From cc119c38533198a1c901ae410d8908bd06779290 Mon Sep 17 00:00:00 2001 From: Ioannis Kakavas Date: Wed, 13 May 2020 11:51:18 +0300 Subject: [PATCH] Expose idp.metadata.http.refresh for SAML realm (#56354) (#56593) This setting was not returned in the SamlRealmSettings#getSettings so it was not possible for users to set this in the realm config in our configuration. --- .../core/security/authc/saml/SamlRealmSettings.java | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/saml/SamlRealmSettings.java b/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/saml/SamlRealmSettings.java index 437dca0c60e..f88c74ca3b4 100644 --- a/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/saml/SamlRealmSettings.java +++ b/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authc/saml/SamlRealmSettings.java @@ -103,11 +103,11 @@ public class SamlRealmSettings { */ public static Set> getSettings() { final Set> set = Sets.newHashSet( - IDP_ENTITY_ID, IDP_METADATA_PATH, IDP_SINGLE_LOGOUT, - SP_ENTITY_ID, SP_ACS, SP_LOGOUT, - NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN, - POPULATE_USER_METADATA, CLOCK_SKEW, - ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES, REQUESTED_AUTHN_CONTEXT_CLASS_REF); + IDP_ENTITY_ID, IDP_METADATA_PATH, IDP_METADATA_HTTP_REFRESH, IDP_SINGLE_LOGOUT, + SP_ENTITY_ID, SP_ACS, SP_LOGOUT, + NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN, + POPULATE_USER_METADATA, CLOCK_SKEW, + ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES, REQUESTED_AUTHN_CONTEXT_CLASS_REF); set.addAll(X509KeyPairSettings.affix(RealmSettings.realmSettingPrefix(TYPE), ENCRYPTION_SETTING_KEY, false)); set.addAll(X509KeyPairSettings.affix(RealmSettings.realmSettingPrefix(TYPE), SIGNING_SETTING_KEY, false)); set.addAll(SSLConfigurationSettings.getRealmSettings(TYPE));