معرفی شرکت ها


django3-auth-saml2-0.6.0


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Django3 auth SAML2 integration
ویژگی مقدار
سیستم عامل -
نام فایل django3-auth-saml2-0.6.0
نام django3-auth-saml2
نسخه کتابخانه 0.6.0
نگهدارنده []
ایمیل نگهدارنده []
نویسنده Jeremy Schulman
ایمیل نویسنده -
آدرس صفحه اصلی -
آدرس اینترنتی https://pypi.org/project/django3-auth-saml2/
مجوز Apache 2.0
# Django3 Auth SAML2 Integration As a developer of Django3 applications I need to integrate a SAML2 based Single-Sign-On (SSO) User authentication system, for example with [Okta](https://www.okta.com/). I know there are a number of existing packages out there, but I want something super-simple that does not require a lot of configuration in my `settings.py` file. I also need this integration to work with exsitng Django solutions that _do not allow me to modify settings.py directly_, as is the case with [Netbox](https://github.com/netbox-community/netbox). This `django3_auth_saml2` package was inspired by the existing [django-saml2-auth](https://github.com/fangli/django-saml2-auth). **Notable Changes**: 1. Django3 / Python3 code base 1. Provides two Views: one for the login redirect to the SSO and the other for the SSO signin 1. Uses Django RemoteUserBackend (or subclass) to handle User creation and configuration process 1. Provide the SAML2 authenticate response payload in `response.META['SAML2_AUTH_RESPONSE']` 1. Any errors result in `PermissionDenied` exceptions to allow for app specific handling 1. Configuration can be store in `django3_auth_saml2.config.SAML2_AUTH_CONFIG` as an alternative to using the Django `settings.py` file ## System Requirements This package requires the `xmlsec` library to be installed. ## Views This package provides two views: * `login` - The URL View should be called when the User attempts to login directly to the app * `acs` - This URL View should be called by the SSO system (Okta) When the User attempts to use `login`, the View will redirect the User's web browser to the SSO system for authentication. Once the User authenticates at the SSO system, the SSO system will then call the `acs` URL view to sign into the Django app. In your ROOT_URLCONF.urlpatterns you will need to define two URLs. The first is for the SSO system, and the second is your login URL that will force the User to authenticate via the SSO first. You can change these to suit your specific app API. Keep in mind that the 'django3_auth_saml2.urls' provides the 'acs' view, so that the example below would result in the app API "/sso/acs/" and "/sso/login/". ```python urlpatterns = [ path('sso/', include('django3_auth_saml2.urls')), path('login/', RedirectView.as_view(url='/sso/login/')), ] ``` ## Django System Configuration The options have been streamlined from the original django-sam2-auth package, only the following are supported: ### Required **AUTHENTICATION_BACKEND**<br/> (NEW) the dotted string name of the backend, for example:<br/> "django.contrib.auth.backends.RemoteUserBackend" One of: A) **METADATA_AUTO_CONF_URL**<br/> The URL to the SSO system where the metadata document can be retrieved, for example:<br/> "https://mycorp.oktapreview.com/app/sadjfalkdsflkads/sso/saml/metadata" B) **METADATA_LOCAL_FILE_PATH**<br/> As an alternative to using the URL, you can store the metadata contents to a local file, for example:<br/> "/etc/oktapreview-netbox-metadata.xml" ### Optional **DEFAULT_NEXT_URL**<br/> The next URL used to redirect the User after login is successful. Defaults to `/`. **DEFAULT_SSO_ACS_URL**<br/> The URL to be used for SSO sign-in purposes. Defaults to `/sso/acs/`. **ENTITY_ID**<br/> This is generally the URL to your application, for example:<br/> "https://okta-devtest.ngrok.io"<br/> **ASSERTION_URL** - same This is generally the URL to your application, for example:<br/> "https://okta-devtest.ngrok.io"<br/> **NAME_ID_FORMAT**<br/> Identifies the format of the User name, see [docs](https://docs.oracle.com/cd/E19316-01/820-3886/ggwbz/index.html) for options. This value defaults to using email. By default the User name value will be taken from the SAML response `name_id.text` value. For example, if the NAME_ID_FORMAT is set to use email, then the User name value will be the User's email address. For more information on these terms, refer to [docs](https://support.okta.com/help/s/article/Common-SAML-Terms). ### Example You should create the `SAML2_AUTH_CONFIG` dictionary in the Django `settings.py` file, for example: ````python SAML2_AUTH_CONFIG = { # Using default remote backend 'AUTHENTICATION_BACKEND': 'django.contrib.auth.backends.RemoteUserBackend', # Metadata is required, choose either remote url or local file path 'METADATA_AUTO_CONF_URL': "https://mycorp.oktapreview.com/app/sadjfalkdsflkads/sso/saml/metadata" } ```` ## User Create & Configuration via RemoteUserBackend By default `acs` will define the `remote_user` parameter from the `saml2_auth_resp.name_id.text` value when it calls the backend `authenticate()` method. For example, if the SSO system (Okta) has configured the name ID format as email (as shown in the example above), then the User name will be the Users email address. The `acs` View will set the `response.META['SAML2_AUTH_RESPONSE']` to the `saml2.response.AuthnResponse` instance so that you can access this information. When `acs` calls the backend `authenticate()`, the User will be created if it does not exist by defaul; see class property `create_unknown_user`. In this case the `RemoteUserBackend.configure_user()` method is called. You can subclass RemoteUserBackend, implemeting your own `authenticate()` and `configure_user()` methods to use the `response.META['SAML2_AUTH_RESPONSE']` data. You can to access the SAML2 user identiy attributes. See samples in [backends.py](django3_auth_saml2/backends.py). # Using Netbox? If you are using [Netbox](https://netbox.readthedocs.io/en/stable/) and you do not want to fork/modify the system `settings.py` file, please refer to [netbox-plugin-auth-saml2](https://github.com/jeremyschulman/netbox-plugin-auth-saml2)


نیازمندی

مقدار نام
>=3 django
==6.5.0 pysaml2


نحوه نصب


نصب پکیج whl django3-auth-saml2-0.6.0:

    pip install django3-auth-saml2-0.6.0.whl


نصب پکیج tar.gz django3-auth-saml2-0.6.0:

    pip install django3-auth-saml2-0.6.0.tar.gz