You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` will use the first non-expired certificate/key when signing/decrypting. It will raise an error only if there are no valid certificates/keys.
8
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now validates the certificate `not_before` condition; previously it was only validating `not_after`.
9
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now causes the generated SP metadata to exclude any inactive/expired certificates.
10
+
11
+
### 1.16.0 (Oct 09, 2023)
12
+
*[#671](https://github.com/SAML-Toolkits/ruby-saml/pull/671) Add support on LogoutRequest with Encrypted NameID
13
+
3
14
### 1.15.0 (Jan 04, 2023)
4
15
*[#650](https://github.com/SAML-Toolkits/ruby-saml/pull/650) Replace strip! by strip on compute_digest method
5
16
*[#638](https://github.com/SAML-Toolkits/ruby-saml/pull/638) Fix dateTime format for the validUntil attribute of the generated metadata
6
-
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support idp cert multi with string keys
17
+
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support `Settings#idp_cert_multi` with string keys
*[#555](https://github.com/onelogin/ruby-saml/pull/555) Define 'soft' variable to prevent exception when doc cert is invalid
53
64
* Improve documentation
54
65
@@ -107,7 +118,6 @@
107
118
*[#423](https://github.com/onelogin/ruby-saml/pull/423) Allow format_cert to work with chained certificates
108
119
*[#422](https://github.com/onelogin/ruby-saml/pull/422) Use to_s for requested attribute value
109
120
110
-
111
121
### 1.5.0 (August 31, 2017)
112
122
*[#400](https://github.com/onelogin/ruby-saml/pull/400) When validating Signature use stored IdP certficate if Signature contains no info about Certificate
113
123
*[#402](https://github.com/onelogin/ruby-saml/pull/402) Fix validate_response_state method that rejected SAMLResponses when using idp_cert_multi and idp_cert and idp_cert_fingerprint were not provided.
@@ -116,7 +126,6 @@
116
126
*[#374](https://github.com/onelogin/ruby-saml/issues/374) Support more than one level of StatusCode
117
127
*[#405](https://github.com/onelogin/ruby-saml/pull/405) Support ADFS encrypted key (Accept KeyInfo nodes with no ds namespace)
raiseValidationError.new('An EncryptedAssertion found and no SP private key found on the settings to decrypt it. Be sure you provided the :settings parameter at the initialize method')
0 commit comments