You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
print "Metadata Signarture failed to be verified with the cert provided"
449
+
print "Metadata Signature failed to be verified with the cert provided"
451
450
end
452
451
```
453
452
454
453
## Retrieving Attributes
455
454
456
-
If you are using `saml:AttributeStatement` to transfer data like the username, you can access all the attributes through `response.attributes`. It contains all the `saml:AttributeStatement`s with its 'Name' as an indifferent key and one or more `saml:AttributeValue`s as values. The value returned depends on the value of the
455
+
If you are using `saml:AttributeStatement` to transfer data, such as the username, you can access all the attributes through `response.attributes`. It contains all the `saml:AttributeStatement`s with its 'Name' as an indifferent key and one or more `saml:AttributeValue`s as values. The value returned depends on the value of the
457
456
`single_value_compatibility` (when activated, only the first value is returned)
458
457
459
458
```ruby
@@ -676,7 +675,7 @@ Next, you may specify the specific SP SAML messages you would like to sign:
676
675
settings.security[:logout_responses_signed] = true# Enable signature on Logout Response
677
676
```
678
677
679
-
Signatures will be handled automatically for both `HTTP-Redirect` and `HTTP-Redirect` Binding.
678
+
Signatures will be handled automatically for both `HTTP-Redirect` and `HTTP-POST` Binding.
680
679
Note that the RelayState parameter is used when creating the Signature on the `HTTP-Redirect` Binding.
681
680
Remember to provide it to the Signature builder if you are sending a `GET RelayState` parameter or the
682
681
signature validation process will fail at the Identity Provider.
@@ -768,7 +767,7 @@ Note the following:
768
767
#### Audience Validation
769
768
770
769
A service provider should only consider a SAML response valid if the IdP includes an <AudienceRestriction>
771
-
element containting an <Audience> element that uniquely identifies the service provider. Unless you specify
770
+
element containing an <Audience> element that uniquely identifies the service provider. Unless you specify
772
771
the `skip_audience` option, Ruby SAML will validate that each SAML response includes an <Audience> element
773
772
whose contents matches `settings.sp_entity_id`.
774
773
@@ -946,7 +945,7 @@ end
946
945
947
946
## Attribute Service
948
947
949
-
To request attributes from the IdP the SP needs to provide an attribute service within it's metadata and reference the index in the assertion.
948
+
To request attributes from the IdP the SP must provide an attribute service within its metadata and reference the index in the assertion.
950
949
951
950
```ruby
952
951
settings = OneLogin::RubySaml::Settings.new
@@ -963,7 +962,7 @@ The `attribute_value` option additionally accepts an array of possible values.
963
962
964
963
## Custom Metadata Fields
965
964
966
-
Some IdPs may require to add SPs to add additional fields (Organization, ContactPerson, etc.)
965
+
Some IdPs may require SPs to add additional fields (Organization, ContactPerson, etc.)
967
966
into the SP metadata. This can be achieved by extending the `OneLogin::RubySaml::Metadata`
968
967
class and overriding the `#add_extras` method as per the following example:
0 commit comments