def post(self, request): serializer = self.serializer_class(data=request.data) serializer.is_valid(raise_exception=True) attribute_mapping = get_custom_setting( 'SAML_ATTRIBUTE_MAPPING', {'uid': ('username', )}) create_unknown_user = get_custom_setting( 'SAML_CREATE_UNKNOWN_USER', True) conf = get_config(request=request) client = Saml2Client(conf, identity_cache=IdentityCache(request.session)) oq_cache = OutstandingQueriesCache(request.session) outstanding_queries = oq_cache.outstanding_queries() xmlstr = serializer.validated_data['SAMLResponse'] # process the authentication response try: response = client.parse_authn_request_response(xmlstr, BINDING_HTTP_POST, outstanding_queries) except Exception as e: if isinstance(e, StatusRequestDenied): return login_failed(_('Authentication request has been denied by identity provider. ' 'Please check your credentials.')) logger.error('SAML response parsing failed %s' % e) return login_failed(_('SAML2 response has errors.')) if response is None: logger.error('SAML response is None') return login_failed(_('SAML response has errors. Please check the logs')) if response.assertion is None: logger.error('SAML response assertion is None') return login_failed(_('SAML response has errors. Please check the logs')) session_id = response.session_id() oq_cache.delete(session_id) # authenticate the remote user session_info = response.session_info() if callable(attribute_mapping): attribute_mapping = attribute_mapping() if callable(create_unknown_user): create_unknown_user = create_unknown_user() user = auth.authenticate( session_info=session_info, attribute_mapping=attribute_mapping, create_unknown_user=create_unknown_user, ) if user is None: return login_failed(_('SAML2 authentication failed.')) registration_method = settings.WALDUR_AUTH_SAML2.get('name', 'saml2') if user.registration_method != registration_method: user.registration_method = registration_method user.save(update_fields=['registration_method']) # required for validating SAML2 logout requests auth.login(request, user) _set_subject_id(request.session, session_info['name_id']) logger.debug('User %s authenticated via SSO.', user) logger.debug('Sending the post_authenticated signal') post_authenticated.send_robust(sender=user, session_info=session_info) token = self.refresh_token(user) logger.info('Authenticated with SAML token. Returning token for successful login of user %s', user) event_logger.saml2_auth.info( 'User {user_username} with full name {user_full_name} logged in successfully with SAML2.', event_type='auth_logged_in_with_saml2', event_context={'user': user} ) return login_completed(token.key, 'saml2')
def assertion_consumer_service_view(request, config_loader_path=None, attribute_mapping=None, create_unknown_user=None): """SAML Authorization Response endpoint The IdP will send its response to this view, which will process it with pysaml2 help and log the user in using the custom Authorization backend djangosaml2.backends.Saml2Backend that should be enabled in the settings.py """ logger.debug('Assertion Consumer Service started') attribute_mapping = attribute_mapping or get_custom_setting( 'SAML_ATTRIBUTE_MAPPING', {'uid': ('username', )}) create_unknown_user = create_unknown_user or get_custom_setting( 'SAML_CREATE_UNKNOWN_USER', True) logger.debug('Assertion Consumer Service started') conf = get_config(config_loader_path, request) if 'SAMLResponse' not in request.POST: return HttpResponseBadRequest( 'Couldn\'t find "SAMLResponse" in POST data.') post = {'SAMLResponse': request.POST['SAMLResponse']} client = Saml2Client(conf, identity_cache=IdentityCache(request.session), logger=logger) oq_cache = OutstandingQueriesCache(request.session) outstanding_queries = oq_cache.outstanding_queries() # process the authentication response try: response = client.response(post, outstanding_queries) except Exception as e: logger.error('Error while authenticating. %s' % e) return HttpResponseRedirect('/saml2/login_error') if response is None: logger.error('SAML response is None') return HttpResponse("SAML response has errors. Please check the logs") session_id = response.session_id() oq_cache.delete(session_id) # authenticate the remote user session_info = response.session_info() if callable(attribute_mapping): attribute_mapping = attribute_mapping() if callable(create_unknown_user): create_unknown_user = create_unknown_user() logger.debug('Trying to authenticate the user') try: user = auth.authenticate(session_info=session_info, attribute_mapping=attribute_mapping, create_unknown_user=create_unknown_user) except Exception as e: logger.error('Error while authenticating. %s' % e) return HttpResponseRedirect('/saml2/login_error') if user is None: logger.error('The user is None') return HttpResponseRedirect('/saml2/login_error') #return HttpResponse("There were problems trying to authenticate the user") auth.login(request, user) _set_subject_id(request.session, session_info['name_id']) _set_saml2_auth_used(request.session, True) logger.debug('Sending the post_authenticated signal') post_authenticated.send_robust(sender=user, session_info=session_info) # redirect the user to the view where he came from #relay_state = request.POST.get('RelayState', '/login') relay_state = '/login' logger.debug('Redirecting to the RelayState: ' + relay_state) return HttpResponseRedirect(relay_state)