deb-python-pysaml2/example
2016-09-23 08:12:58 +02:00
..
attributemaps Made the ADFS v1.x URIs lowercase to be consistent with the ADFS v2.x URIs 2013-07-26 11:07:54 -05:00
idp2 Use six instead of futures for PY3 compatibility. 2016-09-23 08:12:58 +02:00
idp2_repoze Reworked the security backend so you should now be able to use a HSM again for XML security. Support for non-XML crypto using HSMs are on the way. 2015-12-11 13:02:49 +01:00
sp-repoze Fix paramter passing in logging messages 2015-10-15 15:33:10 +02:00
sp-wsgi Deal with entity category (CoCo) that have more complex evaluation rules. 2016-05-16 20:48:56 +02:00
.gitignore Made it work better with Python3.5 2016-05-17 17:27:35 +02:00
all.sh fix #308: make all.sh and sp-wsgi examples work again 2016-01-29 11:23:09 +01:00
create_key.sh Various tweaks to example documentation & helpers. 2014-04-03 23:59:12 -04:00
README Various tweaks to example documentation & helpers. 2014-04-03 23:59:12 -04:00
requirements.txt Merge branch 'master' of https://github.com/its-dirg/pysaml2 2015-09-21 14:34:28 +02:00

This is a very simple setup just to check that all your gear are in order.

The setup consists of one IdP and one SP, in idp2/ and sp-wsgi/ respectively.

To run the setup do:

  ./all.sh start

and then use your favourite webbrowser to look at "http://localhost:8087/"

To shut it down do:

  ./all.sh stop

The IdP authenticates users using a dictionary built in to idp2/idp.py;
look for the dictionary called PASSWD inside that file.

Other metadata about the accounts (names, email addresses, etc) are
stored in idp2/idp_user.py.  (Note, not all accounts have all such data
defined.)

The username:password pairs in PASSWD:

haho0032:qwerty
roland:dianakra
babs:howes
upper:crust

The SP doesn't do anything but show you the information that the IdP sent.

Note, the listeners are all configured to bind to localhost (127.0.0.1) only.
If you want to be able to connect to them externally, grep "HOST = '127.0.0.1'"
example/*/*.py and replace 127.0.0.1 with 0.0.0.0 or a specific IP.

To make it easy, for me :-), both the IdP and the SP uses the same keys.
To generate new keys, run create_key.sh and follow its instructions.

There are alternate IdP and SP configs in idp2_repoze/ and sp-repoze/ that
are still in flux; do not use them unless you know what you are doing.