passport-saml
Advanced tools
Comparing version 1.3.4 to 1.3.5
@@ -1012,3 +1012,3 @@ var debug = require('debug')('passport-saml'); | ||
var attrValueMapper = function(value) { | ||
return typeof value === 'string' ? value : value._; | ||
return value._ ? value._ : value; | ||
}; | ||
@@ -1015,0 +1015,0 @@ |
{ | ||
"name": "passport-saml", | ||
"version": "1.3.4", | ||
"version": "1.3.5", | ||
"license": "MIT", | ||
@@ -26,3 +26,3 @@ "keywords": [ | ||
"type": "git", | ||
"url": "https://github.com/bergie/passport-saml.git" | ||
"url": "https://github.com/node-saml/passport-saml.git" | ||
}, | ||
@@ -35,3 +35,3 @@ "main": "./lib/passport-saml", | ||
"xml-crypto": "^1.4.0", | ||
"xml-encryption": "^1.0.0", | ||
"xml-encryption": "1.2.1", | ||
"xml2js": "0.4.x", | ||
@@ -38,0 +38,0 @@ "xmlbuilder": "^11.0.0", |
Passport-SAML | ||
============= | ||
[![Build Status](https://travis-ci.org/bergie/passport-saml.svg?branch=master)](https://travis-ci.org/bergie/passport-saml) [![GitHub version](https://badge.fury.io/gh/bergie%2Fpassport-saml.svg)](https://badge.fury.io/gh/bergie%2Fpassport-saml) [![npm version](https://badge.fury.io/js/passport-saml.svg)](http://badge.fury.io/js/passport-saml) [![dependencies](https://david-dm.org/bergie/passport-saml.svg)](https://david-dm.org/bergie/passport-saml.svg) [![devDependencies](https://david-dm.org/bergie/passport-saml/dev-status.svg)](https://david-dm.org/bergie/passport-saml/dev-status.svg) [![peerDependencies](https://david-dm.org/bergie/passport-saml/peer-status.svg)](https://david-dm.org/bergie/passport-saml/peer-status.svg) | ||
[![Build Status](https://travis-ci.org/bergie/passport-saml.svg?branch=master)](https://travis-ci.org/bergie/passport-saml) [![GitHub version](https://badge.fury.io/gh/node-saml%2Fpassport-saml.svg)](https://badge.fury.io/gh/node-saml%2Fpassport-saml) [![npm version](https://badge.fury.io/js/passport-saml.svg)](http://badge.fury.io/js/passport-saml) [![NPM](https://nodei.co/npm/passport-saml.png?downloads=true&downloadRank=true&stars=true)](https://nodei.co/npm/passport-saml/) | ||
[![NPM](https://nodei.co/npm/passport-saml.png?downloads=true&downloadRank=true&stars=true)](https://nodei.co/npm/passport-saml/) | ||
This is a [SAML 2.0](http://en.wikipedia.org/wiki/SAML_2.0) authentication provider for [Passport](http://passportjs.org/), the Node.js authentication library. | ||
@@ -80,5 +78,5 @@ | ||
Using multiple providers supports `validateInResponseTo`, but all the `InResponse` values are stored on the same Cache. This means, if you're using the default `InMemoryCache`, that all providers have access to it and a provider might get its response validated against another's request. [Issue Report](!https://github.com/bergie/passport-saml/issues/334). To amend this you should provide a different cache provider per SAML provider, through the `getSamlOptions` function. | ||
Using multiple providers supports `validateInResponseTo`, but all the `InResponse` values are stored on the same Cache. This means, if you're using the default `InMemoryCache`, that all providers have access to it and a provider might get its response validated against another's request. [Issue Report](!https://github.com/node-saml/passport-saml/issues/334). To amend this you should provide a different cache provider per SAML provider, through the `getSamlOptions` function. | ||
> :warning: **There's a race condition [bug](https://github.com/bergie/passport-saml/issues/425) in versions < 1.3.3 which makes it vulnerable to DOS attacks**: Please use > 1.3.3 if you want to use this issue | ||
> :warning: **There's a race condition [bug](https://github.com/node-saml/passport-saml/issues/425) in versions < 1.3.3 which makes it vulnerable to DOS attacks**: Please use > 1.3.3 if you want to use this issue | ||
@@ -131,3 +129,3 @@ | ||
* `attributeConsumingServiceIndex`: optional `AttributeConsumingServiceIndex` attribute to add to AuthnRequest to instruct the IDP which attribute set to attach to the response ([link](http://blog.aniljohn.com/2014/01/data-minimization-front-channel-saml-attribute-requests.html)) | ||
* `disableRequestedAuthnContext`: if truthy, do not request a specific authentication context. This is [known to help when authenticating against Active Directory](https://github.com/bergie/passport-saml/issues/226) (AD FS) servers. | ||
* `disableRequestedAuthnContext`: if truthy, do not request a specific authentication context. This is [known to help when authenticating against Active Directory](https://github.com/node-saml/passport-saml/issues/226) (AD FS) servers. | ||
* `authnContext`: if truthy, name identifier format to request auth context (default: `urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport`); array of values is also supported | ||
@@ -371,3 +369,3 @@ * `RACComparison`: Requested Authentication Context comparison type. Possible values are 'exact','minimum','maximum','better'. Default is 'exact'. | ||
See [Releases](https://github.com/bergie/passport-saml/releases) to find the changes that go into each release. | ||
See [Releases](https://github.com/node-saml/passport-saml/releases) to find the changes that go into each release. | ||
@@ -374,0 +372,0 @@ ## FAQ |
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
478540
44
4940
386
+ Addedxml-encryption@1.2.1(transitive)
+ Addedxpath@0.0.27(transitive)
- Removedxml-encryption@1.3.0(transitive)
Updatedxml-encryption@1.2.1