developmentseed/openid_provider_sso
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
master
Could not load branches
Nothing to show
Could not load tags
Nothing to show
{{ refName }}
default
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code
-
Clone
Use Git or checkout with SVN using the web URL.
Work fast with our official CLI. Learn more.
- Open with GitHub Desktop
- Download ZIP
Sign In Required
Please sign in to use Codespaces.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching GitHub Desktop
If nothing happens, download GitHub Desktop and try again.
Launching Xcode
If nothing happens, download Xcode and try again.
Launching Visual Studio Code
Your codespace will open once ready.
There was a problem preparing your codespace, please try again.
Latest commit
Git stats
Files
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
OpenID Provider SSO =================== OpenID Provider extension for Simple Sign-On among trusted sites. Add trusted sites to a Drupal OpenID provider. Users enjoy a simplified sign on process between trusted sites. Note: this module does not provide true *Single* Sign-On functionality but a largely simplified sign on experience for webs of trusted sites. Hence the name *Simple* Sign-On. It is strongly recommended to install this module on a fresh Drupal OpenID Provider. Installing it on an existing OpenID provider will lead to undefined results. Installation ============ Install this module and dependencies. Apply http://drupal.org/node/621956#comment-2665966 to OpenID Provider. Go to admin/user/openid-provider-sso and enter known Relying Parties, for example: Realm: http://example1.com/ Name: The Example 1 Blog Realm: http://example2.com/ Name: The Example 2 Blog All relying parties must be Drupal sites with the module OpenID SSO enabled and configured. Note that the realm requires a trailing slash.