public function SamlauthConfigureForm::buildForm in SAML Authentication 8.2
Same name and namespace in other branches
- 8.3 src/Form/SamlauthConfigureForm.php \Drupal\samlauth\Form\SamlauthConfigureForm::buildForm()
- 8 src/Form/SamlauthConfigureForm.php \Drupal\samlauth\Form\SamlauthConfigureForm::buildForm()
- 4.x src/Form/SamlauthConfigureForm.php \Drupal\samlauth\Form\SamlauthConfigureForm::buildForm()
Form constructor.
Parameters
array $form: An associative array containing the structure of the form.
\Drupal\Core\Form\FormStateInterface $form_state: The current state of the form.
Return value
array The form structure.
Overrides ConfigFormBase::buildForm
File
- src/
Form/ SamlauthConfigureForm.php, line 78
Class
- SamlauthConfigureForm
- Provides a configuration form for samlauth module settings and IDP/SP info.
Namespace
Drupal\samlauth\FormCode
public function buildForm(array $form, FormStateInterface $form_state) {
$config = $this
->config('samlauth.authentication');
$form['saml_login_logout'] = [
'#type' => 'fieldset',
'#title' => $this
->t('Login / Logout'),
];
// Show note for enabling "log in" or "log out" menu link item.
if (Url::fromRoute('entity.menu.edit_form', [
'menu' => 'account',
])
->access()) {
$form['saml_login_logout']['menu_item'] = [
'#type' => 'markup',
'#markup' => '<em>' . $this
->t('Note: You <a href="@url">may want to enable</a> the "log in" / "log out" menu item and disable the original one.', [
'@url' => Url::fromRoute('entity.menu.edit_form', [
'menu' => 'account',
])
->toString(),
]) . '</em>',
];
}
$form['saml_login_logout']['login_menu_item_title'] = [
'#type' => 'textfield',
'#title' => $this
->t('Login menu item title'),
'#description' => $this
->t('The title of the SAML login link. Defaults to "Log in".'),
'#default_value' => $config
->get('login_menu_item_title'),
];
$form['saml_login_logout']['logout_menu_item_title'] = [
'#type' => 'textfield',
'#title' => $this
->t('Logout menu item title'),
'#description' => $this
->t('The title of the SAML logout link. Defaults to "Log out".'),
'#default_value' => $config
->get('logout_menu_item_title'),
];
$form['saml_login_logout']['drupal_saml_login'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Allow SAML users to log in directly'),
'#description' => $this
->t('If this option is enabled, users that have a remote SAML ID will also be allowed to log in through the normal Drupal process (without the intervention of the configured identity provider). This option does not change anything to site layout (e.g. enabling menu links); you will need to do this yourself.'),
'#default_value' => $config
->get('drupal_saml_login'),
];
$form['saml_login_logout']['login_redirect_url'] = [
'#type' => 'textfield',
'#title' => $this
->t('Login redirect URL'),
'#description' => $this
->t("Define the default URL to redirect the user after login. Enter a internal path starting with a slash, or a absolute URL. Defaults to the logged-in user's account page."),
'#default_value' => $config
->get('login_redirect_url'),
];
$form['saml_login_logout']['logout_redirect_url'] = [
'#type' => 'textfield',
'#title' => $this
->t('Logout redirect URL'),
'#description' => $this
->t('Define the default URL to redirect the user after logout. Enter a internal path starting with a slash, or a absolute URL. Defaults to the front page.'),
'#default_value' => $config
->get('logout_redirect_url'),
];
$form['service_provider'] = [
'#type' => 'fieldset',
'#title' => $this
->t('Service Provider Configuration'),
];
$form['service_provider']['config_info'] = [
'#theme' => 'item_list',
'#items' => [
$this
->t('Metadata URL') . ': ' . \Drupal::urlGenerator()
->generateFromRoute('samlauth.saml_controller_metadata', [], [
'absolute' => TRUE,
]),
$this
->t('Assertion Consumer Service') . ': ' . Url::fromRoute('samlauth.saml_controller_acs', [], [
'absolute' => TRUE,
])
->toString(),
$this
->t('Single Logout Service') . ': ' . Url::fromRoute('samlauth.saml_controller_sls', [], [
'absolute' => TRUE,
])
->toString(),
],
'#empty' => [],
'#list_type' => 'ul',
];
$form['service_provider']['sp_entity_id'] = [
'#type' => 'textfield',
'#title' => $this
->t('Entity ID'),
'#description' => $this
->t('Specifies the identifier to be used to represent the SP.'),
'#default_value' => $config
->get('sp_entity_id'),
];
$form['service_provider']['sp_name_id_format'] = [
'#type' => 'textfield',
'#title' => $this
->t('Name ID Format'),
'#description' => $this
->t('Specify the NameIDFormat attribute to request from the identity provider'),
'#default_value' => $config
->get('sp_name_id_format'),
];
$cert_folder = $config
->get('sp_cert_folder');
$sp_x509_certificate = $config
->get('sp_x509_certificate');
$sp_private_key = $config
->get('sp_private_key');
$form['service_provider']['sp_cert_type'] = [
'#type' => 'select',
'#title' => $this
->t('Type of configuration to save for the certificates'),
'#required' => TRUE,
'#options' => [
'folder' => $this
->t('Folder name'),
'fields' => $this
->t('Cert/key value'),
],
// Prefer folder over certs, like SamlService::reformatConfig(), but if
// both are empty then default to folder here.
'#default_value' => $cert_folder || !$sp_x509_certificate && !$sp_private_key ? 'folder' : 'fields',
];
$form['service_provider']['sp_x509_certificate'] = [
'#type' => 'textarea',
'#title' => $this
->t('x509 Certificate'),
'#description' => $this
->t('Public x509 certificate of the SP. No line breaks or BEGIN CERTIFICATE or END CERTIFICATE lines.'),
'#default_value' => $config
->get('sp_x509_certificate'),
'#states' => [
'visible' => [
[
':input[name="sp_cert_type"]' => [
'value' => 'fields',
],
],
],
],
];
$form['service_provider']['sp_private_key'] = [
'#type' => 'textarea',
'#title' => $this
->t('Private Key'),
'#description' => $this
->t('Private key for SP. No line breaks or BEGIN CERTIFICATE or END CERTIFICATE lines.'),
'#default_value' => $config
->get('sp_private_key'),
'#states' => [
'visible' => [
[
':input[name="sp_cert_type"]' => [
'value' => 'fields',
],
],
],
],
];
$form['service_provider']['sp_cert_folder'] = [
'#type' => 'textfield',
'#title' => $this
->t('Certificate folder'),
'#description' => $this
->t('Set the path to the folder containing a /certs subfolder and the /certs/sp.key (private key) and /certs/sp.crt (public cert) files. The names of the subfolder and files are mandated by the external SAML Toolkit library.'),
'#default_value' => $cert_folder,
'#states' => [
'visible' => [
[
':input[name="sp_cert_type"]' => [
'value' => 'folder',
],
],
],
],
];
$form['identity_provider'] = [
'#type' => 'fieldset',
'#title' => $this
->t('Identity Provider Configuration'),
];
// @TODO: Allow a user to automagically populate this by providing a metadata URL for the iDP.
// $form['identity_provider']['idp_metadata_url'] = [
// '#type' => 'url',
// '#title' => $this->t('Metadata URL'),
// '#description' => $this->t('URL of the XML metadata for the identity provider'),
// '#default_value' => $config->get('idp_metadata_url'),
// ];
$form['identity_provider']['idp_entity_id'] = [
'#type' => 'textfield',
'#title' => $this
->t('Entity ID'),
'#description' => $this
->t('Specifies the identifier to be used to represent the IDP.'),
'#default_value' => $config
->get('idp_entity_id'),
];
$form['identity_provider']['idp_single_sign_on_service'] = [
'#type' => 'url',
'#title' => $this
->t('Single Sign On Service'),
'#description' => $this
->t('URL where the SP will send the authentication request message.'),
'#default_value' => $config
->get('idp_single_sign_on_service'),
];
$form['identity_provider']['idp_single_log_out_service'] = [
'#type' => 'url',
'#title' => $this
->t('Single Log Out Service'),
'#description' => $this
->t('URL where the SP will send the logout request message.'),
'#default_value' => $config
->get('idp_single_log_out_service'),
];
$form['identity_provider']['idp_change_password_service'] = [
'#type' => 'url',
'#title' => $this
->t('Change Password Service'),
'#description' => $this
->t('URL where users will be redirected to change their password.'),
'#default_value' => $config
->get('idp_change_password_service'),
];
$form['identity_provider']['idp_cert_type'] = [
'#type' => 'select',
'#title' => $this
->t('Single/Multi Cert'),
'#required' => TRUE,
'#options' => [
'single' => $this
->t('Single Cert'),
'signing' => $this
->t('Key Rollover Phase'),
'encryption' => $this
->t('Unique Signing/Encryption'),
],
'#default_value' => $config
->get('idp_cert_type') ? $config
->get('idp_cert_type') : 'single',
];
$form['identity_provider']['idp_x509_certificate'] = [
'#type' => 'textarea',
'#title' => $this
->t('Primary x509 Certificate'),
'#description' => $this
->t('Public x509 certificate of the IdP. The external SAML Toolkit library does not allow configuring this as a separate file.'),
'#default_value' => $config
->get('idp_x509_certificate'),
];
$form['identity_provider']['idp_x509_certificate_multi'] = [
'#type' => 'textarea',
'#title' => $this
->t('Secondary x509 Certificate'),
'#description' => $this
->t('Secondary public x509 certificate of the IdP. This is a signing key if using "Key Rollover Phase" and an encryption key if using "Unique Signing/Encryption."'),
'#default_value' => $config
->get('idp_x509_certificate_multi'),
'#states' => [
'invisible' => [
':input[name="idp_cert_type"]' => [
'value' => 'single',
],
],
],
];
$form['user_info'] = [
'#title' => $this
->t('User Info and Syncing'),
'#type' => 'fieldset',
];
$form['user_info']['unique_id_attribute'] = [
'#type' => 'textfield',
'#title' => $this
->t('Unique identifier attribute'),
'#description' => $this
->t("Specify a SAML attribute that is always going to be unique per user. This will be used to identify local users through an 'auth mapping' (which is stored separately from the user account info).<br>Example: <em>eduPersonPrincipalName</em> or <em>eduPersonTargetedID</em>"),
'#default_value' => $config
->get('unique_id_attribute') ?: 'eduPersonTargetedID',
];
$form['user_info']['map_users'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Attempt to map SAML users to existing local users'),
'#description' => $this
->t('If this option is enabled and the SAML authentication response is not mapped to a user yet, but the name / e-mail attribute matches an existing non-mapped user, the SAML user will be mapped to the user.'),
'#default_value' => $config
->get('map_users'),
];
$form['user_info']['create_users'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Create users specified by SAML server'),
'#description' => $this
->t('If this option is enabled and the SAML authentication response is not mapped to a user, a new user is created using the name / e-mail attributes from the response.'),
'#default_value' => $config
->get('create_users'),
];
$form['user_info']['sync_name'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Synchronize user name on every login'),
'#default_value' => $config
->get('sync_name'),
'#description' => $this
->t('If this option is enabled, any changes to the name of SAML users will be propagated into Drupal user accounts.'),
];
$form['user_info']['sync_mail'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Synchronize email address on every login'),
'#default_value' => $config
->get('sync_mail'),
'#description' => $this
->t('If this option is enabled, any changes to the email address of SAML users will be propagated into Drupal user accounts.'),
];
$form['user_info']['user_name_attribute'] = [
'#type' => 'textfield',
'#title' => $this
->t('User name attribute'),
'#description' => $this
->t('When SAML users are mapped / created, this field specifies which SAML attribute should be used for the Drupal user name.<br />Example: <em>cn</em> or <em>eduPersonPrincipalName</em>'),
'#default_value' => $config
->get('user_name_attribute') ?: 'cn',
'#states' => [
'invisible' => [
':input[name="map_users"]' => [
'checked' => FALSE,
],
':input[name="create_users"]' => [
'checked' => FALSE,
],
':input[name="sync_name"]' => [
'checked' => FALSE,
],
],
],
];
$form['user_info']['user_mail_attribute'] = [
'#type' => 'textfield',
'#title' => $this
->t('User email attribute'),
'#description' => $this
->t('When SAML users are mapped / created, this field specifies which SAML attribute should be used for the Drupal email address.<br />Example: <em>mail</em>'),
'#default_value' => $config
->get('user_mail_attribute') ?: 'email',
'#states' => [
'invisible' => [
':input[name="map_users"]' => [
'checked' => FALSE,
],
':input[name="create_users"]' => [
'checked' => FALSE,
],
':input[name="sync_mail"]' => [
'checked' => FALSE,
],
],
],
];
$form['security'] = [
'#title' => $this
->t('Security Options'),
'#type' => 'fieldset',
];
$form['security']['strict'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Strict mode'),
'#description' => $this
->t('In strict mode, any validation failures or unsigned SAML messages which are requested to be signed (according to your settings) will cause the SAML conversation to be terminated. In production environments, this <em>must</em> be set.'),
'#default_value' => $config
->get('strict'),
];
$form['security']['security_authn_requests_sign'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Sign authentication requests'),
'#description' => $this
->t('Requests sent to the Single Sign-On Service of the IDP will include a signature.'),
'#default_value' => $config
->get('security_authn_requests_sign'),
];
$form['security']['security_signature_algorithm'] = [
'#type' => 'select',
'#title' => $this
->t('Signature algorithm'),
// The first option is the library default.
'#options' => [
'http://www.w3.org/2000/09/xmldsig#rsa-sha1' => 'RSA-sha1',
'http://www.w3.org/2000/09/xmldsig#hmac-sha1' => 'HMAC-sha1',
'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256' => 'sha256',
'http://www.w3.org/2001/04/xmldsig-more#rsa-sha384' => 'sha384',
'http://www.w3.org/2001/04/xmldsig-more#rsa-sha512' => 'sha512',
],
'#description' => $this
->t('Algorithm used in the signing process.'),
'#default_value' => $config
->get('security_signature_algorithm'),
'#states' => [
'visible' => [
':input[name="security_authn_requests_sign"]' => [
'checked' => TRUE,
],
],
],
];
$form['security']['security_messages_sign'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Request messages to be signed'),
'#description' => $this
->t('Response messages from the IDP are expected to be signed.'),
'#default_value' => $config
->get('security_messages_sign'),
'#states' => [
'disabled' => [
':input[name="strict"]' => [
'checked' => FALSE,
],
],
],
];
$form['security']['security_request_authn_context'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Request authn context'),
'#default_value' => $config
->get('security_request_authn_context'),
];
$form['security']['security_lowercase_url_encoding'] = [
'#type' => 'checkbox',
'#title' => $this
->t('Encode urls in lowercase'),
'#description' => $this
->t('ADFS encodes urls as lowercase and the library does it so in uppercase. When using ADFS and signature verification, this setting must be enabled.'),
'#default_value' => $config
->get('security_lowercase_url_encoding'),
];
return parent::buildForm($form, $form_state);
}