Django-digid-eherkenning

Latest version: v0.19.2

Safety actively analyzes 710445 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 5

0.12.0

===================

Maintenance release

Note that older versions of django-digid-eherkenning have an upper bound of
``maykin-python3-saml==1.16.0.post1`` due to the implicit PyOpenSSL dependency. If you
upgrade maykin-python3-saml, you also need to update to
``django-digid-eherkenning>=0.12.0``.

* Dropped the (implicit) dependency on PyOpenSSL. Now the cryptography package is used
directly.
* Made the cryptography dependency explicit.

0.11.0

===================

Maintenance and bugfix release

There are no expected breaking/backwards changes, but we did publish a new version of
maykin-python3-saml which has changed build/project tooling. We recommend properly
testing this flow on test/staging environments.

* Fixed the documentation build
* Updated deprecated CI actions
* Addressed build failures with lmxl 5+
* Replaced deprecated defusedxml.lxml module usage
* Removed explicit defusedxml dependency
* Fixed the handling of metadata incorrectly assumed to be string rather than bytes
* Pin lxml 4.7.1 lower bound
* Pin maykin-python3-saml lower bound (which removes the defusedxml dependency)

0.10.0

===================

Introduced a small behaviour change

Before, when returning from the DigiD/eHerkenning login flow and consuming the SAML
artifact (in the assertion consumer service), we checked whether the IP address of the
client was still the same IP address that initiated the authentication context. From
error monitoring, it was clear this leads to false positives, so the fatal error has now
been relaxed to a warning.

0.9.0

==================

Quality of life update

* [45] Added automatic metadata retrieval

* You can now configure a metadata source URL, which will download and process the
metadata automatically.
* Added a management command ``update_stored_metadata`` to refetch the metadata and
process any updates.

* Added BSN validation to mock login form.

0.8.2

==================

Nothing functional. Changed the verbose names of

* eHerkenning service *instance* UUID
* eIDAS service *instance* UUID

0.8.1

==================

* Made EHerkenningConfiguration.loa required
It was previously possible to accidentally misconfigure by selecting the
empty option for the LOA in the admin.

This patch contains a migration that will set undefined eHerkennning LOAs to
low_plus. But if you have an invalid LOA set, the migration will fail with
an IntegrityError. In case this happens, go to the admin and select a LOA.

Page 3 of 5

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.