Python3-saml

Latest version: v1.16.0

Safety actively analyzes 625831 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 5

1.2.4

Not secure
* Publish KeyDescriptor[use=encryption] only when required
* [57](https://github.com/onelogin/python3-saml/pull/57) Be able to register future SP x509cert on the settings and publish it on SP metadata
* [57](https://github.com/onelogin/python3-saml/pull/57) Be able to register more than 1 Identity Provider x509cert, linked with an specific use (signing or encryption
* [57](https://github.com/onelogin/python3-saml/pull/57) Allow metadata to be retrieved from source containing data of multiple entities
* [57](https://github.com/onelogin/python3-saml/pull/57) Adapt IdP XML metadata parser to take care of multiple IdP certtificates and be able to inject the data obtained on the settings.
* Be able to relax SSL Certificate verification when retrieving idp metadata
* Checking the status of response before assertion count
* Allows underscores in URL hosts
* Add a Pyramid demo
* Be able to provide a NameIDFormat to LogoutRequest
* Add DigestMethod support. Add sign_algorithm and digest_algorithm par
ameters to sign_metadata and add_sign.
* Validate serial number as string to work around libxml2 limitation
* Make the Issuer on the Response Optional
* Fixed bug with formated cert fingerprints

1.2.3

Not secure
* Fix p3 compatibility

1.2.2

Not secure
* [37](https://github.com/onelogin/python3-saml/pull/37) Add option to raise response validation exceptions
* [42](https://github.com/onelogin/python3-saml/pull/42) Optionally raise detailed exceptions vs. returning False. Implement a more specific exception class for handling some validation errors. Improve/Fix tests. Add support for retrieving the last ID of the generated AuthNRequest / LogoutRequest. Add hooks to retrieve last-sent and last-received requests and responses
* Improved inResponse validation on Responses
* Add the ability to extract the specific certificate from IdP metadata when several defined
* Fix Invalid True attribute value in Metadata XML
* [35](https://github.com/onelogin/python3-saml/pull/35) Fix typos and json sample code in documentation

1.2.1

Not secure
* [30](https://github.com/onelogin/python3-saml/pull/30) Bug on signature checks

1.2.0

Not secure
* Several security improvements:
* Conditions element required and unique.
* AuthnStatement element required and unique.
* SPNameQualifier must math the SP EntityID
* Reject saml:Attribute element with same “Name” attribute
* Reject empty nameID
* Require Issuer element. (Must match IdP EntityID).
* Destination value can't be blank (if present must match ACS URL).
* Check that the EncryptedAssertion element only contains 1 Assertion element.
* Improve Signature validation process
* Document the wantAssertionsEncrypted parameter
* Support multiple attributeValues on RequestedAttribute
* Fix AttributeConsumingService

1.1.4

Not secure
* Change the decrypt assertion process.
* Add 2 extra validations to prevent Signature wrapping attacks.

Page 4 of 5

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.