Socket
Socket
Sign inDemoInstall

@zaptic-external/saml

Package Overview
Dependencies
75
Maintainers
1
Versions
29
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 2.0.2 to 2.0.3

4

package.json
{
"name": "@zaptic-external/saml",
"version": "2.0.2",
"version": "2.0.3",
"description": "Minimal saml service provider with support for sp-initiated redirect login only",

@@ -40,3 +40,3 @@ "main": "dist/service-provider.js",

"dependencies": {
"libxmljs": "0.19.7",
"libxmljs": "0.19.10",
"xml-crypto": "0.10.1",

@@ -43,0 +43,0 @@ "xml-encryption": "0.11.2",

@@ -13,4 +13,4 @@ [![Known Vulnerabilities](https://snyk.io/test/github/Zaptic/saml/badge.svg?targetFile=package.json)](https://snyk.io/test/github/Zaptic/saml?targetFile=package.json)

### The `sp` property
It should contain all configuration tied to the service provider.

@@ -22,3 +22,3 @@ These options will be used to generate the service provider metadata file and populate the login requests.

It is often a URL as they make it easy to namespace things so long as you own the domain.
If your id might contain numbers the saml spec says that the id should start with an "\_".
If your id might contain numbers the saml spec says that the id should start with an "_".

@@ -40,5 +40,4 @@ `sp.assertionUrl`

### The `idp` property
It should be either an object or string.
If it's a string, it should be a string containing the identity provider's metadata xml.
It should be either an object or string.
If it's a string, it should be a string containing the identity provider's metadata xml.
It is recommended that you use the metadata file as it's easier to maintain than the manually assigned properties.

@@ -54,3 +53,3 @@

`idp.signature`
This is the object that contains the certificates and signature algorithm that we should accept for signing the
This is the object that contains the certificates and signature algorithm that we should accept for signing the
identity provider's assertions

@@ -63,8 +62,8 @@

`idp.signature.allowedCertificates`
These are the public certificates that correspond to the private key the identity provider is using to sign the
These are the public certificates that correspond to the private key the identity provider is using to sign the
assertions. It must have at least one entry as we don't support unsigned requests at the moment.
### The `signature` object
It should contain everything needed to sign our request to the identity provider.
### The `signature` object
It should contain everything needed to sign our request to the identity provider.
Because we are trying to be secure by default, this is not optional.

@@ -77,6 +76,7 @@

The pem encoded public key used to sign your requests.
`signature.key`
The pem encoded public key used to sign your requests.
### The `preferences` object

@@ -91,3 +91,3 @@

When set to false it will not error if the identity provider does not send them but will still check that the assertion
is in the interval if the dates are provided.
is in the interval if the dates are provided.

@@ -102,3 +102,3 @@ `preferences.nameIdFormat` default 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress'

Request the identity provider to prompt the user with a challenge (e.g user name + password) even if they have a valid
session when set to true.
session when set to true.

@@ -108,4 +108,3 @@ `preferences.attributeMapping` default '{}'

unless you need extra claims from the identity provider.
Example:
Example:
```

@@ -119,3 +118,2 @@ {

Full example:
```typescript

@@ -127,9 +125,7 @@ const options = {

singleLogoutUrl: 'http://localhost:7000/sp/logout',
signature: [
{
algorithm: <'sha256'>'sha256',
certificate: testCert,
key: testKey
}
]
signature: [{
algorithm: <'sha256'>'sha256',
certificate: testCert,
key: testKey
}]
},

@@ -157,1 +153,2 @@ idp: {

```
SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc