1 files changed, 10 insertions, 3 deletions
diff --git a/UPGRADE.rst b/UPGRADE.rst
index e852b806c2..8bc2ff91ab 100644
--- a/UPGRADE.rst
+++ b/UPGRADE.rst
@@ -98,9 +98,9 @@ will log a warning on each received request.
To avoid the warning, administrators using a reverse proxy should ensure that
the reverse proxy sets `X-Forwarded-Proto` header to `https` or `http` to
-indicate the protocol used by the client. See the [reverse proxy
-documentation](docs/reverse_proxy.md), where the example configurations have
-been updated to show how to set this header.
+indicate the protocol used by the client. See the `reverse proxy documentation
+<docs/reverse_proxy.md>`_, where the example configurations have been updated to
+show how to set this header.
(Users of `Caddy <https://caddyserver.com/>`_ are unaffected, since we believe it
sets `X-Forwarded-Proto` by default.)
@@ -124,6 +124,13 @@ This version changes the URI used for callbacks from OAuth2 and SAML2 identity p
need to add ``[synapse public baseurl]/_synapse/client/saml2/authn_response`` as a permitted
"ACS location" (also known as "allowed callback URLs") at the identity provider.
+ The "Issuer" in the "AuthnRequest" to the SAML2 identity provider is also updated to
+ ``[synapse public baseurl]/_synapse/client/saml2/metadata.xml``. If your SAML2 identity
+ provider uses this property to validate or otherwise identify Synapse, its configuration
+ will need to be updated to use the new URL. Alternatively you could create a new, separate
+ "EntityDescriptor" in your SAML2 identity provider with the new URLs and leave the URLs in
+ the existing "EntityDescriptor" as they were.
+
Changes to HTML templates
-------------------------
|