Skip to content

Commit 12ccf8d

Browse files
authored
Expose idp.metadata.http.refresh for SAML realm (elastic#56354)
This setting was not returned in the SamlRealmSettings#getSettings so it was not possible for users to set this in the realm config in our configuration.
1 parent 74e2c01 commit 12ccf8d

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/saml/SamlRealmSettings.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -101,11 +101,11 @@ private SamlRealmSettings() {
101101
*/
102102
public static Set<Setting.AffixSetting<?>> getSettings() {
103103
final Set<Setting.AffixSetting<?>> set = Sets.newHashSet(
104-
IDP_ENTITY_ID, IDP_METADATA_PATH, IDP_SINGLE_LOGOUT,
105-
SP_ENTITY_ID, SP_ACS, SP_LOGOUT,
106-
NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN,
107-
POPULATE_USER_METADATA, CLOCK_SKEW,
108-
ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES, REQUESTED_AUTHN_CONTEXT_CLASS_REF);
104+
IDP_ENTITY_ID, IDP_METADATA_PATH, IDP_METADATA_HTTP_REFRESH, IDP_SINGLE_LOGOUT,
105+
SP_ENTITY_ID, SP_ACS, SP_LOGOUT,
106+
NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN,
107+
POPULATE_USER_METADATA, CLOCK_SKEW,
108+
ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES, REQUESTED_AUTHN_CONTEXT_CLASS_REF);
109109
set.addAll(X509KeyPairSettings.affix(RealmSettings.realmSettingPrefix(TYPE), ENCRYPTION_SETTING_KEY, false));
110110
set.addAll(X509KeyPairSettings.affix(RealmSettings.realmSettingPrefix(TYPE), SIGNING_SETTING_KEY, false));
111111
set.addAll(SSLConfigurationSettings.getRealmSettings(TYPE));

0 commit comments

Comments
 (0)