Skip to content

Commit 39e2a4c

Browse files
authored
README.md – spelling corrections.
1 parent 94b3ed8 commit 39e2a4c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ In production, the **onelogin.saml2.strict** setting parameter MUST be set as **
6969
### Hosting
7070
#### Github
7171
The toolkit is hosted on github. You can download it from:
72-
* Lastest release: https://github.com/onelogin/java-saml/releases/latest
72+
* Latest release: https://github.com/onelogin/java-saml/releases/latest
7373
* Master repo: https://github.com/onelogin/java-saml/tree/master
7474

7575
#### Maven
@@ -536,7 +536,7 @@ if a match on the future LogoutResponse ID and the LogoutRequest ID to be sent i
536536
```
537537
auth.getLastRequestId()
538538
```
539-
and later excuting the redirection manually.
539+
and later executing the redirection manually.
540540

541541

542542
### Working behind load balancer
@@ -553,7 +553,7 @@ For Apache Tomcat this is done by setting the proxyName, proxyPort, scheme and s
553553
In some scenarios the IdP uses different certificates for
554554
signing/encryption, or is under key rollover phase and more than one certificate is published on IdP metadata.
555555

556-
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate setted in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
556+
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate set in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
557557

558558

559559
### Replay attacks
@@ -583,7 +583,7 @@ Lets imagine we deploy the jsp example project at *http://localhost:8080/java-sa
583583

584584
2.2. In the second link we are redirected to the */dologin.jsp* view with a 'attrs' GET parameter. An AuthNRequest is sent to the IdP with the /attrs.jsp view as RelayState parameter, we authenticate at the IdP and then a Response is sent to the SP, specifically to the Assertion Consumer Service view: /acs.jsp. There the SAMLResponse is validated, the NameID and user attributes extracted and stored in the session and we are redirected to the RelayState view, the attrs.jsp view where user data is read from session and prompted.
585585

586-
3. The single log out funcionality could be tested by 2 ways.
586+
3. The single log out functionality could be tested by 2 ways.
587587

588588
3.1. SLO Initiated by SP. Click on the "logout" link at the SP, after that we are redirected to the /dologout.jsp view where a Logout Request is sent to the IdP, the session at the IdP is closed and replies to the SP a Logout Response (sent to the Single Logout Service endpoint). The SLS endpoint /sls.jsp of the SP process the Logout Response and if is valid, close the user session of the local app. Notice that the SLO Workflow starts and ends at the SP.
589589

0 commit comments

Comments
 (0)