Commit Graph

70 Commits

Author SHA1 Message Date
Bill Nottingham bbf28f50bd Allow mapping org auditors where we map org admins. 2019-08-13 11:32:35 -04:00
AlanCoding 8c2b3e9b84 Fix Django 2.0 deprecation warnings 2019-04-22 14:17:14 -04:00
beeankha de34a64115 Basic License feature gating changes 2019-04-12 11:28:27 -04:00
Ryan Petrello 9bebf3217e remove usage of import * and enforce F405 in our linter
import * is a scourge upon the earth
2019-02-13 17:10:33 -05:00
Ryan Petrello f223df303f convert py2 -> py3 2019-01-15 14:09:01 -05:00
Bill Nottingham 80abe4b937 Merge pull request #2387 from wenottingham/certificates-for-everyone
Require certpair for SAML.
2018-07-30 22:32:05 -04:00
chris meyers 3fcd1575c1 fix saml_admin_attr 2018-07-23 10:08:18 -04:00
Antony PERIGAULT 3b6ab6217b New feature: Add SAML users as organization admins 2018-07-16 17:02:53 -04:00
Bill Nottingham fa5132991f Require certpair for SAML. 2018-07-05 11:12:00 -04:00
chris meyers 00cd6cb384 set better defaults for ldap
* LDAP params is a new field. It contains the kwargs that will be passed
to the python class specified by group type. The default for group type
is MemberDNGroupType. The required params are now those in the defaults.
2018-04-10 15:44:08 -04:00
chris meyers dc46a732bc fix ldap group type params label
* copy pasted ldap group type label and did no previously update. This
updates.
2018-03-28 09:12:06 -04:00
chris meyers 17795f82e8 more parameters 2018-03-21 09:13:08 -04:00
chris meyers e3c362956d add ldap group type like posixGroupType
* Adds pattern to easy add django-auth-ldap group types classes and to
pass parameters via AUTH_LDAP_GROUP_TYPE_PARAMS
* Adds new group type PosixUIDGroupType that accepts the attribute,
ldap_group_user_attr, on which to search for the user(s) in the group.
2018-03-21 09:13:08 -04:00
Jake McDermott 3d421cc595 Merge pull request #1078 from jakemcdermott/saml-ldap-updates
update configuration views for multiple LDAP servers, SAML 2FA, and SAML attribute mapping
2018-02-02 12:15:44 -05:00
John Eismeier 026cbeb018 Propose small spelling changes 2018-02-02 10:49:55 -05:00
Jake McDermott 44d223b6c9 add fields for team and organization saml attribute mappings 2018-01-30 00:27:51 -05:00
Chris Meyers 2b1d2b2976 Merge pull request #805 from chrismeyersfsu/feature-saml_import_attr
allow for saml attributes to define team and org
2018-01-15 11:57:05 -05:00
Chris Meyers 2ed97aeb0c implement multiple ldap servers 2018-01-11 09:03:14 -05:00
Chris Meyers 9d58b15135 allow for saml attributes to define team and org
related to https://github.com/ansible/awx/issues/217

* Adds a configure tower in tower setting for users to configure a saml
attribute that tower will use to put users into teams and orgs.
2018-01-04 15:35:11 -05:00
Chris Meyers 1899795d08 Merge pull request #721 from chrismeyersfsu/feature-2_factor
allow support for saml + 2-factor
2017-11-29 14:54:57 -05:00
Bill Nottingham 8cede51bac Remove stray quote from help string. 2017-11-28 14:32:39 -05:00
Chris Meyers 383c3cfe3e add more saml fields 2017-11-28 13:49:35 -05:00
Chris Meyers 98f2d936d9 allow support for saml + 2-factor
* python-social-auth has SOCIAL_AUTH_SAML_SECURITY_CONFIG, which is
forwarded to python-saml settings configuration. This commit exposes
SOCIAL_AUTH_SAML_SECURITY_CONFIG to configure tower in tower to allow
users to set requestedAuthnContext, which will disable the requesting of
password type auth from the idp. Thus, it's up to the idp to choose
which auth to use (i.e. 2-factor).
2017-11-17 09:25:50 -05:00
Bill Nottingham 89d0f90e27 Add system auditor placeholder. 2017-11-01 10:46:39 -04:00
Julen Landa Alustiza 50b4002280 Fix broken link on LDAP group type help text
Signed-off-by: Julen Landa Alustiza <julen@zokormazo.info>
2017-09-25 23:43:41 +02:00
Aaron Tan 93341d6108 Revert "Add Tower Configuration setting AUTH_LDAP_GROUP_TYPE_MEMBER_ATTR" 2017-09-22 09:48:32 -04:00
Aaron Tan d271757eba Fix issue #114
Add Tower Configuration setting AUTH_LDAP_GROUP_TYPE_MEMBER_ATTR.

Signed-off-by: Aaron Tan <jangsutsr@gmail.com>
2017-09-19 11:15:45 -04:00
Aaron Tan 0121e5c22b Update API help text for Tower configuration. 2017-08-18 15:02:12 -04:00
Aaron Tan 1e77f909a5 Force providing TACACSPLUS_SECRET when TACACSPLUS_HOST is set 2017-08-07 12:12:05 -04:00
Aaron Tan c1e16c2f46 Merge pull request #73 from jangsutsr/6986_make_up_default_values_for_tower_config
Make up default values for tower configurations
2017-08-01 20:33:41 -04:00
Chris Meyers ed8db2419e make specific saml fields required 2017-07-31 09:28:52 -04:00
Aaron Tan e8bd477f1e Make up default values for tower configurations 2017-07-27 15:02:25 -04:00
Bill Nottingham 8482ed0432 Merge pull request #6818 from wenottingham/i-have-no-idea-what-im-doing
SAML configuration changes based on feedback from field.
2017-07-14 17:05:50 -04:00
Aaron Tan c6ed70dd9d Merge pull request #6928 from jangsutsr/6904_strengthen_attribute_check_for_tower_conf_validators
Strengthen attribute check for Tower configuration validations
2017-07-12 13:30:44 -04:00
Aaron Tan 3fe12e77b7 Merge pull request #6837 from jangsutsr/6107_ldap_setting_field_validator_updates
LDAP setting fields validation updates.
2017-07-12 12:09:48 -04:00
Aaron Tan 0138510936 Strengthen attribute check for Tower configuration validations 2017-07-07 11:44:56 -04:00
Bill Nottingham f8515857b2 Remove assorted references to Tower.
Reword and remove references to Tower so they don't need parameterized.
2017-07-05 16:42:47 -04:00
Aaron Tan 2c69d433e9 LDAP setting fields validation updates. 2017-06-30 15:30:59 -04:00
Bill Nottingham d0a19d4f21 Fix flake8 2017-06-29 18:04:38 -04:00
Bill Nottingham b1e6264ac0 SAML configuration changes based on feedback from field.
1. Default SOCIAL_AUTH_SAML_SP_ENTITY_ID to the Tower hostname/base URL.
2. Refer to the callback URL as the Assertion Consumer Service, per common SAML notation.
2017-06-29 16:33:34 -04:00
Aaron Tan 5e398e4a25 Add Tower configuration category validation for TACACS+ 2017-06-26 10:58:05 -04:00
Aaron Tan 2476c42b1e Simplify Tower configuration help texts. 2017-05-24 09:51:54 -04:00
Aaron Tan fd4aaa6ca9 Implement tacacs+ auth backend. 2017-04-12 16:19:42 -04:00
Aaron Tan f2c99eeaf5 Basic tacacs+ CTiT. 2017-04-12 16:19:42 -04:00
Ryan Petrello ec52e18be8 allow is_system_auditor with AUTH_LDAP_USER_FLAGS_BY_GROUP
see: #4959
2017-03-07 16:48:51 -05:00
Ryan Petrello f4d55659f0 enforce a sane default OPT_NETWORK_TIMEOUT for LDAP connections
see: #5208
2017-02-07 12:37:05 -05:00
Ryan Petrello 5bd670291b default certain LDAP settings to None instead of an empty string
Related: #5148 #4678
2017-02-02 13:06:59 -05:00
Ryan Petrello 0bcbaa5c86 allow certain LDAP settings fields to be nullable
necessary to completely resolve #4678
2017-01-24 09:31:44 -05:00
Chris Church b947367606 Add default for ldap group type. 2016-12-14 11:54:50 -05:00
Chris Church 417d7c29ee Allow SAML entity ID to be any string, not required to be a URL. 2016-12-06 12:56:25 -05:00