Giuseppe De Marco
Giuseppe De Marco
This code MUST be improved https://github.com/UniversitaDellaCalabria/uniAuth/blob/dbc788a3658747d0745f9e6b28f15f6f0f27ee31/example/uniauth_unical_template/templates/saml_login.html#L127 @francesco-filicetti ^
name_id_format shoudl be handled and memorized in the sp config, in sso_init. Then refactored its pointers in AAcli (TargetedID: None when metadata have different structures) and in uniauth.views.IdPHandlerMixin class
the IdP should have a default attr policy and customized policy for each SP. example in settings.py, where `'' ` meand default, an entityID should apply only on the corresponding...
https://github.com/italia/spid-django/blob/119c0b44ae3bdc0310dff28ab427cebe490c1519/.github/workflows/python-app.yml#L47
Si prevede un pieno supporto per il profilo CIE, così realizzato: 1. endpoint metadata ad-hoc 2. authn request e acs endpoint uguali a quelli utilizzati da SPID Su authn request,...
given the need of some actors to customize the metadata to include other ACS and consequently some parameters of the AuthnRequest it is necessary to refactor the code for a...
some changes along the conversation with Dima and Michael Fraser at OWS 2024 in Rome
in GAIN-PoC the authz request may contain the parameter claim with "verified claims" as mandatory this implementation handles this with a workaround, because OpenID IDA is not supported in the...
The problem with authz request is due to the trailing param in the urls, example `"authorization_endpoint": "https://testidpui.integration.com/services/authz/00000001?n=true",` this forces me to handle this cases in the spid cie oidc implementation.
Supported in the code but it should be async with a not blocking loop https://github.com/italia/spid-cie-oidc-django/pull/249/files#diff-16a4a049e67ec9d46a9fa09e8a60e787d060b5a0bd597cb83fe16162af4710edR75