1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
|
from django.contrib.auth.backends import ModelBackend
from django.contrib.auth.models import SiteProfileNotAvailable, User
from django.core.exceptions import ObjectDoesNotExist
import logging
from saml2.saml import name_id_type__from_string
from assurance.models import IdentityProvider
logger = logging.getLogger('djangosaml2')
__author__ = 'leifj'
class Saml2Backend(ModelBackend):
"""This backend is added automatically by the assertion_consumer_service
view.
Don't add it to settings.AUTHENTICATION_BACKENDS.
"""
def _set(self,o,django_attr,saml_attrs,attributes):
for saml_attr in saml_attrs:
if attributes.has_key(saml_attr):
setattr(o, django_attr, attributes[saml_attr][0])
return True
return False
def get_saml_user(self,session_info,attribute_mapping):
attributes = session_info['ava']
if not attributes:
logger.error('The attributes dictionary is empty')
for saml_attr, django_fields in attribute_mapping.items():
if 'username' in django_fields and saml_attr in attributes:
return attributes[saml_attr][0]
return None
def authenticate(self, session_info=None, attribute_mapping=None, create_unknown_user=True):
if session_info is None or attribute_mapping is None:
logger.error('Session info or attribute mapping are None')
return None
if not 'ava' in session_info:
logger.error('"ava" key not found in session_info')
return None
print session_info
saml_user = self.get_saml_user(session_info,attribute_mapping)
if saml_user is None:
logger.error('Could not find saml_user value')
return None
user = None
username = self.clean_username(saml_user)
# Note that this could be accomplished in one try-except clause, but
# instead we use get_or_create when creating unknown users since it has
# built-in safeguards for multiple threads.
if create_unknown_user:
logger.debug('Check if the user "%s" exists or create otherwise' % username)
user, created = User.objects.get_or_create(username=username)
if created:
logger.debug('New user created')
user = self.configure_user(user, session_info, attribute_mapping)
else:
logger.debug('User updated')
user = self.update_user(user, session_info, attribute_mapping)
else:
logger.debug('Retrieving existing user "%s"' % username)
try:
user = User.objects.get(username=username)
user = self.update_user(user, session_info, attribute_mapping)
except User.DoesNotExist:
logger.error('The user "%s" does not exist' % username)
pass
return user
def clean_username(self, username):
"""Performs any cleaning on the "username" prior to using it to get or
create the user object. Returns the cleaned username.
By default, returns the username unchanged.
"""
return username
def configure_user(self, user, session_info, attribute_mapping):
"""Configures a user after creation and returns the updated user.
By default, returns the user with his attributes updated.
"""
user.set_unusable_password()
user = self.update_user(user, session_info, attribute_mapping, force_save=True)
try:
profile = user.get_profile()
if profile is not None and hasattr(profile,'idp'):
profile.idp = session_info['issuer']
profile.save()
#auto-populate idp table
idp_object,created = IdentityProvider.objects.get_or_create(uri=profile.idp)
except Exception:
pass
return user
def update_user(self, user, session_info, attribute_mapping, force_save=False):
"""Update a user with a set of attributes and returns the updated user.
By default it uses a mapping defined in the settings constant
SAML_ATTRIBUTE_MAPPING. For each attribute, if the user object has
that field defined it will be set, otherwise it will try to set
it in the profile object.
"""
if not attribute_mapping:
return user
attributes = session_info['ava']
if not attributes:
logger.error('The attributes dictionary is empty')
try:
profile = user.get_profile()
except ObjectDoesNotExist:
profile = None
except SiteProfileNotAvailable:
profile = None
user_modified = False
profile_modified = False
for django_attr,saml_attrs in attribute_mapping.items():
try:
if hasattr(user, django_attr):
user_modified = self._set(user,django_attr,saml_attrs,attributes)
elif profile is not None and hasattr(profile, django_attr):
profile_modified = self._set(profile,django_attr,saml_attrs,attributes)
except KeyError:
# the saml attribute is missing
pass
if user_modified or force_save:
user.save()
if profile_modified or force_save:
profile.save()
return user
class TargetedUsernameSamlBackend(Saml2Backend):
def get_saml_user(self,session_info,attributes,attribute_mapping):
eptid = attributes.get('eduPersonTargetedID',None)
if eptid is not None:
try:
name_id_o = name_id_type__from_string(eptid)
return "%s!%s!%s" % (name_id_o.name_qualifier,name_id_o.sp_name_qualifier,name_id_o.text)
except Exception,ex:
logger.error(ex)
pass
username = None
print attribute_mapping
if attribute_mapping.has_key('username'):
for saml_attr in attribute_mapping['username']:
if attributes.has_key(saml_attr):
username = attributes[saml_attr][0]
if username is None:
return None
return username
#return "%s!%s!%s" % (session_info['issuer'],session_info.get('entity_id',""),username)
|