mirror of
https://github.com/bringout/oca-server-auth.git
synced 2026-04-18 15:12:03 +02:00
Initial commit: OCA Server Auth packages (29 packages)
This commit is contained in:
commit
3ed80311c4
1325 changed files with 127292 additions and 0 deletions
|
|
@ -0,0 +1,21 @@
|
|||
To use this module, you need an IDP server, properly set up.
|
||||
|
||||
#. Configure the module according to your IdP’s instructions
|
||||
(Settings > Users & Companies > SAML Providers).
|
||||
#. Pre-create your users and set the SAML information against the user.
|
||||
|
||||
By default, the module let users have both a password and SAML ids.
|
||||
To increase security, disable passwords by using the option in Settings.
|
||||
Note that the admin account can still have a password, even if the option is activated.
|
||||
Setting the option immediately remove all password from users with a configured SAML ids.
|
||||
|
||||
If all the users have a SAML id in a single provider, you can set automatic redirection
|
||||
in the provider settings. The autoredirection will only be done on the active provider
|
||||
with the highest priority. It is still possible to access the login without redirection
|
||||
by using the query parameter ``disable_autoredirect``, as in
|
||||
``https://example.com/web/login?disable_autoredirect=`` The login is also displayed if
|
||||
there is an error with SAML login, in order to display any error message.
|
||||
|
||||
If you are using Office365 as identity provider, set up the federation metadata document
|
||||
rather than the document itself. This will allow the module to refresh the document when
|
||||
needed.
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
* `XCG Consulting <https://xcg-consulting.fr/>`__:
|
||||
|
||||
* Florent Aide <florent.aide@xcg-consulting.fr>
|
||||
* Vincent Hatakeyama <vincent.hatakeyama@xcg-consulting.fr>
|
||||
* Alexandre Brun
|
||||
* Houzéfa Abbasbhay <houzefa.abba@xcg-consulting.fr>
|
||||
* Szeka Wong <szeka.wong@xcg-consulting.fr>
|
||||
* Jeremy Co Kim Len <jeremy.cokimlen@vinci-concessions.com>
|
||||
* Jeffery Chen Fan <jeffery9@gmail.com>
|
||||
* Bhavesh Odedra <bodedra@opensourceintegrators.com>
|
||||
* `Tecnativa <https://www.tecnativa.com/>`__:
|
||||
|
||||
* Jairo Llopis
|
||||
* `GlodoUK <https://www.glodo.uk/>`__:
|
||||
|
||||
* Karl Southern
|
||||
* `TAKOBI <https://takobi.online/>`__:
|
||||
|
||||
* Lorenzo Battistini
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
Let users log into Odoo via an SAML2 identity provider.
|
||||
|
||||
This module allows to deport the management of users and passwords in an
|
||||
external authentication system to provide SSO functionality (Single Sign On)
|
||||
between Odoo and other applications of your ecosystem.
|
||||
|
||||
**Benefits**:
|
||||
|
||||
* Reducing the time spent typing different passwords for different accounts.
|
||||
|
||||
* Reducing the time spent in IT support for password oversights.
|
||||
|
||||
* Centralizing authentication systems.
|
||||
|
||||
* Securing all input levels / exit / access to multiple systems without
|
||||
prompting users.
|
||||
|
||||
* The centralization of access control information for compliance testing to
|
||||
different standards.
|
||||
|
|
@ -0,0 +1,12 @@
|
|||
16.0.1.2.1 (2025-05-13)
|
||||
~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
**Bugfixes**
|
||||
|
||||
- Avoid redirecting when there is a SAML error. ()
|
||||
|
||||
|
||||
16.0.1.0.0
|
||||
~~~~~~~~~~
|
||||
|
||||
Initial migration for 16.0.
|
||||
|
|
@ -0,0 +1,3 @@
|
|||
This addon requires the python module ``pysaml2``.
|
||||
|
||||
``pysaml2`` requires the binary ``xmlsec1`` (on Debian or Ubuntu you can install it with ``apt-get install xmlsec1``)
|
||||
|
|
@ -0,0 +1 @@
|
|||
* clean up ``auth_saml.request``
|
||||
|
|
@ -0,0 +1 @@
|
|||
Users can login with the configured SAML IdP with buttons added in the login screen.
|
||||
Loading…
Add table
Add a link
Reference in a new issue