The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Beta.

You can build the distribution from the source tag,

Runtime: https://github.com/wso2/product-is/releases/tag/v5.4.0-beta
Analytics: https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta

following the steps given below.

*Building from the source*

   1. Install Java8 or above
   2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#)
   3. Get the source,
      - For the Runtime: Get a clone from https://github.com/wso2/p
      roduct-is.git and checkout to v5.4.0-beta tag or you can directly
      download the source for the tag from https://github.com/wso2/
      product-is/releases/tag/v5.4.0-beta
      <https://github.com/wso2/product-is/releases/tag/v5.4.0-beta>
      - For the Analytics: Get a clone from
      https://github.com/wso2/analytics-is.git and checkout to v5.4.0-beta
      tag or you can directly download the source for the tag from
      https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta
   4. Run the one of the below maven commands from product-is directory,
      - *mvn** clean install* (To build the binary and source distributions
      with the tests)
      - *mvn** clean install -Dmaven.test.skip=true* (To build the binary
      and source distributions, without running any of the
unit/integration tests)
   5. You can find the,
      - wso2is-5.4.0-beta.zip binary distribution in
      product-is/modules/distribution/target directory.
      - wso2is-analytics-5.4.0-beta.zip binary distribution in
      analytics-is/modules/distribution/target directory.

The following list contains all the features, improvements, and bug fixes
available with the WSO2 Identity Server 5.4.0 Beta release.

Patch

   - [IDENTITY-6198 <https://wso2.org/jira/browse/IDENTITY-6198>] - IS
   Authentication Flow Behavior Between Multiple Service Providers Not Handled
   - [IDENTITY-6924 <https://wso2.org/jira/browse/IDENTITY-6924>] - Add
   ability to sign SAML response using different key other than the private
   key defined in the primary keystore in the carbon.xml
   - [IDENTITY-6931 <https://wso2.org/jira/browse/IDENTITY-6931>] - Adding
   logout support for outbound WS-Federation(Passive)
   - [IDENTITY-6988 <https://wso2.org/jira/browse/IDENTITY-6988>] -
   ClientAuthHandler configuration in identity.xml only read last property in
   OAuthServerConfiguration

Bug

   - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] - Receive
   fault response from RemoteClaimManagerService
   - [IDENTITY-4331 <https://wso2.org/jira/browse/IDENTITY-4331>] - When
   you add Google Prov Connector in a SP OB Provisioning Configuration
   section, You cannot edit IDP again. Lead to a blank page and NPE
   - [IDENTITY-4655 <https://wso2.org/jira/browse/IDENTITY-4655>] - Google
   provisioning not working with IS 5.2.0 beta
   - [IDENTITY-4968 <https://wso2.org/jira/browse/IDENTITY-4968>] - Subject
   claim is returned in the incorrect format when subject claim uri is
   added/removed
   - [IDENTITY-5154 <https://wso2.org/jira/browse/IDENTITY-5154>] - When
   select Domain as PRIMARY Count users always set to -1
   - [IDENTITY-6102 <https://wso2.org/jira/browse/IDENTITY-6102>] - System
   claims can be modified by the User
   - [IDENTITY-6118 <https://wso2.org/jira/browse/IDENTITY-6118>] - Some
   properties of a Custom Inbound Authenticator is not displaying in UI
   properly
   - [IDENTITY-6286 <https://wso2.org/jira/browse/IDENTITY-6286>] - OIDC -
   Wrong claim value in ID token when multiple IDPs used through federated
   authentication
   - [IDENTITY-6345 <https://wso2.org/jira/browse/IDENTITY-6345>] - Ask
   passoword with management console (SOAP service)not working
   - [IDENTITY-6350 <https://wso2.org/jira/browse/IDENTITY-6350>] - Account
   gets locked even if the fails are not consecutive
   - [IDENTITY-6352 <https://wso2.org/jira/browse/IDENTITY-6352>] - cannot
   edit existing workflow without changing workflow name
   - [IDENTITY-6353 <https://wso2.org/jira/browse/IDENTITY-6353>] - cannot
   disable workflow engagements
   - [IDENTITY-6355 <https://wso2.org/jira/browse/IDENTITY-6355>] -
   secondary roles are not displayed when creating workflows in tenant mode
   - [IDENTITY-6361 <https://wso2.org/jira/browse/IDENTITY-6361>] -
   NumberFormatException with server startup with Oracle
   - [IDENTITY-6369 <https://wso2.org/jira/browse/IDENTITY-6369>] -
   Intermittent error when login in to dashboard after some idle time
   - [IDENTITY-6371 <https://wso2.org/jira/browse/IDENTITY-6371>] - Account
   Recovery - Password Reset with email notification has a placeholder in
   confirmation url
   - [IDENTITY-6378 <https://wso2.org/jira/browse/IDENTITY-6378>] - High
   load average observed in OAuth scnearios during performance tests
   - [IDENTITY-6381 <https://wso2.org/jira/browse/IDENTITY-6381>] - Account
   Recovery via Security Questions(using dashboard)fails for a tenant user
   - [IDENTITY-6387 <https://wso2.org/jira/browse/IDENTITY-6387>] - Forced
   Password Reset - OTP fails when user tries to reset the password
   - [IDENTITY-6388 <https://wso2.org/jira/browse/IDENTITY-6388>] - Forced
   Password Reset - Offline fails when user tries to reset the password
   - [IDENTITY-6394 <https://wso2.org/jira/browse/IDENTITY-6394>] -
   Creating roles with no permission/normal permissions not working once the
   flow failed
   - [IDENTITY-6397 <https://wso2.org/jira/browse/IDENTITY-6397>] - Google
   federation with Passive STS fails
   - [IDENTITY-6401 <https://wso2.org/jira/browse/IDENTITY-6401>] - SAML
   federation with Passive STS with email usernames fails
   - [IDENTITY-6407 <https://wso2.org/jira/browse/IDENTITY-6407>] -
   Userstore domain does not append with the subject identifier for 'Primary'
   userstore users even the SP is configured to append userstore domain
   - [IDENTITY-6411 <https://wso2.org/jira/browse/IDENTITY-6411>] -
   Grammatical error in the error message.
   - [IDENTITY-6412 <https://wso2.org/jira/browse/IDENTITY-6412>] - OIDC
   federation with Passive STS with email usernames fails
   - [IDENTITY-6414 <https://wso2.org/jira/browse/IDENTITY-6414>] - When
   associating two local users to the same IDP it should display a proper
   error messgage
   - [IDENTITY-6415 <https://wso2.org/jira/browse/IDENTITY-6415>] - Error
   during session cleanup task
   - [IDENTITY-6416 <https://wso2.org/jira/browse/IDENTITY-6416>] - Need UI
   validation when changing the password of the logged in user
   - [IDENTITY-6422 <https://wso2.org/jira/browse/IDENTITY-6422>] -
   Secondary User Store creation failure in windows
   - [IDENTITY-6423 <https://wso2.org/jira/browse/IDENTITY-6423>] - Two
   update clicks removes Enable Dumb Mode for SCIM tick - UI update issue
   - [IDENTITY-6424 <https://wso2.org/jira/browse/IDENTITY-6424>] - Server
   start-up throws an error when email UserName is enabled
   - [IDENTITY-6428 <https://wso2.org/jira/browse/IDENTITY-6428>] - SCIM
   Endpoints shows in the resident IDP UI does not change when the default
   9443 port is changed in the server
   - [IDENTITY-6432 <https://wso2.org/jira/browse/IDENTITY-6432>] - Error
   log prints when enable old identity listeners with oracle database
   - [IDENTITY-6435 <https://wso2.org/jira/browse/IDENTITY-6435>] - Error
   when try to setup challenge questions using dasboard (for email username)-
   with old identity listeners
   - [IDENTITY-6439 <https://wso2.org/jira/browse/IDENTITY-6439>] -
   ChallengeQuestions based Password Recovery does not work
   - [IDENTITY-6443 <https://wso2.org/jira/browse/IDENTITY-6443>] -
   Increase column size for access token and refresh token to support token
   encryption with 2048 key size
   - [IDENTITY-6449 <https://wso2.org/jira/browse/IDENTITY-6449>] - Warning
   log in server startup regarding the secondary userstore
   - [IDENTITY-6452 <https://wso2.org/jira/browse/IDENTITY-6452>] - SAML
   logout response sending failure in windows
   - [IDENTITY-6460 <https://wso2.org/jira/browse/IDENTITY-6460>] - Git
   provisioning with facebook IDP throws an error when email user name is NOT
   enabled
   - [IDENTITY-6465 <https://wso2.org/jira/browse/IDENTITY-6465>] - Set of
   claims of the federated user is sent when the federated user is associated
   to a local user and there is no requested claims at SP configs.
   - [IDENTITY-6550 <https://wso2.org/jira/browse/IDENTITY-6550>] -
   Possible NPE
   - [IDENTITY-6573 <https://wso2.org/jira/browse/IDENTITY-6573>] - NPE
   observed when click on edit link to update IDP
   - [IDENTITY-6582 <https://wso2.org/jira/browse/IDENTITY-6582>] - List
   new endpoints - e.g. DCR - in Resident IdP UI
   - [IDENTITY-6585 <https://wso2.org/jira/browse/IDENTITY-6585>] -
   Removing users from a role completely delete the provisioned user in SCIM
   outbound provisioning
   - [IDENTITY-6648 <https://wso2.org/jira/browse/IDENTITY-6648>] - Cannot
   initialize Balana by reading a configuration file
   - [IDENTITY-6680 <https://wso2.org/jira/browse/IDENTITY-6680>] - Claims
   with same claim URI (i.e. without the dialect URI prefix) as in other
   dialects, are not getting added to IDN_CLAIM table
   - [IDENTITY-6682 <https://wso2.org/jira/browse/IDENTITY-6682>] - Add
   ClaimDialectUri and PrefixClaimDialectUri facebook authenticator configs in
   application-authentication.xml
   - [IDENTITY-6743 <https://wso2.org/jira/browse/IDENTITY-6743>] - "User
   self registration code expiry time" UI config is not enabled by default
   - [IDENTITY-6749 <https://wso2.org/jira/browse/IDENTITY-6749>] -
   [Intermittent] Only one user is provisioned when I configured Salesforce
   outbound provisioning.
   - [IDENTITY-6755 <https://wso2.org/jira/browse/IDENTITY-6755>] -
   Salesforce users are not provisioned when you define rules
   - [IDENTITY-6778 <https://wso2.org/jira/browse/IDENTITY-6778>] -
   JSPException while including path
'/application/configure-service-provider.jsp'
   with custom inbound authenticators
   - [IDENTITY-6811 <https://wso2.org/jira/browse/IDENTITY-6811>] - CSRF
   token validation fails for 'My Login Sessions' gadget in IS user dashboard
   - [IDENTITY-6816 <https://wso2.org/jira/browse/IDENTITY-6816>] -
   [CLUSTER] Unable to log in to the IS Dashbaord
   - [IDENTITY-6819 <https://wso2.org/jira/browse/IDENTITY-6819>] - When
   Updating the IDP, Backend gives the following error
   - [IDENTITY-6821 <https://wso2.org/jira/browse/IDENTITY-6821>] - TOTP is
   not working with WUM updated 5.3.0 pack
   - [IDENTITY-6840 <https://wso2.org/jira/browse/IDENTITY-6840>] - TOTP is
   not working with WUM updated IS-KM 5.3.0 pack
   - [IDENTITY-6841 <https://wso2.org/jira/browse/IDENTITY-6841>] - Cannot
   log in to analytics dashboard portal with created credentials
   - [IDENTITY-6877 <https://wso2.org/jira/browse/IDENTITY-6877>] -
   remote-user-mgt sample which is a web service client for authentication and
   user admin services doesn't work
   - [IDENTITY-6915 <https://wso2.org/jira/browse/IDENTITY-6915>] - Error
   when using multiple federated authenticators in second step authentication
   and sending fidp parameter as a query param
   - [IDENTITY-6927 <https://wso2.org/jira/browse/IDENTITY-6927>] - Tenant
   rewrite valve does not work with tomcat 7.0.81 upgrade
   - [IDENTITY-6941 <https://wso2.org/jira/browse/IDENTITY-6941>] - SCIM
   1.1 Group PUT does not work
   - [IDENTITY-6946 <https://wso2.org/jira/browse/IDENTITY-6946>] - JWKS
   endpoint modulus value 'n' contains an additional bit
   - [IDENTITY-6951 <https://wso2.org/jira/browse/IDENTITY-6951>] - User
   management UI fails to identify the logged in user when user use different
   case for domain name or user name
   - [IDENTITY-6954 <https://wso2.org/jira/browse/IDENTITY-6954>] -
   Authorization Code not revoked after first use when PKCE is enabled and
   invalid verifier is submitted
   - [IDENTITY-6955 <https://wso2.org/jira/browse/IDENTITY-6955>] - With
   the introspection response the user name comes with the appended tenant
   domain.
   - [IDENTITY-6957 <https://wso2.org/jira/browse/IDENTITY-6957>] - User
   list does not get refreshed during the retry, after getting an error during
   the role add flow
   - [IDENTITY-6958 <https://wso2.org/jira/browse/IDENTITY-6958>] -
   OAuth/DCR does not rollback properly if the app creation fails due to an
   error.
   - [IDENTITY-6959 <https://wso2.org/jira/browse/IDENTITY-6959>] - Tenant
   flow might not close properly if an exception occurs during app creation
   - [IDENTITY-6961 <https://wso2.org/jira/browse/IDENTITY-6961>] - OIDC
   DCR throws 500 for an invalid registration request instead of 400
   - [IDENTITY-6963 <https://wso2.org/jira/browse/IDENTITY-6963>] - Rule
   based outbound provisioning is not working
   - [IDENTITY-6965 <https://wso2.org/jira/browse/IDENTITY-6965>] -
   Intermitent issue in SCIM group creation
   - [IDENTITY-6967 <https://wso2.org/jira/browse/IDENTITY-6967>] -
   Initializing issue in provisioning connectors
   - [IDENTITY-6970 <https://wso2.org/jira/browse/IDENTITY-6970>] -
   Secondary user stores Users not loading in Workflow user search UI
   - [IDENTITY-6974 <https://wso2.org/jira/browse/IDENTITY-6974>] -
   Federated links disappear after failing first attempt in basicauth in SSO
   login flow
   - [IDENTITY-6975 <https://wso2.org/jira/browse/IDENTITY-6975>] -
   AccessTokenDAOImpl connection pool rollback Error
   - [IDENTITY-6976 <https://wso2.org/jira/browse/IDENTITY-6976>] - Logout
   from the user-dashboard fails with an error
   - [IDENTITY-6993 <https://wso2.org/jira/browse/IDENTITY-6993>] -
   Authorization code grant type is not working
   - [IDENTITY-6994 <https://wso2.org/jira/browse/IDENTITY-6994>] - Reusing
   authorization code twice does not revoke the access token issued to it

Task

   - [IDENTITY-6538 <https://wso2.org/jira/browse/IDENTITY-6538>] - Improve
   unit tests coverage for identity-application-authz-xacml

Improvement

   - [IDENTITY-5007 <https://wso2.org/jira/browse/IDENTITY-5007>] -
   Register OAuth/OpenID Connect Service provider using single request.
   - [IDENTITY-5514 <https://wso2.org/jira/browse/IDENTITY-5514>] - Change
   grant-type via configuration
   - [IDENTITY-5638 <https://wso2.org/jira/browse/IDENTITY-5638>] - OIDC -
   Support to extend IDP session
   - [IDENTITY-5861 <https://wso2.org/jira/browse/IDENTITY-5861>] - SAML2
   AuthnContextClassRef returned from the Federated IDP should return to the
   applications.
   - [IDENTITY-6077 <https://wso2.org/jira/browse/IDENTITY-6077>] - Create
   JWT access token in Identity Server
   - [IDENTITY-6512 <https://wso2.org/jira/browse/IDENTITY-6512>] -
   [Workflows] Cannot edit other attributes of the workflow without editing
   the workflow name
   - [IDENTITY-6589 <https://wso2.org/jira/browse/IDENTITY-6589>] -
   Supplementary OSGi service for adding new claims to ID token
   - [IDENTITY-6801 <https://wso2.org/jira/browse/IDENTITY-6801>] - Proper
   UI indication needed where there are no service providers to list
   - [IDENTITY-6966 <https://wso2.org/jira/browse/IDENTITY-6966>] -
   Implemented Self contained access token validator
   - [IDENTITY-6980 <https://wso2.org/jira/browse/IDENTITY-6980>] - Add
   wildcard * support for scim group name filtering


*Contribute to WSO2 Identity Server*

*Mailing Lists*

Join our mailing lists and correspond with the developers directly. We also
encourage you to take part in discussions related to the product in the
architecture mailing list. If you have any questions regarding the product
you can use our StackOverflow forum to raise them as well.

   - Developer List: [email protected]
   - Architecture List: [email protected]
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.

~ The WSO2 Identity and Access Management Team ~

*Jayanga Kaushalya*
Senior Software Engineer
Mobile: +94777860160 <+94%2077%20786%200160>
WSO2 Inc. | http://wso2.com
lean.enterprise.middleware
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to