summaryrefslogtreecommitdiff
path: root/setup.cfg
diff options
context:
space:
mode:
authorMarek Denis <marek.denis@cern.ch>2014-05-05 18:41:59 +0200
committerMarek Denis <marek.denis@cern.ch>2014-07-15 23:03:12 +0200
commit75ebf09187680c4c8f07ffbcf35d95bd16892f53 (patch)
tree04fb5a751769bfa14690577faf219722297ceb41 /setup.cfg
parent658b6900493c9b169dc0dc971e8a9a0f087a0df5 (diff)
downloadpython-keystoneclient-75ebf09187680c4c8f07ffbcf35d95bd16892f53.tar.gz
SAML2 ECP auth plugin
Auth plugin authenticating against remote SAML based Identity Providers. Upon successful authentication the plugin retrieves and stores unscoped token. Plugin object should be later used for scoping the token. Currently only HTTP BasicAuth Method is supported as an IdP authn method. Will not work for ADFS, as that has extensions to the document formats as well as a different workflow. Change-Id: Ieea40505a406bedf7219fa6f9e6cf29a45ad6e88 Implements: blueprint add-saml2-cli-authentication
Diffstat (limited to 'setup.cfg')
-rw-r--r--setup.cfg1
1 files changed, 1 insertions, 0 deletions
diff --git a/setup.cfg b/setup.cfg
index 3e55932..3d6b9af 100644
--- a/setup.cfg
+++ b/setup.cfg
@@ -36,6 +36,7 @@ keystoneclient.auth.plugin =
v2token = keystoneclient.auth.identity.v2:Token
v3password = keystoneclient.auth.identity.v3:Password
v3token = keystoneclient.auth.identity.v3:Token
+ v3unscopedsaml = keystoneclient.contrib.auth.v3.saml2:Saml2UnscopedToken
[build_sphinx]
source-dir = doc/source