Releases: node-saml/passport-saml
Releases · node-saml/passport-saml
v1.4.0
Dependencies
- Upgrade xml-crypto to 2.0.0. HMAC-SHA1 is no longer enabled by default for security
(But it doesn't appear that we were using it, so the major version is not being bumped) - Drop support for Node 8
Bug Fixes
- Only make an attribute an object if it has child elements
- add catch block to NameID decryption (#461)
Internals
v1.3.5
v1.3.4
v1.3.3
v1.3.2
v1.3.1
v1.3.0
New Features
- Add inResponseTo to profile (#400)
- Support signing AuthnRequests with HTTP-POST Binding
- Add support for encrypted nameIDs in SLO request handling
- Allow privateCert to be a single line with no headers (#390)
Bug Fixes
- Bump xml-crypto to 1.4.0
- Quit deleting "name" option passed in.
- Fix case where attributeConsumingServiceIndex can be zero
Breaking Changes
- Drop support for Node 6
Internals
- Add more logout testse
- Add .editorconfig
- Switch from jshint to eslint
- refactor to use more arrow functions
- Document Node version support policy (We support the oldest LTS release)
v1.2.0
v1.1.0
New Features
- Add option to disable SAML spec AuthnRequest optional value AssertionConsumerServiceURL. (Steven Marusa)
- Add SamlResponseXML method to profile object (@josecolella)
- Support InResponseTo validations in MultiSaml (@stavros-wb)
- Create a way to get provider metadata when using MultiSamlStrategy (@mlunoe)
- Add Requested Authn Context Comparison Type parameter: RACComparison (@osan15, @markstos)
Bug Fixes
- Fix error handling bug with MultiSaml code (@cjbarth)
Internals
v1.0.0
Dependencies
- Upgrade xml-crypto to 1.0.2. Thanks to @elahti
Node Release support
- Node 4 is no longer supported due to EOL status. BREAKING CHANGE.
Validation improvements
- Fixes #180: Signature validation will error if empty signature is provided. BREAKING CHANGE. Thanks to @andrsnn
- Validate issuer on logout requests/responses if configured. Thanks to @stavros-wb
- Handle case of missing InResponseTo when validation is on. Thanks to @cjbarth
Features
- Improve Microsoft Outlook compatibility by handling
null
as well asundefined
Thanks to @sibelius - Support redirect for Logout flows. Thanks to @stavros-wb
- Adding signing key in the metadata service provider generation BREAKING CHANGE. Thanks to @tmoiron.
- Extend and document the profile opbject. Thanks to @cjbarth
- #298 Thanks to @cjbarth
- Support dynamic SAML configuration lookup Thanks to @stavros-wb
Docs
- Fix typo in README.