|
| 1 | +# java-saml changelog |
| 2 | + |
| 3 | +### 2.1.5 (Nov 3, 2015) |
| 4 | +* [#86](https://github.com/onelogin/python-saml/pull/86) Make idp settings optional (Usefull when validating SP metadata) |
| 5 | +* [#79](https://github.com/onelogin/python-saml/pull/79) Remove unnecesary dependence. M2crypto is not used. |
| 6 | +* [#77](https://github.com/onelogin/python-saml/pull/77) Fix server_port can be None |
| 7 | +* Fix bug on settings constructor related to sp_validation_only |
| 8 | +* Make SPNameQualifier optional on the generateNameId method. Avoid the use of SPNameQualifier when generating the NameID on the LogoutRequest builder. |
| 9 | +* Allows the RequestedAuthnContext Comparison attribute to be set via settings |
| 10 | +* Be able to retrieve Session Timeout after processResponse |
| 11 | +* Update documentation. Clarify the use of the certFingerprint |
| 12 | + |
| 13 | +### 2.1.4 (Jul 17, 2015) |
| 14 | +* Now the SP is able to select the algorithm to be used on signatures (DSA_SHA1, RSA_SHA1, RSA_SHA256, RSA_SHA384, RSA_SHA512). |
| 15 | +* Support sign validation of different kinds of algorithm |
| 16 | +* Add demo example of the Bottle framework. |
| 17 | +* [#73](https://github.com/onelogin/python-saml/pull/73) Improve decrypt method |
| 18 | +* Handle valid but uncommon dsig block with no URI in the reference |
| 19 | +* Split the setting check methods. Now 1 method for IdP settings and other for SP settings |
| 20 | +* Let the setting object to avoid the IdP setting check. required if we want to publish SP * SAML Metadata when the IdP data is still not provided. |
| 21 | + |
| 22 | +### 2.1.3 (Jun 25, 2015) |
| 23 | +* Do accesible the ID of the object Logout Request (id attribute) |
| 24 | +* Add SAMLServiceProviderBackend reference to the README.md |
| 25 | +* Solve HTTPs issue on demos |
| 26 | +* Fix PHP-style array element in settings json |
| 27 | +* Add fingerprint algorithm support. Previously the toolkit assumed SHA-1 algorithm |
| 28 | +* Fix creation of metadata with no SLS, when using settings.get_sp_metadata() |
| 29 | +* Allow configuration of metadata caching/expiry via settings |
| 30 | +* Allow metadata signing with SP key specified as config value, not file |
| 31 | +* Set NAMEID_UNSPECIFIED as default NameIDFormat to prevent conflicts |
| 32 | +* Improve validUntil/cacheDuration metadata settings |
| 33 | + |
| 34 | +### 2.1.2 (Feb 26, 2015) |
| 35 | +* Fix wrong element order in generated metadata (SLS before NameID). metadata xsd updated |
| 36 | +* Added SLO with nameID and SessionIndex in the demos |
| 37 | +* Fix Exception message on Destination validation of the Logout_request |
| 38 | + |
| 39 | +### 2.1.0 (Jan 14, 2015) |
| 40 | +* Update the dm.xmlsec.binding library to 1.3.2 (Improved transform support, Workaround for buildout problem) |
| 41 | +* Fix flask demo settings example. |
| 42 | +* Add nameID & sessionIndex support on Logout Request |
| 43 | +* Reject SAML Response if not signed and strict = false |
| 44 | +* Add ForceAuh and IsPassive support on AuthN Request |
| 45 | + |
| 46 | +### 2.0.2 (Dec 5, 2014) |
| 47 | +* Adding AuthnContextClassRef support |
| 48 | +* Process nested StatusCode |
| 49 | +* Fix settings bug |
| 50 | + |
| 51 | +### 2.0.1 (Nov 13, 2014) |
| 52 | +* SSO and SLO (SP-Initiated and IdP-Initiated). |
| 53 | +* Assertion and nameId encryption. |
| 54 | +* Assertion signature. |
| 55 | +* Message signature: AuthNRequest, LogoutRequest, LogoutResponses. |
| 56 | +* Enable an Assertion Consumer Service endpoint. |
| 57 | +* Enable a Single Logout Service endpoint. |
| 58 | +* Publish the SP metadata (which can be signed). |
| 59 | + |
| 60 | +### 1.1.0 (Sep 4, 2014) |
| 61 | +* Security improved, added more checks at the SAMLResponse validation |
| 62 | + |
| 63 | +### 1.0.0 (Jun 26, 2014) |
| 64 | +* OneLogin's SAML Python Toolkit v1.0.0 |
| 65 | + |
| 66 | + |
| 67 | + |
| 68 | + |
| 69 | + |
| 70 | + |
| 71 | + |
| 72 | + |
0 commit comments