Skip to content

Commit 1730f2c

Browse files
committed
Fix markdown
1 parent 3e424a9 commit 1730f2c

4 files changed

Lines changed: 7 additions & 8 deletions

docs/simplesamlphp-nostate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The domain name the IdP sends the response to is configured in the metadata of
3636
the IdP. This means that it may not match up with the domain name the user
3737
accessed. For example we may have the following scenario:
3838

39-
1. The user accesses `https://www.example.org/`. A session is created for the user, and the session cookie is set for the current domain (www.example.org).
39+
1. The user accesses `https://www.example.org/`. A session is created for the user, and the session cookie is set for the current domain (`www.example.org`).
4040
1. The user needs to be authenticated. We therefore save some information about the current status in the state array, create a SAML 2.0 authentication request, and send it to the IdP.
4141
1. The user logs in on the IdP. The IdP then sends a response to the SP at `example.org`. However, the metadata for the SP that is registered at the IdP uses `https://example.org/` (without `www`) as the domain the response should be sent to. The authentication response is therefore sent to that domain.
4242
1. The SP (now at `https://example.org/`) tries to load the state information associated with the authentication response it received. But, because the domain name has changed, we do not receive the session cookie of the user. We are therefore unable to find the session of the user. When we attempt to load the state information from the session we are therefore unable to find it.

docs/simplesamlphp-reference-idp-hosted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ The following SAML 2.0 options are available:
210210
: The RSA encryption algorithm with PKCS#1 v1.5 padding is blacklisted by default for security reasons. Any assertions
211211
encrypted with this algorithm will therefore fail to decrypt. You can override this limitation by defining an empty
212212
array in this option (or blacklisting any other algorithms not including that one). However, it is strongly
213-
discouraged to do so. For your own safety, please include the string 'http://www.w3.org/2001/04/xmlenc#rsa-1_5' if
213+
discouraged to do so. For your own safety, please include the string `http://www.w3.org/2001/04/xmlenc#rsa-1_5` if
214214
you make use of this option.
215215

216216
`https.certificate`

docs/simplesamlphp-reference-idp-remote.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ $metadata['entity-id-2'] = [
7474
: The RSA encryption algorithm with PKCS#1 v1.5 padding is blacklisted by default for security reasons. Any assertions
7575
encrypted with this algorithm will therefore fail to decrypt. You can override this limitation by defining an empty
7676
array in this option (or blacklisting any other algorithms not including that one). However, it is strongly
77-
discouraged to do so. For your own safety, please include the string 'http://www.w3.org/2001/04/xmlenc#rsa-1_5' if
77+
discouraged to do so. For your own safety, please include the string `http://www.w3.org/2001/04/xmlenc#rsa-1_5` if
7878
you make use of this option.
7979

8080
`hide.from.discovery`

docs/simplesamlphp-reference-sp-remote.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ The following options can be set:
153153
: The RSA encryption algorithm with PKCS#1 v1.5 padding is blacklisted by default for security reasons. Any assertions
154154
encrypted with this algorithm will therefore fail to decrypt. You can override this limitation by defining an empty
155155
array in this option (or blacklisting any other algorithms not including that one). However, it is strongly
156-
discouraged to do so. For your own safety, please include the string 'http://www.w3.org/2001/04/xmlenc#rsa-1_5' if
156+
discouraged to do so. For your own safety, please include the string `http://www.w3.org/2001/04/xmlenc#rsa-1_5` if
157157
you make use of this option.
158158

159159
`ForceAuthn`
@@ -166,10 +166,9 @@ The following options can be set:
166166

167167
: The three most commonly used values are:
168168

169-
:
170-
1. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
171-
2. `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
172-
3. `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`
169+
* `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
170+
* `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent`
171+
* `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`
173172

174173
: The `transient` format will generate a new unique ID every time
175174
the SP logs in.

0 commit comments

Comments
 (0)