from ipsilon.providers.common import ProviderBase, ProviderPageBase
from ipsilon.providers.saml2.auth import AuthenticateRequest
+from ipsilon.providers.saml2.logout import LogoutRequest
from ipsilon.providers.saml2.admin import Saml2AdminPage
from ipsilon.providers.saml2.provider import IdentityProvider
from ipsilon.tools.certs import Certificate
return self.auth(login)
+class RedirectLogout(LogoutRequest):
+
+ def GET(self, *args, **kwargs):
+ query = cherrypy.request.query_string
+
+ relaystate = kwargs.get(lasso.SAML2_FIELD_RELAYSTATE)
+ response = kwargs.get(lasso.SAML2_FIELD_RESPONSE)
+
+ return self.logout(query,
+ relaystate=relaystate,
+ samlresponse=response)
+
+
class SSO(ProviderPageBase):
def __init__(self, *args, **kwargs):
self.Continue = Continue(*args, **kwargs)
+class SLO(ProviderPageBase):
+
+ def __init__(self, *args, **kwargs):
+ super(SLO, self).__init__(*args, **kwargs)
+ self._debug('SLO init')
+ self.Redirect = RedirectLogout(*args, **kwargs)
+
+
# one week
METADATA_RENEW_INTERVAL = 60 * 60 * 24 * 7
# 30 days
super(SAML2, self).__init__(*args, **kwargs)
self.metadata = Metadata(*args, **kwargs)
self.SSO = SSO(*args, **kwargs)
+ self.SLO = SLO(*args, **kwargs)
class IdpProvider(ProviderBase):
'default email domain',
'Used for users missing the email property.',
'example.com'),
+ pconfig.MappingList(
+ 'default attribute mapping',
+ 'Defines how to map attributes before returning them to SPs',
+ [['*', '*']]),
+ pconfig.ComplexList(
+ 'default allowed attributes',
+ 'Defines a list of allowed attributes, applied after mapping',
+ ['*']),
)
if cherrypy.config.get('debug', False):
import logging
def default_email_domain(self):
return self.get_config_value('default email domain')
+ @property
+ def default_attribute_mapping(self):
+ return self.get_config_value('default attribute mapping')
+
+ @property
+ def default_allowed_attributes(self):
+ return self.get_config_value('default allowed attributes')
+
def get_tree(self, site):
self.idp = self.init_idp()
self.page = SAML2(site, self)