-
Notifications
You must be signed in to change notification settings - Fork 84
Conversation
Whether or not we wait for node-saml/passport-saml#113 largely depends on whether or not multiple |
@vsimonian I think we should probably go ahead and merge this and release, then update when the passport-saml update is released. But first, I want to shake it down with my local setup. Mind doing a walkthrough on the setup + code review? I can make time later today or some time tomorrow. |
@vsimonian can you explain what https://github.com/anvilresearch/connect/pull/245/files#diff-6d4018922cfaa7ff5385670907dccb09R18 |
Also, are you able to resolve the conflicts on your end? Now that node-saml/passport-saml#113 is merged, I want go ahead and merge/release this... |
Hopefully conflicts should be resolved by now. |
@vsimonian good catch on the missing state. What's the purpose of hidden providers? This must be something you added when working on LDAP/AD, etc? I don't recall writing that code... |
Hidden providers was implemented for the CLI, allowing the password provider to be always enabled but not visible to allow authority users to continue to sign in for server administration. |
Know of a SAML service that's easy to integrate with for testing before I merge? |
http://stubidp.kentor.se should be the easiest to work with; you have complete control over the entire set of SAML claims that gets returned. |
@vsimonian mind writing up documentation for using this in a PR on connect-docs? |
Verified. Still needs docs. |
Implement SAML 2.0 protocol support
No description provided.