summaryrefslogtreecommitdiff
path: root/setup.cfg
diff options
context:
space:
mode:
authorMarek Denis <marek.denis@cern.ch>2014-08-04 18:31:25 +0200
committerSteve Martinelli <stevemar@ca.ibm.com>2014-09-17 13:52:47 -0400
commitcbe8c0a178fd589a06657846157518b3ac70aada (patch)
tree8b572f76901dcaa8ac316d1c4410a3d192fd9a65 /setup.cfg
parent01cabf6bbbee8b5340295f3be5e1fa7111387e7d (diff)
downloadpython-keystoneclient-cbe8c0a178fd589a06657846157518b3ac70aada.tar.gz
SAML2 federated authentication for ADFS.
Authentication workflow for the Active Directory Federated Services (ADFS) by Microsoft is different from 'standard' ECP based one. This plugin allows for authentication and fetching security token with SAML2 assertion inside, sending to the Service Provide and retrieving an unscoped token. Change-Id: I588de1967a7fb92c5928686d092895847553923a Implements: blueprint add-saml2-cli-authentication
Diffstat (limited to 'setup.cfg')
-rw-r--r--setup.cfg2
1 files changed, 1 insertions, 1 deletions
diff --git a/setup.cfg b/setup.cfg
index db21d75..e88046e 100644
--- a/setup.cfg
+++ b/setup.cfg
@@ -36,7 +36,7 @@ keystoneclient.auth.plugin =
v3token = keystoneclient.auth.identity.v3:Token
v3unscopedsaml = keystoneclient.contrib.auth.v3.saml2:Saml2UnscopedToken
v3scopedsaml = keystoneclient.contrib.auth.v3.saml2:Saml2ScopedToken
-
+ v3unscopedadfs = keystoneclient.contrib.auth.v3.saml2:ADFSUnscopedToken
[build_sphinx]
source-dir = doc/source