We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When loading idp metadata you shouldn't then have to re-find that same idp to set the settings for it
//Currently var myconfig = new Saml2Configuration { ServiceProvider = new ServiceProvider { SigningCertificate = new X509Certificate2(FileEmbeddedResource("cert.pfx"), "pass", MachineKeySet), Server = "https://localhost:44333/myapp", Id = "https://localhost:44333/myapp" // EntityId used in SAMLP to identify this SP }, AllowedAudienceUris = new List<Uri>(new[] { new Uri("https://localhost:44333/myapp") }) }; myconfig.ServiceProvider.Endpoints.AddRange(new[] { new ServiceProviderEndpoint(EndpointType.SignOn, "/myapp/saml2/login", "/core"), new ServiceProviderEndpoint(EndpointType.Logout, "/myapp/saml2/logout", "/core"), new ServiceProviderEndpoint(EndpointType.Metadata, "/myapp/saml2/metadata") }); myconfig.IdentityProviders.AddByMetadata("IdPMetadataFile.xml"); myconfig.IdentityProviders.First().OmitAssertionSignatureCheck = true; myconfig.LoggingFactoryType = "SAML2.Logging.DebugLoggerFactory"; return myconfig;
We should
var myconfig = new Saml2Configuration { ServiceProvider = new ServiceProvider { SigningCertificate = new X509Certificate2(FileEmbeddedResource("cert.pfx"), "pass", MachineKeySet), Server = "https://localhost:44333/myapp", Id = "https://localhost:44333/myapp" // EntityId used in SAMLP to identify this SP }, AllowedAudienceUris = new List<Uri>(new[] { new Uri("https://localhost:44333/myapp") }) }; myconfig.ServiceProvider.Endpoints.AddRange(new[] { new ServiceProviderEndpoint(EndpointType.SignOn, "/myapp/saml2/login", "/core"), new ServiceProviderEndpoint(EndpointType.Logout, "/myapp/saml2/logout", "/core"), new ServiceProviderEndpoint(EndpointType.Metadata, "/myapp/saml2/metadata") }); myconfig.IdentityProviders.AddByMetadata("IdPMetadataFile.xml", new IdentityProviderOptions { OmitAssertionSignatureCheck = true }); myconfig.LoggingFactoryType = "SAML2.Logging.DebugLoggerFactory"; return myconfig;
The text was updated successfully, but these errors were encountered:
eByte23
No branches or pull requests
When loading idp metadata you shouldn't then have to re-find that same idp to set the settings for it
We should
The text was updated successfully, but these errors were encountered: