@@ -31,7 +31,6 @@ SSO_REQUIRED_OUTSIDE_MANAGE_PY = True # enabled to ensure that production (that
...
@@ -31,7 +31,6 @@ SSO_REQUIRED_OUTSIDE_MANAGE_PY = True # enabled to ensure that production (that
SP_SLS_ENABLED=False# single log out creates too many problems, so it is disabled for now
SP_SLS_ENABLED=False# single log out creates too many problems, so it is disabled for now
SP_SLS_X_FRAME_OPTIONS=None# in case you encounter problems with SLS view not allowed inside of an iframe, e.g. "ALLOW-FROM idp-test.it.hs-hannover.de idp.hs-hannover.de"
SP_SLS_X_FRAME_OPTIONS=None# in case you encounter problems with SLS view not allowed inside of an iframe, e.g. "ALLOW-FROM idp-test.it.hs-hannover.de idp.hs-hannover.de"
GROUPS_SAML_ATTRIBUTE="IDMGroups"# this SAML attribute is expected to contain list of groups for a user
GROUP_RESOLVER="ssoauth.auth_utils.groups_from_saml2_dn_list"# in case you want to override how groups are resolved for users
GROUP_RESOLVER="ssoauth.auth_utils.groups_from_saml2_dn_list"# in case you want to override how groups are resolved for users
LOGIN_PERM_CODENAME=None# None or str; value "can_log_in" will require this permission for users to log in
LOGIN_PERM_CODENAME=None# None or str; value "can_log_in" will require this permission for users to log in
...
@@ -79,6 +78,14 @@ STAFF_PERM_CODENAME = "staff"
...
@@ -79,6 +78,14 @@ STAFF_PERM_CODENAME = "staff"
PRETEND_AUTH_BACKEND=django_settings.AUTHENTICATION_BACKENDS[0]# pretend to be this backend; django does not expect that it is possible to log in without an authentication backend
PRETEND_AUTH_BACKEND=django_settings.AUTHENTICATION_BACKENDS[0]# pretend to be this backend; django does not expect that it is possible to log in without an authentication backend
# the block below defines from which SAML2 attributes this SP receives user data