You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ A replay attack is basically try to reuse an intercepted valid SAML Message in o
154
154
SAML Messages have a limited timelife (NotBefore, NotOnOrAfter) that
155
155
make harder this kind of attacks, but they are still possible.
156
156
157
-
In order to avoid them, the SP can keep a list of SAML Messages or Assertion IDs alredy valdidated and processed. Those values only need
157
+
In order to avoid them, the SP can keep a list of SAML Messages or Assertion IDs already validated and processed. Those values only need
158
158
to be stored the amount of time of the SAML Message life time, so
159
159
we don't need to store all processed message/assertion Ids, but the most recent ones.
160
160
@@ -297,9 +297,9 @@ This is the ``settings.json`` file:
297
297
},
298
298
// If you need to specify requested attributes, set a
299
299
// attributeConsumingService. nameFormat, attributeValue and
300
-
// friendlyName can be ommited
300
+
// friendlyName can be omitted
301
301
"attributeConsumingService": {
302
-
// OPTIONAL: only specifiy if SP requires this.
302
+
// OPTIONAL: only specify if SP requires this.
303
303
// index is an integer which identifies the attributeConsumingService used
304
304
// to the SP. SAML toolkit supports configuring only one attributeConsumingService
305
305
// but in certain cases the SP requires a different value. Defaults to '1'.
@@ -366,7 +366,7 @@ This is the ``settings.json`` file:
366
366
/*
367
367
* Instead of using the whole X.509cert you can use a fingerprint in order to
368
368
* validate a SAMLResponse (but you still need the X.509cert to validate LogoutRequest and LogoutResponse using the HTTP-Redirect binding).
369
-
* But take in mind that the algortithm for the fingerprint should be as strong as the algorithm in a normal certificate signature
369
+
* But take in mind that the algorithm for the fingerprint should be as strong as the algorithm in a normal certificate signature
370
370
* (e.g. SHA256 or strong)
371
371
*
372
372
* (openssl x509 -noout -fingerprint -in "idp.crt" to generate it,
@@ -501,7 +501,7 @@ In addition to the required settings data (idp, sp), extra settings can be defin
501
501
'allowRepeatAttributeName':false,
502
502
503
503
// If the toolkit receive a message signed with a
504
-
// deprecated algoritm (defined at the constant class)
504
+
// deprecated algorithm (defined at the constant class)
505
505
// will raise an error and reject the message
506
506
"rejectDeprecatedAlgorithm":true
507
507
},
@@ -520,7 +520,7 @@ In addition to the required settings data (idp, sp), extra settings can be defin
520
520
},
521
521
522
522
// Organization information template, the info in en_US lang is
523
-
//recomended, add more if required.
523
+
//recommended, add more if required.
524
524
"organization": {
525
525
"en-US": {
526
526
"name":"sp_test",
@@ -690,7 +690,7 @@ We can set a ``return_to`` url parameter to the login function and that will be
690
690
target_url ='https://example.com'
691
691
auth.login(return_to=target_url)
692
692
```
693
-
The login method can recieve 3 more optional parameters:
693
+
The login method can receive 3 more optional parameters:
694
694
695
695
*``force_authn`` When ``true``, the ``AuthNReuqest`` will set the ``ForceAuthn='true'``
696
696
*``is_passive`` When true, the ``AuthNReuqest`` will set the ``Ispassive='true'``
@@ -785,7 +785,7 @@ If we execute print attributes we could get:
785
785
}
786
786
```
787
787
788
-
Each attribute name can be used as a key to obtain the value. Every attribute is a list of values. A single-valued attribute is a listy of a single element.
788
+
Each attribute name can be used as a key to obtain the value. Every attribute is a list of values. A single-valued attribute is a list of a single element.
789
789
790
790
The following code is equivalent:
791
791
@@ -813,7 +813,7 @@ if len(errors) == 0:
813
813
# the value of the url is a trusted URL.
814
814
return redirect(url)
815
815
else:
816
-
print("Sucessfully Logged out")
816
+
print("Successfully Logged out")
817
817
else:
818
818
print("Error when processing SLO: %s%s"% (', '.join(errors), auth.get_last_error_reason()))
819
819
```
@@ -955,7 +955,7 @@ elif 'sls' in request.args: # Single
955
955
# the value of the url is a trusted URL.
956
956
return redirect(url)
957
957
else:
958
-
msg ="Sucessfully logged out"
958
+
msg ="Successfully logged out"
959
959
960
960
iflen(errors) ==0:
961
961
print(msg)
@@ -1071,7 +1071,7 @@ SAML 2 Logout Request class
1071
1071
****get_nameid*** Gets the NameID of the Logout Request Message (returns a string).
1072
1072
****get_issuer*** Gets the Issuer of the Logout Request Message.
1073
1073
****get_session_indexes*** Gets the ``SessionIndexes`` from the Logout Request.
1074
-
****is_valid*** Checks if the Logout Request recieved is valid.
1074
+
****is_valid*** Checks if the Logout Request received is valid.
1075
1075
****get_error*** After execute a validation process, if fails this method returns the cause.
1076
1076
****get_xml*** Returns the XML that will be sent as part of the request or that was received at the SP
1077
1077
@@ -1154,7 +1154,7 @@ Auxiliary class that contains several methods
1154
1154
****get_expire_time*** Compares 2 dates and returns the earliest.
1155
1155
****delete_local_session*** Deletes the local session.
1156
1156
****calculate_X.509_fingerprint*** Calculates the fingerprint of a X.509 cert.
1157
-
****format_finger_print***Formates a fingerprint.
1157
+
****format_finger_print***Formats a fingerprint.
1158
1158
****generate_name_id*** Generates a nameID.
1159
1159
****get_status*** Gets Status from a Response.
1160
1160
****decrypt_element*** Decrypts an encrypted element.
@@ -1204,7 +1204,7 @@ let's see how fast is it to deploy them.
1204
1204
The use of a [virtualenv](http://virtualenv.readthedocs.org/en/latest/) is
1205
1205
highly recommended.
1206
1206
1207
-
Virtualenv helps isolating the python enviroment used to run the toolkit. You
1207
+
Virtualenv helps isolating the python environment used to run the toolkit. You
1208
1208
can find more details and an installation guide in the
@@ -1508,7 +1508,7 @@ Once the SP is configured, the metadata of the SP is published at the ``/metadat
1508
1508
1509
1509
4. We are logged in the app and the user attributes are showed. At this point, we can test the single log out functionality.
1510
1510
1511
-
The single log out funcionality could be tested by 2 ways.
1511
+
The single log out functionality could be tested by 2 ways.
1512
1512
1513
1513
5.1 SLO Initiated by SP. Click on the "logout" link at the SP, after that a Logout Request is sent to the IdP, the session at the IdP is closed and replies through the client to the SP with a Logout Response (sent to the Single Logout Service endpoint). The SLS endpoint /?sls of the SP process the Logout Response and if is valid, close the user session of the local app. Notice that the SLO Workflow starts and ends at the SP.
Copy file name to clipboardExpand all lines: changelog.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@
101
101
### 1.3.0 (Sep 15, 2017)
102
102
* Improve decrypt method, Add an option to decrypt an element in place or copy it before decryption.
103
103
*[#63](https://github.com/onelogin/python3-saml/pull/63) Be able to get at the auth object the last processed ID (response/assertion) and the last generated ID, as well as the NotOnOrAfter value of the valid SubjectConfirmationData in the processed SAMLResponse
104
-
* On a LogoutRequest if the NameIdFormat is entity, NameQualifier and SPNameQualifier will be ommited. If the NameIdFormat is not entity and a NameQualifier is provided, then the SPNameQualifier will be also added.
104
+
* On a LogoutRequest if the NameIdFormat is entity, NameQualifier and SPNameQualifier will be omitted. If the NameIdFormat is not entity and a NameQualifier is provided, then the SPNameQualifier will be also added.
105
105
* Reset errorReason attribute of the auth object before each Process method
106
106
*[#65](https://github.com/onelogin/python3-saml/pull/65) Fix issue on getting multiple certs when only sign or encryption certs
0 commit comments