扩展:SimpleSAMLphp
SimpleSAMLphp 发行状态: 稳定版 |
|
---|---|
实现 | 用户身份 |
描述 | PluggableAuth 扩展以使用SimpleSAMLphp提供身份验证。 |
作者 | Robert Vogel, Cindy Cicalese |
最新版本 | 7.0.1 (2023-06-12) |
兼容性政策 | master分支维持向后兼容。 |
MediaWiki | 1.35+ |
许可协议 | MIT授權條款 |
下載 | |
|
|
季度下載量 | 67 (Ranked 68th) |
前往translatewiki.net翻譯SimpleSAMLphp扩展 | |
問題 | 开启的任务 · 报告错误 |
The SimpleSAMLphp extension extends the PluggableAuth extension to provide authentication using SimpleSAMLphp. It is primarily designed to support SP-initiated authentication flows with just-in-time provisioning of user accounts.
安裝
- 下载文件,并将解压后的
SimpleSAMLphp
文件夹移动到extensions/
目录中。
开发者和代码贡献人员应从Git安装扩展,输入:cd extensions/
git clone https://gerrit.wikimedia.org/r/mediawiki/extensions/SimpleSAMLphp - 将下列代码放置在您的LocalSettings.php 的底部:
wfLoadExtension( 'SimpleSAMLphp' );
- Install and configure SimpleSAMLphp
- Note that you will likely need to change the session store type in SimpleSAMLphp to something other than phpsession (see #Known bugs)
- Configure as required
- 完成 – 在您的wiki上导航至Special:Version,以验证已成功安装扩展。
配置
Values must be provided for the following mandatory configuration variables:
标记 | 默认 | 描述 |
---|---|---|
$wgSimpleSAMLphp_InstallDir
|
no default value | The path on the local server where SimpleSAMLphp is installed. |
In addition, the following optional configuration variables are provided:
Add the plugin to $wgPluggableAuth_Config
:
$wgPluggableAuth_Config['Log in using my SAML'] = [
'plugin' => 'SimpleSAMLphp',
'data' => [
'authSourceId' => 'default-sp',
'usernameAttribute' => 'username',
'realNameAttribute' => 'name',
'emailAttribute' => 'email'
]
];
Fields for data
All versions
Field name | Default | Description |
---|---|---|
authSourceId
|
no default value | The AuthSourceId to be used for authentication. |
usernameAttribute
|
no default value | The name of the attribute to be used for the user's username (by default the username is lowercased, see below if it is not desired). |
realNameAttribute
|
no default value | The name of the attribute(s) to be used for the user's real name. This may be a single attribute name or an array of attribute names. In the latter case, the attribute values will be concatenated with spaces between them to form the value for the user's real name. |
emailAttribute
|
no default value | The name of the attribute to be used for the user's email address. |
userinfoProviders
|
[ 'username' => 'username', 'realname' => 'realname', 'email' => 'email']
|
|
attributeProcessors
|
[
"...\\MapGroups::factory" ] |
This can be used to set up the group synchronization mechanism and to add processing of arbitrary SAML response data. Example see below. The factory callback has the following signature:
callback(
\User $user,
array $attributes,
\Config $config,
SimpleSAML\Auth\Simple $saml )
: MediaWiki\Extension\SimpleSAMLphp\IAttributeProcessor
|
Prior to version 7.0.0
In version 7.0.0, support for group mapping was moved to PluggableAuth with slight changes in syntax. For information on configurating group synchronization in version 7.0.0 and later, see the PluggableAuth documentation.
Field name | Default | Description |
---|---|---|
mapGroups_Map
|
[] | Mapping from SAML attributes to MediaWiki groups of the form:
No group mapping is performed if |
syncAllGroups_GroupAttributeName
|
"groups" | If configured to use "SyncAllGroups", this SAML attribute will be read out |
syncAllGroups_GroupNameModificationCallback
|
null | If configured to use "SyncAllGroups", this can be used to change/normalize the groups coming from the IdP. Example see below. |
syncAllGroups_LocallyManaged
|
[ "sysop" ] | If configured to use "SyncAllGroups", these local user groups will not be influenced by what is set in the SAML response |
groupAttributeDelimiter
|
null | If the IdP returns the list of groups in a single string (e.g. "saml attribute" => [ "group 1,group 2,group 3" ] instead of "saml attribute" => [ "group 1", "group 2", "group 3" ] ) this value can be set to split up the string. Be aware that in this case only the first element of the SAML attribute value is being evaluated. This setting applies to both group synchronization mechanisms "MapGroups" and "SyncAllGroups"
|
Do not lowercase usernames
By default, usernames are lowercased. The original case can be kept by setting:
$wgPluggableAuth_Config['Log in using my SAML'] = [
'plugin' => 'SimpleSAMLphp',
'data' => [
// ...
'userinfoProviders' => [
'username' => 'rawusername'
]
]
];
定义用户信息提供者
If you want to modify any of the fields username
, realname
or email
before login, for instance, if your SAML source does not provide an explicit username attribute and you want to use the email address without the domain for the username, you can configure a custom callback for $wgSimpleSAMLphp_MandatoryUserInfoProviderFactories
.
To create the object a valid ObjectFactory specification must be configured.
For simple usecases one can use MediaWiki\Extension\SimpleSAMLphp\UserInfoProvider\GenericCallback
, assuming your email attribute is called mail
(if it's called something else, change the two instances of $attributes['mail']
to $attributes['YourEmailAttributeName']
):
$wgSimpleSAMLphp_MandatoryUserInfoProviders['myusername'] = [
'factory' => function() {
return new \MediaWiki\Extension\SimpleSAMLphp\UserInfoProvider\GenericCallback( function( $attributes ) {
$mailAttribute = 'mail';
if ( !isset( $attributes[$mailAttribute] ) ) {
throw new Exception( 'missing email address' );
}
$parts = explode( '@', $attributes[$mailAttribute][0] );
return strtolower( $parts[0] );
} );
}
];
Make sure to also set myusername
in the userinfoProviders
of the data
field:
$wgPluggableAuth_Config['Log in using my SAML'] = [
'plugin' => 'SimpleSAMLphp',
'data' => [
// ...
'userinfoProviders' => [
'username' => 'myusername'
]
]
];
Username using real name
The SimpleSAMLphp extension does not by default support concatenating multiple attributes to create a username. Below is an example of a custom provider that uses the given name and surname attributes. This is suitable for Microsoft Entra ID use cases, but can easily be adapted to other cases by changing the given name and surname attributes.
$wgSimpleSAMLphp_MandatoryUserInfoProviders['myusername'] = [
'factory' => function() {
return new \MediaWiki\Extension\SimpleSAMLphp\UserInfoProvider\GenericCallback( function( $attributes ) {
$givenNameAttribute = 'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname';
$surnameAttribute = 'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname';
if ( empty( $attributes[$givenNameAttribute] ) || empty( $attributes[$surnameAttribute] ) ) {
throw new Exception( 'Missing given name and/or surname attributes in SAML assertion.' );
}
return $attributes[$givenNameAttribute][0] . ' ' . $attributes[$surnameAttribute][0];
} );
}
];
$wgPluggableAuth_Config['Log in using my SAML'] = [
'plugin' => 'SimpleSAMLphp',
'data' => [
// ...
'userinfoProviders' => [
'username' => 'myusername'
]
]
];
Group mapping (Prior to version 7.0.0)
In version 7.0.0, support for group mapping was moved to PluggableAuth with slight changes in syntax. For information on configurating group synchronization in version 7.0.0 and later, see the PluggableAuth documentation.
Use case: your SAML IdP reads groups from LDAP or Database and stores this information inside an attribute of the SAML response. You want to use this to map MediaWiki groups to users belonging to some known groups given by your IdP.
Example:
- Your IdP sends an attribute named "groups" with a list of names like "administrator", "student", "teacher", ... in the SAML response after authentication.
- All users that have the value "administrator" in the "groups" attribute shall be mapped to the MediaWiki "sysop" group to give them admin rights within your MediaWiki instance.
- Create a group map in your LocalSettings.php as follows:
$wgSimpleSAMLphp_GroupMap = ['sysop' => ['groups' => ['administrator']]];
You can come up with rather complex mappings that fit your needs. If you have more than one attribute from SAML, just add it to the array with the array of values you like to map.
If a MediaWiki group does not exist, it will be created "on the fly" on first successful mapping of a user.
Group mapping #2
Since version 4.3 one can also configure an alternative group synchronization mechanism. Besides the default "MapGroups" one can use "SyncAllGroups", which takes all groups from the SAML response and assign the user to them.
To do so, add the following to the LocalSettings.php
:
$wgSimpleSAMLphp_AttributeProcessorFactories = [
"MediaWiki\\Extension\\SimpleSAMLphp\\AttributeProcessor\\SyncAllGroups::factory"
];
If the IdP returns group names that are not suitable for the wiki, one can set up a callback to modify the group names.
E.g. some IdP-Setups may return LDAP-DNs like "CN=Admin,OU=Groups,DC=SomeDomain". One could then specify in LocalSettings.php
:
$wgSimpleSAMLphp_SyncAllGroups_GroupNameModificationCallback = function ( $origGroupName ) {
return preg_replace( '#^CN=(.*?),OU=.*$#', '$1', $origGroupName );
};
Processing arbitrary data from the SAML response
The "attribute processors" can also be used to handle arbitrary data from the SAML response.
In this case one must first create a new PHP class that implements the MediaWiki\Extension\SimpleSAMLphp\IAttributeProcessor
interface.
For convenience the base class MediaWiki\Extension\SimpleSAMLphp\AttributeProcessor\Base
can be used, which has a proper factory callback and constructor implemented. An example
use MediaWiki\Extension\SimpleSAMLphp\AttributeProcessor\Base;
class SyncLanguage extends Base {
public function run() {
//Set gender on $this->user from a value in $this->attributes
}
}
It then needs to be instantiated by using the $wgSimpleSAMLphp_AttributeProcessors
.
5.0
, this used to be $wgSimpleSAMLphp_AttributeProcessorFactories
.Compatibility
MediaWiki Core | 扩展:PluggableAuth | Extension:SimpleSAMLphp | SimpleSAMLphp (ServiceProvider / library) | Notes |
---|---|---|---|---|
1.39.5 | 7.0 | 7.0 | 2.1.1 (minimum PHP version required is PHP 8.0) | OK |
1.39.3 | 7.0 | 7.0 | 2.0.2 | OK |
1.39.3 | 7.0-dev | 7.0-dev | 1.19.6 | OK |
1.39.3 | 6.2 | 5.0.1 | 1.18.4 | Error |
1.39 | 6.1 | 5.0 | 2.0.0-rc1 | OK |
1.39 | 6.1 | 5.0 | 1.19.6 | OK |
1.39 | 6.1 | 5.0 | 1.18.8 | OK |
1.35 | 5 | 4.0 | 1.18.8 | OK |
发行说明
- Version 7.0.0
- Made compatible with PluggableAuth 7.0.0
- Use new PluggableAuth group population framework; supports retrieval of attributes including groups
- Code improvements
- Bug fixes:
- T305031: Error when logging out via API
- Version 5.0.1
- Fix group sync
- Version 5.0.0
- Stable release
- Version 5.0.0-beta
- Add compatibility to PluggableAuth version 6
- Version 4.5.2
- fixed bug: Groups are not removed in MW if the attribute is not existing (T246351)
- Version 4.5.1
- fixed warning: $wgSimpleSAMLphp_GroupMap is not an array
- improved loading UserInfo and Groups
- improved tests
- Version 4.5
- added support for custom user info providers
- updated to manifest version 2
- Version 4.4
- Fixed signature of populateGroups() function to match PluggableAuthPopulateGroups hook
- Version 4.3
- Added support for attribute processors
- Fixed bug in SAML attribute processing
- Added PSR-4 compatible namespace
- Dropped support for MW < 1.31
- Version 4.2
- Broke out username, real name, and email functions so they could be overridden in a subclass to allow custom rules
- Coding style and directories
- Improved debugging
- Version 4.1
- Implements PluggableAuthPopulateGroups hook to populate MediaWiki groups from SAML attributes. Thank you to Poikilotherm for contributing this functionality.
- Version 4.0
- Added optional error message to authenticate()
- Bumped version number to synchronize with PluggableAuth and OpenID Connect extensions
Debugging
SSO can be difficult to configure correctly, especially for first-time sysadmins tasked with connecting their new MediaWiki instance to the company's IdP. The PluggableAuth and SimpleSAMLphp extensions themselves are quite stable, so most issues are usually associated with configuration.
To start debugging, set $wgDebugLogFile to a filepath on your local system. You do not need to set $wgShowExceptionDetails to true; in fact, you probably shouldn't, due to security concerns.
Visit your wiki, and try logging in with PluggableAuth.
Once you have encountered your error, visit the debug file and look for lines that start with [PluggableAuth]
and [SimpleSAMLphp]
.
If there was an issue with authentication, the debug log will say [PluggableAuth] Authentication failed
somewhere.
The SimpleSAMLphp extension works like this:
- User clicks on SSO login button on wiki.
- User is taken to Special:PluggableAuthLogin. It detects the wiki is using Extension:SimpleSAMLphp. SimpleSAMLphp (the software, not the extension) detects no login session has been set yet.
- Special:PluggableAuthLogin calls Extension:SimpleSAMLphp's
authenticate()
function, which calls SimpleSAMLphp's API to begin the authentication process. - SimpleSAMLphp redirects user to the IdP's login page.
- After user successfully authenticates with IdP, it generates an assertion and redirects to your local SimpleSAMLphp instance's ACS (assertion consumer service) URL, which then redirects to the wiki's Special:PluggableAuthLogin.
- Special:PluggableAuthLogin now recognizes the session cookie and handles logging the user in.
If you are encountering a login redirect loop, the authentication process will never have a chance to log either an error or success message.
This indicates that the call to SimpleSAMLphp's requireAuth()
method never finishes, which means SimpleSAMLphp is trying to start the auth process all over again.
This is usually because it is not detecting the login session despite it being set.
Make sure you are not making common mistakes, such as leaving store.type in your SimpleSAMLphp configuration as phpsession instead of changing it to another method, or putting your SimpleSAMLphp instance on a different domain than your wiki without a proper proxy.
(For instance, if your SimpleSAMLphp instance is at the canonical domain saml.mywiki-sso.com
but your wiki is located at my.wiki
, the session will never be stored on my.wiki
and Special:PluggableAuthLogin will redirect back to the IdP instead of logging the user in, creating a login loop.)
If you are encountering an error message on Special:PluggableAuthLogin after a successful redirect from the IdP, there is probably a PluggableAuth/SimpleSAMLphp misconfiguration in your LocalSettings.php. Check to see if you properly configured your attributes. The attributes may sometimes need to be URLs (such as if you are using Azure Active Directory).
已知错误
Session handler collision between MediaWiki and SimpleSAML Service Provider
If you are using MediaWiki 1.27 or later with PluggableAuth 2.0 or later, problems have been observed when SimpleSAMLphp is configured to use phpsession for store.type. This may be due to phab:T147161. To fix this, use a different store type in the configuration of the SimpleSAMLphp software by adjusting simplesamlphp/config/config.php (see https://simplesamlphp.org/docs/stable/simplesamlphp-maintenance#section_2_3). For example, for SQLite, use:
'store.type' => 'sql', 'store.sql.dsn' => 'sqlite:/path/where/the/apache/user/can/write/sqlitedatabase.sq3',
For MySQL, use:
'store.type' => 'sql', 'store.sql.dsn' => 'mysql:host=xxx;port=xxx;dbname=xxx', 'store.sql.username' => 'xxx', 'store.sql.password' => 'xxx',
Logout error message
Since MediaWiki 1.35 by default (Skin "Vector") the logout is no longer performed by calling "Special:UserLogout", but by an XHR POST request. This is not compatible to how SAML works and will result in an error message prior to version 7.0.0 of this extension (see screenshot).
See also 任务 T305031
As a workaround in versions prior to 7.0.0, one can change the "Logout" link to point to "Special:Logout" again by adding
\Hooks::register(
'SkinTemplateNavigation::Universal',
function( \SkinTemplate $sktemplate, array &$links ) {
if ( !isset( $links['user-menu']['logout'] ) ) {
return;
}
$links['user-menu']['custom-logout'] = $links['user-menu']['logout'];
unset ( $links['user-menu']['logout'] );
}
);
to the LocalSettings.php
file.
Full Examples of Authentication and Authorization
Example for MW 1.35
- System RockyLinux8/RHEL8
- MediaWiki 1.35.11
- PluggableAuth 6.3
- SimpleSAMLphp 5.0.1
// Load and Configure PluggableAuth for SAML IDP/SSO
wfLoadExtension( "PluggableAuth" );
$wgPluggableAuth_EnableAutoLogin = true;
$wgPluggableAuth_EnableLocalLogin = false;
$wgPluggableAuth_EnableLocalProperties = false;
$wgGroupPermissions['*']['autocreateaccount'] = true;
// Load and Configure SimpleSAMLphp for SAML IDP/SSO
wfLoadExtension( "SimpleSAMLphp" );
$wgSimpleSAMLphp_InstallDir = '/opt/simplesamlphp';
// SAML AuthENTICATION (Tell Mediawiki "WHO" the user "IS")
$wgPluggableAuth_Config['Log in using SAML']['data'] += [ 'mapGroups_Map' => [
'sysop' => ['SAMLresponseMemberOfAttributeName' => [ 'StringFoundInYourSAMLresponseRoleAttributeValuesThatMeansSysop' ]],
'bureaucrat' => ['SAMLresponseMemberOfAttributeName' => [ 'StringFoundInYourSAMLresponseRoleAttributeValuesThatMeansBureaucrat' ]],
'interface-admin' => ['SAMLresponseMemberOfAttributeName' => [ 'StringFoundInYourSAMLresponseRoleAttributeValuesThatMeansInterfaceAdmin' ]],
'Viewer' => ['SAMLresponseMemberOfAttributeName' => [ 'StringFoundInYourSAMLresponseRoleAttributeValuesThatMeansViewer' ]],
'Contributor' => ['SAMLresponseMemberOfAttributeName' => [ 'StringFoundInYourSAMLresponseRoleAttributeValuesThatMeansContributor' ]]
]];
Example for MW 1.39
- System RockyLinux8/RHEL8
- SimpleSAMLphp (ServiceProvider / library) v2.2.1
- MediaWiki v1.39.7
- Extension:PluggableAuth v7.0.0
- Extension:SimpleSAMLphp v7.0.0
// Load and Configure PluggableAuth for SAML IDP/SSO
wfLoadExtension( "PluggableAuth" );
$wgPluggableAuth_EnableAutoLogin = true;
$wgPluggableAuth_EnableLocalLogin = false;
$wgPluggableAuth_EnableLocalProperties = false;
$wgGroupPermissions['*']['autocreateaccount'] = true;
// Load and Configure SimpleSAMLphp for SAML IDP/SSO
wfLoadExtension( "SimpleSAMLphp" );
$wgSimpleSAMLphp_InstallDir = '/opt/simplesamlphp';
// SAML AuthENTICATION (Tell Mediawiki "WHO" the user "IS")
$wgPluggableAuth_Config['Log in using SAML'] = [
'plugin' => 'SimpleSAMLphp',
'data' => [
'yourIDPauthSourceId' => 'default-sp',
'NameOfYourIDPusernameAttribute' => 'ValueOfYourIDPusernameAttribute',
'NameOfYourIDPrealNameAttribute' => 'ValueOfYourIDPrealNameAttribute',
'NameOfYourIDPemailAttribute' => 'ValueOfYourIDPemailAttribute'
]
];
// SAML AuthORIZATION (Tell Mediawiki "WHAT" roles the user "HAS")
$wgPluggableAuth_Config['Log in using SAML'] += [
'groupsyncs' => [ [ 'type' => 'mapped',
'map' => [
'sysop' => [ 'NameOfYourIDPMemberOfAttribute' => 'ValueInIDPMemberOfAttributeValuesThatMeansSysop' ],
'bureaucrat' => [ 'NameOfYourIDPMemberOfAttribute' => 'ValueInIDPMemberOfAttributeValuesThatMeansBureaucrat' ],
'interface-admin' => [ 'NameOfYourIDPMemberOfAttribute' => 'ValueInIDPMemberOfAttributeValuesThatMeansInterfaceAdmin' ],
'Contributor' => [ 'NameOfYourIDPMemberOfAttribute' => 'ValueInIDPMemberOfAttributeValuesThatMeansContributor' ],
'Viewer' => [ 'NameOfYourIDPMemberOfAttribute' => 'ValueInIDPMemberOfAttributeValuesThatMeansViewer' ],
]
] ]
];
此扩展在以下wiki农场/托管网站和/或软件包中提供: 這不是一份權威名單。 即使某些wiki农场/托管网站和/或软件包未在这里列出,它们也可能提供此扩展。 请检查你的wiki农场/托管网站或软件包以确认提供情况。 |
- PluggableAuth plugins/zh
- Stable extensions/zh
- User identity extensions/zh
- MIT licensed extensions/zh
- Extensions in Wikimedia version control/zh
- All extensions/zh
- Extensions included in BlueSpice/zh
- Extensions included in MyWikis/zh
- Extensions included in semantic::core/zh
- Extensions included in WikiForge/zh
- Extensions by MITRE/zh