WSO2 Identity Server team is pleased to announce the 3rd Milestone of WSO2
IdentityServer 5.4.0. You can download this distribution from the following
location.

https://github.com/wso2/product-is/releases/tag/v5.4.0-m3

Following list contains all the features, improvements and bug fixes
available with this milestone.
Patch

   - [IDENTITY-6206 <https://wso2.org/jira/browse/IDENTITY-6206>] - ACS
   validation failure when using signed passive saml requests
   - [IDENTITY-6208 <https://wso2.org/jira/browse/IDENTITY-6208>] -
   Possible Connection Leak in RegistryRecoveryDataStore

Bug

   - [IDENTITY-4663 <https://wso2.org/jira/browse/IDENTITY-4663>] - Getting
   a registry indexing error while evaluating a XACML request against PDP
   - [IDENTITY-5549 <https://wso2.org/jira/browse/IDENTITY-5549>] - Backend
   error while creating a tenant domain with capital letters in the name
   - [IDENTITY-5938 <https://wso2.org/jira/browse/IDENTITY-5938>] - [NPE]
   OAuth2AuthzEndpoint has thrown exception, unwinding now
   - [IDENTITY-5943 <https://wso2.org/jira/browse/IDENTITY-5943>] -
   [LoadTest] Error while retrieving access token in Authorization Code grant
   type
   - [IDENTITY-6073 <https://wso2.org/jira/browse/IDENTITY-6073>] - OIDC
   logout fails when call back url has a uri fragment
   - [IDENTITY-6088 <https://wso2.org/jira/browse/IDENTITY-6088>] - IS
   should not return IDTokens without required claims
   - [IDENTITY-6099 <https://wso2.org/jira/browse/IDENTITY-6099>] -
   Intermittent error when invoking password reset rest api using browser
   based client
   - [IDENTITY-6117 <https://wso2.org/jira/browse/IDENTITY-6117>] -
   Observed a performance degradation due to pre-authentication and
   post-authentication event handlers
   - [IDENTITY-6126 <https://wso2.org/jira/browse/IDENTITY-6126>] - Style
   issue in IS SSO Login page in IE
   - [IDENTITY-6158 <https://wso2.org/jira/browse/IDENTITY-6158>] -
   Exception thrown when debug logs are disabled
   - [IDENTITY-6175 <https://wso2.org/jira/browse/IDENTITY-6175>] -
   Improvements for updateAppAndRevokeTokensAndAuthzCodes
   - [IDENTITY-6235 <https://wso2.org/jira/browse/IDENTITY-6235>] -
   Nullpointer Exception on Requesting Access Token twice for using a custom
   grant type.
   - [IDENTITY-6237 <https://wso2.org/jira/browse/IDENTITY-6237>] - PROVIDE
   MANDATORY DETAILS page does not go away on submit of missing cliams
   - [IDENTITY-6241 <https://wso2.org/jira/browse/IDENTITY-6241>] -
   Multiple claims mapped to a same local claim
   - [IDENTITY-6242 <https://wso2.org/jira/browse/IDENTITY-6242>] -
   Internal Server Error on Requesting Access-Token for the Same 'saml2-bearer'
   - [IDENTITY-6243 <https://wso2.org/jira/browse/IDENTITY-6243>] - Error
   on requesting access tokens with federated user and primary user where both
   users have the same username.
   - [IDENTITY-6244 <https://wso2.org/jira/browse/IDENTITY-6244>] - Only
   sub is recieving even claims are set for federated users
   - [IDENTITY-6247 <https://wso2.org/jira/browse/IDENTITY-6247>] -
   Updating multiple user attributes via SCIM2 Patch-Replace does not work
   - [IDENTITY-6248 <https://wso2.org/jira/browse/IDENTITY-6248>] - ldap
   search filters with objectGUID are not working properly
   - [IDENTITY-6251 <https://wso2.org/jira/browse/IDENTITY-6251>] - [SCIM]
   ArrayIndexOutofBoundException thrown for invalid authorization headers
   - [IDENTITY-6254 <https://wso2.org/jira/browse/IDENTITY-6254>] - [SCIM]
   Error in user creation and retrieval after enabling the config to allow
   emails as usernames
   - [IDENTITY-6259 <https://wso2.org/jira/browse/IDENTITY-6259>] - When a
   user is created email is shown as "User"
   - [IDENTITY-6269 <https://wso2.org/jira/browse/IDENTITY-6269>] -
   sslHandshakeException in the request to /oauth2/authorize in access token
   generation
   - [IDENTITY-6271 <https://wso2.org/jira/browse/IDENTITY-6271>] -
   Users/{id} PATCH expects the "schemas" attribute to be empty
   - [IDENTITY-6273 <https://wso2.org/jira/browse/IDENTITY-6273>] -
   UserInfoEndpoint returns local user claims when a local user presents with
   federated user name in local userstore
   - [IDENTITY-6274 <https://wso2.org/jira/browse/IDENTITY-6274>] -
   FrameworkException when an access token is generated with a positive pool
   size (Authorization code flow)
   - [IDENTITY-6276 <https://wso2.org/jira/browse/IDENTITY-6276>] - Cannot
   configure UserInfoUrl for OpenID Connect Federated Authenticator
   - [IDENTITY-6278 <https://wso2.org/jira/browse/IDENTITY-6278>] -
   Problems in claim mappings for OIDC dialect
   - [IDENTITY-6282 <https://wso2.org/jira/browse/IDENTITY-6282>] - NPE
   when processing the authorization request for poolsize >0

Task

   - [IDENTITY-6261 <https://wso2.org/jira/browse/IDENTITY-6261>] - Adding
   capability to add multiple scope validators
   - [IDENTITY-6263 <https://wso2.org/jira/browse/IDENTITY-6263>] - Prevent
   OAuthServiceComponent instantiating OAuthServerConfiguration multiple times
   during startup
   - [IDENTITY-6275 <https://wso2.org/jira/browse/IDENTITY-6275>] -
   Introduce an extension point for grant handlers at scope validation point
   - [IDENTITY-6285 <https://wso2.org/jira/browse/IDENTITY-6285>] - Add
   default configuration for ScopeValidators and ScopeHandlers in identity.xml

Improvement

   - [IDENTITY-6150 <https://wso2.org/jira/browse/IDENTITY-6150>] -
   Introduce a new Configuration Property to decide the poolsize for OAuth
   Persistence tasks


*How To Contribute*
Your feedback is most welcome!
Mailing Lists
Join our mailing list and correspond with the developers directly.

   - Developer List: [email protected]
   <https://mail.google.com/a/wso2.com/mail/?view=cm&fs=1&tf=1&[email protected]>
    | Subscribe
   
<https://mail.google.com/a/wso2.com/mail/?view=cm&fs=1&tf=1&[email protected]>
    | Mail Archive <http://wso2.org/mailarchive/dev/>
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements and feature requests
regarding WSO2 IdentityServer through public WSO2 Identity Server Runtime
JIRA <https://wso2.org/jira/browse/IDENTITY> and Analytics JIRA
<https://wso2.org/jira/browse/ANLYIS>

~ The WSO2 Identity Server Team ~
-- 

Best Regards,

Nuwandi Wickramasinghe

Software Engineer

WSO2 Inc.

Web : http://wso2.com

Mobile : 0719214873
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to