You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -536,7 +536,7 @@ if a match on the future LogoutResponse ID and the LogoutRequest ID to be sent i
536
536
```
537
537
auth.getLastRequestId()
538
538
```
539
-
and later excuting the redirection manually.
539
+
and later executing the redirection manually.
540
540
541
541
542
542
### Working behind load balancer
@@ -553,7 +553,7 @@ For Apache Tomcat this is done by setting the proxyName, proxyPort, scheme and s
553
553
In some scenarios the IdP uses different certificates for
554
554
signing/encryption, or is under key rollover phase and more than one certificate is published on IdP metadata.
555
555
556
-
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate setted in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
556
+
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate set in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
557
557
558
558
559
559
### Replay attacks
@@ -583,7 +583,7 @@ Lets imagine we deploy the jsp example project at *http://localhost:8080/java-sa
583
583
584
584
2.2. In the second link we are redirected to the */dologin.jsp* view with a 'attrs' GET parameter. An AuthNRequest is sent to the IdP with the /attrs.jsp view as RelayState parameter, we authenticate at the IdP and then a Response is sent to the SP, specifically to the Assertion Consumer Service view: /acs.jsp. There the SAMLResponse is validated, the NameID and user attributes extracted and stored in the session and we are redirected to the RelayState view, the attrs.jsp view where user data is read from session and prompted.
585
585
586
-
3. The single log out funcionality could be tested by 2 ways.
586
+
3. The single log out functionality could be tested by 2 ways.
587
587
588
588
3.1. SLO Initiated by SP. Click on the "logout" link at the SP, after that we are redirected to the /dologout.jsp view where a Logout Request is sent to the IdP, the session at the IdP is closed and replies to the SP a Logout Response (sent to the Single Logout Service endpoint). The SLS endpoint /sls.jsp of the SP process the Logout Response and if is valid, close the user session of the local app. Notice that the SLO Workflow starts and ends at the SP.
0 commit comments