- Node saml separation #574
- Remove support for deprecated
privateCert
#569 - Enforce more secure XML encryption #584
- Add Node 16 support; drop Node 10 #589
- Update all dependencies to latest #590
- Require cert for every strategy #548
- Update xml-crypto to v2.1.1 #558
- Allow for authnRequestBinding in SAML options #529
- Add optional setting to set a ceiling on how old a SAML response is allowed to be #577
- Move XML functions to utility module #571
- Improve the typing of the Strategy class hierarchy. #554
- Resolve XML-encoded carriage returns during signature validation #576
- Make sure CI builds test latest versions of dependencies #570
- Add WantAssertionsSigned #536
- bump xmldom to 0.5.x since all lower versions have security issue #551
- Update xml-encryption to v1.2.3 #560
- Update xml-encryption to v1.2.3 #567
- Update all packages to latest semver-minor #588
- Fix incorrect import of compiled files in tests #572
- Remove deprecated field
privateCert
from README, tests #591 - Add support for more tags in the changelog #592
- Update readme on using multiSamlStrategy #531
- Create of Code of Conduct #573
- Changelog #587
- remove old callback functions, tests use async/await #545
- async/await for saml.ts #496
- Format code and enforce code style on PR #527
- Tests use typescript #534
- async / await in cache interface #532
- Fix lint npm script to match all files including in src/ #555
- Revert "Update xml-encryption to v1.2.3" #564
- Add deprecation notices for renamed variables #568
- Resolve XML-encoded carriage returns during signature validation (2.x) #578
- Update xml-crypto to v2.1.1 #557
- Update xml-encryption to v1.2.3 #562
- bump xmldom to 0.5.x since all lower versions have security issue (#551) #553
- Ignore
test
folder when building npm package #526
- Generating changelog using gren #518
- dev: add @types/xml-encryption #517
- support windows line breaks in keys #500
- add ts-ignore to generated type definitions for multisaml strategy #508
- fix: derive SamlConfig from SAMLOptions #515
- Reexport SamlConfig type to solve a regression in consumer packages #516
- fix(typing): multi saml stratey export #503
- normalize signature line endings before loading signature block to xml-crypto #512
- normalize line endings before signature validation #498
- Add deprecation notice for privateCert; fix bug #492
- Always throw error objects instead of strings #412
- Allow for use of privateKey instead of privateCert #488
- feat(authorize-request): idp scoping provider #428
- update version of xml2js to 0.4.23, fixes #479 #486
- validateSignature: Support XML docs that contain multiple signed nodes #455
- outdated Q library was removed #478
- validateSignature: Support XML docs that contain multiple signed node⦠#481
- Revert "validateSignature: Support XML docs that contain multiple signed nodes" #480
- Primary files use typescript #477
- compatibility with @types/passport-saml, fixes #475 #476
- Only make an attribute an object if it has child elements #464
- support typescript compilation #469
- try to use curl when wget is not available #468
- Ts secondary files #474
- bumped xml-crypto from 1.5.3 to 2.0.0 #470
- Add PR template #473
- Drop support for Node 8 #462
- Fix typo #434
- Upgrade xml-crypto dependancy #465
- Add GitHub Actions as Continuos Integration provider #463
- fix: add catch block to NameID decryption #461
- Fix multi saml strategy race conditions #426
- Singleline private keys #423
- Revert "convert privateCert to PEM for signing" #421
- Upgrade xml-encryption to 1.0.0 #420
- add support for encrypted nameIDs in SLO request handling #408
- Issue #206: Support signing AuthnRequests using the HTTP-POST Binding #207
- convert privateCert to PEM for signing #390
- Add tests to check for correct logout #418
- added passReqToCallback to docs #417
- Fix an issue readme formatting #416
- attributeConsumingServiceIndex can be zero #414
- fix #393 adding 'inResponseTo' in the profile #404
- Fix #355 missing parts: tests. #402
- Fix minimum version of Node.js in Travis #399
- Add .editorconfig as suggested in #373 #398
- Bring-up xml-crypto to 1.4.0 #400
- feat: add RequestedAuthnContext Comparison Type parameter #360
- Add option to disable SAML spec AuthnRequest optional value Assertion⦠#315
- Fix broken tests #367
- Update README.md #363
- Set explicitChar: true to make XML parsing consistent. Fixes issue #283 and #187 #361
- update xml crypto to 1.1.4 #352
- Upgrade xml-crypto to 1.1.2 #344
- Add SamlResponseXML method to profile object #330
- Fix Node Buffer deprecation warning: update 'new Buffer' to 'Buffer.from()' #342
- Fix #128 documentation for body-parser dependancy #326
- Update Node version in package.json to >=6 #340
- Fix for failing test #347
- Support InResponseTo validations in MultiSaml #350
- InResponseTo support for logout #356
- Create a way to get provider metadata when using the MultiSamlStrategy #323
- Adds signing key in the metadata service provider generation. #306
- Include support for run-time params to be included in the generated URLs #136
- support multiple authnContext #298
- Handle case of missing InResponseTo when validation is on #302
- Extend and document the profile object #301
- Update xml-crypto to 1.0.2 #321
- Validate issuer on logout requests/responses if configured #314
- feat(logout): handle null and undefined on nameQualifier #311
- entryPoint is compulsory for signed requests #299
No changelog for this release.
No changelog for this release.
- New Feature: allow customizing the name of the strategy. #262
- Support multiple and dynamic signing certificates #218
- Upd: Mention ADFS 2016 with NameIDFormatError. #242
- [security] Use crypto.randomBytes for ID generation #235
- Fix: "TypeError: Cannot read property 'documentElement' of null" #239
No changelog for this release.
- Add badges to readme #202
- Update README to clarify that saml.cert requires a PEM-encoded x509 c⦠#133
No changelog for this release.
No changelog for this release.
- Remove unused ejs package from devDeps #195
- Fixes #170: Clarify that the certificate are looking for is: #171
- Add the ability to sign with SHA-512 #173
- Support detached encrypted key #166
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.
No changelog for this release.