Skip to content

Commit 4921b49

Browse files
committed
Merge branch '6.0.x'
2 parents 9d19435 + d8db849 commit 4921b49

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

docs/modules/ROOT/pages/servlet/saml2/login/authentication.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ fun securityFilters(val http: HttpSecurity, val converter: AuthenticationConvert
114114
== Setting a Clock Skew
115115

116116
It's not uncommon for the asserting and relying parties to have system clocks that aren't perfectly synchronized.
117-
For that reason, you can configure `OpenSaml4AuthenticationProvider` 's default assertion validator with some tolerance:
117+
For that reason, you can configure ``OpenSaml4AuthenticationProvider``'s default assertion validator with some tolerance:
118118

119119
====
120120
.Java
@@ -260,7 +260,7 @@ open class SecurityConfig {
260260
<3> Third, return a custom authentication that includes the user details
261261

262262
[NOTE]
263-
It's not required to call `OpenSaml4AuthenticationProvider` 's default authentication converter.
263+
It's not required to call ``OpenSaml4AuthenticationProvider``'s default authentication converter.
264264
It returns a `Saml2AuthenticatedPrincipal` containing the attributes it extracted from ``AttributeStatement``s as well as the single `ROLE_USER` authority.
265265

266266
[[servlet-saml2login-opensamlauthenticationprovider-additionalvalidation]]
@@ -293,7 +293,7 @@ After verifying the signature, it will:
293293
1. Validate `<AudienceRestriction>` and `<DelegationRestriction>` conditions
294294
2. Validate ``<SubjectConfirmation>``s, expect for any IP address information
295295

296-
To perform additional validation, you can configure your own assertion validator that delegates to `OpenSaml4AuthenticationProvider` 's default and then performs its own.
296+
To perform additional validation, you can configure your own assertion validator that delegates to ``OpenSaml4AuthenticationProvider``'s default and then performs its own.
297297

298298
[[servlet-saml2login-opensamlauthenticationprovider-onetimeuse]]
299299
For example, you can use OpenSAML's `OneTimeUseConditionValidator` to also validate a `<OneTimeUse>` condition, like so:
@@ -347,7 +347,7 @@ provider.setAssertionValidator { assertionToken ->
347347
====
348348

349349
[NOTE]
350-
While recommended, it's not necessary to call `OpenSaml4AuthenticationProvider` 's default assertion validator.
350+
While recommended, it's not necessary to call ``OpenSaml4AuthenticationProvider``'s default assertion validator.
351351
A circumstance where you would skip it would be if you don't need it to check the `<AudienceRestriction>` or the `<SubjectConfirmation>` since you are doing those yourself.
352352

353353
[[servlet-saml2login-opensamlauthenticationprovider-decryption]]
@@ -359,7 +359,7 @@ Spring Security decrypts `<saml2:EncryptedAssertion>`, `<saml2:EncryptedAttribut
359359
The response decrypter is for decrypting encrypted elements of the `<saml2:Response>`, like `<saml2:EncryptedAssertion>`.
360360
The assertion decrypter is for decrypting encrypted elements of the `<saml2:Assertion>`, like `<saml2:EncryptedAttribute>` and `<saml2:EncryptedID>`.
361361

362-
You can replace `OpenSaml4AuthenticationProvider`'s default decryption strategy with your own.
362+
You can replace ``OpenSaml4AuthenticationProvider``'s default decryption strategy with your own.
363363
For example, if you have a separate service that decrypts the assertions in a `<saml2:Response>`, you can use it instead like so:
364364

365365
====

docs/modules/ROOT/pages/servlet/saml2/login/overview.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -293,7 +293,7 @@ Spring Boot generates two `@Bean` objects for a relying party.
293293
The first is a `SecurityFilterChain` that configures the application as a relying party.
294294
When including `spring-security-saml2-service-provider`, the `SecurityFilterChain` looks like:
295295

296-
.Default JWT Configuration
296+
.Default SAML 2.0 Login Configuration
297297
====
298298
.Java
299299
[source,java,role="primary"]

0 commit comments

Comments
 (0)