- OIDC frontend: Set minimum pyop version to v3.4.0 to ensure the needed methods are available
- docs: Fix orcid mapping in example internal_attributes
- OIDC frontend: support stateless code flow
- OIDC frontend: support Redis and session expiration
- orcid backend: allow family-name to be optional
- docs: add references to external contributions
- docs: update structure
- Reinitialize state if error occurs while loading state
- VirtualCoFrontend: Expose metadata endpoint and fix duplicate entity ids with multiple backends
- saml-backend: Allow request micro-services to affect the authn-context-class-ref
- saml-backend: Keep the last authority from the authenticating authority list
- minor fixes to the Apple and GitHub backends
- micro_services: example config for attribute_policy
- deps: bump minimum pyop version to 3.3.1
- docs: fixes for example files and config options
This is a breaking release, if you were using the openid_connect frontend. To keep compatibility:
- Install the proxy with
pip install satosa[pyop_mongo]
in order to fetch the right dependencies. - If you were not using the
client_db_path
option then set the new optionclient_db_uri
to the value ofdb_uri
.
- The internal data now hold the authenticating authority as part of the
AuthenticationInformation object
(
satosa.internal::AuthenticationInformation::authority
). - The Context object now holds a dictionary of query string params
(
context.qs_params
). - The Context object now holds a dictionary of http headers
(
context.http_headers
). - The Context object now holds a dictionary of server headers
(
context.server_headers
). - The Context object now holds the request method (
context.request_method
). - The Context object now holds the request uri (
context.request_uri
). - The Context object now holds a dictionary of http headers.
- frontends: the openid_connect frontend has a new configuration option
signing_key_id
to set thekid
field on the jwks endpoint. - frontends: the openid_connect frontend dependency
pyop
has been updated to work with both Redis and MongoDB. This changed how its dependencies are set. This is reflected in this package's new extras that can be set topyop_mongo
(to preserve the previous behaviour), orpyop_redis
. - frontends: the openid_connect frontend filters out unset claims.
- frontends: the openid_connect frontend has a new option
extra_id_token_claims
to define in the config per client which extra claims should be added to the ID Token to also work with those clients. - frontends: the openid_connect frontend has a new option
client_db_uri
to specify a database connection string for the client database. If unset,client_db_path
will be used to load the clients from a file. Previously, the optiondb_uri
was used to set the client database string. If you were relying on this behaviour, add theclient_db_uri
option with the same value asdb_uri
. - frontends: document the
client_db_path
option for openid_connect - frontends: the openid_connect frontend has a new configuration option
id_token_lifetime
to set the lifetime of the ID token in seconds. - frontends: the saml2 frontend has a new option
enable_metadata_reload
to expose an endpoint (/<module_name>/reload-metadata
) that allows external triggers to reload the frontend's metadata. This setting is disabled by default. It is up to the user to protect the endpoint if enabled. This feature requires pysaml2 > 7.0.1 - backends: the saml2 backend derives the encryption keys based on the
encryption_keypairs
configuration option, otherwise falling back to thekey_file
andcert_file
pair. This is now reflected in the internal pysaml2 configuration. - backends: the saml2 backend
sp
property is now of typesaml2.client::Saml2Client
instead ofsaml2.client_base::Base
. This allows us to call the higer level methodsaml2.client::Saml2Client::prepare_for_negotiated_authenticate
instead ofsaml2.client_base::Base::create_authn_request
to properly behave when needing to sign the AuthnRequest using the Redirect binding. - backends: the saml2 backend has a new option
enable_metadata_reload
to expose an endpoint (/<module_name>/reload-metadata
) that allows external triggers to reload the backend's metadata. This setting is disabled by default. It is up to the user to protect the endpoint if enabled. This feature requires pysaml2 > 7.0.1 - backends: new ReflectorBackend to help with frontend debugging easier and developing quicker.
- backends: the saml2 backend has a new configuration option
send_requester_id
to specify whether Scoping/RequesterID element should be part of the AuthnRequest. - micro-services: new DecideBackendByTargetIssuer micro-service, to select a target backend based on the target issuer.
- micro-services: new DiscoToTargetIssuer micro-service, to set the discovery protocol response to be the target issuer.
- micro-services: new IdpHinting micro-service, to detect if an idp-hinting feature has been requested and set the target entityID. Enabling this micro-service will result in skipping the discovery service and using the specified entityID as the IdP to be used. The IdP entityID is expected to be specified as a query-param value on the authentication request.
- micro-services: new AttributePolicy micro-service, which is able to force attribute policies for requester by limiting results to a predefined set of allowed attributes.
- micro-services: the PrimaryIdentifier micro-service has a new option
replace_subject_id
to specify whether to replace thesubject_id
with the constructed primary identifier. - micro-services: PrimaryIdentifier is set only if there is a value.
- micro-services: AddSyntheticAttributes has various small fixes.
- micro-services: ScopeExtractorProcessor can handle string values.
- dependencies: the
pystache
package has been replaced bychevron
, aspystache
seems to be abandoned and will not work with python v3.10 andsetuptools
v58 or newer. This package is a dependency of thesatosa.micro_services.attribute_generation.AddSyntheticAttributes
micro-service. - tests: MongoDB flags have been updated to cater for deprecated flags.
- docs: updated with information about the newly added micro-services.
- docs: various typo fixes.
- docs: various example configuration fixes.
- dependencies: Set minimum pysaml2 version to v6.5.1 to fix internal XML parser issues around the xs and xsd namespace prefixes declarations
- Add RegexSubProcessor attribute processor
- Fix SAMLVirtualCoFrontend metadata generation
- frontends: Deprecate the sign_alg and digest_alg configuration options on the saml2 frontend. Instead, use the signing_algorithm and digest_algorithm configuration options under the service/idp configuration path (not under service/idp/policy/default)
- backends: New backend to login with Apple ID
- dependencies: Set minimum pysaml2 version to v6.5.0 to make sure we get a version patched for CVE-2021-21238 and CVE-2021-21239
- build: Fix the CI base image
- tests: Fix entity-category checks
- docs: Document the sub_hash_salt configuration for the OIDC frontend
- examples: Add entityid_endpoint to the saml backend and frontend configuration
- examples: Fix the SAMLVirtualCoFrontend example configuration
- build: fix the CI release process
- Make the AuthnContextClassRefs available through the context
- Extend YAML parsing to understand the
!ENV
and!ENVFILE
tags, that read values or file contents from the environment - Add
satosa.yaml
module to handle YAML parsing - BREAKING: Remove previously deprecated configuration options:
hash
: use the hasher micro-service insteadUSER_ID_HASH_SALT
: use the hasher micro-service instead
- BREAKING: Remove previously deprecated classes:
SAMLInternalResponse
: usesatosa.internal.InternalData
insteadInternalRequest
: usesatosa.internal.InternalData
insteadInternalResponse
: usesatosa.internal.InternalData
insteadUserIdHashType
: use the hasher micro-service insteadUserIdHasher
: use the hasher micro-service instead
- BREAKING: Remove previously deprecated functions:
hash_attributes
: use the hasher micro-service insteadoidc_subject_type_to_hash_type
: usesatosa.internal.InternalData.subject_type
directlysaml_name_id_format_to_hash_type
: usesatosa.internal.InternalData.subject_type
directlyhash_type_to_saml_name_id_format
: usesatosa.internal.InternalData.subject_type
directly
- BREAKING: Remove previously deprecated modules:
src/satosa/internal_data.py
- BREAKING: Remove previously deprecated properties of the
saml2.internal.InternalData
class:name_id
: use usesubject_id
instead,user_id
: usesubject_id
instead,user_id_hash_type
: usesubject_type
instead,approved_attributes
: useattributes
instead,
- The cookie is now a session-cookie; To have the the cookie removed
immediately after use, the CONTEXT_STATE_DELETE configuration option should
be set to
True
- Create dedicated module to handle the proxy version
- Set the logger to log to stdout on DEBUG level by default
- Cleanup code around the wsgi calls
- micro-services: separate core from micro-services; drop checks for micro-services order; drop references to the Consent and AccountLinking micro-services
- micro-services: generate a random name for the pool name when REUSABLE client strategy is used for the ldap-attribute-store micro-service.
- docs: improve example proxy configuration
- docs: minor fixes/typos/etc
- build: update CI to use Travis-CI stages
- build: run tests for Python3.8
- build: tag docker image by commit, branch, PR number, version and "latest"
- Set the SameSite cookie attribute to "None"
- Add compatibility support for the SameSite attribute for incompatible browsers
- Set the Secure attribute of the cookie, always
- Set minimum pysaml2 version to make sure we get a version patched for CVE-2020-5390
- Fix typos and improve documetation
- Set the session-id when state is created
- Use LinkedIn API v2
- properly support mutliple values when converting internal attributes to OIDC claims. For all claims other than the ones define in OIDC core specification, the same values as the ones that have been set in the internal representation will be returned.
- improve log handling
- micro-services: Better handling of single-value attribute by LdapAttributeStore
Notice: Support for python 3.5 has been dropped.
- Add a dict-like interface to the internal objects
- Fix escaped chars in RegEx strings
- tests: fix warnings
- build: drop support for python 3.5
- misc: typos and formatting
- add options in saml-frontend to encrypt assertion from AuthnResponse
- use saml2.extension.mdui in place of saml2.extension.ui
- improve log handling
- remove logging around state-cookie loading
- print the absolute path of the configuration when failing to read it
- error out if no backend or frontend is configured
- frontends: oidc: support extra_scopes
- frontends: SAMLVirtualCoFrontend: add attribute scope
- backends: orcid: add state parameter to authorization request
- backends: orcid: fix read address attribute
- backends: orcid: fix authorization token header
- backends: bitbucket: new oauth2 backend
- backends: facebook: add more configuration options
- micro-services: improve the ldap_attribute_store
- build: refactor the start.sh docker script
- build: improve travis stages for new releases
- docs: add sequence diagrams for SAML-to-SAML flow
- docs: improve configuration docs
- docs: improve micro-service docs
- misc: correct typos
Trigger new version build to automatically upload to PyPI, docker hub and GitHub.
- Fix travis CI/CD configuration
Trigger new version build to automatically upload to PyPI and docker hub.
- Fix travis CI/CD configuration
Trigger new version build to automatically upload to PyPI and docker hub.
- Fix travis CI/CD configuration
- Fix typo in release instructions
Trigger new version build to automatically upload to PyPI and docker hub.
- Add release instructions
- Remove the warning filter; users must set the filter themselves
- Refactor internal data representation
- Deprecate satosa.internal_data module
- Use satosa.internal module
- Store the NameID value as satosa.internal.InternalData.subject_id
- Store the NameID nameid-format as satosa.internal.InternalData.subject_type
- Deprecate hash configuration option set in internal attributes
- Deprecate USER_ID_HASH_SALT configuration option
- Remove attribute hashing
- Deprecate UserIdHasher classes
- Deprecate UserIdHashType enum
- Support SAML NameID nameid-format emailAddress and unspecified
- Accept authn response with no NameID element
- Reset state after cookie decryption failure
- Add API to load data in Context object
- KEY_BACKEND_METADATA_STORE
- KEY_TARGET_ENTITYID
- KEY_FORCE_AUTHN
- KEY_MEMORIZED_IDP
- Add initial eIDAS support
- Support memoization of IdP selection when using MDQ
- plugins: Warn when AssertionConsumerService binding is HTTP-Redirect in the saml2 backend
- plugins: Add SAMLVirtualCoFrontend frontend
- plugins: Add extra_scopes configuration to support multiple scopes
- plugins: Use the latest pyop version
- plugins: Add primary identifier micro-service
- plugins: Misc fixes and improvents for LDAP attribute store micro-service
- plugins: Add verify_ssl option to OIDC backend
- plugins: Add hasher micro-service
- plugins: Add support in frontend for common domain cookie
- plugins: Add Ping frontend
- plugins: Fixes for the account linking micro-service
- tests: Misc improvements
- tests: Use latest pytest
- build: Set supported python versions to py35 py36 py37 and pypy3
- Dropped support for py34
- build: Set minimum supported pysaml2 version
- docs: Instructions to use with Apache and mod_wsgi
- docs: Add satosa-users mailing list information
- docs: Add ui_info in example configs
- docs: Add GÉANT contribution notice
- docs: Misc typos and improvements