Skip to content
Snippets Groups Projects
Commit dab61cc8 authored by Thijs Kinkhorst's avatar Thijs Kinkhorst
Browse files

Also add SP-side docs and changelog

parent af7d4ab6
No related branches found
No related tags found
No related merge requests found
......@@ -316,6 +316,9 @@ Released 2017-11-20
refuse to parse an assertion with an eduPersonTargetedID in 'string' format.
* Receiving an eduPersonTargetedID in string form will no longer break
parsing of the assertion.
* Can disable the Scoping element in SP and remote IdP configuration with the
`disable_scoping` option, for compatibility with ADFS which does not accept
the element.
### `smartattributes`
* Fix SmartName authproc that failed to load.
......
......@@ -196,6 +196,15 @@ Options
: *Note*: For this to be added to the metadata, you must also specify the `attributes` and `name` options.
`disable_scoping`
: Whether sending of samlp:Scoping elements in authentication requests should be suppressed. The default value is `FALSE`.
When set to `TRUE`, no scoping elements will be sent. This does not comply with the SAML2 specification, but allows
interoperability with ADFS which [does not support Scoping elements](https://docs.microsoft.com/en-za/azure/active-directory/develop/active-directory-single-sign-on-protocol-reference#scoping).
: Note that this option also exists in the IdP remote configuration. An
entry in the the IdP-remote metadata overrides this the option in the
SP configuration.
`discoURL`
: Set which IdP discovery service this SP should use.
If this is unset, the IdP discovery service specified in the global option `idpdisco.url.{saml20|shib13}` in `config/config.php` will be used.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment