{"id":41363498,"url":"https://github.com/platform9/pf9-saml-auth","last_synced_at":"2026-01-23T08:10:27.908Z","repository":{"id":57452043,"uuid":"74042883","full_name":"platform9/pf9-saml-auth","owner":"platform9","description":"Pluggable library to authenticate with SAML IdP's \u0026 obtain OpenStack Keystone token","archived":false,"fork":false,"pushed_at":"2025-07-17T04:25:59.000Z","size":45,"stargazers_count":2,"open_issues_count":0,"forks_count":4,"subscribers_count":42,"default_branch":"master","last_synced_at":"2025-09-22T18:54:56.383Z","etag":null,"topics":["cli","openstack-keystone","saml2"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/platform9.png","metadata":{"files":{"readme":"README.rst","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2016-11-17T15:57:27.000Z","updated_at":"2022-02-02T09:20:13.000Z","dependencies_parsed_at":"2022-09-02T08:32:38.031Z","dependency_job_id":null,"html_url":"https://github.com/platform9/pf9-saml-auth","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"purl":"pkg:github/platform9/pf9-saml-auth","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/platform9%2Fpf9-saml-auth","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/platform9%2Fpf9-saml-auth/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/platform9%2Fpf9-saml-auth/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/platform9%2Fpf9-saml-auth/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/platform9","download_url":"https://codeload.github.com/platform9/pf9-saml-auth/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/platform9%2Fpf9-saml-auth/sbom","scorecard":{"id":737280,"data":{"date":"2025-08-11","repo":{"name":"github.com/platform9/pf9-saml-auth","commit":"be7d1185a4995fcdd2a72914a627767b9dbe0c7b"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":3.6,"checks":[{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Code-Review","score":1,"reason":"Found 4/29 approved changesets -- score normalized to 1","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Pinned-Dependencies","score":-1,"reason":"no dependencies found","details":null,"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Vulnerabilities","score":10,"reason":"0 existing vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 5 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}}]},"last_synced_at":"2025-08-22T16:14:03.283Z","repository_id":57452043,"created_at":"2025-08-22T16:14:03.283Z","updated_at":"2025-08-22T16:14:03.283Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28684015,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-23T05:48:07.525Z","status":"ssl_error","status_checked_at":"2026-01-23T05:48:07.129Z","response_time":59,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cli","openstack-keystone","saml2"],"created_at":"2026-01-23T08:10:26.546Z","updated_at":"2026-01-23T08:10:27.897Z","avatar_url":"https://github.com/platform9.png","language":"Python","readme":"pf9-saml-auth\n=============\n\npf9-saml-auth is a set of OpenStack Keystone authentication plugins for enabling\nfederated authentication against non-ECP compliant SAML identity providers.\n\nSupported providers\n-------------------\n\n- Microsoft AD FS\n- Okta_\n- Onelogin_\n\nInstallation\n------------\n\n.. code:: bash\n\n    pip install https://github.com/platform9/oktaauth/archive/1.0.zip\n    pip install https://github.com/platform9/pf9-saml-auth/archive/1.0.zip\n\n\nExample CLI Usage\n=================\n\nOpenStack RC\n------------\n\n.. code:: bash\n\n    export OS_AUTH_URL=\"https://\u003chostname\u003e/keystone/v3\"\n    export OS_REGION_NAME=\"\u003cregion\u003e\"\n    export OS_USERNAME=\"\u003cIdP username\u003e\"\n    export OS_PASSWORD=\"\u003cIdP password\u003e\"\n    export OS_TENANT_NAME=\"\u003ctenant\u003e\"\n    export OS_PROJECT_DOMAIN_ID=${OS_PROJECT_DOMAIN_ID:-\"default\"}\n    export OS_IDENTITY_API_VERSION=3\n    export OS_IDENTITY_PROVIDER=${OS_IDENTITY_PROVIDER:-\"IDP1\"}\n    export OS_PROTOCOL=saml2\n    export OS_AUTH_TYPE=v3pf9samlokta\n\nThen execute the **openstack** CLI utility in interactive mode.\n\n.. code:: bash\n\n    $ openstack\n    (openstack)\n    server list\n\n\nExample Python program\n----------------------\n\n.. code:: python\n\n    import pf9_saml_auth\n    from keystoneauth1 import session\n    from novaclient import client as nova_client\n\n\n    def main():\n        auth = pf9_saml_auth.V3Pf9SamlOkta(\n            auth_url='https://\u003chostname\u003e/keystone/v3',\n            username='\u003cIdP username\u003e',\n            password='\u003cIdP password\u003e',\n            protocol='saml2',\n            identity_provider='IDP1',\n            project_name='\u003ctenant\u003e',\n            project_domain_name='default',\n        )\n\n        # Create Keystone authentication session\n        sess = session.Session(auth=auth)\n\n        # Create OpenStack service clients\n        nova = nova_client.Client(2, session=sess)\n\n\n    if __name__ == '__main__':\n        main()\n\n\n.. _Okta: http://www.okta.com/\n.. _Onelogin: http://www.onelogin.com/\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fplatform9%2Fpf9-saml-auth","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fplatform9%2Fpf9-saml-auth","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fplatform9%2Fpf9-saml-auth/lists"}