Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@types/saml2-js

Package Overview
Dependencies
Maintainers
1
Versions
16
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@types/saml2-js - npm Package Compare versions

Comparing version 2.0.0 to 2.0.1

64

saml2-js/index.d.ts

@@ -22,7 +22,7 @@ // Type definitions for SAML2-js 2.0.6

/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the SP or on a per-method basis. */
force_authn?: boolean;
force_authn?: boolean | undefined;
/** If true, signs the request. This can also be configured on the SP or on a per-method basis. */
sign_get_request?: boolean;
sign_get_request?: boolean | undefined;
/** If true, allows unencrypted assertions. This can also be configured on the SP or on a per-method basis. */
allow_unencrypted_assertion?: boolean;
allow_unencrypted_assertion?: boolean | undefined;
}

@@ -78,7 +78,7 @@

/** Additional private keys to use when attempting to decrypt responses. Useful for adding backward-compatibility for old certificates after a rollover. */
alt_private_keys?: string[];
alt_private_keys?: string[] | undefined;
/** Additional certificates to expose in the SAML metadata. Useful for staging new certificates for rollovers. */
alt_certs?: string[];
alt_certs?: string[] | undefined;
/** If set, at least one of the <Audience> values within the <AudienceRestriction> condition of a SAML authentication response must match. Defaults to `entity_id`. */
audience?: string | RegExp;
audience?: string | RegExp | undefined;
/**

@@ -91,25 +91,25 @@ * To account for clock skew between IdP and SP, accept responses with a NotBefore condition

*/
notbefore_skew?: number;
notbefore_skew?: number | undefined;
/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the IdP or on a per-method basis. */
force_authn?: boolean;
force_authn?: boolean | undefined;
/** Specifies AuthnContextClassRef. This can also be configured on a per-method basis. */
auth_context?: AuthnContextClassRef;
auth_context?: AuthnContextClassRef | undefined;
/** Format for Name ID. This can also be configured on a per-method basis. */
nameid_format?: string;
nameid_format?: string | undefined;
/** If true, signs the request. This can also be configured on the IdP or on a per-method basis. */
sign_get_request?: boolean;
sign_get_request?: boolean | undefined;
/** If true, allows unencrypted assertions. This can also be configured on the IdP or on a per-method basis. */
allow_unencrypted_assertion?: boolean;
allow_unencrypted_assertion?: boolean | undefined;
}
export interface CreateLoginRequestUrlOptions {
/** SAML relay state. */
relay_state?: string;
relay_state?: string | undefined;
/** Specifies AuthnContextClassRef. This can also be configured on the SP. */
auth_context?: AuthnContextClassRef;
auth_context?: AuthnContextClassRef | undefined;
/** Format for Name ID. This can also be configured on the SP. */
nameid_format?: string;
nameid_format?: string | undefined;
/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the IdP or SP. */
force_authn?: boolean;
force_authn?: boolean | undefined;
/** If true, signs the request. This can also be configured on the IdP or SP. */
sign_get_request?: boolean;
sign_get_request?: boolean | undefined;
}

@@ -123,9 +123,9 @@ export interface RedirectAssertOptions {

/** If true, allows unencrypted assertions. This can also be configured on the IdP or SP. */
allow_unencrypted_assertion?: boolean;
allow_unencrypted_assertion?: boolean | undefined;
/** If false, allow the assertion to be valid without a SessionIndex attribute on the AuthnStatement node. */
require_session_index?: boolean;
require_session_index?: boolean | undefined;
}
export interface PostAssertOptions extends RedirectAssertOptions {
/** If set, at least one of the <Audience> values within the <AudienceRestriction> condition of a SAML authentication response must match. Defaults to entity_id. */
audience?: string | RegExp;
audience?: string | RegExp | undefined;
/**

@@ -138,23 +138,23 @@ * To account for clock skew between IdP and SP, accept responses with a NotBefore condition

*/
notbefore_skew?: boolean;
notbefore_skew?: boolean | undefined;
}
export interface CreateLogoutRequestUrlOptions {
/** Format for Name ID. This can also be configured on a per-method basis. */
name_id?: string;
name_id?: string | undefined;
/** Session index to use for creating logout request. */
session_index?: string;
session_index?: string | undefined;
/** If true, allows unencrypted assertions. This can also be configured on the IdP or SP. */
allow_unencrypted_assertion?: boolean;
allow_unencrypted_assertion?: boolean | undefined;
/** If true, signs the request. This can also be configured on the IdP or SP. */
sign_get_request?: boolean;
sign_get_request?: boolean | undefined;
/** SAML relay state. */
relay_state?: string;
relay_state?: string | undefined;
}
export interface CreateLogoutResponseUrlOptions {
/** The ID of the request that this is in response to. Should be checked against any sent request IDs. */
in_response_to?: string;
in_response_to?: string | undefined;
/** If true, signs the request. This can also be configured on the IdP or SP. */
sign_get_request?: boolean;
sign_get_request?: boolean | undefined;
/** SAML relay state. */
relay_state?: string;
relay_state?: string | undefined;
}

@@ -167,5 +167,5 @@

name_id: string;
session_index?: string;
session_not_on_or_after?: string;
attributes?: { [attr: string]: string | string[] };
session_index?: string | undefined;
session_not_on_or_after?: string | undefined;
attributes?: { [attr: string]: string | string[] } | undefined;
};

@@ -172,0 +172,0 @@ }

{
"name": "@types/saml2-js",
"version": "2.0.0",
"version": "2.0.1",
"description": "TypeScript definitions for SAML2-js",
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/saml2-js",
"license": "MIT",

@@ -27,4 +28,4 @@ "contributors": [

"dependencies": {},
"typesPublisherContentHash": "cf9b057099e89e0cede6352a0e35b7d3b14ed7d8c775f0552bcd654e4486ce3d",
"typeScriptVersion": "3.3"
"typesPublisherContentHash": "7a4702351c86200e04ff8fb1c8c29df0e3bad4f06e7db674c7583201b40e6939",
"typeScriptVersion": "3.6"
}

@@ -11,3 +11,3 @@ # Installation

### Additional Details
* Last updated: Fri, 18 Dec 2020 20:12:33 GMT
* Last updated: Tue, 06 Jul 2021 16:34:12 GMT
* Dependencies: none

@@ -14,0 +14,0 @@ * Global values: none

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc