You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,10 @@
5
5
Add SAML support to your Java applications using this library.
6
6
Forget those complicated libraries and use that open source library provided and supported by OneLogin Inc.
7
7
8
+
Version < 2.5.0 uses an old version of xmlsec library (<2.1.4 which has a security vulnerability [CVE-2019-12400](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESANTUARIO-460281))
9
+
10
+
Version 2.4.1 sets the 'strict' setting parameter to true.
11
+
8
12
Version 2.X.X, compatible with java7 / java8.
9
13
10
14
We [introduced some incompatibilities](https://github.com/onelogin/java-saml/issues/90), that could be fixed and make it compatible with java6.
@@ -188,7 +192,7 @@ Here are the list of properties to be defined on the settings file:
188
192
# If 'strict' is True, then the Java Toolkit will reject unsigned
189
193
# or unencrypted messages if it expects them signed or encrypted
190
194
# Also will reject the messages if not strictly follow the SAML
# URL Location of the IdP where the SP will send the SLO Response. If left blank, same URL as onelogin.saml2.idp.single_logout_service.url will be used.
70
69
# Some IdPs use a separate URL for sending a logout request and response, use this property to set the separate response url
0 commit comments