Bill Nottingham
bbf28f50bd
Allow mapping org auditors where we map org admins.
2019-08-13 11:32:35 -04:00
AlanCoding
8c2b3e9b84
Fix Django 2.0 deprecation warnings
2019-04-22 14:17:14 -04:00
beeankha
de34a64115
Basic License feature gating changes
2019-04-12 11:28:27 -04:00
Ryan Petrello
9bebf3217e
remove usage of import * and enforce F405 in our linter
...
import * is a scourge upon the earth
2019-02-13 17:10:33 -05:00
Ryan Petrello
f223df303f
convert py2 -> py3
2019-01-15 14:09:01 -05:00
Bill Nottingham
80abe4b937
Merge pull request #2387 from wenottingham/certificates-for-everyone
...
Require certpair for SAML.
2018-07-30 22:32:05 -04:00
chris meyers
3fcd1575c1
fix saml_admin_attr
2018-07-23 10:08:18 -04:00
Antony PERIGAULT
3b6ab6217b
New feature: Add SAML users as organization admins
2018-07-16 17:02:53 -04:00
Bill Nottingham
fa5132991f
Require certpair for SAML.
2018-07-05 11:12:00 -04:00
chris meyers
00cd6cb384
set better defaults for ldap
...
* LDAP params is a new field. It contains the kwargs that will be passed
to the python class specified by group type. The default for group type
is MemberDNGroupType. The required params are now those in the defaults.
2018-04-10 15:44:08 -04:00
chris meyers
dc46a732bc
fix ldap group type params label
...
* copy pasted ldap group type label and did no previously update. This
updates.
2018-03-28 09:12:06 -04:00
chris meyers
17795f82e8
more parameters
2018-03-21 09:13:08 -04:00
chris meyers
e3c362956d
add ldap group type like posixGroupType
...
* Adds pattern to easy add django-auth-ldap group types classes and to
pass parameters via AUTH_LDAP_GROUP_TYPE_PARAMS
* Adds new group type PosixUIDGroupType that accepts the attribute,
ldap_group_user_attr, on which to search for the user(s) in the group.
2018-03-21 09:13:08 -04:00
Jake McDermott
3d421cc595
Merge pull request #1078 from jakemcdermott/saml-ldap-updates
...
update configuration views for multiple LDAP servers, SAML 2FA, and SAML attribute mapping
2018-02-02 12:15:44 -05:00
John Eismeier
026cbeb018
Propose small spelling changes
2018-02-02 10:49:55 -05:00
Jake McDermott
44d223b6c9
add fields for team and organization saml attribute mappings
2018-01-30 00:27:51 -05:00
Chris Meyers
2b1d2b2976
Merge pull request #805 from chrismeyersfsu/feature-saml_import_attr
...
allow for saml attributes to define team and org
2018-01-15 11:57:05 -05:00
Chris Meyers
2ed97aeb0c
implement multiple ldap servers
2018-01-11 09:03:14 -05:00
Chris Meyers
9d58b15135
allow for saml attributes to define team and org
...
related to https://github.com/ansible/awx/issues/217
* Adds a configure tower in tower setting for users to configure a saml
attribute that tower will use to put users into teams and orgs.
2018-01-04 15:35:11 -05:00
Chris Meyers
1899795d08
Merge pull request #721 from chrismeyersfsu/feature-2_factor
...
allow support for saml + 2-factor
2017-11-29 14:54:57 -05:00
Bill Nottingham
8cede51bac
Remove stray quote from help string.
2017-11-28 14:32:39 -05:00
Chris Meyers
383c3cfe3e
add more saml fields
2017-11-28 13:49:35 -05:00
Chris Meyers
98f2d936d9
allow support for saml + 2-factor
...
* python-social-auth has SOCIAL_AUTH_SAML_SECURITY_CONFIG, which is
forwarded to python-saml settings configuration. This commit exposes
SOCIAL_AUTH_SAML_SECURITY_CONFIG to configure tower in tower to allow
users to set requestedAuthnContext, which will disable the requesting of
password type auth from the idp. Thus, it's up to the idp to choose
which auth to use (i.e. 2-factor).
2017-11-17 09:25:50 -05:00
Bill Nottingham
89d0f90e27
Add system auditor placeholder.
2017-11-01 10:46:39 -04:00
Julen Landa Alustiza
50b4002280
Fix broken link on LDAP group type help text
...
Signed-off-by: Julen Landa Alustiza <julen@zokormazo.info >
2017-09-25 23:43:41 +02:00
Aaron Tan
93341d6108
Revert "Add Tower Configuration setting AUTH_LDAP_GROUP_TYPE_MEMBER_ATTR"
2017-09-22 09:48:32 -04:00
Aaron Tan
d271757eba
Fix issue #114
...
Add Tower Configuration setting AUTH_LDAP_GROUP_TYPE_MEMBER_ATTR.
Signed-off-by: Aaron Tan <jangsutsr@gmail.com >
2017-09-19 11:15:45 -04:00
Aaron Tan
0121e5c22b
Update API help text for Tower configuration.
2017-08-18 15:02:12 -04:00
Aaron Tan
1e77f909a5
Force providing TACACSPLUS_SECRET when TACACSPLUS_HOST is set
2017-08-07 12:12:05 -04:00
Aaron Tan
c1e16c2f46
Merge pull request #73 from jangsutsr/6986_make_up_default_values_for_tower_config
...
Make up default values for tower configurations
2017-08-01 20:33:41 -04:00
Chris Meyers
ed8db2419e
make specific saml fields required
2017-07-31 09:28:52 -04:00
Aaron Tan
e8bd477f1e
Make up default values for tower configurations
2017-07-27 15:02:25 -04:00
Bill Nottingham
8482ed0432
Merge pull request #6818 from wenottingham/i-have-no-idea-what-im-doing
...
SAML configuration changes based on feedback from field.
2017-07-14 17:05:50 -04:00
Aaron Tan
c6ed70dd9d
Merge pull request #6928 from jangsutsr/6904_strengthen_attribute_check_for_tower_conf_validators
...
Strengthen attribute check for Tower configuration validations
2017-07-12 13:30:44 -04:00
Aaron Tan
3fe12e77b7
Merge pull request #6837 from jangsutsr/6107_ldap_setting_field_validator_updates
...
LDAP setting fields validation updates.
2017-07-12 12:09:48 -04:00
Aaron Tan
0138510936
Strengthen attribute check for Tower configuration validations
2017-07-07 11:44:56 -04:00
Bill Nottingham
f8515857b2
Remove assorted references to Tower.
...
Reword and remove references to Tower so they don't need parameterized.
2017-07-05 16:42:47 -04:00
Aaron Tan
2c69d433e9
LDAP setting fields validation updates.
2017-06-30 15:30:59 -04:00
Bill Nottingham
d0a19d4f21
Fix flake8
2017-06-29 18:04:38 -04:00
Bill Nottingham
b1e6264ac0
SAML configuration changes based on feedback from field.
...
1. Default SOCIAL_AUTH_SAML_SP_ENTITY_ID to the Tower hostname/base URL.
2. Refer to the callback URL as the Assertion Consumer Service, per common SAML notation.
2017-06-29 16:33:34 -04:00
Aaron Tan
5e398e4a25
Add Tower configuration category validation for TACACS+
2017-06-26 10:58:05 -04:00
Aaron Tan
2476c42b1e
Simplify Tower configuration help texts.
2017-05-24 09:51:54 -04:00
Aaron Tan
fd4aaa6ca9
Implement tacacs+ auth backend.
2017-04-12 16:19:42 -04:00
Aaron Tan
f2c99eeaf5
Basic tacacs+ CTiT.
2017-04-12 16:19:42 -04:00
Ryan Petrello
ec52e18be8
allow is_system_auditor with AUTH_LDAP_USER_FLAGS_BY_GROUP
...
see: #4959
2017-03-07 16:48:51 -05:00
Ryan Petrello
f4d55659f0
enforce a sane default OPT_NETWORK_TIMEOUT for LDAP connections
...
see: #5208
2017-02-07 12:37:05 -05:00
Ryan Petrello
5bd670291b
default certain LDAP settings to None instead of an empty string
...
Related: #5148 #4678
2017-02-02 13:06:59 -05:00
Ryan Petrello
0bcbaa5c86
allow certain LDAP settings fields to be nullable
...
necessary to completely resolve #4678
2017-01-24 09:31:44 -05:00
Chris Church
b947367606
Add default for ldap group type.
2016-12-14 11:54:50 -05:00
Chris Church
417d7c29ee
Allow SAML entity ID to be any string, not required to be a URL.
2016-12-06 12:56:25 -05:00