Skip to content

Commit 2ebe8ac

Browse files
Update README.md
1 parent 22cd564 commit 2ebe8ac

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

README.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -316,11 +316,14 @@ of using the fingerprint method. The fingerprint, is a hash, so at the end is op
316316
attack that can end on a signature validation bypass. Other SAML toolkits deprecated that mechanism,
317317
we maintain it for compatibility and also to be used on test environment.
318318
319-
In some scenarios the IdP uses different certificates for signing/encryption, or is under key
320-
rollover phase and more than one certificate is published on IdP metadata.
319+
## Handling Multiple IdP Certificates
321320
322-
In order to handle that Ruby SAML offers the `idp_cert_multi` parameter.
323-
When used, `idp_cert` and `idp_cert_fingerprint` values are ignored.
321+
If IdP includes multiple certificates in their metadata XML, you may specify the `idp_cert_multi`
322+
parameter. When used, `idp_cert` and `idp_cert_fingerprint` values are ignored.
323+
This is useful in the following scenarios:
324+
325+
* The IdP uses different certificates for signing versus encryption.
326+
* The IdP is undergoing a key rollover and is publishing the old and new certificates in parallel.
324327
325328
The `idp_cert_multi` must be a Hash as follows:
326329
@@ -558,7 +561,7 @@ You can add `ValidUntil` and `CacheDuration` to the SP Metadata XML using instea
558561
559562
## Signing and Decryption
560563
561-
Ruby SAML supports the following signing and decryption functionality:
564+
Ruby SAML supports the following functionality:
562565
563566
1. Signing your SP Metadata XML
564567
2. Signing your SP SAML messages

0 commit comments

Comments
 (0)