Metadata-Version: 1.1
Name: hl.pas.samlplugin
Version: 0.8
Summary: SAML2 authentication for Zope
Home-page: https://github.com/Haufe-Lexware/hl.pas.samlplugin
Author: Thomas Schorr
Author-email: thomas.schorr@haufe-lexware.com
License: GPL
Description: Introduction
        ============
        
        ``hl.pas.samlplugin`` provides a SAML2 plugin for Zope's `PluggableAuthService 
        <http://pypi.python.org/pypi/Products.PluggableAuthService>`__. It provides 
        the IExtractionPlugin, IAuthenticationPlugin, IChallengePlugin, ICredentialsResetPlugin
        interfaces.
        
        ``hl.pas.samlplugin`` so far has been tested with OpenAM.
        
        Installation
        ============
        
        1. Add the package to your buildout.
        2. Run buildout. ``hl.pas.samlplugin`` will pull in `pysaml2 <http://pypi.python.org/pypi/pysaml2/0.4.2>`__, 
           which in turn needs xmlsec and repoze.who. xmlsec has to be installed manually, please refer to the pysaml2 
           documentation.
        3. Restart Zope.
        4. Visit your site's Pluggable Auth Service in ZMI and add a SAML2 PAS plugin
        
        Configuration
        =============
        
        You will need to provide your IDP with an endpoint configuration for your Zope site containing your sites' 
        settings for AssertionConsumerService and SingleLogoutService. This will be an XML file looking like e.g::
        
            <EntityDescriptor entityID="http://zopehost:8080/spEntityID" xmlns="urn:oasis:names:tc:SAML:2.0:metadata">
                <SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="false"
                                 protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
                    <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
                                         Location="http://zopehost:8080/site/logout"
                                         ResponseLocation="https://zopehost:8080/site/logout"/>
                    <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
                    <AssertionConsumerService isDefault="true" index="0" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
                                Location="http://zopehost:8080/site"/> 
                </SPSSODescriptor>
                <RoleDescriptor xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
                                xmlns:query="urn:oasis:names:tc:SAML:metadata:ext:query"
                                xsi:type="query:AttributeQueryDescriptorType"
                                protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
                </RoleDescriptor>
            </EntityDescriptor>
        
        At the moment the bindings specified in the above example (i.e. HTTP-Redirect for the SingleLogoutService and HTTP-POST 
        for the AssertionConsumerService) are the only ones that are supported. For the authentication request, HTTP-Redirect is used.
        
        Please refer to available SAML2 documentation for further information.
        
        On the SAML2 PAS plugins' properties tab, you will need to specify some more properties to make things work:
        
        - the absolute path to the IDP config file. This XML file should be provided by your IDP
        - the service endpoint URL, i.e. http://zopehost:8080/site in the example above
        - the service endpoint entity id as given to the IDP
        - the AuthnContextClass to use with the authentication request
        - the absolute path to the xmlsec executable (s. pysaml2 documentation)
        - the attribute provided by the IDP that should be used as the users login attribute (i.e. the user id used by Zope)
        - additional user properties given by the IDP that should be stored in the users session
        
        Please have a look in the ``browser`` and the ``skins/auth`` subdirectories for examples on how to handle login/logout 
        for a CMFSite.
        
        It seems important to note that this PAS plugin (and the SAML2 protocol) only provides authentication. It is rather likely 
        that you will have to implement your own plugins to provide the IPropertiesPlugin and the IUserEnumerationPlugin interfaces, 
        at least if you have to deal with user generated content or want to use the Zope CMF.
        
        Changelog
        =========
        
        0.8 (2013-11-25)
        -------------------
        
        - added support for AuthnContextClass
        
        0.7.1 (2013-09-06)
        -------------------
        
        - require pysaml2 == 1.0.2 (1.0.3 not working)
        
        0.7 (2013-08-19)
        -------------------
        
        - Python 2.6 compatibility
        
        0.6 (2013-08-16)
        -------------------
        
        - use pysaml2 >= 1.0
        
        0.5 (2013-07-24)
        -------------------
        
        - fixed configuration caching issue (when using multiple plugins)
        
        0.4 (2013-07-04)
        -------------------
        
        - improved config caching
        - add sample data for unittests
        
        0.3 (2013-07-02)
        -------------------
        
        - add icon
        
        
        0.2 (2013-07-02)
        -------------------
        
        - fix MANIFEST.in
        
        
        0.1 (2013-07-02)
        -------------------
        
        - initial release
        
        Contributors
        ************
        
        
        Download
        ********
        
Platform: UNKNOWN
Classifier: Framework :: Zope2
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: GNU General Public License (GPL)
