Commit Graph

925 Commits

Author SHA1 Message Date
Mikaël Ates 95b0ef6c3c Release 2.0.0 2011-12-22 22:03:26 +01:00
Mikaël Ates 098681d144 Add missing static files. 2011-12-22 22:02:43 +01:00
Mikaël Ates a40c0c7b34 Preparation for release 2.0.0 2011-12-22 19:11:28 +01:00
Mikaël Ates c3e33cf284 Fix typo 2011-12-22 16:05:30 +01:00
Benjamin Dauvergne 1501588554 add an AUTHORS.txt file 2011-12-22 15:45:55 +01:00
Mikaël Ates c15f4b0c75 [doc] Use Lasso 2.3.6. 2011-12-21 18:44:35 +01:00
Mikaël Ates d5421feccd [doc] remove link to PDF file. 2011-12-21 18:40:57 +01:00
Mikaël Ates 5535a32f4d Use the latest Lasso release 2.3.6. 2011-12-21 18:30:52 +01:00
Mikaël Ates 01830ebf09 [doc] Prepare documentation for the release. 2011-12-21 18:26:44 +01:00
Mikaël Ates 0e596f1731 [doc] Fix title underline too short. 2011-12-21 18:26:14 +01:00
Mikaël Ates 4cacd2ac59 [doc] Fix title underline too short. 2011-12-21 18:24:22 +01:00
Mikaël Ates f346bdae04 Use name Authentic 2 2011-12-21 18:22:35 +01:00
Mikaël Ates c08956e787 Use name Authentic 2 2011-12-21 18:21:32 +01:00
Mikaël Ates 947d382384 Use name Authentic 2 2011-12-21 18:21:25 +01:00
Mikaël Ates 492affffca [doc] Use name Authentic 2 2011-12-21 18:21:09 +01:00
Mikaël Ates 8ef4fdb713 [doc] Add a page about settings.py. 2011-12-20 18:48:18 +01:00
Mikaël Ates bd7f68991d Ignore compiled FR language file. 2011-12-20 14:50:20 +01:00
Mikaël Ates b187a36e5f Bits of traduction. 2011-12-20 14:48:11 +01:00
Mikaël Ates 43e9150f1c [templates] Change content in header. 2011-12-20 14:47:48 +01:00
Mikaël Ates ec052532f0 [templates] Missing traduction tags in oath login form. 2011-12-20 14:46:29 +01:00
Mikaël Ates 9d98443235 [saml] Don't show unused model in admin. 2011-12-20 14:45:24 +01:00
Mikaël Ates 13ca80ca66 [saml] Add missing verbose names of model fields. 2011-12-20 14:44:39 +01:00
Mikaël Ates 99df51a15d [idp] Add missing verbose names of model fields. 2011-12-20 14:44:13 +01:00
Mikaël Ates d8b6e78511 [authsaml2] Remove typo in error message. 2011-12-20 14:43:37 +01:00
Mikaël Ates 21704a4d49 [attribute_aggregator] Add missing verbose names of model fields. 2011-12-20 14:42:44 +01:00
Benjamin Dauvergne 1361e23071 [idp] change service_list() interface
service_list() now returns a list of objects with 3 fields:
 - name
 - url
 - actions

name and url are self-explanatoring, actions is a list of tuples of
length 3 or 4:
 - (name, http_method, url, post_content)

It allows to export any action toward a provider given there is an URL
endpoint to do it.
2011-12-16 22:14:11 +01:00
Benjamin Dauvergne fd894db492 [saml2] in idp_slo, send all known session indexes for the current session and the given provider
That's needed for SLO to work in most cases.
2011-12-16 21:52:23 +01:00
Benjamin Dauvergne 013da0db7a [saml2] make transient NameID persistent for a session duration
It's needed for SAML2 logout to work; as it's impossible to send
more thant one NameID in the logout request and you never know which
assertion reached the service provider among all the one emitted during
a session.
2011-12-16 21:52:23 +01:00
Benjamin Dauvergne fe81abec32 [saml2] fix typo in idp_slo 2011-12-16 21:52:23 +01:00
Benjamin Dauvergne 0465954e06 [saml2] add if case for OATHOTP backend when creating authncontextlclassref from backends 2011-12-16 21:52:23 +01:00
Benjamin Dauvergne 9629f729ae remove debugging print statements 2011-12-16 21:52:22 +01:00
Benjamin Dauvergne cb527b2c72 [saml] do not filter on an absent field of LibertyProvider 2011-12-16 21:52:15 +01:00
Benjamin Dauvergne 46c3d6f41f remove useless line of code 2011-12-16 21:51:59 +01:00
Mikaël Ates 57fc07fcc5 Bits of traduction. 2011-12-15 16:23:50 +01:00
Benjamin Dauvergne 9de7dce5c7 Fix static images path in the openid js library 2011-12-15 15:35:00 +01:00
Benjamin Dauvergne a533d04fda [saml2] forward oath-totp authentication as TimeSyncToken AuthenticationContextClassRef
The TOTP over SSL security does not have a proper SAMLv2 class-ref so
its meaning is lost.
2011-12-15 15:35:00 +01:00
Benjamin Dauvergne 6fa51b108e [auth2_oath] rename security level from oath-otp to oath-totp 2011-12-15 15:35:00 +01:00
Benjamin Dauvergne 1e4ba411b1 remove debugging print statements 2011-12-15 15:35:00 +01:00
Mikaël Ates ed247a8ba1 [auth2_ssl] Fix lost next parameter 2011-12-15 14:57:30 +01:00
Mikaël Ates 09ca6ee0a3 [authsaml2] Give provider in GET parameter to sp_slo 2011-12-15 09:18:30 +01:00
Mikaël Ates b22def58af [idp] Always return next or icon in idp_slo 2011-12-15 09:17:35 +01:00
Mikaël Ates 65e3793119 [authsaml2] Encode in utf-8 the session dump 2011-12-15 08:58:56 +01:00
Mikaël Ates 24f8de35db Ignore static directory. 2011-12-14 19:35:35 +01:00
Mikaël Ates 2e5bf62fb7 [doc] Consent management doc page. 2011-12-14 19:33:22 +01:00
Mikaël Ates 80b468344e [idp] Always send prior if there is an existing federation. 2011-12-14 18:46:55 +01:00
Mikaël Ates b2f8bb25fb [idp] Enhance consent management on the IdP side.
- The consent rrom is now always treated in continue_sso().

    - Set the Consent attribute of the authnResponse in a more
    relevant way.
2011-12-14 18:36:37 +01:00
Mikaël Ates 70a32aae88 [authsaml2] Accept prior consent for account linking. 2011-12-14 18:32:49 +01:00
Mikaël Ates 0d10374bd2 [authsaml2] Enhance consent management on the SP side.
The userconsent during SSO is about account linking on the IdP side.

In 3.2.1 Complex Type RequestAbstractType of the saml-core-2.0-os specs
Consent [Optional]
    Indicates whether or not (and under what conditions) consent has been
    obtained from a principal in the sending of this request. See Section 8.4
    for some URI references that MAY be used as the value of the Consent
    attribute and their associated descriptions. If no Consent value is
    provided, the identifier urn:oasis:names:tc:SAML:2.0:consent:unspecified
    (see Section 8.4.1) is in effect.

*The Consent attribute is thus not applicable for the SP to ask the user
consent.*

However this attribute is meaningful in the response
In 3.2.2 Complex Type StatusResponseType
Consent [Optional]
    Same as above s/request/response.

    - The authnrequest Consent attribute is not used anymore.

    - A parameter has been added to the idp options policy to indicate
    how the service provider must handle the Consent attribute of the
    authresponse. If force_user_consent is True, the SP reject the SSO
    if the consent attribute in the response is not in the set of
    the consentement strings.
2011-12-14 18:23:36 +01:00
Mikaël Ates c2e58ef995 [idp] Consent page with attribute selection or all-or-nothing. 2011-12-14 15:10:45 +01:00
Mikaël Ates da394277b0 [idp] Add an attribute selection page.
- Add a paramater to the attribute policy model to configure the
    display of the page per service provider.

    - Add support during the SSO process of a hook for asking users
    their consent to send attributes and select which attributes.

    - Add form to select attributes or refuse to send attributes
2011-12-14 13:00:00 +01:00