Skip to content

Commit 9209a33

Browse files
committed
Remove References to Deprecated OpenSaml Components
Issue gh-11658
1 parent 7a7d2ca commit 9209a33

File tree

4 files changed

+11
-11
lines changed

4 files changed

+11
-11
lines changed

docs/modules/ROOT/pages/servlet/saml2/login/authentication.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -542,7 +542,7 @@ For example, you can throw a custom exception with any additional information av
542542
----
543543
OpenSaml4AuthenticationProvider provider = new OpenSaml4AuthenticationProvider();
544544
provider.setResponseValidator((responseToken) -> {
545-
Saml2ResponseValidatorResult result = OpenSamlAuthenticationProvider
545+
Saml2ResponseValidatorResult result = OpenSaml4AuthenticationProvider
546546
.createDefaultResponseValidator()
547547
.convert(responseToken)
548548
.concat(myCustomValidator.convert(responseToken));

docs/modules/ROOT/pages/servlet/saml2/login/overview.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ This filter calls its configured `AuthenticationConverter` to create a `Saml2Aut
4949
This converter additionally resolves the <<servlet-saml2login-relyingpartyregistration, `RelyingPartyRegistration`>> and supplies it to `Saml2AuthenticationToken`.
5050

5151
image:{icondir}/number_2.png[] Next, the filter passes the token to its configured xref:servlet/authentication/architecture.adoc#servlet-authentication-providermanager[`AuthenticationManager`].
52-
By default, it uses the <<servlet-saml2login-architecture,`OpenSamlAuthenticationProvider`>>.
52+
By default, it uses the <<servlet-saml2login-architecture,`OpenSaml4AuthenticationProvider`>>.
5353

5454
image:{icondir}/number_3.png[] If authentication fails, then _Failure_.
5555

@@ -184,9 +184,9 @@ To achieve this, any interfaces or classes where Spring Security uses OpenSAML i
184184
This makes it possible for you to switch out OpenSAML for some other library or an unsupported version of OpenSAML.
185185

186186
As a natural outcome of these two goals, Spring Security's SAML API is quite small relative to other modules.
187-
Instead, such classes as `OpenSamlAuthenticationRequestFactory` and `OpenSamlAuthenticationProvider` expose `Converter` implementations that customize various steps in the authentication process.
187+
Instead, such classes as `OpenSamlXAuthenticationRequestFactory` and `OpenSamlXAuthenticationProvider` expose `Converter` implementations that customize various steps in the authentication process.
188188

189-
For example, once your application receives a `SAMLResponse` and delegates to `Saml2WebSsoAuthenticationFilter`, the filter delegates to `OpenSamlAuthenticationProvider`:
189+
For example, once your application receives a `SAMLResponse` and delegates to `Saml2WebSsoAuthenticationFilter`, the filter delegates to `OpenSamlXAuthenticationProvider`:
190190

191191
.Authenticating an OpenSAML `Response`
192192
image:{figures}/opensamlauthenticationprovider.png[]

docs/modules/ROOT/pages/servlet/saml2/logout.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -510,7 +510,7 @@ Java::
510510
----
511511
@Component
512512
public class MyOpenSamlLogoutRequestValidator implements Saml2LogoutRequestValidator {
513-
private final Saml2LogoutRequestValidator delegate = new OpenSamlLogoutRequestValidator();
513+
private final Saml2LogoutRequestValidator delegate = new OpenSaml5LogoutRequestValidator();
514514
515515
@Override
516516
public Saml2LogoutRequestValidator logout(Saml2LogoutRequestValidatorParameters parameters) {
@@ -529,7 +529,7 @@ Kotlin::
529529
----
530530
@Component
531531
open class MyOpenSamlLogoutRequestValidator: Saml2LogoutRequestValidator {
532-
private val delegate = OpenSamlLogoutRequestValidator()
532+
private val delegate = OpenSaml5LogoutRequestValidator()
533533
534534
@Override
535535
fun logout(parameters: Saml2LogoutRequestValidatorParameters): Saml2LogoutRequestValidator {
@@ -586,7 +586,7 @@ Java::
586586
----
587587
@Component
588588
public class MyOpenSamlLogoutResponseValidator implements Saml2LogoutResponseValidator {
589-
private final Saml2LogoutResponseValidator delegate = new OpenSamlLogoutResponseValidator();
589+
private final Saml2LogoutResponseValidator delegate = new OpenSaml5LogoutResponseValidator();
590590
591591
@Override
592592
public Saml2LogoutValidatorResult logout(Saml2LogoutResponseValidatorParameters parameters) {

docs/modules/ROOT/pages/servlet/saml2/metadata.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ public class RefreshableRelyingPartyRegistrationRepository
5858
implements IterableRelyingPartyRegistrationRepository {
5959
6060
private final AssertingPartyMetadataRepository metadata =
61-
OpenSamlAssertingPartyMetadataRepository
61+
OpenSaml5AssertingPartyMetadataRepository
6262
.fromTrustedMetadataLocation("https://idp.example.org/metadata").build();
6363
6464
@Override
@@ -93,7 +93,7 @@ Kotlin::
9393
class RefreshableRelyingPartyRegistrationRepository : IterableRelyingPartyRegistrationRepository {
9494
9595
private val metadata: AssertingPartyMetadataRepository =
96-
OpenSamlAssertingPartyMetadataRepository.fromTrustedMetadataLocation(
96+
OpenSaml5AssertingPartyMetadataRepository.fromTrustedMetadataLocation(
9797
"https://idp.example.org/metadata").build()
9898
9999
fun findByRegistrationId(registrationId:String?): RelyingPartyRegistration {
@@ -132,7 +132,7 @@ Java::
132132
+
133133
[source,java,role="primary"]
134134
----
135-
OpenSamlAssertingPartyMetadataRepository.withMetadataLocation("https://idp.example.org/metadata")
135+
OpenSaml5AssertingPartyMetadataRepository.withMetadataLocation("https://idp.example.org/metadata")
136136
.verificationCredentials((c) -> c.add(myVerificationCredential))
137137
.build();
138138
----
@@ -141,7 +141,7 @@ Kotlin::
141141
+
142142
[source,kotlin,role="secondary"]
143143
----
144-
OpenSamlAssertingPartyMetadataRepository.withMetadataLocation("https://idp.example.org/metadata")
144+
OpenSaml5AssertingPartyMetadataRepository.withMetadataLocation("https://idp.example.org/metadata")
145145
.verificationCredentials({ c : Collection<Saml2X509Credential> ->
146146
c.add(myVerificationCredential) })
147147
.build()

0 commit comments

Comments
 (0)