diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000000000000000000000000000000000000..1b86f679226098cc6f795cd48bb079a5a45dc19a_LmdpdGlnbm9yZQ==
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,7 @@
+*.pyc
+*.py~
+.project
+.directory
+.pydevproject
+i18n/fr.po~
+.idea
diff --git a/__init__.py b/__init__.py
index dff262e3b1c8dd1e490a99a01cfa6cd1235066dc_X19pbml0X18ucHk=..1b86f679226098cc6f795cd48bb079a5a45dc19a_X19pbml0X18ucHk= 100644
--- a/__init__.py
+++ b/__init__.py
@@ -1,4 +1,4 @@
 import controllers
 import auth_saml
 import res_users
-import token
+import saml_token
diff --git a/saml_token.py b/saml_token.py
new file mode 100644
index 0000000000000000000000000000000000000000..1b86f679226098cc6f795cd48bb079a5a45dc19a_c2FtbF90b2tlbi5weQ==
--- /dev/null
+++ b/saml_token.py
@@ -0,0 +1,31 @@
+# -*- encoding: utf-8 -*-
+__author__ = 'faide'
+
+
+import logging
+from openerp.osv import osv, fields
+
+_logger = logging.getLogger(__name__)
+
+
+class saml_token(osv.Model):
+    _name = "auth_saml.token"
+    _rec_name = "user_id"
+
+    _columns = {
+        'saml_provider_id': fields.many2one(
+            'auth.saml.provider',
+            string='SAML Provider that issued the token',
+        ),
+        'user_id': fields.many2one(
+            'res.users',
+            string="User",
+            # we want the token to be destroyed if the corresponding res.users
+            # is deleted
+            ondelete="cascade"
+        ),
+        'saml_access_token': fields.char(
+            'Current SAML token for this user',
+            help="The current SAML token in use",
+        ),
+    }
diff --git a/token.py b/token.py
deleted file mode 100644
index dff262e3b1c8dd1e490a99a01cfa6cd1235066dc_dG9rZW4ucHk=..0000000000000000000000000000000000000000
--- a/token.py
+++ /dev/null
@@ -1,31 +0,0 @@
-# -*- encoding: utf-8 -*-
-__author__ = 'faide'
-
-
-import logging
-from openerp.osv import osv, fields
-
-_logger = logging.getLogger(__name__)
-
-
-class saml_token(osv.Model):
-    _name = "auth_saml.token"
-    _rec_name = "user_id"
-
-    _columns = {
-        'saml_provider_id': fields.many2one(
-            'auth.saml.provider',
-            string='SAML Provider that issued the token',
-        ),
-        'user_id': fields.many2one(
-            'res.users',
-            string="User",
-            # we want the token to be destroyed if the corresponding res.users
-            # is deleted
-            ondelete="cascade"
-        ),
-        'saml_access_token': fields.char(
-            'Current SAML token for this user',
-            help="The current SAML token in use",
-        ),
-    }