Ruby SAML

Upstream URLSecurity RiskAbandonment Risk
https://github.com/SAML-Toolkits/ruby-samlVery HighVery Low

External contacts

The maintainer is reachable via the public GitHub issue tracker. Security reports are taken via GHSA.

Security posture

This gem implements the logic for SAML authentication, which is used for the OmniAuth SAML strategy used by MoR for authenticating administrators. It is therefore is of critical importance for the security of MoR. Sign in bypass could expose all aspects of the storefront to a third party attacker, including customer addresses, order histories, and API credentials for Stripe, Facebook, and others.

Abandonment risk

The primary maintainer runs his own consultancy around SAML. It is very unlikely that the gem will be abandoned.

It would be great to financially support ruby-saml when we are able to do so.

Versioning policy

Updates will be picked up by bundle during our monthly updates. We are not directly pinning any specific version, though OmniAuth SAML is doing so.

Updates, even patch releases, may have breaking changes per their documentation. We must be careful to test all SAML flows when updating the gem.