summaryrefslogtreecommitdiff
path: root/doc/examples/sp.rst
blob: fdbacda1b46533bce4bd5d4cfbef7999636ae445 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
.. _example_sp:

An extremly simple example of a SAML2 service provider.
=======================================================

How it works
************

A SP works with authentication and possibly attribute aggregation.
Both of these functions can be seen as parts of the normal Repoze.who
setup. Namely the Challenger, Identifier and MetadataProvider parts.

Normal for Repoze.who Identifier and MetadataProvider plugins are that
they place information in environment variables. The convention is to place
identity information in environ["repoze.who.identity"].
This is a dictionary with keys like 'login', and 'repoze.who.userid'.

The SP follows this pattern and places the information gathered from 
the IdP that handled the authentication and possible extra information
received from attribute authorities in the above mentioned dictionary under
the key 'user'.

So in environ["repoze.who.identity"] you will find a dictionary with 
attributes and values, the attribute names used depends on what's returned
from the IdP/AA. If there exists both a name and a friendly name, for
instance, the friendly name is used as the key.

Setup
*****

**sp-wsgi:**

* Go to the folder:
[your path]/pysaml2/example/sp-wsgi

* Take the file named sp_conf.py.example and rename it sp_conf.py

sp_conf.py is configured to run on localhost on port 8087. If you want to you could make the necessary changes before proceeding to the next step.

* In order to generate the metadata file open a terminal::

    cd [your path]/pysaml2/example/sp-wsgi
    make_metadata.py sp_conf.py > sp.xml


**sp-repoze:**

* Go to the folder:
[your path]/pysaml2/example/sp-repoze

* Take the file named sp_conf.py.example and rename it sp_conf.py

sp_conf.py is configured to run on localhost on port 8087. If you want to you could make the necessary changes before proceeding to the next step.

* In order to generate the metadata file open a terminal::

    cd [your path]/pysaml2/example/sp-repoze
    make_metadata.py sp_conf.py > sp.xml

Important files:

sp_conf.py
    The SPs configuration 
    
who.ini
    The repoze.who configuration file
    
Inside the folder named pki there are two files with certificates, mykey.pem with the private
certificate and mycert.pem with the public part.

I'll go through these step by step.

sp_conf.py
----------

The configuration is written as described in :ref:`howto_config`. It means among other
things that it's easily testable as to the correct syntax.

You can see the whole file in example/sp/sp_conf.py, here I will go through
it line by line::

        "service": ["sp"],

Tells the software what type of services the software is supposed to
supply. It is used to check for the 
completeness of the configuration and also when constructing metadata from
the configuration. More about that later. Allowed values are: "sp" 
(service provider), "idp" (identity provider) and "aa" (attribute authority).
::

        "entityid" : "urn:mace:example.com:saml:sp",
        "service_url" : "http://example.com:8087/",
        
The ID of the entity and the URL on which it is listening.::

        "idp_url" : "https://example.com/saml2/idp/SSOService.php",

Since this is a very simple SP it only need to know about one IdP, therefor there
is really no need for a metadata file or a WAYF-function or anything like that.
It needs the URL of the IdP and that's all.::

        "my_name" : "My first SP",
        
This is just for informal purposes, not really needed but nice to do::

        "debug" : 1,
        
Well, at this point in time you'd really like to have as much information
as possible as to what's going on, right ? ::

        "key_file" : "./mykey.pem",
        "cert_file" : "./mycert.pem",

The necessary certificates.::

        "xmlsec_binary" : "/opt/local/bin/xmlsec1",

Right now the software is built to use xmlsec binaries and not the python
xmlsec package. There are reasons for this but I won't go into them here.::

        "organization": {
            "name": "Example Co",
            #display_name
            "url":"http://www.example.com/",            
        },

Information about the organization that is behind this SP, only used when
building metadata. ::

        "contact": [{
            "given_name":"John",
            "sur_name": "Smith",
            "email_address": "john.smith@example.com",
            #contact_type
            #company
            #telephone_number
        }]

Another piece of information that only matters if you build and distribute
metadata.

So, now to that part. In order to allow the IdP to talk to you you may have
to provide the one running the IdP with a metadata file.
If you have a SP configuration file similar to the one I've walked you
through here, but with your information, you can make the metadata file
by running the make_metadata script you can find in the tools directory. 

Change directory to where you have the configuration file and do ::

    make_metadata.py sp_conf.py > metadata.xml
    


who.ini
-------
The file named who.ini is the repoze.who configuration file

I'm not going through the INI file format here. You should read
`Middleware Responsibilities <http://docs.repoze.org/who/2.0/middleware.html>`_ 
to get a good introduction to the concept.

The configuration of the pysaml2 part in the applications middleware are
first the special module configuration, namely::

    [plugin:saml2auth]
    use = s2repoze.plugins.sp:make_plugin
    saml_conf = sp_conf.py
    rememberer_name = auth_tkt
    debug = 1
    path_logout = .*/logout.*

Which contains a specification ("use") of which function in which module 
should be used to initialize the part. After that comes the name of the 
file ("saml_conf") that contains the PySaml2 configuration. The third line
("rememberer_name") points at the plugin that should be used to 
remember the user information.

After this, the plugin is referenced in a couple of places::

    [identifiers]
    plugins =
          saml2auth
          auth_tkt
          
    [authenticators]
    plugins = saml2auth

    [challengers]
    plugins = saml2auth

    [mdproviders]
    plugins = saml2auth

Which means that the plugin is used in all phases.

Run SP:
*******

Open a Terminal::

    cd [your path]/pysaml2/example/sp-wsgi
    python sp.py sp_conf

Note that you should not have the .py extension on the sp_conf.py while running the program

Now you should be able to open a web browser go to to service provider (if you didn't change sp_conf.py it should be: http://localhost:8087)

You should be redirected to the IDP and presented with a login screen.

You could enter Username:roland and Password:dianakra
All users are specified in idp.py in a dictionary named PASSWD

The application
---------------

The app is, as said before, extremely simple. The only thing that is connected to
the PySaml2 configuration is at the bottom, namely where the server is.
You have to ascertain that this coincides with what is specified in the 
PySaml2 configuration. Apart from that there really is nothing in 
application.py that demands that you use PySaml2 as middleware. If you 
switched to using the LDAP or CAS plugins nothing would change in the 
application. In the application configuration yes! But not in the application.
And that is really how it should be done.

There is one assumption, and that is that the middleware plugin that gathers
information about the user places the extra information in as a value on the
"user" property in the dictionary found under the key "repoze.who.identity"
in the environment.