- linkToRouteAbsolute('core.login.showLoginForm') . '?direct=1';
-$url = '
' . \OCP\Util::sanitizeHTML($url) . ' ';
-if (isset($_['general']['allow_multiple_user_back_ends']['text'])) {
- print_unescaped(
- $l->t(
- 'Make sure to configure an administrative user that can access the instance via SSO. Logging-in with your regular %s account will not be possible anymore, unless you enabled "%s" or you go directly to the URL %s.',
- [
- \OCP\Util::sanitizeHTML($theme->getEntity()),
- \OCP\Util::sanitizeHTML($_['general']['allow_multiple_user_back_ends']['text']),
- $url,
- ]
- )
- );
-} else {
- print_unescaped(
- $l->t(
- 'Make sure to configure an administrative user that can access the instance via SSO. Logging-in with your regular %s account will not be possible anymore, unless you go directly to the URL %s.',
- [
- \OCP\Util::sanitizeHTML($theme->getEntity()),
- $url,
- ]
- )
- );
-}
+\OCP\Util::addScript('user_saml', 'user_saml-admin');
+\OCP\Util::addStyle('user_saml', 'user_saml-admin');
?>
-
-
-
- t('Please choose whether you want to authenticate using the SAML provider built-in in Nextcloud or whether you want to authenticate against an environment variable.')) ?>
-
- t('Use built-in SAML authentication')) ?>
- t('Use environment variable')) ?>
-
-
-
-
-
-
- t('General')) ?>
-
- $attribute): ?>
-
-
-
-
-
-
t('This feature might not work with all identity providers. Use only if your IdP specifically requires POST binding for SAML requests.')) ?>
-
-
-
-
-
- class="required" />
-
-
-
-
-
-
-
-
-
t('Service Provider Data')) ?>
-
- t('If your Service Provider should use certificates you can optionally specify them here.')) ?>
- t('Show Service Provider settings…')) ?>
-
-
-
-
t('Name ID format')) ?>
-
- $value): ?>
- >
-
-
- $attribute): ?>
-
-
-
- class="required"/>
-
-
-
-
-
-
-
-
-
t('Identity Provider Data')) ?>
-
- t('Identifier of the IdP entity (must be a URI)')) ?>
-
-
-
- t('URL Target of the IdP where the SP will send the Authentication Request Message')) ?>
-
-
-
t('Show optional Identity Provider settings…')) ?>
-
-
- t('URL Location of the IdP where the SP will send the SLO Request')) ?>
-
-
-
- t('URL Location of the IDP\'s SLO Response')) ?>
-
-
-
- t('Public X.509 certificate of the IdP')) ?>
-
-
-
- t('Request parameters to pass-through to IdP (comma separated list)')) ?>
-
-
-
-
-
-
-
t('Attribute mapping')) ?>
-
- t('If you want to optionally map attributes to the user you can configure these here.')) ?>
- t('Show attribute mapping settings…')) ?>
-
-
-
- $attribute): ?>
-
-
-
- class="required"/>
-
-
-
-
-
-
-
-
t('Security settings')) ?>
-
- t('For increased security we recommend enabling the following settings if supported by your environment.')) ?>
- t('Show security settings…')) ?>
-
-
-
t('Signatures and encryption offered')) ?>
- $text): ?>
-
-
-
-
-
-
t('Signatures and encryption required')) ?>
- $text): ?>
-
-
-
-
-
-
t('General')) ?>
- $attribute): ?>
-
-
-
-
- class="required" placeholder="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
-
-
-
-
-
-
-
-
-
-
-
-
-
-
t('User filtering')) ?>
-
- t('If you want to optionally restrict user login depending on user data, configure it here.')) ?>
- t('Show user filtering settings …')) ?>
-
-
-
- $attribute): ?>
-
-
-
- class="required" placeholder=""/>
-
-
-
-
-
-
-
- t('Download metadata XML')) ?>
-
-
-
t('Reset settings')) ?>
-
-
t('Metadata invalid')) ?>
-
t('Metadata valid')) ?>
-
-