#include <saml/saml2/profile/BrowserSSOProfileValidator.h>
Inheritance diagram for opensaml::saml2::BrowserSSOProfileValidator:
Public Member Functions | |
BrowserSSOProfileValidator (const XMLCh *recipient, const std::vector< const XMLCh * > *audiences=NULL, time_t ts=0, const char *destination=NULL, const char *requestID=NULL) | |
Constructor. | |
void | validateAssertion (const Assertion &assertion) const |
Type-safe validation method. | |
const char * | getAddress () const |
Return address information from the confirmed bearer SubjectConfirmation, if any. | |
Protected Attributes | |
xmltooling::auto_ptr_XMLCh | m_destination |
Server location to which assertion was delivered. | |
xmltooling::auto_ptr_XMLCh | m_requestID |
ID of request that resulted in assertions. |
In addition to standard core requirements for validity, SSO assertions MUST be bearer-confirmable.
opensaml::saml2::BrowserSSOProfileValidator::BrowserSSOProfileValidator | ( | const XMLCh * | recipient, | |
const std::vector< const XMLCh * > * | audiences = NULL , |
|||
time_t | ts = 0 , |
|||
const char * | destination = NULL , |
|||
const char * | requestID = NULL | |||
) | [inline] |
Constructor.
recipient | name of assertion recipient (implicit audience) | |
audiences | additional audience values | |
ts | timestamp to evaluate assertion conditions, or 0 to bypass check | |
destination | server location to which assertion was delivered, or 0 to bypass check | |
requestID | ID of request that resulted in assertion, or NULL if unsolicited |
const char* opensaml::saml2::BrowserSSOProfileValidator::getAddress | ( | ) | const [inline] |
Return address information from the confirmed bearer SubjectConfirmation, if any.
void opensaml::saml2::BrowserSSOProfileValidator::validateAssertion | ( | const Assertion & | assertion | ) | const [virtual] |
Type-safe validation method.
assertion | assertion to validate |
Reimplemented from opensaml::saml2::AssertionValidator.