You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,20 @@
1
1
# Ruby SAML Changelog
2
+
3
+
### 1.17.0
4
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673) Add `Settings#sp_cert_multi` paramter to facilitate SP certificate and key rotation.
5
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673) Support multiple simultaneous SP decryption keys via `Settings#sp_cert_multi` parameter.
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` will use the first non-expired certificate/key when signing/decrypting. It will raise an error only if there are no valid certificates/keys.
8
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now validates the certificate `not_before` condition; previously it was only validating `not_after`.
9
+
*[#673](https://github.com/SAML-Toolkits/ruby-saml/pull/673)`:check_sp_cert_expiration` now causes the generated SP metadata to exclude any inactive/expired certificates.
10
+
2
11
### 1.16.0 (Oct 09, 2023)
3
12
*[#671](https://github.com/SAML-Toolkits/ruby-saml/pull/671) Add support on LogoutRequest with Encrypted NameID
4
13
5
14
### 1.15.0 (Jan 04, 2023)
6
15
*[#650](https://github.com/SAML-Toolkits/ruby-saml/pull/650) Replace strip! by strip on compute_digest method
7
16
*[#638](https://github.com/SAML-Toolkits/ruby-saml/pull/638) Fix dateTime format for the validUntil attribute of the generated metadata
8
-
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support idp cert multi with string keys
17
+
*[#576](https://github.com/SAML-Toolkits/ruby-saml/pull/576) Support `Settings#idp_cert_multi` with string keys
raiseValidationError.new('An EncryptedAssertion found and no SP private key found on the settings to decrypt it. Be sure you provided the :settings parameter at the initialize method')
0 commit comments