[docs] Update saml.xml.org link from http to https
closes keycloak/keycloak#21317
This commit is contained in:
parent
f695eeaa44
commit
e945a056bb
3 changed files with 3 additions and 3 deletions
|
@ -26,7 +26,7 @@ the request.
|
||||||
|
|
||||||
==== SAML 2.0
|
==== SAML 2.0
|
||||||
|
|
||||||
link:http://saml.xml.org/saml-specifications[SAML 2.0] is a similar specification to OIDC but a lot older and more mature. It has its roots in SOAP and the plethora
|
link:https://saml.xml.org/saml-specifications[SAML 2.0] is a similar specification to OIDC but a lot older and more mature. It has its roots in SOAP and the plethora
|
||||||
of WS-* specifications so it tends to be a bit more verbose than OIDC. SAML 2.0 is primarily an authentication protocol
|
of WS-* specifications so it tends to be a bit more verbose than OIDC. SAML 2.0 is primarily an authentication protocol
|
||||||
that works by exchanging XML documents between the authentication server and the application. XML signatures and encryption are used to verify requests and responses.
|
that works by exchanging XML documents between the authentication server and the application. XML signatures and encryption are used to verify requests and responses.
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
|
|
||||||
{project_name} is a separate server that you manage on your network. Applications are configured to point to and
|
{project_name} is a separate server that you manage on your network. Applications are configured to point to and
|
||||||
be secured by this server. {project_name} uses open protocol standards like link:https://openid.net/developers/how-connect-works/[OpenID Connect]
|
be secured by this server. {project_name} uses open protocol standards like link:https://openid.net/developers/how-connect-works/[OpenID Connect]
|
||||||
or link:http://saml.xml.org/saml-specifications[SAML 2.0] to secure
|
or link:https://saml.xml.org/saml-specifications[SAML 2.0] to secure
|
||||||
your applications. Browser applications redirect a user's browser from the application to the {project_name} authentication
|
your applications. Browser applications redirect a user's browser from the application to the {project_name} authentication
|
||||||
server where they enter their credentials. This redirection is important because users are completely isolated from applications and
|
server where they enter their credentials. This redirection is important because users are completely isolated from applications and
|
||||||
applications never see a user's credentials. Applications instead are given an identity token or assertion that is cryptographically
|
applications never see a user's credentials. Applications instead are given an identity token or assertion that is cryptographically
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
|
|
||||||
=== SAML
|
=== SAML
|
||||||
[role="_abstract"]
|
[role="_abstract"]
|
||||||
link:http://saml.xml.org/saml-specifications[SAML 2.0] is a similar specification to OIDC but more mature. It is descended from SOAP and web service messaging specifications so is generally more verbose than OIDC. SAML 2.0 is an authentication protocol that exchanges XML documents between authentication servers and applications. XML signatures and encryption are used to verify requests and responses.
|
link:https://saml.xml.org/saml-specifications[SAML 2.0] is a similar specification to OIDC but more mature. It is descended from SOAP and web service messaging specifications so is generally more verbose than OIDC. SAML 2.0 is an authentication protocol that exchanges XML documents between authentication servers and applications. XML signatures and encryption are used to verify requests and responses.
|
||||||
|
|
||||||
In general, SAML implements two use cases.
|
In general, SAML implements two use cases.
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue