Skip to content
Snippets Groups Projects
Select Git revision
  • 7b56a623af1912d16e8d0d563f9f16b0b7c56a8f
  • master default protected
  • cesnet_simplesamlphp-1.19.8
  • elixir_simplesamlphp-1.19.8
  • simplesamlphp-1.19.8
  • cesnet_simplesamlphp-1.19.5
  • simplesamlphp-2.0
  • feature/assets
  • feature/rac-source-selector
  • cleanup/remove-base64-attributes
  • simplesamlphp-1.19
  • elixir_simplesamlphp-1.19.5
  • aarc_idp_hinting
  • feature/validate-authstate-before-processing
  • feature/build-two-tarballs
  • dependabot/composer/twig/twig-3.4.3
  • tvdijen-patch-1
  • unchanged-acs-url-no-www-script
  • feature/translation-improvements
  • symfony6
  • move_tests
  • v1.19.9
  • v2.1.3
  • v2.0.10
  • v2.1.2
  • v2.0.9
  • v2.1.1
  • v2.0.8
  • v2.1.0
  • v2.0.7
  • v2.1.0-rc1
  • v2.0.6
  • v2.0.5
  • 2.0.4-alpha.1
  • v2.0.4-alpha.1
  • v2.0.4
  • v2.0.3
  • v2.0.2
  • v2.0.1-alpha.1
  • v2.0.1
  • v1.19.8
41 results

saml-schema-authn-context-pgp-2.0.xsd

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    inputTesting.py 1.04 KiB
    {
       "rules" : [
          {
             "allowedIPs" : [
                "10.1.1.10",
                "10.1.1.2",
                "10.1.2.3",
                "10.1.2.4"
             ],
             "rule" : "147.251.22.212:22,tcp"
          },
          {
             "allowedIPs" : [
                "10.1.1.10",
                "10.1.1.2",
                "10.1.2.3",
                "10.1.2.4"
             ],
             "rule" : "147.251.22.214:8082,tcp"
          },
          {
             "allowedIPs" : [
                "10.1.1.2",
                "10.1.1.5",
                "10.1.2.2"
             ],
             "rule" : "147.251.54.223:22,tcp"
          },
          {
             "allowedIPs" : [
                "10.1.1.10",
                "10.1.1.2",
                "10.1.1.5",
                "10.1.2.2",
                "10.1.2.3",
                "10.1.2.4"
             ],
             "rule" : "147.251.54.225:6633,tcp"
          },
          {
             "allowedIPs" : [
                "190.1.1.10",
                "170.1.1.2",
                "10.1.1.5",
                "10.1.2.2",
                "102.1.2.3",
                "10.1.2.4"
             ],
             "rule" : "147.250.1.225:22,tcp"
          }
       ]
    }