Skip to content

Commit 2af5b1b

Browse files
authored
Merge pull request #219 from BrandonNoad/fix-requestedAuthnContext-description
Update requestedAuthnContext description in README
2 parents d7f3d9f + 8b04df7 commit 2af5b1b

1 file changed

Lines changed: 9 additions & 11 deletions

File tree

README.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ $settings = array (
288288
// Set a BaseURL to be used instead of try to guess
289289
// the BaseURL of the view that process the SAML Message.
290290
// Ex http://sp.example.com/
291-
// http://example.com/sp/
291+
// http://example.com/sp/
292292
'baseurl' => null,
293293

294294
// Service Provider Data that we are deploying.
@@ -322,7 +322,7 @@ $settings = array (
322322
)
323323
),
324324
// Specifies info about where and how the <Logout Response> message MUST be
325-
// returned to the requester, in this case our SP.
325+
// returned to the requester, in this case our SP.
326326
'singleLogoutService' => array (
327327
// URL Location where the <Response> from the IdP will be returned
328328
'url' => '',
@@ -343,7 +343,7 @@ $settings = array (
343343
/*
344344
* Key rollover
345345
* If you plan to update the SP x509cert and privateKey
346-
* you can define here the new x509cert and it will be
346+
* you can define here the new x509cert and it will be
347347
* published on the SP metadata so Identity Providers can
348348
* read them and get ready for rollover.
349349
*/
@@ -454,7 +454,6 @@ $advancedSettings = array (
454454
*/
455455
'signMetadata' => false,
456456

457-
458457
/** signatures and encryptions required **/
459458

460459
// Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest>
@@ -477,11 +476,10 @@ $advancedSettings = array (
477476
// this SP to be encrypted.
478477
'wantNameIdEncrypted' => false,
479478

480-
481479
// Authentication context.
482-
// Set to false or don't present this parameter and no AuthContext will be sent in the AuthNRequest,
483-
// Set true and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'
484-
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509'),
480+
// Set to false and no AuthContext will be sent in the AuthNRequest.
481+
// Set true or don't present this parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'.
482+
// Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509').
485483
'requestedAuthnContext' => true,
486484

487485
// Indicates if the SP will validate all received xmls.
@@ -1083,7 +1081,7 @@ if (isset($_SESSION['samlUserdata'])) { // If there is user data we print it.
10831081
```
10841082

10851083
#### URL-guessing methods ####
1086-
1084+
10871085
php-saml toolkit uses a bunch of methods in OneLogin_Saml2_Utils that try to guess the URL where the SAML messages are processed.
10881086

10891087
* `getSelfHost` Returns the current host.
@@ -1114,7 +1112,7 @@ Or by using the method described on the previous section.
11141112

11151113
### SP Key rollover ###
11161114

1117-
If you plan to update the SP x509cert and privateKey you can define the new x509cert as $settings['sp']['x509certNew'] and it will be
1115+
If you plan to update the SP x509cert and privateKey you can define the new x509cert as $settings['sp']['x509certNew'] and it will be
11181116
published on the SP metadata so Identity Providers can read them and get ready for rollover.
11191117

11201118

@@ -1128,7 +1126,7 @@ In order to handle that the toolkit offers the $settings['idp']['x509certMulti']
11281126
When that parameter is used, 'x509cert' and 'certFingerprint' values will be ignored by the toolkit.
11291127

11301128
The 'x509certMulti' is an array with 2 keys:
1131-
- 'signing'. An array of certs that will be used to validate IdP signature
1129+
- 'signing'. An array of certs that will be used to validate IdP signature
11321130
- 'encryption' An array with one unique cert that will be used to encrypt data to be sent to the IdP
11331131

11341132

0 commit comments

Comments
 (0)