Socket
Socket
Sign inDemoInstall

passport-saml

Package Overview
Dependencies
Maintainers
2
Versions
68
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

passport-saml - npm Package Compare versions

Comparing version 0.8.0 to 0.9.0

7

lib/passport-saml/saml.js

@@ -92,2 +92,3 @@ var zlib = require('zlib');

var callbackUrl;
var forceAuthn = self.options.forceAuthn || false;

@@ -117,3 +118,3 @@ Q.fcall(function() {

'@AssertionConsumerServiceURL': callbackUrl,
'@Destination': self.options.entryPoint,
'@Destination': self.options.entryPoint,
'saml:Issuer' : {

@@ -129,2 +130,6 @@ '@xmlns:saml' : 'urn:oasis:names:tc:SAML:2.0:assertion',

if (forceAuthn) {
request['samlp:AuthnRequest']['@ForceAuthn'] = true;
}
if (self.options.identifierFormat) {

@@ -131,0 +136,0 @@ request['samlp:AuthnRequest']['samlp:NameIDPolicy'] = {

2

package.json
{
"name": "passport-saml",
"version": "0.8.0",
"version": "0.9.0",
"licenses": [

@@ -5,0 +5,0 @@ {

@@ -58,2 +58,3 @@ Passport-SAML

* `authnContext`: if truthy, name identifier format to request auth context (default: `urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport`)
* `forceAuthn`: if set to true, the initial SAML request from the service provider specifies that the IdP should force re-authentication of the user, even if they possess a valid session.
* InResponseTo Validation

@@ -60,0 +61,0 @@ * `validateInResponseTo`: if truthy, then InResponseTo will be validated from incoming SAML responses

Sorry, the diff of this file is too big to display

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc