@@ -316,11 +316,14 @@ of using the fingerprint method. The fingerprint, is a hash, so at the end is op
316316attack that can end on a signature validation bypass. Other SAML toolkits deprecated that mechanism,
317317we maintain it for compatibility and also to be used on test environment.
318318
319- In some scenarios the IdP uses different certificates for signing/encryption, or is under key
320- rollover phase and more than one certificate is published on IdP metadata.
319+ ## Handling Multiple IdP Certificates
321320
322- In order to handle that Ruby SAML offers the `idp_cert_multi` parameter.
323- When used, `idp_cert` and `idp_cert_fingerprint` values are ignored.
321+ If IdP includes multiple certificates in their metadata XML, you may specify the `idp_cert_multi`
322+ parameter. When used, `idp_cert` and `idp_cert_fingerprint` values are ignored.
323+ This is useful in the following scenarios:
324+
325+ * The IdP uses different certificates for signing versus encryption.
326+ * The IdP is undergoing a key rollover and is publishing the old and new certificates in parallel.
324327
325328The `idp_cert_multi` must be a Hash as follows:
326329
@@ -558,7 +561,7 @@ You can add `ValidUntil` and `CacheDuration` to the SP Metadata XML using instea
558561
559562# # Signing and Decryption
560563
561- Ruby SAML supports the following signing and decryption functionality:
564+ Ruby SAML supports the following functionality:
562565
5635661. Signing your SP Metadata XML
5645672. Signing your SP SAML messages
0 commit comments