Versatile identity management server
Go to file
Benjamin Dauvergne fe345e5746 tests: improve ldap tests with non ASCII characters in uid (#31273) 2019-03-11 20:49:34 +01:00
data [saml2] add a default certificate and aSAML_SIGNING_KEY setting 2010-12-14 16:39:25 +01:00
debian python3: adapt exception raising and handling (#31137) 2019-03-07 13:58:28 +01:00
debian-wheezy python3: adapt exception raising and handling (#31137) 2019-03-07 13:58:28 +01:00
doc remove vendored dpam library (fixes #29085) 2018-12-17 10:38:39 +01:00
samples/authentic2-plugin-template removed django-admin-tools (#22626) 2018-07-17 09:21:07 +02:00
src ldap: encode string before using urlparse.quote() on them (#31273) 2019-03-11 20:49:28 +01:00
tests tests: improve ldap tests with non ASCII characters in uid (#31273) 2019-03-11 20:49:34 +01:00
tests_rbac tests: adjust performance test to pass on new jenkins host (#27661) 2018-10-30 09:49:51 +01:00
.coveragerc .coveragerc: fix omit paths 2015-09-22 11:17:25 +02:00
.gitignore Added tox as a test-runner. 2014-12-11 14:33:49 +01:00
.gitmodules manager: add gadjo as a submodule (refs #5180) 2014-08-14 11:17:34 +02:00
AUTHORS.txt AUTHORS: update 2013-11-14 15:54:09 +01:00
COPYING remove authentic2_idp_openid (fixes #23515) 2018-07-01 13:51:44 +02:00
Jenkinsfile jenkins: publish results earlier (#29442) 2019-01-04 10:41:45 +01:00
MANIFEST.in remove vendored dpam library (fixes #29085) 2018-12-17 10:38:39 +01:00
NEWS Prepare release 2.1.13 2015-03-23 17:25:46 +01:00
README remove authentic2_idp_openid (fixes #23515) 2018-07-01 13:51:44 +02:00
authentic2-ctl use a special logger to make DEBUG log activation dynamic (fixes #8028) 2015-08-06 09:49:04 +02:00
ez_setup.py Distributable package of Authentic2 manage with Setuptools. 2012-05-11 14:30:13 +02:00
getlasso.sh Added tox as a test-runner. 2014-12-11 14:33:49 +01:00
jenkins.sh delete report directories when job starts (#24805) 2018-07-02 13:01:00 +02:00
local_settings.py.example remove authentic2_idp_openid (fixes #23515) 2018-07-01 13:51:44 +02:00
merge-coverage.py python3: use __future__.print_function (#31140) 2019-03-07 13:55:29 +01:00
merge-junit-results.py python3: use __future__.print_function (#31140) 2019-03-07 13:55:29 +01:00
pylint.sh create jenkins pipeline job (#24805) 2018-07-02 11:56:19 +02:00
setup.py setup.py: adopt a more PEP440 process to create version (fixes #29918) 2019-01-31 13:43:35 +01:00
tox.ini tox.ini: add testing with python-ldap<3 (#30577) 2019-03-01 16:06:20 +01:00

README

=======================================
Authentic 2 - Versatile Identity Server
=======================================

Authentic 2 is a versatile identity management server aiming to address a
broad range of needs, from simple to complex setups; it has support for many
protocols and can bridge between them.

Authentic 2 supports many protocols and standards, including SAML2, CAS,
LDAP, X509 and OAUTH2.

Authentic 2 is under the GNU AGPL version 3 licence.

It has support for SAMLv2 thanks to `Lasso <http://lasso.entrouvert.org>`_,
a free (GNU GPL) implementation of the Liberty Alliance and OASIS
specifications of SAML2.

Authentic 2 requires Python 2.7 and Django 1.7.

Full documentation available on http://authentic2.readthedocs.org/en/stable/.

Features
--------

* SAML 2.0 Identity and service provider
* Server CAS 1.0 and 2.0 using a plugin
* Standards authentication mechanisms:

    * Login/password through internal directory or LDAP
    * X509 certificate over SSL/TLS

* Protocol proxying
* Support of LDAP v2 and v3 directories
* Support of the PAM backend
* One-time password (OATH and Google-Authenticator) using a plugin
* Identity attribute management
* Plugin system


Installation
============

First of all, you can boot Authentic vwithout root
privileges  like this:

# Initialize a virtualenv::

    virtualenv authentic
    source ./authentic/bin/activate
    cd authentic

# Install Authentic::

    pip install

# Initialize the database migrations::

    authentic2-ctl syncdb --migrate

# Run the HTTP test server::

    authentic2-ctl runserver

Upgrade
=======
.. WARNING::
   Version 2.2.0 is the first version supporting only Django 1.7, if you are
   using a previous one you must first upgrade to 2.1.12 before tempting
   upgrade to a release later than 2.2.0.

Support
=======

Authentic's developpers and users hangs on the mailing list
authentic@listes.entrouvert.com
See archives or register at http://listes.entrouvert.com/info/authentic.

You can "open":http://dev.entrouvert.org/projects/authentic/issues/new bug
reports or feature request on this site.

Entr'ouvert also provides a commercial support. For information, see
http://www.entrouvert.com.


Copyright
=========

Authentic is copyrighted by Entr'ouvert and is licensed through the GNU Affero
General Public Licence, version 3 or later. A copy of the whole license text
is available in the COPYING file.