@types/saml2-js
Advanced tools
Comparing version 2.0.0 to 2.0.1
@@ -22,7 +22,7 @@ // Type definitions for SAML2-js 2.0.6 | ||
/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the SP or on a per-method basis. */ | ||
force_authn?: boolean; | ||
force_authn?: boolean | undefined; | ||
/** If true, signs the request. This can also be configured on the SP or on a per-method basis. */ | ||
sign_get_request?: boolean; | ||
sign_get_request?: boolean | undefined; | ||
/** If true, allows unencrypted assertions. This can also be configured on the SP or on a per-method basis. */ | ||
allow_unencrypted_assertion?: boolean; | ||
allow_unencrypted_assertion?: boolean | undefined; | ||
} | ||
@@ -78,7 +78,7 @@ | ||
/** Additional private keys to use when attempting to decrypt responses. Useful for adding backward-compatibility for old certificates after a rollover. */ | ||
alt_private_keys?: string[]; | ||
alt_private_keys?: string[] | undefined; | ||
/** Additional certificates to expose in the SAML metadata. Useful for staging new certificates for rollovers. */ | ||
alt_certs?: string[]; | ||
alt_certs?: string[] | undefined; | ||
/** If set, at least one of the <Audience> values within the <AudienceRestriction> condition of a SAML authentication response must match. Defaults to `entity_id`. */ | ||
audience?: string | RegExp; | ||
audience?: string | RegExp | undefined; | ||
/** | ||
@@ -91,25 +91,25 @@ * To account for clock skew between IdP and SP, accept responses with a NotBefore condition | ||
*/ | ||
notbefore_skew?: number; | ||
notbefore_skew?: number | undefined; | ||
/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the IdP or on a per-method basis. */ | ||
force_authn?: boolean; | ||
force_authn?: boolean | undefined; | ||
/** Specifies AuthnContextClassRef. This can also be configured on a per-method basis. */ | ||
auth_context?: AuthnContextClassRef; | ||
auth_context?: AuthnContextClassRef | undefined; | ||
/** Format for Name ID. This can also be configured on a per-method basis. */ | ||
nameid_format?: string; | ||
nameid_format?: string | undefined; | ||
/** If true, signs the request. This can also be configured on the IdP or on a per-method basis. */ | ||
sign_get_request?: boolean; | ||
sign_get_request?: boolean | undefined; | ||
/** If true, allows unencrypted assertions. This can also be configured on the IdP or on a per-method basis. */ | ||
allow_unencrypted_assertion?: boolean; | ||
allow_unencrypted_assertion?: boolean | undefined; | ||
} | ||
export interface CreateLoginRequestUrlOptions { | ||
/** SAML relay state. */ | ||
relay_state?: string; | ||
relay_state?: string | undefined; | ||
/** Specifies AuthnContextClassRef. This can also be configured on the SP. */ | ||
auth_context?: AuthnContextClassRef; | ||
auth_context?: AuthnContextClassRef | undefined; | ||
/** Format for Name ID. This can also be configured on the SP. */ | ||
nameid_format?: string; | ||
nameid_format?: string | undefined; | ||
/** If true, forces re-authentication of users even if the user has a SSO session with the IdP. This can also be configured on the IdP or SP. */ | ||
force_authn?: boolean; | ||
force_authn?: boolean | undefined; | ||
/** If true, signs the request. This can also be configured on the IdP or SP. */ | ||
sign_get_request?: boolean; | ||
sign_get_request?: boolean | undefined; | ||
} | ||
@@ -123,9 +123,9 @@ export interface RedirectAssertOptions { | ||
/** If true, allows unencrypted assertions. This can also be configured on the IdP or SP. */ | ||
allow_unencrypted_assertion?: boolean; | ||
allow_unencrypted_assertion?: boolean | undefined; | ||
/** If false, allow the assertion to be valid without a SessionIndex attribute on the AuthnStatement node. */ | ||
require_session_index?: boolean; | ||
require_session_index?: boolean | undefined; | ||
} | ||
export interface PostAssertOptions extends RedirectAssertOptions { | ||
/** If set, at least one of the <Audience> values within the <AudienceRestriction> condition of a SAML authentication response must match. Defaults to entity_id. */ | ||
audience?: string | RegExp; | ||
audience?: string | RegExp | undefined; | ||
/** | ||
@@ -138,23 +138,23 @@ * To account for clock skew between IdP and SP, accept responses with a NotBefore condition | ||
*/ | ||
notbefore_skew?: boolean; | ||
notbefore_skew?: boolean | undefined; | ||
} | ||
export interface CreateLogoutRequestUrlOptions { | ||
/** Format for Name ID. This can also be configured on a per-method basis. */ | ||
name_id?: string; | ||
name_id?: string | undefined; | ||
/** Session index to use for creating logout request. */ | ||
session_index?: string; | ||
session_index?: string | undefined; | ||
/** If true, allows unencrypted assertions. This can also be configured on the IdP or SP. */ | ||
allow_unencrypted_assertion?: boolean; | ||
allow_unencrypted_assertion?: boolean | undefined; | ||
/** If true, signs the request. This can also be configured on the IdP or SP. */ | ||
sign_get_request?: boolean; | ||
sign_get_request?: boolean | undefined; | ||
/** SAML relay state. */ | ||
relay_state?: string; | ||
relay_state?: string | undefined; | ||
} | ||
export interface CreateLogoutResponseUrlOptions { | ||
/** The ID of the request that this is in response to. Should be checked against any sent request IDs. */ | ||
in_response_to?: string; | ||
in_response_to?: string | undefined; | ||
/** If true, signs the request. This can also be configured on the IdP or SP. */ | ||
sign_get_request?: boolean; | ||
sign_get_request?: boolean | undefined; | ||
/** SAML relay state. */ | ||
relay_state?: string; | ||
relay_state?: string | undefined; | ||
} | ||
@@ -167,5 +167,5 @@ | ||
name_id: string; | ||
session_index?: string; | ||
session_not_on_or_after?: string; | ||
attributes?: { [attr: string]: string | string[] }; | ||
session_index?: string | undefined; | ||
session_not_on_or_after?: string | undefined; | ||
attributes?: { [attr: string]: string | string[] } | undefined; | ||
}; | ||
@@ -172,0 +172,0 @@ } |
{ | ||
"name": "@types/saml2-js", | ||
"version": "2.0.0", | ||
"version": "2.0.1", | ||
"description": "TypeScript definitions for SAML2-js", | ||
"homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/saml2-js", | ||
"license": "MIT", | ||
@@ -27,4 +28,4 @@ "contributors": [ | ||
"dependencies": {}, | ||
"typesPublisherContentHash": "cf9b057099e89e0cede6352a0e35b7d3b14ed7d8c775f0552bcd654e4486ce3d", | ||
"typeScriptVersion": "3.3" | ||
"typesPublisherContentHash": "7a4702351c86200e04ff8fb1c8c29df0e3bad4f06e7db674c7583201b40e6939", | ||
"typeScriptVersion": "3.6" | ||
} |
@@ -11,3 +11,3 @@ # Installation | ||
### Additional Details | ||
* Last updated: Fri, 18 Dec 2020 20:12:33 GMT | ||
* Last updated: Tue, 06 Jul 2021 16:34:12 GMT | ||
* Dependencies: none | ||
@@ -14,0 +14,0 @@ * Global values: none |
No website
QualityPackage does not have a website.
Found 1 instance in 1 package
11736
0