You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` will use the first non-expired certificate/key when signing/decrypting. It will raise an error only if there are no valid certificates/keys.
8
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now validates the certificate `not_before` condition; previously it was only validating `not_after`.
9
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now causes the generated SP metadata to exclude any inactive/expired certificates.
10
+
2
11
### 1.16.0 (Oct 09, 2023)
3
12
*[#671](https://github.com/SAML-Toolkits/ruby-saml/pull/671) Add support on LogoutRequest with Encrypted NameID
4
13
5
14
### 1.15.0 (Jan 04, 2023)
6
15
*[#650](https://github.com/SAML-Toolkits/ruby-saml/pull/650) Replace strip! by strip on compute_digest method
7
16
*[#638](https://github.com/SAML-Toolkits/ruby-saml/pull/638) Fix dateTime format for the validUntil attribute of the generated metadata
8
-
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support idp cert multi with string keys
17
+
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support `Settings#idp_cert_multi` with string keys
raiseValidationError.new('An EncryptedAssertion found and no SP private key found on the settings to decrypt it. Be sure you provided the :settings parameter at the initialize method')
0 commit comments