Skip to content

Commit 21b676b

Browse files
authored
Add sponsor: 84codes
1 parent 791fc2c commit 21b676b

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

README.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,19 @@ ruby-saml never enables DTDLOAD, and it never disables NONET.
5555
The OneLogin::RubySaml::IdpMetadataParser class does not validate in any way the URL
5656
that is introduced in order to be parsed.
5757

58-
Usually the same administrator that handles the Service Provider also sets the URL to
58+
Usually, the same administrator that handles the Service Provider also sets the URL to
5959
the IdP, which should be a trusted resource.
6060

6161
But there are other scenarios, like a SAAS app where the administrator of the app
62-
delegates this functionality to other users. In this case, extra precaution should
62+
delegates this functionality to other users. In this case, extra precautions should
6363
be taken in order to validate such URL inputs and avoid attacks like SSRF.
6464

65+
### Sponsors
66+
67+
Thanks to the following sponsors for their support:
68+
69+
[<img alt="84codes" src="https://avatars.githubusercontent.com/u/5353257" width="50px">](https://www.84codes.com)
70+
6571
## Getting Started
6672

6773
In order to use Ruby SAML you will need to install the gem (either manually or using Bundler),
@@ -71,7 +77,7 @@ Using `Gemfile`
7177

7278
```ruby
7379
# latest stable
74-
gem 'ruby-saml', '~> 1.11.0'
80+
gem 'ruby-saml', '~> 1.17.0'
7581

7682
# or track master for bleeding-edge
7783
gem 'ruby-saml', :github => 'saml-toolkit/ruby-saml'

0 commit comments

Comments
 (0)