Download the PHP package kingstarter/invoiceplane-saml without Composer
On this page you can find all versions of the php package kingstarter/invoiceplane-saml. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download kingstarter/invoiceplane-saml
More information about kingstarter/invoiceplane-saml
Files in kingstarter/invoiceplane-saml
Package invoiceplane-saml
Short Description A saml plugin for InvoicePlane 1.5
License MIT
Informations about the package invoiceplane-saml
InvoicePlane SAML Authentication Plugin
This package is planned as a plugin to integrate SAML to InvoicePlane 1. Using the package let InvoicePlane act as an SAML SP (Service Provider). An IDP integration is currently not planned.
Description
SAML generally implements SingleSignOn (SSO) and SingleLogout (SLO) between different web applications. This package allows the implementation of SingleSignOn. Though configurations of SingleLogout are available, the SLO part has not been tested and might therefore not work correctly.
Automatic account creation has been added as well. When signing in via the IDP with an unknown account an adminstator user is created using both the given name and email and some standard configurations.
Installation and configuration
Base for the package is not the zip-package of the website but the development stack from github. First load the git master branch from github. Then install the package using composer
:
Basically all that has to be done is calling the install script and configuring both the SP and the IDP for SAML authentication. The plugin install script will modify InvoicePlane to support SAML:
Configuring InvoicePlane as SP
After running the install script the general settings have been appended by a SAML entry. Login to InvoicePlane, go within system settings to the Saml settings. There are some sample settings given. Upon saving all settings will be added to the database. A metadata file is not needed.
Configuring the IDP
As the page address can be used, e.g. . The SAML-Response consumer URL (SP login destination) is the samlauth endpoint:
Certificates
Certificates can be added using the integration settings. Alternatively they should be placed within the /var/ip_certs
directory.
- SP Crt:
/var/ip_certs/ip-sp.crt
- SP Key:
/var/ip_certs/ip-sp.crt
- IDP Crt: Stored within database using the configuration page.
Troubleshooting
Note for CSRF protection
Within the samlauth API endpoint needs to be added within the array (should be done automatically by the install script). In case IP is blocking with an 403 forbidden error it might be necessary to check the config entry:
Contributors
- The package is redesigned using a fork of Trajches Kanboard SAMLAuth Plugin as model.