Let users log into Odoo via an SAML2 identity provider.
This module allows to deport the management of users and passwords in an external authentication system to provide SSO functionality (Single Sign On) between Odoo and other applications of your ecosystem.
Benefits:
- Reducing the time spent typing different passwords for different accounts.
- Reducing the time spent in IT support for password oversights.
- Centralizing authentication systems.
- Securing all input levels / exit / access to multiple systems without prompting users.
- The centralization of access control information for compliance testing to different standards.
Table of contents
This addon requires the python module pysaml2
.
pysaml2
requires the binary xmlsec1
(on Debian or Ubuntu you can install it with apt-get install xmlsec1
)
To use this module, you need an IDP server, properly set up.
- Configure the module according to your IdP’s instructions (Settings > Users & Companies > SAML Providers).
- Pre-create your users and set the SAML information against the user.
By default, the module let users have both a password and SAML ids. To increase security, disable passwords by using the option in Settings. Note that the admin account can still have a password, even if the option is activated. Setting the option immediately remove all password from users with a configured SAML ids.
If all the users have a SAML id in a single provider, you can set automatic redirection
in the provider settings. The autoredirection will only be done on the active provider
with the highest priority. It is still possible to access the login without redirection
by using the query parameter disable_autoredirect
, as in
https://example.com/web/login?disable_autoredirect=
The login is also displayed if
there is an error with SAML login, in order to display any error message.
Users can login with the configured SAML IdP with buttons added in the login screen.
- clean up
auth_saml.request
Fix the module by adding a transaction to commit the token.
Fix the disallow password for users with SAML ids. Added tests to ensure the feature works correctly. Admin user is also an exception from not having a password. In Odoo 15.0, this is the standard user to connect for administrative task, not the super user.
Improve provider form and list views.
Add auto redirect on providers. Use disable_autoredirect as a parameter query to disable automatic redirection (for example https://example.com/web/login?disable_autoredirect=
)
Add certificate file name fields to improve the UI.
Add required on several fields of the SAML provider; without them the server will crash and there is not enough information to make SAML work.
Split signing to have finer control and be compatible with more IDP.
Integrate token into res.users.saml, removing auth_saml.token. No need for a separate table, and no more need to create lines in the table.
Avoid server errors when user try metadata page without necessary parameters.
Replace method call from odoo.http.redirect_with_hash
to request.redirect
as the former does not exists in Odoo 15.0 anymore.
Improved the module documentation.
Bugs are tracked on GitHub Issues. In case of trouble, please check there if your issue has already been reported. If you spotted it first, help us smashing it by providing a detailed and welcomed feedback.
Do not contact contributors directly about support or help with technical issues.
- XCG Consulting
- Florent Aide <florent.aide@xcg-consulting.fr>
- Vincent Hatakeyama <vincent.hatakeyama@xcg-consulting.fr>
- Alexandre Brun <alexandre.brun@xcg-consulting.fr>
- Jeremy Co Kim Len <jeremy.cokimlen@vinci-concessions.com>
- Houzéfa Abbasbhay <houzefa.abba@xcg-consulting.fr>
- Jeffery Chen Fan <jeffery9@gmail.com>
- Bhavesh Odedra <bodedra@opensourceintegrators.com>
- Tecnativa:
- Jairo Llopis
- GlodoUK:
- Karl Southern
- TAKOBI:
- Lorenzo Battistini
This module is maintained by the OCA.
OCA, or the Odoo Community Association, is a nonprofit organization whose mission is to support the collaborative development of Odoo features and promote its widespread use.
This module is part of the OCA/server-auth project on GitHub.
You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute.