@@ -31,9 +31,9 @@ Use the SAML strategy as a middleware in your application:
31
31
require ' omniauth'
32
32
use OmniAuth ::Strategies ::SAML ,
33
33
:assertion_consumer_service_url => " consumer_service_url" ,
34
- :issuer => " issuer " ,
35
- :idp_sso_target_url => " idp_sso_target_url " ,
36
- :idp_sso_target_url_runtime_params => {:original_request_param => :mapped_idp_param },
34
+ :sp_entity_id => " sp_entity_id " ,
35
+ :idp_sso_service_url => " idp_sso_service_url " ,
36
+ :idp_sso_service_url_runtime_params => {:original_request_param => :mapped_idp_param },
37
37
:idp_cert => " -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" ,
38
38
:idp_cert_multi => {
39
39
:signing => [" -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" , " -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" , ...],
@@ -58,9 +58,9 @@ and in `config/initializers/omniauth.rb`:
58
58
Rails .application.config.middleware.use OmniAuth ::Builder do
59
59
provider :saml ,
60
60
:assertion_consumer_service_url => " consumer_service_url" ,
61
- :issuer => " rails-application" ,
62
- :idp_sso_target_url => " idp_sso_target_url " ,
63
- :idp_sso_target_url_runtime_params => {:original_request_param => :mapped_idp_param },
61
+ :sp_entity_id => " rails-application" ,
62
+ :idp_sso_service_url => " idp_sso_service_url " ,
63
+ :idp_sso_service_url_runtime_params => {:original_request_param => :mapped_idp_param },
64
64
:idp_cert => " -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" ,
65
65
:idp_cert_multi => {
66
66
:signing => [" -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" , " -----BEGIN CERTIFICATE-----\n ...-----END CERTIFICATE-----" , ...],
@@ -72,7 +72,7 @@ Rails.application.config.middleware.use OmniAuth::Builder do
72
72
end
73
73
```
74
74
75
- For IdP-initiated SSO, users should directly access the IdP SSO target URL. Set the ` href ` of your application's login link to the value of ` idp_sso_target_url ` . For SP-initiated SSO, link to ` /auth/saml ` .
75
+ For IdP-initiated SSO, users should directly access the IdP SSO service URL. Set the ` href ` of your application's login link to the value of ` idp_sso_service_url ` . For SP-initiated SSO, link to ` /auth/saml ` .
76
76
77
77
A ` OneLogin::RubySaml::Response ` object is added to the ` env['omniauth.auth'] ` extra attribute, so we can use it in the controller via ` env['omniauth.auth'].extra.response_object `
78
78
@@ -88,13 +88,13 @@ Note that when [integrating with Devise](#devise-integration), the URL path will
88
88
received. If not provided, defaults to the OmniAuth callback URL (typically
89
89
` http://example.com/auth/saml/callback ` ). Optional.
90
90
91
- * ` :issuer ` - The name of your application. Some identity providers might need this
91
+ * ` :sp_entity_id ` - The name of your application. Some identity providers might need this
92
92
to establish the identity of the service provider requesting the login. ** Required** .
93
93
94
- * ` :idp_sso_target_url ` - The URL to which the authentication request should be sent.
94
+ * ` :idp_sso_service_url ` - The URL to which the authentication request should be sent.
95
95
This would be on the identity provider. ** Required** .
96
96
97
- * ` :idp_slo_target_url ` - The URL to which the single logout request and response should
97
+ * ` :idp_slo_service_url ` - The URL to which the single logout request and response should
98
98
be sent. This would be on the identity provider. Optional.
99
99
100
100
* ` :idp_slo_session_destroy ` - A proc that accepts up to two parameters (the rack environment, and the session),
@@ -106,7 +106,7 @@ Note that when [integrating with Devise](#devise-integration), the URL path will
106
106
instance will be passed to this callable if it has an arity of 1. If the value is a string,
107
107
the string will be returned, when the ` RelayState ` is called. Optional.
108
108
109
- * ` :idp_sso_target_url_runtime_params ` - A dynamic mapping of request params that exist
109
+ * ` :idp_sso_service_url_runtime_params ` - A dynamic mapping of request params that exist
110
110
during the request phase of OmniAuth that should to be sent to the IdP after a specific
111
111
mapping. So for example, a param ` original_request_param ` with value ` original_param_value ` ,
112
112
could be sent to the IdP on the login request as ` mapped_idp_param ` with value
@@ -170,7 +170,7 @@ idp_metadata = idp_metadata_parser.parse_remote_to_hash("http://idp.example.com/
170
170
use OmniAuth ::Strategies ::SAML ,
171
171
idp_metadata.merge(
172
172
:assertion_consumer_service_url => " consumer_service_url" ,
173
- :issuer => " issuer "
173
+ :sp_entity_id => " sp_entity_id "
174
174
)
175
175
```
176
176
@@ -186,7 +186,7 @@ In `config/initializers/devise.rb`:
186
186
Devise .setup do |config |
187
187
config.omniauth :saml ,
188
188
idp_cert_fingerprint: ' fingerprint' ,
189
- idp_sso_target_url : ' target_url '
189
+ idp_sso_service_url : ' idp_sso_service_url '
190
190
end
191
191
```
192
192
@@ -196,7 +196,7 @@ Then follow Devise's general [OmniAuth tutorial](https://github.com/plataformate
196
196
197
197
Single Logout can be Service Provider initiated or Identity Provider initiated.
198
198
199
- For SP initiated logout, the ` idp_slo_target_url ` option must be set to the logout url on the IdP,
199
+ For SP initiated logout, the ` idp_slo_service_url ` option must be set to the logout url on the IdP,
200
200
and users directed to ` user_saml_omniauth_authorize_path + '/spslo' ` after logging out locally. For
201
201
IdP initiated logout, logout requests from the IdP should go to ` /auth/saml/slo ` (this can be
202
202
advertised in metadata by setting the ` single_logout_service_url ` config option).
@@ -226,7 +226,7 @@ class SessionsController < Devise::SessionsController
226
226
# ...
227
227
228
228
def after_sign_out_path_for (_ )
229
- if session[' saml_uid' ] && session[' saml_session_index' ] && SAML_SETTINGS .idp_slo_target_url
229
+ if session[' saml_uid' ] && session[' saml_session_index' ] && SAML_SETTINGS .idp_slo_service_url
230
230
user_saml_omniauth_authorize_path + " /spslo"
231
231
else
232
232
super
0 commit comments