Grafana-django-saml2-auth

Latest version: v3.18.2

Safety actively analyzes 722460 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 4

3.18.2

What's Changed
* Supporting ForceAuthn SAML request attribute by MohammedAlmeshal in https://github.com/grafana/django-saml2-auth/pull/357

New Contributors
* MohammedAlmeshal made their first contribution in https://github.com/grafana/django-saml2-auth/pull/357

**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.18.1...v3.18.2

3.18.1

What's Changed
* Add clarity on the return object type of `TRIGGER.GET_METADATA_AUTO_CONF_URLS` by noppanut15 in https://github.com/grafana/django-saml2-auth/pull/355
* Update deps by mostafa in https://github.com/grafana/django-saml2-auth/pull/356

New Contributors
* noppanut15 made their first contribution in https://github.com/grafana/django-saml2-auth/pull/355

**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.18.0...v3.18.1

3.18.0

What's Changed
* feat: Separate the Build and Deploy job by henryh9n in https://github.com/grafana/django-saml2-auth/pull/349
* feat: Trigger to get custom frontend URLs by henryh9n in https://github.com/grafana/django-saml2-auth/pull/350


**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.17.0...v3.18.0

3.17.0

What's Changed
* feat: Allow custom assertion URIs by henryh9n in https://github.com/grafana/django-saml2-auth/pull/348


**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.16.0...v3.17.0

3.16.0

What's Changed
* [feat] Implement a setting to disable the exception handler. by henryh9n in https://github.com/grafana/django-saml2-auth/pull/345

New Contributors
* henryh9n made their first contribution in https://github.com/grafana/django-saml2-auth/pull/345

**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.15.0...v3.16.0

3.15.0

This release introduces a new feature that allows the extraction of custom attributes from the SAML Response during user identity processing. The new hook function, `TRIGGER.EXTRACT_USER_IDENTITY`, accepts two parameters:

1. A user dictionary that has been processed by the `extract_user_identity` [function](https://github.com/grafana/django-saml2-auth/blob/cba317c90199d2eaee5fddc6616908613e6771cb/django_saml2_auth/saml.py#L391-L474).
2. A decoded but unvalidated `AuthnResponse` object, provided as a raw XML string.

If this function is implemented, it MUST return the user dictionary or optionally enrich it with additional attributes extracted from the `AuthnResponse`.

> [!WARNING]
> This hook function receives an **unvalidated and unverified** raw XML string. Extreme caution is required to validate the attributes before using them. For example, the `Issuer` and `NameID` attributes should at minimum be verified to contain a valid URL and URN, respectively. For further details, refer to [this discussion](https://github.com/grafana/django-saml2-auth/issues/343#issuecomment-2404905452).

What's Changed
* Extract user identity hook by mostafa in https://github.com/grafana/django-saml2-auth/pull/344


**Full Changelog**: https://github.com/grafana/django-saml2-auth/compare/v3.13.0...v3.15.0

Page 1 of 4

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.