You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -288,7 +288,7 @@ $settings = array (
288
288
// Set a BaseURL to be used instead of try to guess
289
289
// the BaseURL of the view that process the SAML Message.
290
290
// Ex http://sp.example.com/
291
-
// http://example.com/sp/
291
+
// http://example.com/sp/
292
292
'baseurl' => null,
293
293
294
294
// Service Provider Data that we are deploying.
@@ -322,7 +322,7 @@ $settings = array (
322
322
)
323
323
),
324
324
// Specifies info about where and how the <LogoutResponse> message MUST be
325
-
// returned to the requester, in this case our SP.
325
+
// returned to the requester, in this case our SP.
326
326
'singleLogoutService' => array (
327
327
// URL Location where the <Response> from the IdP will be returned
328
328
'url' => '',
@@ -343,7 +343,7 @@ $settings = array (
343
343
/*
344
344
* Key rollover
345
345
* If you plan to update the SP x509cert and privateKey
346
-
* you can define here the new x509cert and it will be
346
+
* you can define here the new x509cert and it will be
347
347
* published on the SP metadata so Identity Providers can
348
348
* read them and get ready for rollover.
349
349
*/
@@ -454,7 +454,6 @@ $advancedSettings = array (
454
454
*/
455
455
'signMetadata' => false,
456
456
457
-
458
457
/** signatures and encryptions required **/
459
458
460
459
// Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest>
@@ -477,11 +476,10 @@ $advancedSettings = array (
477
476
// this SP to be encrypted.
478
477
'wantNameIdEncrypted' => false,
479
478
480
-
481
479
// Authentication context.
482
-
// Set to false or don't present this parameter and no AuthContext will be sent in the AuthNRequest,
483
-
// Set true and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'
484
-
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509'),
480
+
// Set to false and no AuthContext will be sent in the AuthNRequest.
481
+
// Set true or don't present this parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'.
482
+
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509').
485
483
'requestedAuthnContext' => true,
486
484
487
485
// Indicates if the SP will validate all received xmls.
@@ -1083,7 +1081,7 @@ if (isset($_SESSION['samlUserdata'])) { // If there is user data we print it.
1083
1081
```
1084
1082
1085
1083
#### URL-guessing methods ####
1086
-
1084
+
1087
1085
php-saml toolkit uses a bunch of methods in OneLogin_Saml2_Utils that try to guess the URL where the SAML messages are processed.
1088
1086
1089
1087
*`getSelfHost` Returns the current host.
@@ -1114,7 +1112,7 @@ Or by using the method described on the previous section.
1114
1112
1115
1113
### SP Key rollover ###
1116
1114
1117
-
If you plan to update the SP x509cert and privateKey you can define the new x509cert as $settings['sp']['x509certNew'] and it will be
1115
+
If you plan to update the SP x509cert and privateKey you can define the new x509cert as $settings['sp']['x509certNew'] and it will be
1118
1116
published on the SP metadata so Identity Providers can read them and get ready for rollover.
1119
1117
1120
1118
@@ -1128,7 +1126,7 @@ In order to handle that the toolkit offers the $settings['idp']['x509certMulti']
1128
1126
When that parameter is used, 'x509cert' and 'certFingerprint' values will be ignored by the toolkit.
1129
1127
1130
1128
The 'x509certMulti' is an array with 2 keys:
1131
-
- 'signing'. An array of certs that will be used to validate IdP signature
1129
+
- 'signing'. An array of certs that will be used to validate IdP signature
1132
1130
- 'encryption' An array with one unique cert that will be used to encrypt data to be sent to the IdP
0 commit comments