Skip to content

Conversation

@bringsvor
Copy link

Add configurable feature to allow unsolicited SAML requests. This is for example useful to allow IdP to initiate.

@OCA-git-bot
Copy link
Contributor

Hi @vincent-hatakeyama,
some modules you are maintaining are being modified, check this out!

Copy link
Contributor

@vincent-hatakeyama vincent-hatakeyama left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the pull request.

A couple of additional review elements:

I also have a question about testing this: is there a way to test this feature with keycloak?

Comment on lines +140 to +145
allow_saml_unsolicited_req = fields.Boolean(
compute="_compute_allow_saml_unsolicited",
string="Allow Unsolicited Requests",
help="Allow IdP-initiated authentication requests",
)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why make this a company dependent value and not a provider dependant one?

If it is company dependent, it should only be in the configuration panel.

Comment on lines -222 to +228
"allow_unsolicited": False,
"allow_unsolicited": self.allow_saml_unsolicited_req,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I’m not confident the company is correct at this place, I believe it might be using the superuser company instead of any company.

@@ -0,0 +1,82 @@
# Copyright (C) 2010-2016, 2022 XCG Consulting <http://odoo.consulting>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
# Copyright (C) 2010-2016, 2022 XCG Consulting <http://odoo.consulting>
# Copyright (C) 2010-2016, 2022 XCG SAS <https://orbeet.io/>

No need to keep the copyright unless you copied something from another test.
You should add your name or your company’s.

Comment on lines +16 to +18
<!-- Allow IdP-initiated authentication without prior AuthnRequest from SP.
Security Note: Only enable if your IdP requires unsolicited requests
and you trust the IdP to properly validate user sessions. -->
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should not be a comment, it should be displayed in the configuration page.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants