You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 12, 2026. It is now read-only.
Version `1.3.0` is a recommended update for all Ruby SAML users as it includes security fixes. It adds security improvements in order to prevent Signature wrapping attacks. [CVE-2016-5697](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5697)
5
6
6
-
Version `1.1` adds some improvements on signature validation and solves some namespace conflicts.
7
+
## Updating from 1.1.x to 1.2.X
8
+
9
+
Version `1.2` adds IDP metadata parsing improvements, uuid deprecation in favour of SecureRandom, refactor error handling and some minor improvements
10
+
11
+
There is no compatibility issue detected.
7
12
8
13
For more details, please review [the changelog](changelog.md).
9
14
15
+
## Updating from 1.0.x to 1.1.X
16
+
17
+
Version `1.1` adds some improvements on signature validation and solves some namespace conflicts.
18
+
10
19
## Updating from 0.9.x to 1.0.X
11
20
12
21
Version `1.0` is a recommended update for all Ruby SAML users as it includes security fixes.
@@ -33,6 +42,7 @@ We created a demo project for Rails4 that uses the latest version of this librar
33
42
### Supported versions of Ruby
34
43
* 1.8.7
35
44
* 1.9.x
45
+
* 2.0.x
36
46
* 2.1.x
37
47
* 2.2.x
38
48
* JRuby 1.7.19
@@ -102,7 +112,7 @@ To override the default behavior and control the destination of log messages, pr
102
112
a ruby Logger object to the gem's logging singleton:
If you are using saml:AttributeStatement to transfer metadata, like the user name, you can access all the attributes through response.attributes. It contains all the saml:AttributeStatement with its 'Name' as a indifferent key the one/more saml:AttributeValue as value. The value returned depends on the value of the
260
270
`single_value_compatibility` (when activate, only one value returned, the first one)
@@ -386,7 +396,10 @@ The settings related to sign are stored in the `security` attribute of the setti
386
396
```ruby
387
397
settings.security[:authn_requests_signed] = true # Enable or not signature on AuthNRequest
388
398
settings.security[:logout_requests_signed] = true # Enable or not signature on Logout Request
389
-
settings.security[:logout_responses_signed] = true # Enable or not signature on Logout Response
399
+
settings.security[:logout_responses_signed] = true # Enable or not
400
+
signature on Logout Response
401
+
settings.security[:want_assertions_signed] = true # Enable or not
402
+
the requirement of signed assertion
390
403
settings.security[:metadata_signed] = true # Enable or not signature on Metadata
Copy file name to clipboardExpand all lines: changelog.md
+29-1Lines changed: 29 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,38 @@
1
1
# RubySaml Changelog
2
2
3
+
### 1.3.0 (June 24, 2016)
4
+
*[Security Fix](https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995) Add extra validations to prevent Signature wrapping attacks
0 commit comments