SATOSA icon indicating copy to clipboard operation
SATOSA copied to clipboard

Proxy translating between different authentication protocols (SAML2, OpenID Connect and OAuth2)

Results 90 SATOSA issues
Sort by recently updated
recently updated
newest added
trafficstars

previously backend threw KeyError for users with empty name, because `name` is not present in `atresp` at all and it is `None` in response from `/person` endpoint ### All Submissions:...

If Satosa is installed under a path which is not the root of the webserver (ie. "https://example.com/satosa"), then endpoint routing must take the base path into consideration. Some modules registered...

enhancement

I can't make service routing work when base_url contains a path, ie `BASE=https://example.com/satosa`. (I'm trying with an OIDC frontend and SAML2 backend.) The problem is that both backends register their...

The documentation for this project needs an overhaul. There isn't a lot of structure to the current documentation, it's very difficult to find how to configure the various frontend/backend plugins...

documentation

## Code Version 7.0.1 ## Expected Behavior email claim being part of userinfo ## Current Behavior email claim not part of userinfo ## Possible Solution ## Steps to Reproduce 1....

This patch adds an option to not only process the first ldap result, but all of them. This can be useful while trying to enrich the data e.g. with multiple...

This patch adds the option to override the search_filter in ldap with an own complex search_filter, because sometimes a single simple argument is not sufficient. ### All Submissions: * [x]...

This patch adds another option to the ldap connection. Next to the other pool connections, it is now possible to set the `pool_lifetime`. Some LDAP Server abandon connections after some...

### All Submissions: * [x] Have you checked to ensure there aren't other open [Pull Requests](../../pulls) for the same update/change? * [x] Have you added an explanation of what problem...

This PR fixes https://github.com/IdentityPython/SATOSA/issues/344 introducing the following paramenters to be optionally handled in the proxy global configuration. **Secure** Now can be disabled via `COOKIE_SECURE: no` in proxy_conf.yaml. Default: True that's...

next-release