostname running https with client certificate authentication on.
* reverted r806Frédéric Péters2007-06-171-1/+1
|