SAML: cleaning/hidding some unused parameters (bindings, index, protocol)

This commit is contained in:
Thomas CHEMINEAU 2010-03-22 17:47:59 +00:00
parent a99b604f1a
commit d434d9f2ec
6 changed files with 44 additions and 49 deletions

View File

@ -239,3 +239,12 @@ option
display:inline-block;
width:20px;
}
/* saml */
#content_samlAssertion table,
#content_samlService table
{
margin-left:auto;
margin-right:auto;
}

View File

@ -332,19 +332,19 @@ function authParams(id) {
}
});
formateSelect('authText',[
'Apache:Apache',
'CAS:Central Authentication Service (CAS)',
'DBI:Database (DBI)',
'LA:Liberty Alliance',
'LDAP:LDAP',
'Multi:Multi',
'Null:None',
'OpenID:OpenID',
'Proxy:Proxy',
'Remote:Remote',
'SAML:SAML v2',
'SSL:SSL',
'Twitter:Twitter'
'Apache=Apache',
'CAS=Central Authentication Service (CAS)',
'DBI=Database (DBI)',
'LA=Liberty Alliance',
'LDAP=LDAP',
'Multi=Multi',
'Null=None',
'OpenID=OpenID',
'Proxy=Proxy',
'Remote=Remote',
'SAML=SAML v2',
'SSL=SSL',
'Twitter=Twitter'
],t[0]);
display('authParams',lmtext(id));
}
@ -352,14 +352,14 @@ function userdbParams(id) {
currentId=id;
$('#authOptions').hide();
formateSelect('authText',[
'DBI:Database (DBI)',
'Env:Environment',
'LDAP:LDAP',
'Multi:Multi',
'Null:None',
'Proxy:Proxy',
'Remote:Remote',
'SAML:SAML v2'
'DBI=Database (DBI)',
'Env=Environment',
'LDAP=LDAP',
'Multi=Multi',
'Null=None',
'Proxy=Proxy',
'Remote=Remote',
'SAML=SAML v2'
],lmdata(id));
display('authParams',lmtext(id));
}
@ -418,9 +418,9 @@ function samlAssertion(id) {
}
$('#samlAssertionIndex').attr('value',t[1]);
formateSelect('samlAssertionBinding',[
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact',
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect'
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact=Artifact',
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST=HTTP POST',
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect=HTTP Redirect'
],t[2]);
$('#samlAssertionLocation').attr('value',t[3]);
display('samlAssertion',lmtext(id));
@ -460,8 +460,8 @@ function samlService(id) {
currentId=id;
var t=lmdata(id).split(';');
formateSelect('samlServiceBinding',[
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
'urn:oasis:names:tc:SAML:2.0:bindings:SOAP'
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect=HTTP Redirect',
'urn:oasis:names:tc:SAML:2.0:bindings:SOAP=SOAP'
],t[0]);
$('#samlServiceLocation').attr('value',t[1]);
$('#samlServiceResponseLocation').attr('value',t[2]);
@ -748,10 +748,11 @@ function downloadFile(id){
function formateSelect(id,values,selectedValue) {
var options='';
for(i=0;i<values.length;i++){
var t=values[i].split(':');
options+='<option value="'+t[0]+'"';
if(selectedValue==t[0]){options+=' selected';}
options+='>'+t[1]+'</option>';
var key=values[i].substring(0,values[i].indexOf('='));
var val=values[i].substring(values[i].indexOf('=')+1);
options+='<option value="'+key+'"';
if(selectedValue==key){options+=' selected';}
options+='>'+val+'</option>';
}
$('#'+id).empty().append(options);
}

View File

@ -316,11 +316,11 @@
<input id="samlAssertionDefaultOff" type="radio" name="boolean" value="0" /> <lang en="Off" fr="Désactivé"/>
</td>
</tr>
<tr>
<tr class="hidden">
<td><lang en="Index" fr="Index"/></td>
<td><input type="text" size="50" id="samlAssertionIndex" /></td>
</tr>
<tr>
<tr class="hidden">
<td><lang en="Binding" fr="Binding"/></td>
<td><select id="samlAssertionBinding"></select></td>
</tr>
@ -338,7 +338,7 @@
<!-- samlService -->
<div id="content_samlService" class="hidden">
<table>
<tr>
<tr class="hidden">
<td><lang en="Binding" fr="Binding"/></td>
<td><select id="samlServiceBinding"></select></td>
</tr>

View File

@ -11,6 +11,7 @@ use XML::LibXSLT;
use MIME::Base64;
use JSON;
use LWP::Simple;
use LWP::UserAgent;
use URI::Escape;
use Lemonldap::NG::Common::Safelib; #link protected safe Safe object

View File

@ -533,7 +533,6 @@ sub struct {
'samlSPSSODescriptor' => {
_nodes => [
qw(samlSPSSODescriptorAuthnRequestsSigned
samlSPSSODescriptorProtocolSupportEnumeration
samlSPSSODescriptorKeyDescriptorSigning
n:samlSPSSODescriptorSingleLogoutService
n:samlSPSSODescriptorAssertionConsumerService
@ -543,8 +542,6 @@ sub struct {
samlSPSSODescriptorAuthnRequestsSigned =>
'bool:/samlSPSSODescriptorAuthnRequestsSigned',
samlSPSSODescriptorProtocolSupportEnumeration =>
'text:/samlSPSSODescriptorProtocolSupportEnumeration',
samlSPSSODescriptorKeyDescriptorSigning =>
'filearea:/samlSPSSODescriptorKeyDescriptorSigning',
@ -595,7 +592,6 @@ sub struct {
samlIDPSSODescriptor => {
_nodes => [
qw(samlIDPSSODescriptorWantAuthnRequestsSigned
samlIDPSSODescriptorProtocolSupportEnumeration
samlIDPSSODescriptorKeyDescriptorSigning
n:samlIDPSSODescriptorSingleSignOnService
n:samlIDPSSODescriptorSingleLogoutService
@ -607,8 +603,6 @@ sub struct {
samlIDPSSODescriptorWantAuthnRequestsSigned =>
'bool:/samlIDPSSODescriptorWantAuthnRequestsSigned',
samlIDPSSODescriptorProtocolSupportEnumeration =>
'text:/samlIDPSSODescriptorProtocolSupportEnumeration',
samlIDPSSODescriptorKeyDescriptorSigning =>
'filearea:/samlIDPSSODescriptorKeyDescriptorSigning',
@ -961,7 +955,6 @@ sub testStruct {
samlOrganizationName => $testNotDefined,
samlOrganizationURL => $testNotDefined,
samlSPSSODescriptorAuthnRequestsSigned => $boolean,
samlSPSSODescriptorProtocolSupportEnumeration => $testNotDefined,
samlSPSSODescriptorKeyDescriptorSigning => $testNotDefined,
samlSPSSODescriptorSingleLogoutServiceHTTP => $testNotDefined,
samlSPSSODescriptorSingleLogoutServiceSOAP => $testNotDefined,
@ -974,7 +967,6 @@ sub testStruct {
samlSPSSODescriptorNameIDFormatPersistent => $boolean,
samlSPSSODescriptorNameIDFormatTransient => $boolean,
samlIDPSSODescriptorWantAuthnRequestsSigned => $boolean,
samlIDPSSODescriptorProtocolSupportEnumeration => $testNotDefined,
samlIDPSSODescriptorKeyDescriptorSigning => $testNotDefined,
samlIDPSSODescriptorSingleSignOnServiceHTTP => $testNotDefined,
samlIDPSSODescriptorSingleSignOnServiceSOAP => $testNotDefined,
@ -1114,8 +1106,6 @@ sub defaultConf {
samlOrganizationName => 'Example',
samlOrganizationURL => 'http://www.example.com',
samlSPSSODescriptorAuthnRequestsSigned => '0',
samlSPSSODescriptorProtocolSupportEnumeration =>
'urn:oasis:names:tc:SAML:2.0:protocol',
samlSPSSODescriptorKeyDescriptorSigning => '',
samlSPSSODescriptorSingleLogoutServiceHTTP =>
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;'
@ -1143,8 +1133,6 @@ sub defaultConf {
samlSPSSODescriptorNameIDFormatPersistent => '1',
samlSPSSODescriptorNameIDFormatTransient => '0',
samlIDPSSODescriptorWantAuthnRequestsSigned => '0',
samlIDPSSODescriptorProtocolSupportEnumeration =>
'urn:oasis:names:tc:SAML:2.0:protocol',
samlIDPSSODescriptorKeyDescriptorSigning => '',
samlIDPSSODescriptorSingleSignOnServiceHTTP =>
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;'

View File

@ -217,7 +217,6 @@ sub en {
samlSPSSODescriptor => 'Service Provider',
samlSPSSODescriptorAuthnRequestsSigned =>
'Signed Authentication Request',
samlSPSSODescriptorProtocolSupportEnumeration => 'Protocol',
samlSPSSODescriptorKeyDescriptorSigning => 'Signing Key',
samlSPSSODescriptorSingleLogoutService => 'Single Logout',
samlSPSSODescriptorSingleLogoutServiceHTTP => 'HTTP Service',
@ -235,7 +234,6 @@ sub en {
samlIDPSSODescriptor => 'Identity Provider',
samlIDPSSODescriptorWantAuthnRequestsSigned =>
'Signed Authentication Request',
samlIDPSSODescriptorProtocolSupportEnumeration => 'Protocol',
samlIDPSSODescriptorKeyDescriptorSigning => 'Clef de signature',
samlIDPSSODescriptorSingleSignOnService => 'Single Sign on',
samlIDPSSODescriptorSingleSignOnServiceHTTP => 'HTTP Service',
@ -431,7 +429,6 @@ sub fr {
samlSPSSODescriptor => 'Fournisseur de service',
samlSPSSODescriptorAuthnRequestsSigned =>
'Requête d\'authentification signé',
samlSPSSODescriptorProtocolSupportEnumeration => 'Protocole',
samlSPSSODescriptorKeyDescriptorSigning => 'Clef de signature',
samlSPSSODescriptorSingleLogoutService => 'Single Logout',
samlSPSSODescriptorSingleLogoutServiceHTTP => 'Service HTTP',
@ -449,7 +446,6 @@ sub fr {
samlIDPSSODescriptor => 'Fournisseur d\'identité',
samlIDPSSODescriptorWantAuthnRequestsSigned =>
'Requête d\'authentification signé',
samlIDPSSODescriptorProtocolSupportEnumeration => 'Protocole',
samlIDPSSODescriptorKeyDescriptorSigning => 'Clef de signature',
samlIDPSSODescriptorSingleSignOnService => 'Single Sign on',
samlIDPSSODescriptorSingleSignOnServiceHTTP => 'Service HTTP',