A client is trying to remove a device from your account. To confirm this
action, <ahref="https://sso_provider/validate?SAMLRequest=...">re-authenticate with single sign-on</a>.
If you did not expect this, your account may be compromised!
</body>
```
@ -101,11 +106,12 @@ limited by the chosen SSO implementation, for example:
```
GET https://sso_provider/validate?SAMLRequest=<etc> HTTP/1.1
... SAML/CAS stuff
<SAML/CASorotherSSOdata>
```
3. The SSO provider validates the user and ends up redirecting the browser back
to the homeserver. (The example below shows a 302 for simplicity but SAML normally uses a 200 with an html <form>, with javascript to automatically submit it.)
to the homeserver. The example below shows a 302 for simplicity, this might
vary based on SSO implementation.
```
HTTP/1.1 302 Moved
@ -191,13 +197,13 @@ change to your account.
This problem can be mitigated by clearly telling the user what is about to happen.
### Reusing UI-Auth sessions
### Reusing User Interactive Authentication sessions
The security of this relies on UI-Auth sessions only being used for the same
request as they were initiated for. It is not believed that this is currently
enforced.
The security of this relies on User Interactive Authentication sessions only
being used for the same request as they were initiated for. It is not believed
that this is currently enforced.
## Unstable prefix
A vendor prefix of `org.matrix.login.sso`(instead of `m.login.sso` is proposed
A vendor prefix of `org.matrix.login.sso`is proposed (instead of `m.login.sso`)