passport-saml
Advanced tools
Comparing version 0.8.0 to 0.9.0
@@ -92,2 +92,3 @@ var zlib = require('zlib'); | ||
var callbackUrl; | ||
var forceAuthn = self.options.forceAuthn || false; | ||
@@ -117,3 +118,3 @@ Q.fcall(function() { | ||
'@AssertionConsumerServiceURL': callbackUrl, | ||
'@Destination': self.options.entryPoint, | ||
'@Destination': self.options.entryPoint, | ||
'saml:Issuer' : { | ||
@@ -129,2 +130,6 @@ '@xmlns:saml' : 'urn:oasis:names:tc:SAML:2.0:assertion', | ||
if (forceAuthn) { | ||
request['samlp:AuthnRequest']['@ForceAuthn'] = true; | ||
} | ||
if (self.options.identifierFormat) { | ||
@@ -131,0 +136,0 @@ request['samlp:AuthnRequest']['samlp:NameIDPolicy'] = { |
{ | ||
"name": "passport-saml", | ||
"version": "0.8.0", | ||
"version": "0.9.0", | ||
"licenses": [ | ||
@@ -5,0 +5,0 @@ { |
@@ -58,2 +58,3 @@ Passport-SAML | ||
* `authnContext`: if truthy, name identifier format to request auth context (default: `urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport`) | ||
* `forceAuthn`: if set to true, the initial SAML request from the service provider specifies that the IdP should force re-authentication of the user, even if they possess a valid session. | ||
* InResponseTo Validation | ||
@@ -60,0 +61,0 @@ * `validateInResponseTo`: if truthy, then InResponseTo will be validated from incoming SAML responses |
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
228372
2254
201