You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 12, 2026. It is now read-only.
Version `1.1` adds some improvements on signature validation and solves some namespace conflicts.
7
+
8
+
For more details, please review [the changelog](changelog.md).
9
+
4
10
## Updating from 0.9.x to 1.0.X
5
11
6
12
Version `1.0` is a recommended update for all Ruby SAML users as it includes security fixes.
7
13
8
14
Version `1.0` adds security improvements like entity expansion limitation, more SAML message validations, and other important improvements like decrypt support.
9
15
10
-
For more details, please review [the changelog](changelog.md).
11
-
12
16
### Important Changes
13
17
Please note the `get_idp_metadata` method raises an exception when it is not able to fetch the idp metadata, so review your integration if you are using this functionality.
14
18
@@ -31,6 +35,8 @@ We created a demo project for Rails4 that uses the latest version of this librar
31
35
* 1.9.x
32
36
* 2.1.x
33
37
* 2.2.x
38
+
* JRuby 1.7.19
39
+
* JRuby 9.0.0.0
34
40
35
41
## Adding Features, Pull Requests
36
42
* Fork the repository
@@ -164,6 +170,13 @@ def saml_settings
164
170
end
165
171
```
166
172
173
+
Some assertion validations can be skipped by passing parameters to OneLogin::RubySaml::Response.new(). For example, you can skip the Conditions validation or the SubjectConfirmation validations by initializing the response with different options:
What's left at this point, is to wrap it all up in a controller and point the initialization and consumption URLs in OneLogin at that. A full controller example could look like this:
168
181
169
182
```ruby
@@ -394,6 +407,7 @@ Service Provider.
394
407
395
408
Notice that this toolkit uses 'settings.certificate' and 'settings.private_key' for the sign and the decrypt process.
396
409
410
+
Enable/disable the soft mode by the settings.soft parameter. When is set false, the saml validations errors will raise an exception.
0 commit comments