razorbacks / laravel-shibboleth
Enable basic Shibboleth support for Laravel 5.x
Installs: 1 394
Dependents: 0
Suggesters: 0
Security: 0
Stars: 10
Watchers: 4
Forks: 38
Open Issues: 5
Requires
- illuminate/support: 5.*
- laravel/framework: 5.4.* || 5.5.*
- mrclay/shibalike: 1.0.0
- tymon/jwt-auth: ^0.5.10
Requires (Dev)
- orchestra/testbench: 3.4.*
- phpunit/phpunit: ^6.0
This package is not auto-updated.
Last update: 2024-11-10 03:41:17 UTC
README
This package provides Shibboleth authentication for Laravel.
For development, it can emulate an IdP (via mrclay/shibalike).
Pre-Requisites
In order to use this plugin, we assume you already have a pre-existing Shibboleth SP and Shibboleth IdP configured. This does not (and will not) go into explaining how to set that up.
However, this might be helpful: https://github.com/razorbacks/ubuntu-authentication/tree/master/shibboleth
Installation
Use composer to require the latest release into your project:
composer require razorbacks/laravel-shibboleth
If you're running Laravel >= 5.5, then you can skip this step, otherwise
you will need to manually register the service provider in your config/app.php
file within the Providers
array.
StudentAffairsUwm\Shibboleth\ShibbolethServiceProvider::class,
If you you would like to use the emulated IdP via shibalike, then you will need to manually register it on any version - this is not automatically loaded even in Laravel 5.5.
StudentAffairsUwm\Shibboleth\ShibalikeServiceProvider::class,
Note that the password is the same as the username for shibalike.
Publish the default configuration file:
php artisan vendor:publish --provider="StudentAffairsUwm\Shibboleth\ShibbolethServiceProvider"
Optionally, you can also publish the views for the shibalike emulated IdP login:
php artisan vendor:publish --provider="StudentAffairsUwm\Shibboleth\ShibalikeServiceProvider"
University of Arkansas Users:
To also logout with the IdP, set the the following in
config/shibboleth.php
'idp_logout' => '/Shibboleth.sso/Logout?return=https%3A%2F%2Fidp.uark.edu%2Fidp%2Fexit.jsp',
Change the driver to shibboleth
in your config/auth.php
file.
'providers' => [ 'users' => [ 'driver' => 'shibboleth', 'model' => App\User::class, ], ],
Now users may login via Shibboleth by going to https://example.com/shibboleth-login
and logout using https://example.com/shibboleth-logout
so you can provide a custom link
or redirect based on email address in the login form.
@if (Auth::guest()) <a href="/shibboleth-login">Login</a> @else <a href="/shibboleth-logout"> Logout {{ Auth::user()->name }} </a> @endif
You may configure server variable mappings in config/shibboleth.php
such as
the user's first name, last name, entitlements, etc. You can take a look at them
by reading what's been populated into the $_SERVER
variable after authentication.
<?php print_r($_SERVER);
Mapped values will be synced to the user table upon successful authentication.
Declare Login Route
By convention, laravel assumes a route named login
exists
to redirect unauthenticated requests.
This package names its route shibboleth-login
because
it's designed to work alongside other authentication providers,
such as the default scaffolding provided by artisan.
But if this is the only authentication provider,
then that name will need to be manually declared. e.g.
Route::name('login')->get('/login', '\\'.Route::getRoutes()->getByName('shibboleth-login')->getActionName());
or more readable, but with a redirect:
Route::redirect('/login', '/shibboleth-login')->name('login');
See also: #10
Authorization
You can check for an entitlement string of the current user statically:
$entitlement = 'urn:mace:uark.edu:ADGroups:Computing Services:Something'; if (Entitlement::has($entitlement)) { // authorize something }
Now you can draft policies and gates around these entitlements.
Local Users
This was designed to work side-by-side with the native authentication system for projects where you want to have both Shibboleth and local users. If you would like to allow local registration as well as authenticate Shibboleth users, then use laravel's built-in auth system.
php artisan make:auth
JWTAuth Tokens
If you're taking advantage of token authentication with tymon/jwt-auth then
set this variable in your .env
JWTAUTH=true