You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,17 +17,17 @@ Version 2.0.0 - 2.4.0, compatible with java7 / java8.
17
17
18
18
We [introduced some incompatibilities](https://github.com/onelogin/java-saml/issues/90), that could be fixed and make it compatible with java6.
19
19
20
-
Version 1.1.2 is considered to be deprecated. If you have used it, we strongly recommend that you migrate to the new version.
20
+
Version 1.1.2 is considered to be deprecated. If you have used it, we strongly recommend that you migrate to the new version.
21
21
We rebuilt the toolkit on 2.0.0, so code/settings that you had been using in the previous version will no longer be compatible.
22
22
23
23
24
24
## Why add SAML support to my software?
25
25
26
26
SAML is an XML-based standard for web browser single sign-on and is defined by
27
-
the OASIS Security Services Technical Committee. The standard has been around
27
+
the OASIS Security Services Technical Committee. The standard has been around
28
28
since 2002, but lately it has become popular due to its advantages as follows:
29
29
30
-
***Usability** - One-click access from portals or intranets, deep linking,
30
+
***Usability** - One-click access from portals or intranets, deep linking,
31
31
password elimination and automatically renewing sessions make life
32
32
easier for the user.
33
33
***Security** - Based on strong digital signatures for authentication and
@@ -40,7 +40,7 @@ since 2002, but lately it has become popular due to its advantages as follows:
40
40
***IT Friendly** - SAML simplifies life for IT because it centralizes
41
41
authentication, provides greater visibility and makes directory
42
42
integration easier.
43
-
***Opportunity** - B2B cloud vendor should support SAML to facilitate the
43
+
***Opportunity** - B2B cloud vendor should support SAML to facilitate the
44
44
integration of their product.
45
45
46
46
@@ -75,7 +75,7 @@ In production, the **onelogin.saml2.strict** setting parameter MUST be set as **
75
75
76
76
In production also we highly recommend to register on the settings the IdP certificate instead of using the fingerprint method. The fingerprint, is a hash, so at the end is open to a collision attack that can end on a signature validation bypass. Other SAML toolkits deprecated that mechanism, we maintain it for compatibility and also to be used on test environment.
77
77
78
-
The IdPMetadataParser class does not validate in any way the URL that is introduced in order to be parsed.
78
+
The IdPMetadataParser class does not validate in any way the URL that is introduced in order to be parsed.
79
79
80
80
Usually the same administrator that handles the Service Provider also sets the URL to the IdP, which should be a trusted resource.
81
81
@@ -97,7 +97,7 @@ Install it as a maven dependency:
@@ -665,7 +665,7 @@ and later executing the redirection manually.
665
665
666
666
### Extending the provided implementation
667
667
668
-
All the provided SAML message classes (`AuthnRequest`, `SamlResponse`, `LogoutRequest`, `LogoutResponse`) can be extended to add or change the processing behavior.
668
+
All the provided SAML message classes (`AuthnRequest`, `SamlResponse`, `LogoutRequest`, `LogoutResponse`) can be extended to add or change the processing behavior.
669
669
670
670
In particular, the classes used to produce outgoing messages (`AuthnRequest`, `LogoutRequest`, and `LogoutResponse`) also provide a `postProcessXml` method that can be overridden to customise the generation of the corresponding SAML message XML, along with the ability to pass in proper extensions of the input parameter classes (`AuthnRequestParams`, `LogoutRequestParams`, and `LogoutResponseParams` respectively).
auth.login(relayState, newAuthnRequestParamsEx()); // the custom generation of AuthnReqeustEx will be executed
689
689
// ... or process the response as usual
@@ -700,12 +700,12 @@ For Apache Tomcat this is done by setting the proxyName, proxyPort, scheme and s
700
700
701
701
702
702
### IdP with multiple certificates
703
-
703
+
704
704
In some scenarios the IdP uses different certificates for
705
705
signing/encryption, or is under key rollover phase and more than one certificate is published on IdP metadata.
706
-
706
+
707
707
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate set in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
0 commit comments