You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Mark SHA1 as deprecated
- Aggregate verification settings in dataclass
- Mark all dataclasses in API as frozen
- Add ability to assert expected signature location
- Add ability to assert expected signature algorithms
- Add ability to assert expected digest algorithms
- Add MGF1 ("RSASSA-PSS without parameters") algorithm identifiers
- Remove PSS ("RSASSA-PSS with parameters") and EdDSA algorithm
identifiers (given low usage and no interop examples, we will not be
implementing PSS parameters for now; EdDSA key info additionally has
no standardized way to serialize it)
- Add debug logging of canonicalization outputs
- Documentation and formatting improvements
* Simple interface with useful, ergonomic, and secure defaults (no network calls, XSLT or XPath transforms)
27
27
* Compactness, readability, and extensibility
28
28
29
29
Installation
@@ -108,7 +108,10 @@ Assuming ``metadata.xml`` contains SAML metadata for the assertion source:
108
108
data returned by the ``verify()`` method. The ``signed_xml`` attribute of the return value is the XML node or string that
109
109
was signed.
110
110
111
-
**Recommended reading:** `W3C XML Signature Best Practices for Applications <http://www.w3.org/TR/xmldsig-bestpractices/#practices-applications>`_, `On Breaking SAML: Be Whoever You Want to Be <https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf>`_, `Duo Finds SAML Vulnerabilities Affecting Multiple Implementations <https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations>`_
111
+
**Recommended reading:** `W3C XML Signature Best Practices for Applications
112
+
<http://www.w3.org/TR/xmldsig-bestpractices/#practices-applications>`_, `On Breaking SAML: Be Whoever You Want to Be
0 commit comments