SAML2 authentication for Zope
Project description
Introduction
hl.pas.samlplugin provides a SAML2 plugin for Zope’s PluggableAuthService. It provides the IExtractionPlugin, IAuthenticationPlugin, IChallengePlugin, ICredentialsResetPlugin interfaces.
hl.pas.samlplugin so far has been tested with OpenAM.
Installation
Add the package to your buildout.
Run buildout. hl.pas.samlplugin will pull in pysaml2, which in turn needs xmlsec and repoze.who. xmlsec has to be installed manually, please refer to the pysaml2 documentation.
Restart Zope.
Visit your site’s Pluggable Auth Service in ZMI and add a SAML2 PAS plugin
Configuration
You will need to provide your IDP with an endpoint configuration for your Zope site containing your sites’ settings for AssertionConsumerService and SingleLogoutService. This will be an XML file looking like e.g:
<EntityDescriptor entityID="http://zopehost:8080/spEntityID" xmlns="urn:oasis:names:tc:SAML:2.0:metadata"> <SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"> <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="http://zopehost:8080/site/logout" ResponseLocation="https://zopehost:8080/site/logout"/> <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat> <AssertionConsumerService isDefault="true" index="0" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="http://zopehost:8080/site"/> </SPSSODescriptor> <RoleDescriptor xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:query="urn:oasis:names:tc:SAML:metadata:ext:query" xsi:type="query:AttributeQueryDescriptorType" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"> </RoleDescriptor> </EntityDescriptor>
Please refer to available SAML2 documentation for further information.
On the SAML2 PAS plugins’ properties tab, you will need to specify some more properties to make things work:
the absolute path to the IDP config file. This XML file should be provided by your IDP
the service endpoint URL, i.e. http://zopehost:8080/site in the example above
the service endpoint entity id as given to the IDP
the absolute path to the xmlsec executable (s. pysaml2 documentation)
the attribute provided by the IDP that should be used as the users login attribute (i.e. the user id used by Zope)
additional user properties given by the IDP that should be stored in the users session
Please have a look in the browser and the skins/auth subdirectories for example on how to handle login/logout for a CMFSite.
It seems important to note that this PAS plugin (and the SAML2 protocol) only provides authentication. It is rather likely that you will have to implement your own plugins to provide the IPropertiesPlugin and the IUserEnumerationPlugin interfaces, at least if you have to deal with user generated content or want to use the Zope CMF.
Changelog
0.5 (24.7.2013)
fixed configuration caching issue (when using multiple plugins)
0.4 (4.7.2013)
improved config caching
add sample data for unittests
0.3 (2.7.2013)
add icon
0.2 (2.7.2013)
fix MANIFEST.in
0.1 (2.7.2013)
initial release
Contributors
Download
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file hl.pas.samlplugin-0.5.tar.gz
.
File metadata
- Download URL: hl.pas.samlplugin-0.5.tar.gz
- Upload date:
- Size: 27.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | f4e7e409bcd7dc1dd8f120ffdfe964643b781e9431d0fc8dd9398e95ecc48cd2 |
|
MD5 | 49549214c2f99bac00682222783c2c26 |
|
BLAKE2b-256 | 0ea0a399d5315d023124c5a9f75a809aff8cca8500fdc65e20f59143646c7f1f |