Metadata-Version: 2.1
Name: djangosaml
Version: 1.0.1
Summary: Django SAML2 Authentication Made Easy. Easily integrate with SAML2 SSO identity providers like Okta
Home-page: https://djangosaml.readthedocs.io/en/latest/
Author: Fang Li & Suhail vs
Author-email: suhailvs@gmail.com
License: Apache 2.0
Keywords: Django SAML2 Authentication Made Easy,integrate with SAML2 SSO such as Okta easily
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Classifier: License :: OSI Approved :: Apache Software License
Classifier: Framework :: Django :: 4.2
Classifier: Framework :: Django :: 5.0
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Description-Content-Type: text/markdown
License-File: LICENSE
License-File: AUTHORS.rst
Requires-Dist: pysaml2>=4.5.0

# [Django SAML2][docs]


**Django SAML2 Authentication Made Easy.**

Full documentation for the project is available at [https://djangosaml.readthedocs.io/en/latest/][docs].


## Requirements

* Python 3.6+
* Django 5.0, 4.2, 4.1, 4.0, 3.2, 3.1, 3.0
* PySAML2 requires `xmlsec1` which can be installed using:
```
    apt install xmlsec1
    // or
    yum install xmlsec1
    // or
    brew install xmlsec1
```

## Installation

Install using `pip`...

    pip install djangosaml

Add `'djangosaml'` to your `INSTALLED_APPS` setting.
```python
INSTALLED_APPS = [
    ...
    'djangosaml',
]
```

Now update your root `urls.py`:

```python
import django_saml2_auth.views
urlpatterns = [
    ...
    path('djangosaml/', include('djangosaml.urls')),
    # The following line will replace the default user login with SAML2 (optional)
    # If you want to specific the after-login-redirect-URL, use parameter "?next=/the/path/you/want"
    path('login/', django_saml2_auth.views.signin),
]
```
Copy your `metadata.xml` into root directory.

In `settings.py`, add the SAML2 related configuration.

```python
SAML2_AUTH = {
    # Metadata is required, local file path
    'METADATA_LOCAL_FILE_PATH': BASE_DIR / 'metadata.xml',
    # Populates the Issuer element in authn request
    'ENTITY_ID': 'https://your-domain/saml2_auth/acs/',
    # Change Email/UserName/FirstName/LastName to corresponding SAML2 userprofile attributes.
    'ATTRIBUTES_MAP': { 
        'email': 'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress',
        'username': 'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier',
        'first_name': 'http://schemas.auth0.com/nickname',
        'last_name': 'http://schemas.auth0.com/nickname',
    },
}

```

In your SAML2 SSO identity provider, set the Single-sign-on URL and Audience
   URI(SP Entity ID) to:

```
https://your-domain/saml2_auth/acs/
```



[docs]: https://djangosaml.readthedocs.io/en/latest/
