Skip to content

Commit

Permalink
Merge pull request #547 from OCA/16.0
Browse files Browse the repository at this point in the history
Syncing from upstream OCA/server-auth (16.0)
  • Loading branch information
bt-admin authored Feb 14, 2025
2 parents 69678ab + fd7d564 commit 65a73df
Show file tree
Hide file tree
Showing 14 changed files with 402 additions and 23 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ addon | version | maintainers | summary
[auth_oauth_ropc](auth_oauth_ropc/) | 16.0.1.0.0 | | Allow to login with OAuth Resource Owner Password Credentials Grant
[auth_oidc](auth_oidc/) | 16.0.1.2.2 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider
[auth_oidc_environment](auth_oidc_environment/) | 16.0.1.0.0 | | This module allows to use server env for OIDC configuration
[auth_saml](auth_saml/) | 16.0.1.1.0 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication
[auth_saml](auth_saml/) | 16.0.1.2.0 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication
[auth_session_timeout](auth_session_timeout/) | 16.0.1.0.0 | | This module disable all inactive sessions since a given delay
[auth_signup_verify_email](auth_signup_verify_email/) | 16.0.1.0.1 | | Force uninvited users to use a good email for signup
[auth_user_case_insensitive](auth_user_case_insensitive/) | 16.0.1.0.0 | | Makes the user login field case insensitive
Expand Down
6 changes: 5 additions & 1 deletion auth_saml/README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ SAML2 Authentication
!! This file is generated by oca-gen-addon-readme !!
!! changes will be overwritten. !!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!! source digest: sha256:b6fc8ba1a52301c5f2f980399d52e2f034b959b353cf5035e6daa5239cd6e11f
!! source digest: sha256:6ce2abd5b7e87a50efc71e5dfce5693abeda4364442c429660d98398ec4dac69
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
.. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png
Expand Down Expand Up @@ -81,6 +81,10 @@ by using the query parameter ``disable_autoredirect``, as in
``https://example.com/web/login?disable_autoredirect=`` The login is also displayed if
there is an error with SAML login, in order to display any error message.

If you are using Office365 as identity provider, set up the federation metadata document
rather than the document itself. This will allow the module to refresh the document when
needed.

Usage
=====

Expand Down
2 changes: 1 addition & 1 deletion auth_saml/__manifest__.py
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

{
"name": "SAML2 Authentication",
"version": "16.0.1.1.0",
"version": "16.0.1.2.0",
"category": "Tools",
"author": "XCG Consulting, Odoo Community Association (OCA)",
"maintainers": ["vincent-hatakeyama"],
Expand Down
23 changes: 23 additions & 0 deletions auth_saml/i18n/auth_saml.pot
Original file line number Diff line number Diff line change
Expand Up @@ -192,6 +192,11 @@ msgstr ""
msgid "Identity Provider Metadata"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,field_description:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid "Identity Provider Metadata URL"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Identity Provider Settings"
Expand All @@ -202,6 +207,11 @@ msgstr ""
msgid "Identity Provider matching attribute"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "If you provider gives you a URL, use this field preferably"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__authn_requests_signed
msgid ""
Expand Down Expand Up @@ -353,6 +363,11 @@ msgstr ""
msgid "Providers"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Refresh"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_users_form
msgid "SAML"
Expand Down Expand Up @@ -436,6 +451,14 @@ msgstr ""
msgid "Signature Algorithm"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid ""
"Some SAML providers, notably Office365 can have a metadata document which "
"changes over time, and they provide a URL to the document instead. When this"
" field is set, the metadata can be fetched from the provided URL."
msgstr ""

#. module: auth_saml
#: model:ir.model,name:auth_saml.model_ir_config_parameter
msgid "System Parameter"
Expand Down
23 changes: 23 additions & 0 deletions auth_saml/i18n/es.po
Original file line number Diff line number Diff line change
Expand Up @@ -213,6 +213,11 @@ msgstr "Atributo de la respuesta del PDI"
msgid "Identity Provider Metadata"
msgstr "Metadatos del proveedor de identidad"

#. module: auth_saml
#: model:ir.model.fields,field_description:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid "Identity Provider Metadata URL"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Identity Provider Settings"
Expand All @@ -223,6 +228,11 @@ msgstr "Configuración del proveedor de identidades"
msgid "Identity Provider matching attribute"
msgstr "Atributo de coincidencia del proveedor de identidad"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "If you provider gives you a URL, use this field preferably"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__authn_requests_signed
msgid ""
Expand Down Expand Up @@ -384,6 +394,11 @@ msgstr "Nombre de Proveedor"
msgid "Providers"
msgstr "Proveedores"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Refresh"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_users_form
msgid "SAML"
Expand Down Expand Up @@ -467,6 +482,14 @@ msgstr "No está permitido registrarse en esta base de datos."
msgid "Signature Algorithm"
msgstr "Algoritmo de firma"

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid ""
"Some SAML providers, notably Office365 can have a metadata document which "
"changes over time, and they provide a URL to the document instead. When this "
"field is set, the metadata can be fetched from the provided URL."
msgstr ""

#. module: auth_saml
#: model:ir.model,name:auth_saml.model_ir_config_parameter
msgid "System Parameter"
Expand Down
23 changes: 23 additions & 0 deletions auth_saml/i18n/fr.po
Original file line number Diff line number Diff line change
Expand Up @@ -217,6 +217,11 @@ msgstr "Attribut de réponse du FI"
msgid "Identity Provider Metadata"
msgstr "Métadonnées du fournisseur d’identité"

#. module: auth_saml
#: model:ir.model.fields,field_description:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid "Identity Provider Metadata URL"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Identity Provider Settings"
Expand All @@ -227,6 +232,11 @@ msgstr "Paramètres du fournisseur d’identité"
msgid "Identity Provider matching attribute"
msgstr "Attribut de correspondance du fournisseur d’identité"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "If you provider gives you a URL, use this field preferably"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__authn_requests_signed
msgid ""
Expand Down Expand Up @@ -392,6 +402,11 @@ msgstr "Nom du fournisseur"
msgid "Providers"
msgstr "Fournisseurs"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Refresh"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_users_form
msgid "SAML"
Expand Down Expand Up @@ -475,6 +490,14 @@ msgstr "L’inscription n’est pas autorisée sur cette base de donnée."
msgid "Signature Algorithm"
msgstr "Algorithme de signature"

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid ""
"Some SAML providers, notably Office365 can have a metadata document which "
"changes over time, and they provide a URL to the document instead. When this "
"field is set, the metadata can be fetched from the provided URL."
msgstr ""

#. module: auth_saml
#: model:ir.model,name:auth_saml.model_ir_config_parameter
msgid "System Parameter"
Expand Down
35 changes: 29 additions & 6 deletions auth_saml/i18n/it.po
Original file line number Diff line number Diff line change
Expand Up @@ -176,8 +176,8 @@ msgstr "ID entità"
#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid ""
"Entity Identifier sent to the IDP. Often this would be the metadata URL, but"
" it can be any string."
"Entity Identifier sent to the IDP. Often this would be the metadata URL, but "
"it can be any string."
msgstr ""
"Identificatore entità inviato al IDP. Spesso è l'URL dei metadati, ma può "
"essere qualsiasi stringa."
Expand Down Expand Up @@ -210,6 +210,11 @@ msgstr "Attributo risposta IDP"
msgid "Identity Provider Metadata"
msgstr "Metadati provider identità"

#. module: auth_saml
#: model:ir.model.fields,field_description:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid "Identity Provider Metadata URL"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Identity Provider Settings"
Expand All @@ -220,11 +225,16 @@ msgstr "Impostazioni provider identità"
msgid "Identity Provider matching attribute"
msgstr "Attributo corrsipondenza provider identità"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "If you provider gives you a URL, use this field preferably"
msgstr ""

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__authn_requests_signed
msgid ""
"Indicates if the Authentication Requests sent by this SP should be signed by"
" default."
"Indicates if the Authentication Requests sent by this SP should be signed by "
"default."
msgstr ""
"ndica se la richiesta di atenticazione inviata da questo SP deve essere "
"firmata in modo predefinito."
Expand Down Expand Up @@ -381,6 +391,11 @@ msgstr "Nome provider"
msgid "Providers"
msgstr "Provider"

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_saml_provider_form
msgid "Refresh"
msgstr ""

#. module: auth_saml
#: model_terms:ir.ui.view,arch_db:auth_saml.view_users_form
msgid "SAML"
Expand Down Expand Up @@ -464,6 +479,14 @@ msgstr "Non è consentito iscriversi a questo database."
msgid "Signature Algorithm"
msgstr "Algoritmo firma"

#. module: auth_saml
#: model:ir.model.fields,help:auth_saml.field_auth_saml_provider__idp_metadata_url
msgid ""
"Some SAML providers, notably Office365 can have a metadata document which "
"changes over time, and they provide a URL to the document instead. When this "
"field is set, the metadata can be fetched from the provided URL."
msgstr ""

#. module: auth_saml
#: model:ir.model,name:auth_saml.model_ir_config_parameter
msgid "System Parameter"
Expand Down Expand Up @@ -491,8 +514,8 @@ msgstr "Token SAML attualmente in uso"
#: code:addons/auth_saml/models/res_users.py:0
#, python-format
msgid ""
"This database disallows users to have both passwords and SAML IDs. Error for"
" logins %s"
"This database disallows users to have both passwords and SAML IDs. Error for "
"logins %s"
msgstr ""
"Questo database nn consente agli utenti di avere sia password che ID SAML. "
"Errore per accessi %s"
Expand Down
Loading

0 comments on commit 65a73df

Please sign in to comment.