djangosaml2idp implements the Identity Provider side of the SAML2 protocol for Django. It builds on top of PySAML2, and is used in production.
Package version 0.3.3 is the last Python 2 / Django 1.8-1.11 compatible release. Versions starting from 0.4.0 are for Python 3 and Django 2.x.
Any contributions, feature requests, proposals, ideas ... are welcome!
PySAML2 uses XML Security Library binary to sign SAML assertions, so you need to install it either through your operating system package or by compiling the source code. It doesn't matter where the final executable is installed because you will need to set the full path to it in the configuration stage. XmlSec is available (at least) for Debian, OSX and Alpine Linux.
Now you can install the djangosaml2idp package using pip. This will also install PySAML2 and its dependencies automatically:
pip install djangosaml2idp
Install the dev dependencies in requirements-dev.txt
:
pip install -r requirements-dev.txt
Run py.test
from the project root:
py.test
The first thing you need to do is add djangosaml2idp
to the list of installed apps:
INSTALLED_APPS = ( 'django.contrib.admin', 'djangosaml2idp', ... )
Now include djangosaml2idp
in your project by adding it in the url config:
from django.conf.urls import url, include from django.contrib import admin urlpatterns = [ url(r'^idp/', include('djangosaml2idp.urls')), url(r'^admin/', admin.site.urls), ... ]
In your Django settings, configure your IdP. Configuration follows the PySAML2 configuration. The IdP from the example project looks like this:
... import saml2 from saml2.saml import NAMEID_FORMAT_EMAILADDRESS, NAMEID_FORMAT_UNSPECIFIED from saml2.sigver import get_xmlsec_binary LOGIN_URL = '/login/' BASE_URL = 'http://localhost:9000/idp' SAML_IDP_CONFIG = { 'debug' : DEBUG, 'xmlsec_binary': get_xmlsec_binary(['/opt/local/bin', '/usr/bin/xmlsec1']), 'entityid': '%s/metadata' % BASE_URL, 'description': 'Example IdP setup', 'service': { 'idp': { 'name': 'Django localhost IdP', 'endpoints': { 'single_sign_on_service': [ ('%s/sso/post' % BASE_URL, saml2.BINDING_HTTP_POST), ('%s/sso/redirect' % BASE_URL, saml2.BINDING_HTTP_REDIRECT), ], }, 'name_id_format': [NAMEID_FORMAT_EMAILADDRESS, NAMEID_FORMAT_UNSPECIFIED], 'sign_response': True, 'sign_assertion': True, }, }, 'metadata': { 'local': [os.path.join(os.path.join(os.path.join(BASE_DIR, 'idp'), 'saml2_config'), 'sp_metadata.xml')], }, # Signing 'key_file': BASE_DIR + '/certificates/private.key', 'cert_file': BASE_DIR + '/certificates/public.cert', # Encryption 'encryption_keypairs': [{ 'key_file': BASE_DIR + '/certificates/private.key', 'cert_file': BASE_DIR + '/certificates/public.cert', }], 'valid_for': 365 * 24, }
Notice the configuration requires a private key and public certificate to be available on the filesystem in order to sign and encrypt messages.
You also have to define a mapping for each SP you talk to:
... SAML_IDP_SPCONFIG = { 'http://localhost:8000/saml2/metadata/': { 'processor': 'djangosaml2idp.processors.BaseProcessor', 'attribute_mapping': { # DJANGO: SAML 'email': 'email', 'first_name': 'first_name', 'last_name': 'last_name', 'is_staff': 'is_staff', 'is_superuser': 'is_superuser', } } }
That's all for the IdP configuration. Assuming you run the Django development server on localhost:8000, you can get its metadata by visiting http://localhost:8000/idp/metadata/. Use this metadata xml to configure your SP. Place the metadata xml from that SP in the location specified in the config dict (sp_metadata.xml in the example above).
djangosaml2idp renders a very basic error page if it encounters an error, indicating an error occured, which error, and possibly an extra message. The HTTP status code is also set if possible depending on which error occured. You can customize this by using the SAML_IDP_ERROR_VIEW_CLASS setting. Set this to a dotted import path to your custom (class based) view in order to use that one. If you subclass the provided djangosaml2idp.error_views.SamlIDPErrorView, you have the following variables available for use in the template:
- exception_type
- the class of the exception that occurred
- exception_msg
- the message from the exception (by doing str(exception))
- extra_message
- if no specific exception given, a message indicating something went wrong, or an additional message next to the exception_msg
The simplest override is to subclass the SamlIDPErrorView and only using your own error template. You can use any Class-Based-View for this; it's not necessary to subclass the builtin error view. The example project contains a ready to use example of this; uncomment the SAML_IDP_ERROR_VIEW_CLASS setting and it will use a custom view with custom template.
There are three main components to adding multiple factor support.
- Subclass djangosaml2idp.processors.BaseProcessor as outlined above. You will need to override the enable_multifactor() method to check whether or not multifactor should be enabled for a user. (If it should allways be enabled for all users simply hard code to True). By default it unconditionally returns False and no multifactor is enforced.
- Sublass the djangosaml2idp.views.ProcessMultiFactorView view to make the appropriate calls for your environment. Implement your custom verification logic in the multifactor_is_valid method: this could call a helper script, an internal SMS triggering service, a data source only the IdP can access or an external second factor provider (e.g. Symantec VIP). By default this view will log that it was called then redirect.
- Update your urls.py and add an override for name='saml_multi_factor' - ensure it comes before importing the djangosaml2idp urls file so your custom view is used instead of the built-in one.
example_project
contains a barebone demo setup to demonstrate the login-logout functionality.
It consists of a Service Provider implemented with djangosaml2 and an Identity Provider using djangosaml2idp
.