Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

First commit of the SAMLUnsolicitedFrontend class #231

Merged
merged 5 commits into from
May 16, 2019

Conversation

skoranda
Copy link
Contributor

@skoranda skoranda commented May 1, 2019

First commit of the SAMLUnsolicitedFrontend class that provides all of
the functionality of the base SAMLFrontend class but also enables
an unsolicited endpoint that can be used to initiate a SAML flow using
a proprietary set of query string parameters that are not part of any
SAML standard but follow closely similar functionality from the
Shibboleth project.

All Submissions:

  • Have you checked to ensure there aren't other open Pull Requests for the same update/change?
  • Have you added an explanation of what problem you are trying to solve with this PR?
  • Have you added information on what your changes do and why you chose this as your solution?
  • Have you written new tests for your changes?
  • Does your submission pass tests?
  • This project follows PEP8 style guide. Have you run your code against the 'flake8' linter?

@skoranda
Copy link
Contributor Author

skoranda commented May 1, 2019

Note that this PR depends on PR 230 in order to dynamically set the discovery service to be used. That is causing the checks to fail.

skoranda and others added 4 commits May 16, 2019 11:29
First commit of the SAMLUnsolicitedFrontend class that provides all of
the functionality of the base SAMLFrontend class but also enables
an unsolicited endpoint that can be used to initiate a SAML flow using
a proprietary set of query string parameters that are not part of any
SAML standard but follow closely similar functionality from the
Shibboleth project.
Add a query parameter to the unsolicted endpoint to allow setting the
discovery service policy.
Add a query parameter to the unsolicted endpoint to allow
setting the entityID for the IdP to be used by the backend for
authentication.
Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
@c00kiemon5ter c00kiemon5ter force-pushed the saml_unsolicited_idp branch from 278f426 to 285c80d Compare May 16, 2019 09:29
Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants