{"id":18457228,"url":"https://github.com/redsolution/django-openid-auth","last_synced_at":"2025-10-14T22:11:34.333Z","repository":{"id":136858623,"uuid":"1350398","full_name":"redsolution/django-openid-auth","owner":"redsolution","description":null,"archived":false,"fork":false,"pushed_at":"2011-02-10T12:01:38.000Z","size":490,"stargazers_count":1,"open_issues_count":0,"forks_count":1,"subscribers_count":9,"default_branch":"master","last_synced_at":"2025-08-23T22:00:19.278Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-2-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/redsolution.png","metadata":{"files":{"readme":"README.txt","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2011-02-10T12:00:44.000Z","updated_at":"2013-10-19T16:07:46.000Z","dependencies_parsed_at":"2023-06-25T23:36:11.883Z","dependency_job_id":null,"html_url":"https://github.com/redsolution/django-openid-auth","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/redsolution/django-openid-auth","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/redsolution%2Fdjango-openid-auth","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/redsolution%2Fdjango-openid-auth/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/redsolution%2Fdjango-openid-auth/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/redsolution%2Fdjango-openid-auth/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/redsolution","download_url":"https://codeload.github.com/redsolution/django-openid-auth/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/redsolution%2Fdjango-openid-auth/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279021742,"owners_count":26087053,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-14T02:00:06.444Z","response_time":60,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-11-06T08:13:46.964Z","updated_at":"2025-10-14T22:11:34.312Z","avatar_url":"https://github.com/redsolution.png","language":"Python","readme":"= Django OpenID Authentication Support =\n\nThis package provides integration between Django's authentication\nsystem and OpenID authentication.  It also includes support for using\na fixed OpenID server endpoint, which can be useful when implementing\nsingle signon systems.\n\n\n== Basic Installation ==\n\n 1. Install the Jan Rain Python OpenID library.  It can be found at:\n\n        http://openidenabled.com/python-openid/\n\n    It can also be found in most Linux distributions packaged as\n    \"python-openid\".  You will need version 2.2.0 or later.\n\n 2. Add 'django_openid_auth' to INSTALLED_APPS for your application.\n    At a minimum, you'll need the following in there:\n\n        INSTALLED_APPS = (\n            'django.contrib.auth',\n            'django.contrib.contenttypes',\n            'django.contrib.sessions',\n            'django_openid_auth',\n        )\n\n 3. Add 'django_auth_openid.auth.OpenIDBackend' to\n    AUTHENTICATION_BACKENDS.  This should be in addition to the\n    default ModelBackend:\n\n        AUTHENTICATION_BACKENDS = (\n            'django_openid_auth.auth.OpenIDBackend',\n            'django.contrib.auth.backends.ModelBackend',\n        )\n\n 4. To create users automatically when a new OpenID is used, add the\n    following to the settings:\n\n        OPENID_CREATE_USERS = True\n\n 5. To have user details updated from OpenID Simple Registration or\n    Attribute Exchange extension data each time they log in, add the\n    following:\n\n        OPENID_UPDATE_DETAILS_FROM_SREG = True\n\n 6. Hook up the login URLs to your application's urlconf with\n    something like:\n\n        urlpatterns = patterns('',\n            ...\n            (r'^openid/', include('django_openid_auth.urls')),\n            ...\n        )\n\n 7. Configure the LOGIN_URL and LOGIN_REDIRECT_URL appropriately for\n    your site:\n\n        LOGIN_URL = '/openid/login/'\n        LOGIN_REDIRECT_URL = '/'\n\n    This will allow pages that use the standard @login_required\n    decorator to use the OpenID login page.\n\n 8. Rerun \"python manage.py syncdb\" to add the UserOpenID table to\n    your database.\n\n\n== Configuring Single Sign-On ==\n\nIf you only want to accept identities from a single OpenID server and\nthat server implemnts OpenID 2.0 identifier select mode, add the\nfollowing setting to your app:\n\n    OPENID_SSO_SERVER_URL = 'server-endpoint-url'\n\nWith this setting enabled, the user will not be prompted to enter\ntheir identity URL, and instead an OpenID authentication request will\nbe started with the given server URL.\n\nAs an example, to use Launchpad accounts for SSO, you'd use:\n\n     OPENID_SSO_SERVER_URL = 'https://login.launchpad.net/'\n\n\n== Launchpad Teams Support ==\n\nThis library supports the Launchpad Teams OpenID extension.  Using\nthis feature, it is possible to map Launchpad team memberships to\nDjango group memberships.  It can be configured with:\n\n    OPENID_SSO_SERVER_URL = 'https://login.launchpad.net/'\n    OPENID_LAUNCHPAD_TEAMS_MAPPING = {\n        'launchpad-team-1': 'django-group-1',\n        'launchpad-team-2': 'django-group-2',\n        }\n\nWhen a user logs in, they will be added or removed from the relevant\nteams listed in the mapping.\n\nIf you have already django-groups and want to map these groups automatically, you can use the OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO variable in your settings.py file.\n\n\tOPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO = True\n\nIf you use OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO, the variable OPENID_LAUNCHPAD_TEAMS_MAPPING will be ignored.\nIf you want to exclude some groups from the auto mapping, use OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO_BLACKLIST. This variable has only an effect if OPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO is True.\n\n\tOPENID_LAUNCHPAD_TEAMS_MAPPING_AUTO_BLACKLIST = ['django-group1', 'django-group2']\n\t\n== External redirect domains ==\n\nBy default, redirecting back to an external URL after auth is forbidden. To permit redirection to external URLs on a separate domain, define ALLOWED_EXTERNAL_OPENID_REDIRECT_DOMAINS in your settings.py file as a list of permitted domains:\n\n\tALLOWED_EXTERNAL_OPENID_REDIRECT_DOMAINS = ['example.com', 'example.org']\n\nand redirects to external URLs on those domains will additionally be permitted.\n\n== Use as /admin (django.admin.contrib) login ==\n\nIf you require openid authentication into the admin application, add the following setting:\n\n        OPENID_USE_AS_ADMIN_LOGIN = True\n\nIt is worth noting that a user needs to be be marked as a \"staff user\" to be able to access the admin interface.  A new openid user will not normally be a \"staff user\".  \nThe easiest way to resolve this is to use traditional authentication (OPENID_USE_AS_ADMIN_LOGIN = False) to sign in as your first user with a password and authorise your \nopenid user to be staff.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fredsolution%2Fdjango-openid-auth","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fredsolution%2Fdjango-openid-auth","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fredsolution%2Fdjango-openid-auth/lists"}