You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-16Lines changed: 7 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ type Profile = {
127
127
-`additionalAuthorizeParams`: dictionary of additional query params to add to 'authorize' requests
128
128
-`identifierFormat`: optional name identifier format to request from identity provider (default: `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`)
129
129
-`wantAssertionsSigned`: if truthy, add `WantAssertionsSigned="true"` to the metadata, to specify that the IdP should always sign the assertions.
130
-
-`acceptedClockSkewMs`: Time in milliseconds of skew that is acceptable between client and server when checking `OnBefore` and `NotOnOrAfter` assertion condition validity timestamps. Setting to `-1` will disable checking these conditions entirely. Default is `0`.
130
+
-`acceptedClockSkewMs`: Time in milliseconds of skew that is acceptable between client and server when checking `NotBefore` and `NotOnOrAfter` assertion condition validity timestamps. Setting to `-1` will disable checking these conditions entirely. Default is `0`.
131
131
-`maxAssertionAgeMs`: Amount of time after which the framework should consider an assertion expired. If the limit imposed by this variable is stricter than the limit imposed by `NotOnOrAfter`, this limit will be used when determining if an assertion is expired.
132
132
-`attributeConsumingServiceIndex`: optional `AttributeConsumingServiceIndex` attribute to add to AuthnRequest to instruct the IDP which attribute set to attach to the response ([link](http://blog.aniljohn.com/2014/01/data-minimization-front-channel-saml-attribute-requests.html))
133
133
-`disableRequestedAuthnContext`: if truthy, do not request a specific authentication context. This is [known to help when authenticating against Active Directory](https://github.com/node-saml/passport-saml/issues/226) (AD FS) servers.
@@ -359,28 +359,19 @@ To support this scenario you can provide an implementation for a cache provider
359
359
360
360
```javascript
361
361
{
362
-
save:function(key, value, callback) {
363
-
//save the key with the optional value, invokes the callback with the value saves
362
+
saveAsync:asyncfunction(key, value) {
363
+
//saves the key with the optional value, returns the saved value
364
364
},
365
-
get:function(key, callback) {
366
-
//invokes 'callback' and passes the value if found, null otherwise
365
+
getAsync:asyncfunction(key) {
366
+
//returns the value if found, null otherwise
367
367
},
368
-
remove:function(key, callback) {
369
-
// removes the key from the cache, invokes `callback` with the
368
+
removeAsync:asyncfunction(key) {
369
+
// removes the key from the cache, returns the
370
370
// key removed, null if no key is removed
371
371
}
372
372
}
373
373
```
374
374
375
-
The `callback` argument is a function in the style of normal Node callbacks:
376
-
377
-
```
378
-
function callback(err, result)
379
-
{
380
-
381
-
}
382
-
```
383
-
384
375
Provide an instance of an object which has these functions passed to the `cacheProvider` config option when using Passport-SAML.
0 commit comments