diff --git a/.changeset/small-radios-help.md b/.changeset/small-radios-help.md new file mode 100644 index 00000000000..a3bead0dc87 --- /dev/null +++ b/.changeset/small-radios-help.md @@ -0,0 +1,6 @@ +--- +"@wso2is/admin.connections.v1": major +"@wso2is/i18n": major +--- + +Update SAML connection ProviderName config name diff --git a/features/admin.connections.v1/components/edit/forms/authenticators/saml-authenticator-form.tsx b/features/admin.connections.v1/components/edit/forms/authenticators/saml-authenticator-form.tsx index 29d8954782c..bae0e14873b 100644 --- a/features/admin.connections.v1/components/edit/forms/authenticators/saml-authenticator-form.tsx +++ b/features/admin.connections.v1/components/edit/forms/authenticators/saml-authenticator-form.tsx @@ -116,7 +116,7 @@ export interface SamlPropertiesInterface { IncludeCert?: boolean; IncludeNameIDPolicy?:boolean; AuthnContextClassRef?: string; - AuthnReqProviderName?: string; + samlAuthnRequestProviderName?: string; } const FORM_ID: string = "saml-authenticator-form"; @@ -250,7 +250,6 @@ export const SamlAuthenticatorSettingsForm: FunctionComponent({ defaultValue: authorizedRedirectURL, key: "AuthRedirectUrl" }), AuthnContextClassRef: findPropVal({ defaultValue: "", key: "AuthnContextClassRef" }), AuthnContextComparisonLevel: findPropVal({ defaultValue: "", key: "AuthnContextComparisonLevel" }), - AuthnReqProviderName: findPropVal({ defaultValue: "", key: "AuthnReqProviderName" }), CustomAuthnContextClassRef: findPropVal({ defaultValue: "", key: "CustomAuthnContextClassRef" }), DigestAlgorithm: findPropVal({ defaultValue: "SHA256", key: "DigestAlgorithm" }), ForceAuthentication: findPropVal({ defaultValue: "string", key: "ForceAuthentication" }), @@ -300,8 +299,11 @@ export const SamlAuthenticatorSettingsForm: FunctionComponent({ defaultValue: false, key: "isAssertionSigned" }) - + isAssertionSigned: findPropVal({ defaultValue: false, key: "isAssertionSigned" }), + samlAuthnRequestProviderName: findPropVal({ + defaultValue: "", + key: "samlAuthnRequestProviderName" + }) } as SamlPropertiesInterface; }, []); @@ -964,20 +966,20 @@ export const SamlAuthenticatorSettingsForm: FunctionComponent - { t(`${ I18N_TARGET_KEY }.authnReqProviderName.label`) } + + { t(`${ I18N_TARGET_KEY }.samlAuthnRequestProviderName.label`) } ) } maxLength={ IDENTITY_PROVIDER_AUTHENTICATION_REQUEST_PROVIDER_NAME_LENGTH.max } minLength={ IDENTITY_PROVIDER_AUTHENTICATION_REQUEST_PROVIDER_NAME_LENGTH.min } - hint={ t(`${ I18N_TARGET_KEY }.authnReqProviderName.hint`) } + hint={ t(`${ I18N_TARGET_KEY }.samlAuthnRequestProviderName.hint`) } readOnly={ readOnly } /> diff --git a/modules/i18n/src/models/namespaces/authentication-provider-ns.ts b/modules/i18n/src/models/namespaces/authentication-provider-ns.ts index b6cad78ee02..24a17c73635 100644 --- a/modules/i18n/src/models/namespaces/authentication-provider-ns.ts +++ b/modules/i18n/src/models/namespaces/authentication-provider-ns.ts @@ -812,7 +812,7 @@ export interface AuthenticationProviderNS { placeholder: string; ariaLabel: string; }; - authnReqProviderName: { + samlAuthnRequestProviderName: { hint: string; label: string; placeholder: string; diff --git a/modules/i18n/src/translations/en-US/portals/authentication-provider.ts b/modules/i18n/src/translations/en-US/portals/authentication-provider.ts index 504f6b27abe..897487b666e 100644 --- a/modules/i18n/src/translations/en-US/portals/authentication-provider.ts +++ b/modules/i18n/src/translations/en-US/portals/authentication-provider.ts @@ -801,7 +801,7 @@ export const authenticationProvider:AuthenticationProviderNS = { hint: "Specify if SAMLAssertion element is encrypted", label: "Enable assertion encryption" }, - authnReqProviderName: { + samlAuthnRequestProviderName: { hint: "The human-readable name of the requester.", label: "Authentication Request Provider Name", placeholder: "Enter authentication request provider name",