The WSO2 Identity and Access Management team is pleased to announce the release of WSO2 Identity Server 5.4.0 Beta.
You can build the distribution from the source tag, Runtime: https://github.com/wso2/product-is/releases/tag/v5.4.0-beta Analytics: https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta following the steps given below. *Building from the source* 1. Install Java8 or above 2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#) 3. Get the source, - For the Runtime: Get a clone from https://github.com/wso2/p roduct-is.git and checkout to v5.4.0-beta tag or you can directly download the source for the tag from https://github.com/wso2/ product-is/releases/tag/v5.4.0-beta <https://github.com/wso2/product-is/releases/tag/v5.4.0-beta> - For the Analytics: Get a clone from https://github.com/wso2/analytics-is.git and checkout to v5.4.0-beta tag or you can directly download the source for the tag from https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta 4. Run the one of the below maven commands from product-is directory, - *mvn** clean install* (To build the binary and source distributions with the tests) - *mvn** clean install -Dmaven.test.skip=true* (To build the binary and source distributions, without running any of the unit/integration tests) 5. You can find the, - wso2is-5.4.0-beta.zip binary distribution in product-is/modules/distribution/target directory. - wso2is-analytics-5.4.0-beta.zip binary distribution in analytics-is/modules/distribution/target directory. The following list contains all the features, improvements, and bug fixes available with the WSO2 Identity Server 5.4.0 Beta release. Patch - [IDENTITY-6198 <https://wso2.org/jira/browse/IDENTITY-6198>] - IS Authentication Flow Behavior Between Multiple Service Providers Not Handled - [IDENTITY-6924 <https://wso2.org/jira/browse/IDENTITY-6924>] - Add ability to sign SAML response using different key other than the private key defined in the primary keystore in the carbon.xml - [IDENTITY-6931 <https://wso2.org/jira/browse/IDENTITY-6931>] - Adding logout support for outbound WS-Federation(Passive) - [IDENTITY-6988 <https://wso2.org/jira/browse/IDENTITY-6988>] - ClientAuthHandler configuration in identity.xml only read last property in OAuthServerConfiguration Bug - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] - Receive fault response from RemoteClaimManagerService - [IDENTITY-4331 <https://wso2.org/jira/browse/IDENTITY-4331>] - When you add Google Prov Connector in a SP OB Provisioning Configuration section, You cannot edit IDP again. Lead to a blank page and NPE - [IDENTITY-4655 <https://wso2.org/jira/browse/IDENTITY-4655>] - Google provisioning not working with IS 5.2.0 beta - [IDENTITY-4968 <https://wso2.org/jira/browse/IDENTITY-4968>] - Subject claim is returned in the incorrect format when subject claim uri is added/removed - [IDENTITY-5154 <https://wso2.org/jira/browse/IDENTITY-5154>] - When select Domain as PRIMARY Count users always set to -1 - [IDENTITY-6102 <https://wso2.org/jira/browse/IDENTITY-6102>] - System claims can be modified by the User - [IDENTITY-6118 <https://wso2.org/jira/browse/IDENTITY-6118>] - Some properties of a Custom Inbound Authenticator is not displaying in UI properly - [IDENTITY-6286 <https://wso2.org/jira/browse/IDENTITY-6286>] - OIDC - Wrong claim value in ID token when multiple IDPs used through federated authentication - [IDENTITY-6345 <https://wso2.org/jira/browse/IDENTITY-6345>] - Ask passoword with management console (SOAP service)not working - [IDENTITY-6350 <https://wso2.org/jira/browse/IDENTITY-6350>] - Account gets locked even if the fails are not consecutive - [IDENTITY-6352 <https://wso2.org/jira/browse/IDENTITY-6352>] - cannot edit existing workflow without changing workflow name - [IDENTITY-6353 <https://wso2.org/jira/browse/IDENTITY-6353>] - cannot disable workflow engagements - [IDENTITY-6355 <https://wso2.org/jira/browse/IDENTITY-6355>] - secondary roles are not displayed when creating workflows in tenant mode - [IDENTITY-6361 <https://wso2.org/jira/browse/IDENTITY-6361>] - NumberFormatException with server startup with Oracle - [IDENTITY-6369 <https://wso2.org/jira/browse/IDENTITY-6369>] - Intermittent error when login in to dashboard after some idle time - [IDENTITY-6371 <https://wso2.org/jira/browse/IDENTITY-6371>] - Account Recovery - Password Reset with email notification has a placeholder in confirmation url - [IDENTITY-6378 <https://wso2.org/jira/browse/IDENTITY-6378>] - High load average observed in OAuth scnearios during performance tests - [IDENTITY-6381 <https://wso2.org/jira/browse/IDENTITY-6381>] - Account Recovery via Security Questions(using dashboard)fails for a tenant user - [IDENTITY-6387 <https://wso2.org/jira/browse/IDENTITY-6387>] - Forced Password Reset - OTP fails when user tries to reset the password - [IDENTITY-6388 <https://wso2.org/jira/browse/IDENTITY-6388>] - Forced Password Reset - Offline fails when user tries to reset the password - [IDENTITY-6394 <https://wso2.org/jira/browse/IDENTITY-6394>] - Creating roles with no permission/normal permissions not working once the flow failed - [IDENTITY-6397 <https://wso2.org/jira/browse/IDENTITY-6397>] - Google federation with Passive STS fails - [IDENTITY-6401 <https://wso2.org/jira/browse/IDENTITY-6401>] - SAML federation with Passive STS with email usernames fails - [IDENTITY-6407 <https://wso2.org/jira/browse/IDENTITY-6407>] - Userstore domain does not append with the subject identifier for 'Primary' userstore users even the SP is configured to append userstore domain - [IDENTITY-6411 <https://wso2.org/jira/browse/IDENTITY-6411>] - Grammatical error in the error message. - [IDENTITY-6412 <https://wso2.org/jira/browse/IDENTITY-6412>] - OIDC federation with Passive STS with email usernames fails - [IDENTITY-6414 <https://wso2.org/jira/browse/IDENTITY-6414>] - When associating two local users to the same IDP it should display a proper error messgage - [IDENTITY-6415 <https://wso2.org/jira/browse/IDENTITY-6415>] - Error during session cleanup task - [IDENTITY-6416 <https://wso2.org/jira/browse/IDENTITY-6416>] - Need UI validation when changing the password of the logged in user - [IDENTITY-6422 <https://wso2.org/jira/browse/IDENTITY-6422>] - Secondary User Store creation failure in windows - [IDENTITY-6423 <https://wso2.org/jira/browse/IDENTITY-6423>] - Two update clicks removes Enable Dumb Mode for SCIM tick - UI update issue - [IDENTITY-6424 <https://wso2.org/jira/browse/IDENTITY-6424>] - Server start-up throws an error when email UserName is enabled - [IDENTITY-6428 <https://wso2.org/jira/browse/IDENTITY-6428>] - SCIM Endpoints shows in the resident IDP UI does not change when the default 9443 port is changed in the server - [IDENTITY-6432 <https://wso2.org/jira/browse/IDENTITY-6432>] - Error log prints when enable old identity listeners with oracle database - [IDENTITY-6435 <https://wso2.org/jira/browse/IDENTITY-6435>] - Error when try to setup challenge questions using dasboard (for email username)- with old identity listeners - [IDENTITY-6439 <https://wso2.org/jira/browse/IDENTITY-6439>] - ChallengeQuestions based Password Recovery does not work - [IDENTITY-6443 <https://wso2.org/jira/browse/IDENTITY-6443>] - Increase column size for access token and refresh token to support token encryption with 2048 key size - [IDENTITY-6449 <https://wso2.org/jira/browse/IDENTITY-6449>] - Warning log in server startup regarding the secondary userstore - [IDENTITY-6452 <https://wso2.org/jira/browse/IDENTITY-6452>] - SAML logout response sending failure in windows - [IDENTITY-6460 <https://wso2.org/jira/browse/IDENTITY-6460>] - Git provisioning with facebook IDP throws an error when email user name is NOT enabled - [IDENTITY-6465 <https://wso2.org/jira/browse/IDENTITY-6465>] - Set of claims of the federated user is sent when the federated user is associated to a local user and there is no requested claims at SP configs. - [IDENTITY-6550 <https://wso2.org/jira/browse/IDENTITY-6550>] - Possible NPE - [IDENTITY-6573 <https://wso2.org/jira/browse/IDENTITY-6573>] - NPE observed when click on edit link to update IDP - [IDENTITY-6582 <https://wso2.org/jira/browse/IDENTITY-6582>] - List new endpoints - e.g. DCR - in Resident IdP UI - [IDENTITY-6585 <https://wso2.org/jira/browse/IDENTITY-6585>] - Removing users from a role completely delete the provisioned user in SCIM outbound provisioning - [IDENTITY-6648 <https://wso2.org/jira/browse/IDENTITY-6648>] - Cannot initialize Balana by reading a configuration file - [IDENTITY-6680 <https://wso2.org/jira/browse/IDENTITY-6680>] - Claims with same claim URI (i.e. without the dialect URI prefix) as in other dialects, are not getting added to IDN_CLAIM table - [IDENTITY-6682 <https://wso2.org/jira/browse/IDENTITY-6682>] - Add ClaimDialectUri and PrefixClaimDialectUri facebook authenticator configs in application-authentication.xml - [IDENTITY-6743 <https://wso2.org/jira/browse/IDENTITY-6743>] - "User self registration code expiry time" UI config is not enabled by default - [IDENTITY-6749 <https://wso2.org/jira/browse/IDENTITY-6749>] - [Intermittent] Only one user is provisioned when I configured Salesforce outbound provisioning. - [IDENTITY-6755 <https://wso2.org/jira/browse/IDENTITY-6755>] - Salesforce users are not provisioned when you define rules - [IDENTITY-6778 <https://wso2.org/jira/browse/IDENTITY-6778>] - JSPException while including path '/application/configure-service-provider.jsp' with custom inbound authenticators - [IDENTITY-6811 <https://wso2.org/jira/browse/IDENTITY-6811>] - CSRF token validation fails for 'My Login Sessions' gadget in IS user dashboard - [IDENTITY-6816 <https://wso2.org/jira/browse/IDENTITY-6816>] - [CLUSTER] Unable to log in to the IS Dashbaord - [IDENTITY-6819 <https://wso2.org/jira/browse/IDENTITY-6819>] - When Updating the IDP, Backend gives the following error - [IDENTITY-6821 <https://wso2.org/jira/browse/IDENTITY-6821>] - TOTP is not working with WUM updated 5.3.0 pack - [IDENTITY-6840 <https://wso2.org/jira/browse/IDENTITY-6840>] - TOTP is not working with WUM updated IS-KM 5.3.0 pack - [IDENTITY-6841 <https://wso2.org/jira/browse/IDENTITY-6841>] - Cannot log in to analytics dashboard portal with created credentials - [IDENTITY-6877 <https://wso2.org/jira/browse/IDENTITY-6877>] - remote-user-mgt sample which is a web service client for authentication and user admin services doesn't work - [IDENTITY-6915 <https://wso2.org/jira/browse/IDENTITY-6915>] - Error when using multiple federated authenticators in second step authentication and sending fidp parameter as a query param - [IDENTITY-6927 <https://wso2.org/jira/browse/IDENTITY-6927>] - Tenant rewrite valve does not work with tomcat 7.0.81 upgrade - [IDENTITY-6941 <https://wso2.org/jira/browse/IDENTITY-6941>] - SCIM 1.1 Group PUT does not work - [IDENTITY-6946 <https://wso2.org/jira/browse/IDENTITY-6946>] - JWKS endpoint modulus value 'n' contains an additional bit - [IDENTITY-6951 <https://wso2.org/jira/browse/IDENTITY-6951>] - User management UI fails to identify the logged in user when user use different case for domain name or user name - [IDENTITY-6954 <https://wso2.org/jira/browse/IDENTITY-6954>] - Authorization Code not revoked after first use when PKCE is enabled and invalid verifier is submitted - [IDENTITY-6955 <https://wso2.org/jira/browse/IDENTITY-6955>] - With the introspection response the user name comes with the appended tenant domain. - [IDENTITY-6957 <https://wso2.org/jira/browse/IDENTITY-6957>] - User list does not get refreshed during the retry, after getting an error during the role add flow - [IDENTITY-6958 <https://wso2.org/jira/browse/IDENTITY-6958>] - OAuth/DCR does not rollback properly if the app creation fails due to an error. - [IDENTITY-6959 <https://wso2.org/jira/browse/IDENTITY-6959>] - Tenant flow might not close properly if an exception occurs during app creation - [IDENTITY-6961 <https://wso2.org/jira/browse/IDENTITY-6961>] - OIDC DCR throws 500 for an invalid registration request instead of 400 - [IDENTITY-6963 <https://wso2.org/jira/browse/IDENTITY-6963>] - Rule based outbound provisioning is not working - [IDENTITY-6965 <https://wso2.org/jira/browse/IDENTITY-6965>] - Intermitent issue in SCIM group creation - [IDENTITY-6967 <https://wso2.org/jira/browse/IDENTITY-6967>] - Initializing issue in provisioning connectors - [IDENTITY-6970 <https://wso2.org/jira/browse/IDENTITY-6970>] - Secondary user stores Users not loading in Workflow user search UI - [IDENTITY-6974 <https://wso2.org/jira/browse/IDENTITY-6974>] - Federated links disappear after failing first attempt in basicauth in SSO login flow - [IDENTITY-6975 <https://wso2.org/jira/browse/IDENTITY-6975>] - AccessTokenDAOImpl connection pool rollback Error - [IDENTITY-6976 <https://wso2.org/jira/browse/IDENTITY-6976>] - Logout from the user-dashboard fails with an error - [IDENTITY-6993 <https://wso2.org/jira/browse/IDENTITY-6993>] - Authorization code grant type is not working - [IDENTITY-6994 <https://wso2.org/jira/browse/IDENTITY-6994>] - Reusing authorization code twice does not revoke the access token issued to it Task - [IDENTITY-6538 <https://wso2.org/jira/browse/IDENTITY-6538>] - Improve unit tests coverage for identity-application-authz-xacml Improvement - [IDENTITY-5007 <https://wso2.org/jira/browse/IDENTITY-5007>] - Register OAuth/OpenID Connect Service provider using single request. - [IDENTITY-5514 <https://wso2.org/jira/browse/IDENTITY-5514>] - Change grant-type via configuration - [IDENTITY-5638 <https://wso2.org/jira/browse/IDENTITY-5638>] - OIDC - Support to extend IDP session - [IDENTITY-5861 <https://wso2.org/jira/browse/IDENTITY-5861>] - SAML2 AuthnContextClassRef returned from the Federated IDP should return to the applications. - [IDENTITY-6077 <https://wso2.org/jira/browse/IDENTITY-6077>] - Create JWT access token in Identity Server - [IDENTITY-6512 <https://wso2.org/jira/browse/IDENTITY-6512>] - [Workflows] Cannot edit other attributes of the workflow without editing the workflow name - [IDENTITY-6589 <https://wso2.org/jira/browse/IDENTITY-6589>] - Supplementary OSGi service for adding new claims to ID token - [IDENTITY-6801 <https://wso2.org/jira/browse/IDENTITY-6801>] - Proper UI indication needed where there are no service providers to list - [IDENTITY-6966 <https://wso2.org/jira/browse/IDENTITY-6966>] - Implemented Self contained access token validator - [IDENTITY-6980 <https://wso2.org/jira/browse/IDENTITY-6980>] - Add wildcard * support for scim group name filtering *Contribute to WSO2 Identity Server* *Mailing Lists* Join our mailing lists and correspond with the developers directly. We also encourage you to take part in discussions related to the product in the architecture mailing list. If you have any questions regarding the product you can use our StackOverflow forum to raise them as well. - Developer List: [email protected] - Architecture List: [email protected] - User Forum: StackOverflow <http://stackoverflow.com/questions/tagged/wso2is> Reporting Issues We encourage you to report issues, improvements, and feature requests regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA <https://wso2.org/jira/projects/IDENTITY/issues>. ~ The WSO2 Identity and Access Management Team ~ *Jayanga Kaushalya* Senior Software Engineer Mobile: +94777860160 <+94%2077%20786%200160> WSO2 Inc. | http://wso2.com lean.enterprise.middleware
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
