1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
namespace SilverStripe\ActiveDirectory\Authenticators; |
4
|
|
|
|
5
|
|
|
use SilverStripe\Control\Controller; |
6
|
|
|
use Silverstripe\Control\Director; |
7
|
|
|
use SilverStripe\Control\Session; |
8
|
|
|
use SilverStripe\Core\Config\Config; |
9
|
|
|
use SilverStripe\Core\Injector\Injector; |
10
|
|
|
use SilverStripe\Forms\Form; |
11
|
|
|
use SilverStripe\Security\Authenticator; |
12
|
|
|
|
13
|
|
|
/** |
14
|
|
|
* Class SAMLAuthenticator |
15
|
|
|
* |
16
|
|
|
* Authenticates the user against a SAML IdP via a single sign-on process. |
17
|
|
|
* It will create a {@link Member} stub record with rudimentary fields (see {@link SAMLController::acs()}) |
18
|
|
|
* if the Member record was not found. |
19
|
|
|
* |
20
|
|
|
* You can either use: |
21
|
|
|
* - just SAMLAuthenticator (which will trigger LDAP sync anyway, via LDAPMemberExtension::memberLoggedIn) |
22
|
|
|
* - just LDAPAuthenticator (syncs explicitly, but no single sign-on via IdP done) |
23
|
|
|
* - both, so people have multiple tabbed options in the login form. |
24
|
|
|
* |
25
|
|
|
* Both authenticators understand and collaborate through the GUID field on the Member. |
26
|
|
|
* |
27
|
|
|
* @package activedirectory |
28
|
|
|
*/ |
29
|
|
|
class SAMLAuthenticator extends Authenticator |
30
|
|
|
{ |
31
|
|
|
/** |
32
|
|
|
* @var string |
33
|
|
|
*/ |
34
|
|
|
private $name = 'SAML'; |
|
|
|
|
35
|
|
|
|
36
|
|
|
/** |
37
|
|
|
* @return string |
38
|
|
|
*/ |
39
|
|
|
public static function get_name() |
40
|
|
|
{ |
41
|
|
|
return Config::inst()->get('SilverStripe\\ActiveDirectory\\Authenticators\\SAMLAuthenticator', 'name'); |
42
|
|
|
} |
43
|
|
|
|
44
|
|
|
/** |
45
|
|
|
* @param Controller $controller |
46
|
|
|
* @return SAMLLoginForm |
47
|
|
|
*/ |
48
|
|
|
public static function get_login_form(Controller $controller) |
49
|
|
|
{ |
50
|
|
|
return new SAMLLoginForm($controller, 'LoginForm'); |
|
|
|
|
51
|
|
|
} |
52
|
|
|
|
53
|
|
|
/** |
54
|
|
|
* Sends the authentication process down the SAML rabbit hole. It will trigger |
55
|
|
|
* the IdP redirection via the 3rd party implementation, and if successful, the user |
56
|
|
|
* will be delivered to the SAMLController::acs. |
57
|
|
|
* |
58
|
|
|
* @param array $data |
59
|
|
|
* @param Form $form |
60
|
|
|
* @return bool|Member|void |
61
|
|
|
* @throws SS_HTTPResponse_Exception |
62
|
|
|
*/ |
63
|
|
|
public static function authenticate($data, Form $form = null) |
64
|
|
|
{ |
65
|
|
|
// $data is not used - the form is just one button, with no fields. |
66
|
|
|
$auth = Injector::inst()->get('SilverStripe\\ActiveDirectory\\Helpers\\SAMLHelper')->getSAMLAuth(); |
67
|
|
|
Session::set('BackURL', isset($data['BackURL']) ? $data['BackURL'] : null); |
68
|
|
|
Session::save(); |
69
|
|
|
$auth->login(Director::absoluteBaseURL().'saml/'); |
70
|
|
|
} |
71
|
|
|
} |
72
|
|
|
|
This check marks private properties in classes that are never used. Those properties can be removed.