https://github.com/johnygomez/krabicka
Simple User management POC
https://github.com/johnygomez/krabicka
Last synced: 3 months ago
JSON representation
Simple User management POC
- Host: GitHub
- URL: https://github.com/johnygomez/krabicka
- Owner: johnygomez
- License: mit
- Created: 2019-11-29T11:40:07.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2024-02-07T20:28:30.000Z (over 1 year ago)
- Last Synced: 2025-01-12T12:18:12.829Z (4 months ago)
- Language: Python
- Size: 14.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# How to start
1. Create new virtualenv (pyenv)
1. `pip install -r requirements.txt`
1. `python manage.py migrate`
1. `python manage.py runserver`This starts a webserver running on
# How to use
1. Create a superuser: `python manage.py createsuperuser`
1. Create an RSA Key: `python manage.py creatersakey`
1. Enter where you can login using your superuser credentials
1. Create new OID application in _OPENID CONNECT PROVIDER_ section, which will generate Client ID/Secret you can use in your client application
1. In your client application, point to `http://127.0.0.1:8000/openid` as oidc provider### LDAP
Application is configured to use test LDAP server
so out-of-box you should be able to login with e.g. `gauss:password`. After successful login, LDAP user is added
to Django User list. It's also possible to automatically populate groups and permissions.
Note: You can use the LDAP user to login to app, but not to admin site, for that you'd have to
set `AUTH_LDAP_USER_FLAGS_BY_GROUP` in .More info at
# Further extensions
It seems it's pretty straightforward to extend the solution by e.g.:
1. SAML connector
1. Being a Oauth2 provider
1. Custom per-entity permissions and rules
1. ...