@@ -226,7 +226,7 @@ We will see a typical configuration for protecting a Django project::
226
226
# Signing
227
227
'key_file': path.join(BASEDIR, 'mycert.key'), # private part
228
228
'cert_file': path.join(BASEDIR, 'mycert.pem'), # public part
229
-
229
+
230
230
# Encryption
231
231
'encryption_keypairs': [{
232
232
'key_file': path.join(BASEDIR, 'my_encryption_key.key'), # private part
@@ -282,7 +282,7 @@ entities metadata. This XML file should be in the SAML2 metadata format.
282
282
The ``key_file `` and ``cert_file `` options reference the two parts of a
283
283
standard x509 certificate. You need it to sign your metadata. For assertion
284
284
encryption/decryption support please configure another set of ``key_file `` and
285
- ``cert_file ``, but as inner attribues of ``encryption_keypairs `` option.
285
+ ``cert_file ``, but as inner attributes of ``encryption_keypairs `` option.
286
286
287
287
.. note ::
288
288
@@ -310,7 +310,7 @@ User attributes
310
310
---------------
311
311
312
312
In the SAML 2.0 authentication process the Identity Provider (IdP) will
313
- send a security assertion to the Service Provider (SP) upon a succesful
313
+ send a security assertion to the Service Provider (SP) upon a successful
314
314
authentication. This assertion contains attributes about the user that
315
315
was authenticated. It depends on the IdP configuration what exact
316
316
attributes are sent to each SP it can talk to.
@@ -328,7 +328,7 @@ Please, use an unique attribute when setting this option. Otherwise
328
328
the authentication process may fail because djangosaml2 will not know
329
329
which Django user it should pick.
330
330
331
- If your main attribute is something inherently case-inensitive (such as
331
+ If your main attribute is something inherently case-insensitive (such as
332
332
an email address), you may set::
333
333
334
334
SAML_DJANGO_USER_MAIN_ATTRIBUTE_LOOKUP = '__iexact'
@@ -376,7 +376,7 @@ If you are using Django user profile objects to store extra attributes
376
376
about your user you can add those attributes to the SAML_ATTRIBUTE_MAPPING
377
377
dictionary. For each (key, value) pair, djangosaml2 will try to store the
378
378
attribute in the User model if there is a matching field in that model.
379
- Otherwise it will try to do the same with your profile custom model. For
379
+ Otherwise it will try to do the same with your profile custom model. For
380
380
multi-valued attributes only the first value is assigned to the destination field.
381
381
382
382
Alternatively, custom processing of attributes can be achieved by setting the
@@ -403,7 +403,7 @@ Custom User object::
403
403
class User(AbstractUser):
404
404
405
405
def process_groups(self, groups):
406
- // process list of group names in argument 'groups'
406
+ // process list of group names in argument 'groups'
407
407
pass;
408
408
409
409
settings.py::
0 commit comments