- PR merged fixing reopened Issue #16 (from @peterox)
- Remove the need for supplying certicate and key files if the requests are not signed (Issue #16). Useful during development when the corresponding Identity Provider is setup for unsigned requests/responses. Use signing for production deployments. The defaults expect signed requests/responses.
-
Issue: #12. Support for IDP initiated SSO flow.
-
Original auth request ID when returned in auth response is made available in the assertion subject (SP initiated SSO flows). For IDP initiated SSO flows, this will be an empty string.
-
Issue: #14. Remove built-in referer check. Not specific to
Samly. It is better handled by the consuming application.
- Shibboleth Single Logout session match related fix. Uptake
esaml v3.3.0.
- Generates SP metadata XML that passes XSD validation
- Handle namespaces in Identity Provider Metadata XML file
- Added support for multiple Identity Providers. Check issue: #4. Instructions for migrating from v0.7.x available in github project wiki.
- Added
use_redirect_for_idp_reqconfig parameter. By defaultSamlyuses HTTP POST when sending requests to IdP. Set this config parameter totrueif HTTP redirection should be used instead.
- Added config option (
entity_id). OOTB uses metadata URI as entity ID. Can be specified (urnentity ID for example) to override the default.
- Added config options to control if requests and/or responses are signed or not
- Added Inch CI
- Corresponding doc updates
- Doc updates
- Config handling changes and corresponding tests
target_urlquery parameter form url encoded
- Plug Pipeline config
:pre_session_create_pipeline - Computed attributes available in
Samly.Assertion - Updates to
Samly.Providerbase_urlconfig handling