Skip to content

Commit

Permalink
Add sponsor: 84codes
Browse files Browse the repository at this point in the history
  • Loading branch information
pitbulk authored Oct 2, 2024
1 parent 791fc2c commit 21b676b
Showing 1 changed file with 9 additions and 3 deletions.
12 changes: 9 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,13 +55,19 @@ ruby-saml never enables DTDLOAD, and it never disables NONET.
The OneLogin::RubySaml::IdpMetadataParser class does not validate in any way the URL
that is introduced in order to be parsed.

Usually the same administrator that handles the Service Provider also sets the URL to
Usually, the same administrator that handles the Service Provider also sets the URL to
the IdP, which should be a trusted resource.

But there are other scenarios, like a SAAS app where the administrator of the app
delegates this functionality to other users. In this case, extra precaution should
delegates this functionality to other users. In this case, extra precautions should
be taken in order to validate such URL inputs and avoid attacks like SSRF.

### Sponsors

Thanks to the following sponsors for their support:

[<img alt="84codes" src="https://avatars.githubusercontent.com/u/5353257" width="50px">](https://www.84codes.com)

## Getting Started

In order to use Ruby SAML you will need to install the gem (either manually or using Bundler),
Expand All @@ -71,7 +77,7 @@ Using `Gemfile`

```ruby
# latest stable
gem 'ruby-saml', '~> 1.11.0'
gem 'ruby-saml', '~> 1.17.0'

# or track master for bleeding-edge
gem 'ruby-saml', :github => 'saml-toolkit/ruby-saml'
Expand Down

0 comments on commit 21b676b

Please sign in to comment.