Changeset 8123 for trunk/ndg_oauth/ndg_oauth_server
- Timestamp:
- 24/08/12 16:23:04 (9 years ago)
- Location:
- trunk/ndg_oauth/ndg_oauth_server
- Files:
-
- 2 added
- 5 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/ndg_oauth/ndg_oauth_server
- Property svn:ignore
-
old new 1 1 authn 2 dist 3 ndg_oauth_server.egg-info
-
- Property svn:ignore
-
trunk/ndg_oauth/ndg_oauth_server/ndg/oauth/server/examples/README
r8109 r8123 3 3 ini file which sets the combination of middleware and config settings needed. 4 4 5 ceda/ - standard oauth usage 5 bearer_tok/ - uses string-based bearer tokens 6 6 7 7 slcs/ - short-lived credential service returns an X.509 cert as 8 8 token. It uses MyProxy as a backend service to issue certs. 9 A test MyProxyCA service is needed for this configured with 10 a custom PAM to allow of a global password. See: 9 A test MyProxyCA service (see 10 http://grid.ncsa.illinois.edu/myproxy/ca/) is needed for 11 this configured with a custom PAM to allow of a global 12 password. See: 11 13 http://ndg-security.ceda.ac.uk/browser/trunk/MashMyData/pam_credential_translation 12 14 13 15 shared_config/ - contains config files used by all example configurations 16 17 These examples should be used with their equivalent client apps in 18 ndg.oauth.client.examples -
trunk/ndg_oauth/ndg_oauth_server/ndg/oauth/server/examples/slcs/slcs_server_app.ini
r8121 r8123 27 27 OAuth2Authz 28 28 OAuth2ServerFilterApp 29 # OAuth2Server30 29 31 30 # This filter sets up a server side session linked to a cookie. The session -
trunk/ndg_oauth/ndg_oauth_server/setup.cfg
r8030 r8123 1 1 [egg_info] 2 2 #tag_build = dev 3 tag_svn_revision = true3 tag_svn_revision = false -
trunk/ndg_oauth/ndg_oauth_server/setup.py
r8030 r8123 16 16 This is an OAuth 2.0 server library and WSGI middleware filter. 17 17 18 It supports simple string-based bearer token and a custom extension to enable 19 the use of X.509 certificates as tokens. The latter has been added for a 20 specialised use case to enable a SLCS (Short-lived Credential Service) to issue 21 delegated X.509-based credentials with OAuth. 22 18 23 Prerequisites 19 24 ============= 20 This has been developed and tested for Python 2.6 .25 This has been developed and tested for Python 2.6 and 2.7. 21 26 22 27 Installation … … 26 31 Configuration 27 32 ============= 28 An example of configuration is provided in the file development.ini. This 29 configures the components needed to authenticate users, obtain user 30 authorisation for an OAuth client and obtain a certificate to use as an access 31 token using MyProxyClient. 33 Examples are contained in the examples/ sub-folder: 34 35 bearer_tok/: 36 This configures a simple test application that uses string based tokens. 37 slcs/: 38 This is a more complex and specialised example that issues X.509 certificate- 39 based tokens as part of a Short-lived Credential Service. The authorisation 40 server requires access to a specially configured MyProxyCA service ( 41 http://grid.ncsa.illinois.edu/myproxy/ca/) configured with a custom PAM to 42 allow issue of credentials. See: 43 http://ndg-security.ceda.ac.uk/browser/trunk/MashMyData/pam_credential_translation 44 45 The examples should be used in conjunction with the ndg.oauth client package. 32 46 """ 33 47 34 48 setup( 35 49 name = 'ndg_oauth_server', 36 version = '0.2.0', 37 description = 'OAuth 2.0 server providing MyProxy certificates as access tokens', 50 version = '0.3.0', 51 description = 'OAuth 2.0 server providing MyProxy ' 52 'certificates as access tokens', 38 53 long_description = _long_description, 39 54 author = 'R. B. Wilkinson', 40 maintainer = 'Philip Kershaw',55 maintainer = 'Philip Kershaw', 41 56 maintainer_email = 'Philip.Kershaw@stfc.ac.uk', 42 57 #url ='', … … 47 62 "WebOb", 48 63 "repoze.who", 49 "MyProxyWebService",50 64 "Genshi", 51 65 ], 52 packages =find_packages(), 53 zip_safe =False, 66 extras_require = {'slcs_support': 'MyProxyClient'}, 67 packages = find_packages(), 68 zip_safe = False, 54 69 )
Note: See TracChangeset
for help on using the changeset viewer.