@@ -22,7 +22,7 @@ Add the following settings to your `app.yml` file in the Environment Settings se
DISCOURSE_SAML_CERT_FINGERPRINT: "43:BB:DA:FF..."
#DISCOURSE_SAML_REQUEST_METHOD: post
#DISCOURSE_SAML_FULL_SCREEN_LOGIN: true
DISCOURSE_SAML_CERT: "-----BEGIN CERTIFICATE-----
DISCOURSE_SAML_CERT: "-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----"
```
...
...
@@ -35,6 +35,16 @@ Add the following settings to your `discourse.conf` file:
-`saml_target_url`
### Supported settings
-`DISCOURSE_SAML_SP_CERTIFICATE`: SAML Service Provider Certificate
-`DISCOURSE_SAML_SP_PRIVATE_KEY`: SAML Service Provider Private Key
-`DISCOURSE_SAML_AUTHN_REQUESTS_SIGNED`: defaults to false
-`DISCOURSE_SAML_WANT_ASSERTIONS_SIGNED`: defaults to false
-`DISCOURSE_SAML_NAME_IDENTIFIER_FORMAT`: defaults to "urn:oasis:names:tc:SAML:2.0:protocol"
-`DISCOURSE_SAML_DEFAULT_EMAILS_VALID`: defaults to true
-`DISCOURSE_SAML_VALIDATE_EMAIL_FIELDS`: defaults to blank. This setting accepts pipe separated group names that are supplied in `memberOf` attribute in SAML payload. If the group name specified in the value matches that from `memberOf` attribute than the `email_valid` is set to `true`, otherwise it defaults to `false`. This setting overrides `DISCOURSE_SAML_DEFAULT_EMAILS_VALID`.
### Convering an RSA Key to a PEM
If the idp has an RSA key split up as modulus and exponent, this javascript library makes