-
Notifications
You must be signed in to change notification settings - Fork 188
Open
Description
Is your feature request related to a problem? Please describe...
I have just updated to 4 version and confused by validateSignatureValue function.
I have duplicated <KeyInfo> inside SamlRequest and SamlMetadata. Similar to Okta example http://saml.oktadev.com/.
That's mean that loadSignature functions will initialize this.keyInfo by request key, and validateSignatureValue will use it preferable over metadata certificate without any option to choose another behavior.
// loadSignature
const keyInfo = xpath.select1(".//*[local-name(.)='KeyInfo']", signatureNode);
// TODO: should this just be a single return instead of an array that we always take the first entry of?
if (xpath.isNodeLike(keyInfo)) {
this.keyInfo = keyInfo;
}
// validateSignatureValue
const key = this.getCertFromKeyInfo(this.keyInfo) || this.publicCert || this.privateKey;
Describe teh solution you'd like...
Another order of keys.
Describe the alternatives you've considered...
Configurable keyInfo
Metadata
Metadata
Assignees
Labels
No labels