Skip to content

Extract all bindings and support multiple certificates when decoding idp metadata#26

Open
kmacgugan wants to merge 2 commits intoarekinath:developfrom
chef:multiple-certificates
Open

Extract all bindings and support multiple certificates when decoding idp metadata#26
kmacgugan wants to merge 2 commits intoarekinath:developfrom
chef:multiple-certificates

Conversation

@kmacgugan
Copy link
Copy Markdown

Extract all bindings when decoding idp metadata.

-Before, this would only look for HTTP-POST login locations. Now, it will
extract any location it finds: post, redirect, or artifact. The way this
is achieved is not the most beautiful, but allows for easy matching when
#esaml_idp_metadata is used.

Support multiple certificates from idp metadata.

-Changes the esaml_idp_metadata record: certificate -> certificates,
now of type [binary()] instead of binary(), with undefined instead
of [] winning if there's nothing in the metadata xml document.

Adds okta-ish and azure test metadata.

srenatus added 2 commits June 29, 2016 10:46
Before, this would only look for HTTP-POST login locations. Now, it will
extract any location it finds: post, redirect, or artifact. The way this
is achieved is not the most beautiful, but allows for easy matching when
`#esaml_idp_metadata` is used.

Also adds okta-ish test metadata.
Changes the `esaml_idp_metadata` record: `certificate` -> `certificates`,
now of type `[binary()]` instead of `binary()`, with `undefined` instead
of `[]` winning if there's nothing in the metadata xml document.

Test data included (Azure AD).
@kmacgugan kmacgugan changed the title Multiple certificates Extract all bindings and support multiple certificates when decoding idp metadata Jun 29, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants