Important: This documentation covers Yarn 1 (Classic).
For Yarn 2+ docs and migration guide, see yarnpkg.com.

Package detail

@node-saml/node-saml

node-saml1.1mMIT5.1.0TypeScript support: included

SAML 2.0 implementation for Node.js

saml, adfs, sso, shibboleth

readme

Node SAML

Build Status npm version code style: prettier codecov DeepScan grade

NPM

This is a SAML 2.0 authentication provider for Node.js.

Sponsors

We gratefully acknowledge support from our sponsors:

If your company benefits from node-saml being secure and up-to-date, consider asking them to sponsor the project at $25/month. See the Github Sponsors page for more sponsorship levels. It's easy to do, appearing as another line-item on the Github bill they already have.

Installation

npm install @node-saml/node-saml

Usage

The examples utilize the Feide OpenIdp identity provider. You need an account there to log in with this. You also need to register your site as a service provider.

Configure strategy

The SAML identity provider will redirect you to the URL provided by the path configuration.

const { SAML } = require("@node-saml/node-saml");

const options = {};
const saml = new SAML(options);

Config parameter details

  • Core
  • callbackUrl: full callbackUrl
  • entryPoint: identity provider entrypoint (is required to be spec-compliant when the request is signed)
  • issuer: issuer string to supply to identity provider
  • audience: expected saml response Audience, defaults to value of Issuer (if false, Audience won't be verified)
  • idpCert: the IDP's public signing certificate used to validate the signatures of the incoming SAML Responses, see Security and signatures
  • privateKey: see Security and signatures.
  • publicCert: the service provider's public signing certificate used to embed in AuthnRequest in order for the IDP to validate the signatures of the incoming SAML Request, see Security and signatures
  • decryptionPvk: optional private key that will be used to attempt to decrypt any encrypted assertions that are received
  • signatureAlgorithm: valid values are 'sha1', 'sha256', or 'sha512'
  • digestAlgorithm: optionally set the digest algorithm used to provide a digest for the signed data object, valid values are 'sha1' (default), 'sha256', or 'sha512'
  • xmlSignatureTransforms: optionally set an array of signature transforms to be used in HTTP-POST signatures. By default this is [ 'http://www.w3.org/2000/09/xmldsig#enveloped-signature', 'http://www.w3.org/2001/10/xml-exc-c14n#' ]
  • Additional SAML behaviors
  • additionalParams: dictionary of additional query params to add to all requests; if an object with this key is passed to authenticate, the dictionary of additional query params will be appended to those present on the returned URL, overriding any specified by initialization options' additional parameters (additionalParams, additionalAuthorizeParams, and additionalLogoutParams)
  • additionalAuthorizeParams: dictionary of additional query params to add to 'authorize' requests
  • identifierFormat: optional name identifier format to request from identity provider (default: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress)
  • allowCreate: grants permission to the identity provider to create a new subject identifier (default: true)
  • spNameQualifier: optionally specifies that the assertion subject's identifier be returned (or created) in the namespace of another service provider, or in the namespace of an affiliation of service providers
  • wantAssertionsSigned: if true, add WantAssertionsSigned="true" to the metadata, to specify that the IdP should always sign the assertions. It is on by default. Note: either the response or the assertion must be signed even if both are turned off.
  • wantAuthnResponseSigned: if true, require that all incoming authentication response messages be signed at the top level, not just at the assertions. It is on by default. Note: either the response or the assertion must be signed even if both are turned off.
  • acceptedClockSkewMs: Time in milliseconds of skew that is acceptable between client and server when checking OnBefore and NotOnOrAfter assertion condition validity timestamps. Setting to -1 will disable checking these conditions entirely. Default is 0.
  • maxAssertionAgeMs: Amount of time after which the framework should consider an assertion expired. If the limit imposed by this variable is stricter than the limit imposed by NotOnOrAfter, this limit will be used when determining if an assertion is expired.
  • attributeConsumingServiceIndex: optional AttributeConsumingServiceIndex attribute to add to AuthnRequest to instruct the IDP which attribute set to attach to the response (link)
  • disableRequestedAuthnContext: if truthy, do not request a specific authentication context.
  • authnContext: if truthy, name identifier format to request auth context (default: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport); array of values is also supported
  • racComparison: Requested Authentication Context comparison type. Possible values are 'exact','minimum','maximum','better'. Default is 'exact'.

  • forceAuthn: if set to true, the initial SAML request from the service provider specifies that the IdP should force re-authentication of the user, even if they possess a valid session.

  • passive: if set to true, specifies that the IdP must not visibly take control of the user interface and interact with the user.
  • providerName: optional human-readable name of the requester for use by the presenter's user agent or the identity provider
  • skipRequestCompression: if set to true, the SAML request from the service provider won't be compressed.
  • authnRequestBinding: if set to HTTP-POST, will request authentication from IDP via HTTP POST binding, otherwise defaults to HTTP Redirect
  • disableRequestAcsUrl: if truthy, SAML AuthnRequest from the service provider will not include the optional AssertionConsumerServiceURL. Default is falsy so it is automatically included.
  • generateUniqueId: optional function which will be called to generate unique IDs for SAML requests.
  • scoping: An optional configuration which implements the functionality explained in the SAML spec paragraph "3.4.1.2 Element <Scoping>". The config object is structured as following:
  • signMetadata: if true, adds a signature to the generated Service Provider metadata. privateKey must be set to use this option.
{
  idpList: [ // optional
    {
      entries: [ // required
        {
          providerId: 'yourProviderId', // required for each entry
          name: 'yourName', // optional
          loc: 'yourLoc', // optional
        }
      ],
      getComplete: 'URI to your complete IDP list', // optional
    },
  ],
  proxyCount: 2, // optional
  requesterId: 'requesterId', // optional
}
  • InResponseTo Validation
  • validateInResponseTo:
    • if "always", then InResponseTo will be validated from incoming SAML responses
    • if "never"(default), then InResponseTo won't be validated.
    • if "ifPresent", then InResponseTo will only be validated if present in the incoming SAML response
  • requestIdExpirationPeriodMs: Defines the expiration time when a Request ID generated for a SAML request will not be valid if seen in a SAML response in the InResponseTo field. Default is 8 hours.
  • cacheProvider: Defines the implementation for a cache provider used to store request Ids generated in SAML requests as part of InResponseTo validation. Default is a built-in in-memory cache provider. For details see the 'Cache Provider' section.
  • Issuer Validation
  • idpIssuer: if provided, then the IdP issuer will be validated for incoming Logout Requests/Responses. For ADFS this looks like https://acme_tools.windows.net/deadbeef
  • Passport
  • passReqToCallback: if truthy, req will be passed as the first argument to the verify callback (default: false)
  • name: Optionally, provide a custom name. (default: saml). Useful If you want to instantiate the strategy multiple times with different configurations, allowing users to authenticate against multiple different SAML targets from the same site. You'll need to use a unique set of URLs for each target, and use this custom name when calling passport.authenticate() as well.
  • Logout
  • logoutUrl: base address to call with logout requests (default: entryPoint)
  • additionalLogoutParams: dictionary of additional query params to add to 'logout' requests
  • logoutCallbackUrl: The value with which to populate the Location attribute in the SingleLogoutService elements in the generated service provider metadata.

  • SAML Authn Request Extensions

  • samlAuthnRequestExtensions: Optional, The SAML extension provides a more flexible structure for expressing which combination of Attributes are requested by service providers in comparison to the existing mechanisms, More about extensions. There are many possible values for the samlAuthnRequestExtensions element. It accepts fully customize XMLBuilder type.
// Example
samlAuthnRequestExtensions: {
  "md:RequestedAttribute": {
    "@isRequired": "true",
    "@Name": "LastName",
    "@xmlns:md": "urn:oasis:names:tc:SAML:2.0:metadata"
  },
  vetuma: {
    "@xmlns": "urn:vetuma:SAML:2.0:extensions",
    LG: {
      "#text": "sv",
    },
  },
},
  • SAML Logout Request Extensions
  • samlLogoutRequestExtensions: Optional, The SAML extension provides a more flexible structure for expressing which combination of Attributes are requested by service providers in comparison to the existing mechanisms, More about extensions. There are many possible values for the samlLogoutRequestExtensions element. It accepts fully customize XMLBuilder type.
// Example
samlLogoutRequestExtensions: {
  vetuma: {
    "@xmlns": "urn:vetuma:SAML:2.0:extensions",
    LG: {
      "#text": "sv",
    },
  },
},
  • SAML metadata Extensions
  • metadataContactPerson: Optional, this parameters can be used to include more metadata in the XML generated by generateServiceProviderMetadata. There are many possible values for the metadataContactPerson element. You can check the type definitions for help.
  • metadataOrganization: Optional, this parameters can be used to include more metadata in the XML generated by generateServiceProviderMetadata. There are many possible values for the metadataOrganization element. You can check the type definitions for help.
// Example for metadataContactPerson
metadataContactPerson:  [{
  "@contactType": "support",
  "GivenName": "test",
  "EmailAddress": "test@node-saml",
}],
// ContactPerson is an array because there can be multiple ContactPerson fields

generateServiceProviderMetadata( decryptionCert, publicCert )

As a convenience, the strategy object exposes a generateServiceProviderMetadata method which will generate a service provider metadata document suitable for supplying to an identity provider.

The decryptionCert argument should be a public certificate matching the decryptionPvk and is required if the strategy is configured with a decryptionPvk.

The publicCert argument should be a public certificate matching the privateKey and is required if the strategy is configured with a privateKey. An array of certificates can be provided to support certificate rotation. When supplying an array of certificates, the first entry in the array should match the current privateKey. Additional entries in the array can be used to publish upcoming certificates to IdPs before changing the privateKey.

generateServiceProviderMetadata( params )

The underlying generateServiceProviderMetadata function is also exported directly. This is useful if you want to generate metadata without creating a strategy object.

const { generateServiceProviderMetadata } = require("@node-saml/node-saml");

const metadata = generateServiceProviderMetadata({
  issuer: "https://example.com",
  callbackUrl: "https://example.com/callback",
});

Security and signatures

Node-SAML uses the HTTP Redirect Binding for its AuthnRequests (unless overridden with the authnRequestBinding parameter), and expects to receive the messages back via the HTTP POST binding.

Configuration option signatureAlgorithm

Authentication requests sent by Node-SAML can be signed using RSA signature with SHA1, SHA256 or SHA512 hashing algorithms.

To select hashing algorithm, use:

signatureAlgorithm: 'sha1' // (default, but not recommended anymore these days)
signatureAlgorithm: 'sha256', // (preferred - your IDP should support it, otherwise think about upgrading it)
signatureAlgorithm: 'sha512' // (most secure - check if your IDP supports it)

Configuration option privateKey

To sign authentication requests, private key needs to be provide in the PEM format via the privateKey configuration property. Node-SAML is enforcing RFC7468 stricttextualmsg format for PEM files.

Add it to strategy options like this:

privateKey: fs.readFileSync("./privateKey.pem", "latin1");

Example formats for privateKey field are,

  1. RFC7468 stricttextualmsg formatted PEM:
-----BEGIN PRIVATE KEY-----
<private key contents here delimited at 64 characters per row>
-----END PRIVATE KEY-----

or

-----BEGIN RSA PRIVATE KEY-----
<private key contents here delimited at 64 characters per row>
-----END RSA PRIVATE KEY-----
  1. Alternatively, a single-line or multi-line private key in Base64 format. See example from tests of single line private key.

Configuration option idpCert

It is important to validate the signatures of the incoming SAML Responses. For this, provide the Identity Provider's public X.509 signing certificate(s) or public key(s) in RFC7468 stricttextualmsg PEM format via the idpCert configuration property.

Important, provided public key MUST always be in PEM format!

Add it to options like this:

idpCert: "MIICizCCAfQCCQCY8tKaMc0BMjANBgkqh ... W==";

or

If the Identity Provider has multiple signing certificates or public keys that are valid then the idpCert configuration property can be an array. This can be the case during the rolling from an old key to a new key and responses signed with either key are valid:

idpCert: ["MIICizCCAfQCCQCY8tKaMc0BMjANBgkqh ... W==", "MIIEOTCCAyGgAwIBAgIJAKZgJdKdCdL6M ... g="];

or

The idpCert configuration property can also be a function that receives a callback as argument calls back a possible error and a certificate or array of certificates or a public key or array of public keys. This allows the Identity Provider to be polled for valid certificates or public keys and the new certificate or public key can be used if it is changed:

idpCert: (callback) => {
  callback(null, polledCertificates);
};

Example formats for idpCert field are,

  1. RFC7468 stricttextualmsg formatted PEM:
-----BEGIN CERTIFICATE-----
<certificate contents here delimited at 64 characters per row>
-----END CERTIFICATE-----

or

-----BEGIN PUBLIC KEY-----
<public key contents here delimited at 64 characters per row>
-----END PUBLIC KEY-----
  1. Alternatively, a single-line or multi-line certificate in Base64 format.

TIP: If the certificate is in the binary DER encoding

Convert it to the necessary PEM encoding like this:

openssl x509 -inform der -in my_certificate.cer -out my_certificate.pem

Some identity providers require that the public signing certificate be embedded in AuthnRequest in order for the IDP to verify the request as well as match the subject DN and confirm if the certificate was signed. This can be achieved by passing service provider's public signing certificate in PEM format via the publicCert configuration key. The publicCert should be a public certificate matching the privateKey.

-----BEGIN CERTIFICATE-----
<X.509 certificate contents here delimited at 64 characters per row>
-----END CERTIFICATE-----

Alternativelly a single line X.509 certificate without start/end lines where all rows are joined into single line can be passed:

publicCert: "MIICizCCAfQCCQCY8tKaMc0BMjANBgkqh ... W==";

SAML Response Validation - NotBefore and NotOnOrAfter

If the NotBefore or the NotOnOrAfter attributes are returned in the SAML response, Node-SAML will validate them against the current time +/- a configurable clock skew value. The default for the skew is 0s. This is to account for differences between the clock time on the client (Node server with Node-SAML) and the server (Identity provider).

NotBefore and NotOnOrAfter can be part of either the SubjectConfirmation element, or within in the Assertion/Conditions element in the SAML response.

Subject confirmation validation

When configured (turn validateInResponseTo to always in the Node-SAML config), the InResponseTo attribute will be validated. Validation will succeed if Node-SAML previously generated a SAML request with an id that matches the value of InResponseTo.

Also note that InResponseTo is validated as an attribute of the top level Response element in the SAML response, as well as part of the SubjectConfirmation element.

Previous request id's generated for SAML requests will eventually expire. This is controlled with the requestIdExpirationPeriodMs option passed into the Node-SAML config. The default is 28,800,000 ms (8 hours). Once expired, a subsequent SAML response received with an InResponseTo equal to the expired id will not validate and an error will be returned.

Cache Provider

When InResponseTo validation is turned on, Node SAML will store generated request ids used in SAML requests to the IdP. The implementation of how things are stored, checked to see if they exist, and eventually removed is handled by the configured CacheProvider.

The default implementation is a simple in-memory cache provider. For multiple server/process scenarios, this will not be sufficient as the server/process that generated the request id and stored in memory could be different than the server/process handling the SAML response. The InResponseTo could fail in this case erroneously.

To support this scenario you can create a cache provider that implements the following interface:

interface CacheProvider {
  // Store an item in the cache, using the specified key and value.
  saveAsync(key: string, value: string): Promise<CacheItem | null>;
  // Returns the value of the specified key in the cache
  getAsync(key: string): Promise<string | null>;
  // Removes an item from the cache if the key exists
  removeAsync(key: string): Promise<string | null>;
}

SLO (single logout)

Node-SAML has built in support for SLO including

  • Signature validation
  • IdP initiated and SP initiated logouts
  • Decryption of encrypted name identifiers in IdP initiated logout
  • Redirect and POST SAML Protocol Bindings

ChangeLog

See Changelog

FAQ

Node Support Policy

We only support Long-Term Support versions of Node.

We specifically limit our support to LTS versions of Node, not because this package won't work on other versions, but because we have a limited amount of time, and supporting LTS offers the greatest return on that investment.

It's possible this package will work correctly on newer versions of Node. It may even be possible to use this package on older versions of Node, though that's more unlikely as we'll make every effort to take advantage of features available in the oldest LTS version we support.

As each Node LTS version reaches its end-of-life we will remove that version from the node engines property of our package's package.json file. Removing a Node version is considered a breaking change and will entail the publishing of a new major version of this package. We will not accept any requests to support an end-of-life version of Node. Any merge requests or issues supporting an end-of-life version of Node will be closed.

We will accept code that allows this package to run on newer, non-LTS, versions of Node.

changelog

Changelog

5.0.1 (2025-03-14)

🚀 Minor Changes

  • feat: improve error messages when validating pems #373

🐛 Bug Fixes

  • [security] Update xml-crypto to address CVE #388

📚 Documentation

  • docs: Update README.md set never default validateInResponseTo #384
  • Docs: add pitch to encourage more sponsors #366
  • Update sponsor acknowledgements #365

⚙️ Technical Tasks

  • Adjust to support type stripping #389

v5.0.0 (2024-02-27)

💣 Major Changes

  • Update minor dependencies and Node to 18 #344
  • Rename cert to idpCert and signingCert to publicCert #343
  • Update to current Node versions #342
  • Upgrade to latest version of xml-crypto #341
  • Fix spelling and normalize naming #278
  • Export types required for SamlOptions #224
  • Simplify callback URL options; remove path, protocol, and host. #214

🚀 Minor Changes

  • Added X509 certificate to KeyInfo X509Data, if passed through options #36
  • Export generateServiceProviderMetadata #337
  • Fixes node-saml not checking all Audiences in an AudienceRestriction #340
  • Add public key support #225
  • feat: support additionalParams on HTTP-POST binding #263
  • Improve audience mismatch error message #257

🔗 Dependencies

  • [javascript] Bump release-it from 16.3.0 to 17.0.5 #348
  • [javascript] Bump eslint-plugin-prettier from 4.2.1 to 5.1.3 #346
  • [javascript] Bump eslint-config-prettier from 8.10.0 to 9.1.0 #345
  • [javascript] Bump eslint-plugin-deprecation from 1.5.0 to 2.0.0 #347
  • [javascript] Bump sinon and @types/sinon #349
  • [github_actions] Bump actions/checkout from 3 to 4 #330
  • [javascript] Bump prettier from 2.8.8 to 3.0.0 #300
  • [javascript] Bump prettier-plugin-packagejson from 2.4.3 to 2.4.5 #307
  • [javascript] Bump eslint from 8.42.0 to 8.45.0 #306
  • [javascript] Bump release-it from 15.11.0 to 16.1.3 #305
  • [javascript] Bump @cjbarth/github-release-notes from 4.0.0 to 4.1.0 #304
  • [javascript] Bump @types/node from 14.18.50 to 14.18.53 #303
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.59.9 to 5.62.0 #302
  • [javascript] Bump @xmldom/xmldom from 0.8.8 to 0.8.10 #301
  • [javascript] Bump @typescript-eslint/parser from 5.59.9 to 5.62.0 #299
  • [javascript] Bump word-wrap from 1.2.3 to 1.2.4 #298
  • [javascript] Bump sinon from 14.0.2 to 15.2.0 #294
  • [javascript] Bump typescript from 4.8.4 to 5.1.6 #293
  • [javascript] Bump @typescript-eslint/parser from 5.59.9 to 5.60.1 #292
  • [javascript] Bump concurrently from 7.6.0 to 8.2.0 #290
  • Remove dependency on Passport types #296
  • Remove express dependency #284
  • Update minor dependencies #283
  • [github_actions] Bump codecov/codecov-action from 3.1.1 to 3.1.4 #279
  • [javascript] Bump @typescript-eslint/parser from 5.58.0 to 5.59.8 #281
  • [javascript] Bump prettier from 2.8.7 to 2.8.8 #274
  • [javascript] Bump json5 from 2.2.1 to 2.2.3 #244
  • [javascript] Bump vm2 from 3.9.16 to 3.9.19 #277
  • Update minor dependencies #269

🐛 Bug Fixes

  • Fix metadata order #334

📚 Documentation

  • Roll-up changelog entries for beta releases #282

⚙️ Technical Tasks

  • Add test coverage for initialize() of saml.ts #327
  • Add tests for XML parsing with comments #285
  • Separate linting out from testing #288
  • Add test coverage #287
  • Prefer Chai expect to Node assert #286
  • Remove types specific to Passport #226
  • Acknowledge that XML can be parsed to any #271

🙈 Other

  • Enforce valid setting for validateInResponseTo #314
  • feat: add public getAuthorizeMessage method #235

v4.0.4 (2023-04-11)

🔗 Dependencies

  • [security] [javascript] Bump xml2js from 0.4.23 to 0.5.0 #268
  • [javascript] Bump xml-encryption from 3.0.1 to 3.0.2 #236

v4.0.3 (2022-12-13)

🔗 Dependencies

  • [javascript] Bump eslint from 8.26.0 to 8.29.0 #234
  • [javascript] Bump eslint-plugin-deprecation from 1.3.2 to 1.3.3 #232
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.43.0 to 5.45.0 #231
  • [javascript] Bump concurrently from 7.5.0 to 7.6.0 #230
  • [javascript] Bump prettier from 2.7.1 to 2.8.0 #229

v4.0.2 (2022-11-23)

🐛 Bug Fixes

  • fix: correct handling of XML entities in signature attributes #221
  • Expose ValidateInResponseTo as it is required in options #220

📚 Documentation

  • Remove pre-release comments from README #223

v4.0.1 (2022-11-16)

🔗 Dependencies

  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.41.0 to 5.43.0 #216
  • [javascript] Bump @typescript-eslint/parser from 5.41.0 to 5.43.0 #217
  • Lock to TypeScript <4.9.0 due to a regression in 4.9.3 #219
  • [javascript] Bump @types/node from 14.18.32 to 14.18.33 #201
  • [javascript] Bump xml-crypto from 3.0.0 to 3.0.1 #205
  • Update @xmldom/xmldom #213

📚 Documentation

  • Fixes #208, updated readme by updating package names. #210

⚙️ Technical Tasks

  • Remove check now covered by dependency #215

v4.0.0 (2022-10-28)

💣 Major Changes

  • Require all assertions be signed; new option wantAssertionsSigned can be set to false to enabled the older, less secure behavior. #177
  • Document signatures are now required by default. Setting wantAuthenResponseSigned=false disables this feature and restores the prior, less secure behavior #83
  • Make issuer required; remove OneLogin default #61
  • Make Audience a required setting #25
  • Allow to validate InResponseTo only if provided, to support IDP-initiated login #40
  • Update packages; bump minimum node to 14 #45
  • Add support for a failed logout response #10
  • Set AuthnRequestsSigned in SP metadata if configured for signing. #20

🚀 Minor Changes

  • feat: expose getLogoutResponseUrlAsync publicly #194
  • fix generate unique metadata ID #158
  • Include AuthnRequestsSigned attribute in all metadata #143
  • Add support for metadata ContactPerson and Organization #140
  • Support multiple Assertion SubjectConfirmation #43
  • Extend available options for NameIDPolicy attributes #67
  • Migrate from "should" to "chai" #41
  • Set a unique ID value in generated metadata #30
  • Add option to sign generated metadata #24
  • Feature: add facility in config to add <Extensions> element in SAML request #11
  • Add ability to publish multiple signing certs in metadata #23
  • CacheProvider interface #29
  • Support importing to passport-saml project #9
  • Add assertion attributes to child object on profile (passport-saml#543) #5

🔗 Dependencies

  • Update dependencies, including locked ones #198
  • Update Dependencies #197
  • Bump @xmldom/xmldom from 0.7.5 to 0.7.6 #196
  • [javascript] Bump @xmldom/xmldom from 0.8.2 to 0.8.3 #188
  • [javascript] Bump node-fetch and release-it #187
  • [javascript] Bump parse-url and release-it #176
  • [javascript] Bump @typescript-eslint/parser from 5.36.2 to 5.40.0 #186
  • [javascript] Bump prettier-plugin-packagejson from 2.2.18 to 2.3.0 #185
  • [javascript] Bump @types/passport from 1.0.9 to 1.0.11 #182
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.36.2 to 5.38.1 #183
  • [javascript] Bump typescript from 4.8.3 to 4.8.4 #181
  • [github_actions] Bump codecov/codecov-action from 3.1.0 to 3.1.1 #180
  • [javascript] Bump vm2 from 3.9.10 to 3.9.11 #179
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.30.7 to 5.36.2 #171
  • [javascript] Bump @types/chai from 4.3.1 to 4.3.3 #172
  • [javascript] Bump @typescript-eslint/parser from 5.30.7 to 5.36.2 #170
  • [javascript] Bump eslint from 8.19.0 to 8.23.0 #163
  • [javascript] Bump typescript from 4.7.4 to 4.8.3 #169
  • [javascript] Bump concurrently from 7.2.2 to 7.3.0 #136
  • [javascript] Bump @types/sinon from 10.0.12 to 10.0.13 #134
  • deps: move express to devDependencies because it is only used in a test. #161
  • Update changelog #162
  • [javascript] Bump @typescript-eslint/parser from 5.30.5 to 5.30.7 #125
  • [javascript] Bump @types/node from 14.18.16 to 14.18.22 #124
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.30.6 to 5.30.7 #123
  • [javascript] Bump release-it from 15.1.1 to 15.1.2 #122
  • [javascript] Bump ts-node from 10.8.2 to 10.9.1 #126
  • [javascript] Bump release-it from 15.0.0 to 15.1.1 #117
  • [javascript] Bump xml-crypto from 2.1.3 to 2.1.4 #118
  • [javascript] Bump ts-node from 10.7.0 to 10.8.2 #119
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.30.5 to 5.30.6 #120
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.30.3 to 5.30.5 #114
  • [javascript] Bump parse-url from 6.0.0 to 6.0.2 #115
  • [javascript] Bump @typescript-eslint/parser from 5.22.0 to 5.30.5 #113
  • [javascript] Bump @types/passport from 1.0.7 to 1.0.9 #112
  • [javascript] Bump eslint from 8.14.0 to 8.19.0 #111
  • [javascript] Bump eslint-plugin-prettier from 4.0.0 to 4.2.1 #104
  • [javascript] Bump prettier from 2.6.2 to 2.7.1 #107
  • [javascript] Bump @types/sinon from 10.0.11 to 10.0.12 #106
  • [javascript] Bump typescript from 4.6.4 to 4.7.4 #105
  • [javascript] Bump sinon from 13.0.2 to 14.0.0 #102
  • [javascript] Bump concurrently from 7.1.0 to 7.2.2 #100
  • [javascript] Bump prettier-plugin-packagejson from 2.2.17 to 2.2.18 #103
  • [javascript] Bump @typescript-eslint/eslint-plugin from 5.22.0 to 5.30.3 #99
  • [github_actions] Bump actions/checkout from 2 to 3 #97
  • Update CodeQL to v2 #95
  • Bump npm from 8.6.0 to 8.11.0 #88
  • Update dependencies #81
  • Update dependencies #75
  • Move dependency types next to dependencies #73
  • Remove unused qs types #72
  • Remove unused request dependency #71
  • Support Node 18 #68
  • [security] Upgrade xml-encryption to 2.0.0 (fixes audit issue) #44
  • Update xmldom #17

🐛 Bug Fixes

  • [security] Throw if multiple XML roots detected #195
  • Make Issuer Required in the Types Too (like it is at runtime) #90
  • Bypass for InResponseTo #87
  • Fix broken request tests #86
  • [security] Address polynomial regular expression used on uncontrolled data #79
  • Fix issues with cache provider potentially returning expired keys #59
  • Correctly reset Sinon fake timers #60
  • Correct carriage-return entity handling #38
  • 13 GCM EncryptionMethod #15

  • [security] Limit transforms for signed nodes #6
  • Remove duplicate calls to the cache provider #4

📚 Documentation

  • Update documentation to remove ADFS references; rename passport-saml #190
  • Changelog #173
  • Remove insecure clockSkew recommendation #151
  • Update badges for scoped package #93
  • Add codecov and DeepScan badges #76
  • Correct several typos in documentation #39
  • Update README.md #1

⚙️ Technical Tasks

  • Update types #199
  • Update changelog build tools #189
  • Clean up signature tests #178
  • Remove some usage of any type #175
  • Add prerelease script #174
  • Reduce frequency of dependabot updates #152
  • Consolidate all SAML class code to single file #147
  • Improve tests #141
  • Refactor process routines out of saml.ts #130
  • Refactor generate functions to a separate file #129
  • Coerce booleans when constructing options object #85
  • Refactor code for better functional grouping #128
  • Have dependabot update package.json too #109
  • Add dependabot config file #96
  • Simplify configs for compilation and release #92
  • Move to NPM organization #91
  • Factor out metadata routines #78
  • Clear up ambiguous branch #80
  • Tighten any type #77
  • Add code coverage #74
  • Clean up exception messages and related tests #69
  • Saml options typing #66
  • Stop using import assignments #65
  • Remove unused vars #64
  • Stop using import assignments #63
  • Remove useless not null assertions #54
  • Enable assertRequired to type narrow #62
  • fix a linting warning by adding a return type #56
  • remove warnings related to loggedOut in tests #55
  • remove useless any type declaration #53
  • removes an unused variable in a test #52
  • remove useless not null assertions on errors #50
  • transform a test that does not use some of its variables #51
  • remove a not null assertion by checking certificate's validity #49
  • add an assertion to remove a linting warning #47
  • remove useless not null assertions #48
  • fix a linting warning by adding a return type #46
  • [Split saml.ts #1] Move getAdditionalParams out of saml.ts #32
  • Move non SAML code out of saml.ts #18
  • Fix workflow for Node 16.x #7
  • Remove passport-saml code and tests #3

v3.0.0 (2021-05-14)

No changelog for this release.