summaryrefslogtreecommitdiff
path: root/src/saml2/server.py
diff options
context:
space:
mode:
authorAshima Athri <ashimaathri@gmail.com>2016-10-05 17:06:02 -0400
committerAshima Athri <ashimaathri@gmail.com>2016-10-05 17:06:02 -0400
commit4375361939e942c4dd666d3ca4e1159858404bc4 (patch)
tree18abfab98b62a8c1c10e699a5daf28e55f7378bb /src/saml2/server.py
parent05d9276ab4764f1a895fa2b0e50d0e05fc3160dd (diff)
downloadpysaml2-4375361939e942c4dd666d3ca4e1159858404bc4.tar.gz
The ID of each Signature element must be unique
If the assertion and response both are signed, both Signatures have an ID of `Signature1`. This creates invalid xml as xs:ID must be unique. This fixes the issue when integrating with onelogin's python3-saml client: Element '{http://www.w3.org/2000/09/xmldsig#}Signature', attribute 'Id': 'Signature1' is not a valid value of the atomic type 'xs:ID'.
Diffstat (limited to 'src/saml2/server.py')
-rw-r--r--src/saml2/server.py2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/saml2/server.py b/src/saml2/server.py
index 2dad57f9..08d09bfb 100644
--- a/src/saml2/server.py
+++ b/src/saml2/server.py
@@ -476,7 +476,7 @@ class Server(Entity):
if not encrypt_assertion:
if sign_assertion:
assertion.signature = pre_signature_part(assertion.id,
- self.sec.my_cert, 1,
+ self.sec.my_cert, 2,
sign_alg=sign_alg,
digest_alg=digest_alg)
to_sign.append((class_name(assertion), assertion.id))