An authentication backend for Django based on Polytechnique.org's auth-groupe-x SSO protocol.
Project description
django-authgroupex
This library provides a Django authentication backend based on Polytechnique.org’s auth-groupe-x SSO protocol.
Setup
The django-authgroupex package requires only a minimal pair of settings to work:
# Enable AuthGroupeX authentication backend
AUTHENTICATION_BACKENDS = (
'django_authgroupex.auth.AuthGroupeXBackend',
'django.contrib.auth.backends.ModelBackend', # Optional
)
# Read secret key from file
AUTHGROUPEX_KEY = open('authgroupex.key', 'r').readline()
It should also be included in your projects urls.py file:
urlpatterns = patterns('',
# Usual suspects here
url(r'^xorgauth/', include('django_authgroupex.views', namespace='authgroupex')),
)
If you’re using the django.contrib.admin app, you may also override its login form:
from django.contrib import admin
admin.site.login_template = 'authgroupex/admin_login.html'
Settings
django-authgroupex provides the following settings:
AUTHGROUPEX_KEY: Required, the secret key used to connect to an AuthGroupeX-compatible server.
AUTHGROUPEX_ENDPOINT: The remote endpoint (an AuthGroupeX-compatible server). Default: https://www.polytechnique.org/auth-groupe-x/utf8
AUTHGROUPEX_FIELDS: The list of profile fields to require upon connection; order matters. Default: ('username', 'firstname', 'lastname', 'email')
AUTHGROUPEX_USER_MODEL: Model storing users. Default: auth.User
AUTHGROUPEX_USER_GROUP: Model storing groups. Default: auth.Group
AUTHGROUPEX_SUPERADMIN_PERMS: A list of AuthGroupeX permissions that enable the is_admin flag on this server. Default: ()
AUTHGROUPEX_STAFF_PERMS: A list of AuthGroupeX permissions that enable the is_staff flag on this server.
AUTHGROUPEX_DISABLE_DEADS: Whether a user connecting from a “dead” account should be switched to is_active=False Default: False
AUTHGROUPEX_GROUP: Name of the AuthGroupeX group to use for a single-group website. Default: ''
AUTHGROUPEX_MAP_GROUPS: Dict mapping an AuthGroupeX permission to a local group name. Default: {}
AUTHGROUPEX_RETURN_URL: Name of the (local) return url for successful logins. Default: settings.LOGIN_URL
AUTHGROUPEX_LOGIN_REDIRECT_URL: Name of the URL to redirect the user to after a successful login. Default: settings.LOGIN_REDIRECT_URL
Testing
For testing purposes, it is advised to not use a production private key.
django_authgroupex has a special, “fake” mode for such cases. That fake mode adds a couple of URLs handling a local endpoint where the end user can choose custom values for requested fields.
Installation requires a couple of extra settings:
# settings.py AUTHGROUPEX_FAKE = True AUTHGROUPEX_ENDPOINT = 'authgroupex:fake_endpoint'
The AUTHGROUPEX_FAKE setting will enable two views for handling fake requests:
One validates the input (which can also be used to validate external clients)
The second provides a dynamic form based on AUTHGROUPEX_FIELDS, enabling users to select there preferred response.
The AUTHGROUPEX_ENDPOINT setting should include the namespace at which django_authgroupex.urls was inserted.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file django_authgroupex-0.2.1.tar.gz
.
File metadata
- Download URL: django_authgroupex-0.2.1.tar.gz
- Upload date:
- Size: 13.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6894f49453ccbb1b8fd213aa3cf0f5251b9125a0adfdccc8989ca3f25843ee67 |
|
MD5 | 04398f3db6cbcb9284063de7bc3bcede |
|
BLAKE2b-256 | 5d4d3cc4e0278e83cfe691735b38b53290f24d487ffd4e7fba53d4ffe4c3838f |