Skip to content

Commit d59584c

Browse files
authored
fix auth-verify-path description (#115)
1 parent 7595283 commit d59584c

File tree

2 files changed

+12
-9
lines changed

2 files changed

+12
-9
lines changed

README.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,12 @@ Provides a SAML SP authentication proxy for backend web services
1313
Comma separated list of attribute=header pairs mapping SAML IdP response attributes to forwarded request header (env SAML_PROXY_ATTRIBUTE_HEADER_MAPPINGS)
1414
-attribute-header-wildcard string
1515
Maps all SAML attributes with this option as a prefix, slashes in attribute names will be replaced by dashes (env SAML_PROXY_ATTRIBUTE_HEADER_WILDCARD)
16-
-auth-verify bool
16+
-auth-verify
1717
Enables verify path endpoint for forward auth and trusts X-Forwarded headers (env SAML_PROXY_AUTH_VERIFY)
1818
-auth-verify-path string
19-
Path under BaseUrl that will respond with a 200 when authenticated (env SAML_PROXY_AUTH_VERIFY_PATH) (default "/_verify")
19+
Path under BaseUrl that will respond with a 204 when authenticated (env SAML_PROXY_AUTH_VERIFY_PATH) (default "/_verify")
20+
-auth-verify-require-login
21+
If set, trigger a login if the user is not authenticated during verify (env SAML_PROXY_AUTH_VERIFY_REQUIRE_LOGIN)
2022
-authorize-attribute attribute
2123
Enables authorization and specifies the attribute to check for authorized values (env SAML_PROXY_AUTHORIZE_ATTRIBUTE)
2224
-authorize-values values
@@ -30,16 +32,20 @@ Provides a SAML SP authentication proxy for backend web services
3032
-cookie-domain string
3133
Overrides the domain set on the session cookie. By default the BaseUrl host is used. (env SAML_PROXY_COOKIE_DOMAIN)
3234
-cookie-max-age duration
33-
Specifies the amount of time the authentication token will remain valid (env SAML_PROXY_COOKIE_MAX_AGE) (default 2h0m0s)
35+
Specifies the amount of time the authentication token will remain valid (env SAML_PROXY_COOKIE_MAX_AGE) (default 2h0m0s)
3436
-cookie-name string
3537
Name of the cookie that tracks session token (env SAML_PROXY_COOKIE_NAME) (default "token")
38+
-debug
39+
Enable debug logs (env SAML_PROXY_DEBUG)
40+
-encrypt-jwt
41+
If set, enables JWT session encryption (env SAML_PROXY_ENCRYPT_JWT)
3642
-entity-id string
3743
Entity ID of this service provider (env SAML_PROXY_ENTITY_ID)
3844
-idp-ca-path path
3945
Optional path to a CA certificate PEM file for the IdP (env SAML_PROXY_IDP_CA_PATH)
4046
-idp-metadata-url URL
4147
URL of the IdP's metadata XML, can be a local file by specifying the file:// scheme (env SAML_PROXY_IDP_METADATA_URL)
42-
-initiate-session-path path
48+
-initiate-session-path string
4349
If set, initiates a SAML authentication flow only when a user visits this path. This will allow anonymous users to access to the backend. (env SAML_PROXY_INITIATE_SESSION_PATH)
4450
-name-id-format string
4551
One of unspecified, transient, email, or persistent to use a standard format or give a full URN of the name ID format (env SAML_PROXY_NAME_ID_FORMAT) (default "transient")
@@ -49,15 +55,12 @@ Provides a SAML SP authentication proxy for backend web services
4955
URL of webhook that will get POST'ed when a new authentication is processed (env SAML_PROXY_NEW_AUTH_WEBHOOK_URL)
5056
-sign-requests
5157
If set, enables SAML request signing (env SAML_PROXY_SIGN_REQUESTS)
52-
-encrypt-jwt
53-
If set, JWTs will be encrypted as JWE (env SAML_PROXY_ENCRYPT_JWT)
5458
-sp-cert-path path
5559
The path to the X509 public certificate PEM file for this SP (env SAML_PROXY_SP_CERT_PATH) (default "saml-auth-proxy.cert")
5660
-sp-key-path path
5761
The path to the X509 private key PEM file for this SP (env SAML_PROXY_SP_KEY_PATH) (default "saml-auth-proxy.key")
5862
-static-relay-state string
59-
A fixed RelayState value, such as a short URL. Will be trimmed to 80 characters to conform with SAML. The default generates random bytes that are Base64
60-
encoded. (env SAML_PROXY_STATIC_RELAY_STATE)
63+
A fixed RelayState value, such as a short URL. Will be trimmed to 80 characters to conform with SAML. The default generates random bytes that are Base64 encoded. (env SAML_PROXY_STATIC_RELAY_STATE)
6164
-version
6265
show version and exit
6366
```

server/config.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ type Config struct {
2424
CookieDomain string `usage:"Overrides the domain set on the session cookie. By default the BaseUrl host is used."`
2525
AllowIdpInitiated bool `usage:"If set, allows for IdP initiated authentication flow"`
2626
AuthVerify bool `usage:"Enables verify path endpoint for forward auth and trusts X-Forwarded headers"`
27-
AuthVerifyPath string `default:"/_verify" usage:"Path under BaseUrl that will respond with a 200 when authenticated"`
27+
AuthVerifyPath string `default:"/_verify" usage:"Path under BaseUrl that will respond with a 204 when authenticated"`
2828
AuthVerifyRequireLogin bool `usage:"If set, trigger a login if the user is not authenticated during verify"`
2929
Debug bool `usage:"Enable debug logs"`
3030
StaticRelayState string `usage:"A fixed RelayState value, such as a short URL. Will be trimmed to 80 characters to conform with SAML. The default generates random bytes that are Base64 encoded."`

0 commit comments

Comments
 (0)