On Fri, Dec 1, 2017 at 10:57 PM, Jayanga Kaushalya <[email protected]> wrote:
> The WSO2 Identity and Access Management team is pleased to announce the > release of WSO2 Identity Server 5.4.0 Beta. > > You can build the distribution from the source tag, > > Runtime: https://github.com/wso2/product-is/releases/tag/v5.4.0-beta > Analytics: https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta > > following the steps given below. > > *Building from the source* > > 1. Install Java8 or above > 2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#) > 3. Get the source, > - For the Runtime: Get a clone from https://github.com/wso2/p > roduct-is.git and checkout to v5.4.0-beta tag or you can directly > download the source for the tag from https://github.com/wso2/p > roduct-is/releases/tag/v5.4.0-beta > <https://github.com/wso2/product-is/releases/tag/v5.4.0-beta> > - For the Analytics: Get a clone from https://github.com/wso2/ > analytics-is.git and checkout to v5.4.0-beta tag or you can > directly download the source for the tag from > https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta > <https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta> > 4. Run the one of the below maven commands from product-is directory, > - *mvn** clean install* (To build the binary and source > distributions with the tests) > - *mvn** clean install -Dmaven.test.skip=true* (To build the binary > and source distributions, without running any of the unit/integration > tests) > 5. You can find the, > - wso2is-5.4.0-beta.zip binary distribution in > product-is/modules/distribution/target directory. > - wso2is-analytics-5.4.0-beta.zip binary distribution in > analytics-is/modules/distribution/target directory. > > The following list contains all the features, improvements, and bug fixes > available with the WSO2 Identity Server 5.4.0 Beta release. > What is reason for following two sections patch & bug. What is the difference ? Thanks, Asela. > > > Patch > > - [IDENTITY-6198 <https://wso2.org/jira/browse/IDENTITY-6198>] - IS > Authentication Flow Behavior Between Multiple Service Providers Not Handled > - [IDENTITY-6924 <https://wso2.org/jira/browse/IDENTITY-6924>] - Add > ability to sign SAML response using different key other than the private > key defined in the primary keystore in the carbon.xml > - [IDENTITY-6931 <https://wso2.org/jira/browse/IDENTITY-6931>] - > Adding logout support for outbound WS-Federation(Passive) > - [IDENTITY-6988 <https://wso2.org/jira/browse/IDENTITY-6988>] - > ClientAuthHandler configuration in identity.xml only read last property in > OAuthServerConfiguration > > Bug > > - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] - > Receive fault response from RemoteClaimManagerService > - [IDENTITY-4331 <https://wso2.org/jira/browse/IDENTITY-4331>] - When > you add Google Prov Connector in a SP OB Provisioning Configuration > section, You cannot edit IDP again. Lead to a blank page and NPE > - [IDENTITY-4655 <https://wso2.org/jira/browse/IDENTITY-4655>] - > Google provisioning not working with IS 5.2.0 beta > - [IDENTITY-4968 <https://wso2.org/jira/browse/IDENTITY-4968>] - > Subject claim is returned in the incorrect format when subject claim uri is > added/removed > - [IDENTITY-5154 <https://wso2.org/jira/browse/IDENTITY-5154>] - When > select Domain as PRIMARY Count users always set to -1 > - [IDENTITY-6102 <https://wso2.org/jira/browse/IDENTITY-6102>] - > System claims can be modified by the User > - [IDENTITY-6118 <https://wso2.org/jira/browse/IDENTITY-6118>] - Some > properties of a Custom Inbound Authenticator is not displaying in UI > properly > - [IDENTITY-6286 <https://wso2.org/jira/browse/IDENTITY-6286>] - OIDC > - Wrong claim value in ID token when multiple IDPs used through federated > authentication > - [IDENTITY-6345 <https://wso2.org/jira/browse/IDENTITY-6345>] - Ask > passoword with management console (SOAP service)not working > - [IDENTITY-6350 <https://wso2.org/jira/browse/IDENTITY-6350>] - > Account gets locked even if the fails are not consecutive > - [IDENTITY-6352 <https://wso2.org/jira/browse/IDENTITY-6352>] - > cannot edit existing workflow without changing workflow name > - [IDENTITY-6353 <https://wso2.org/jira/browse/IDENTITY-6353>] - > cannot disable workflow engagements > - [IDENTITY-6355 <https://wso2.org/jira/browse/IDENTITY-6355>] - > secondary roles are not displayed when creating workflows in tenant mode > - [IDENTITY-6361 <https://wso2.org/jira/browse/IDENTITY-6361>] - > NumberFormatException with server startup with Oracle > - [IDENTITY-6369 <https://wso2.org/jira/browse/IDENTITY-6369>] - > Intermittent error when login in to dashboard after some idle time > - [IDENTITY-6371 <https://wso2.org/jira/browse/IDENTITY-6371>] - > Account Recovery - Password Reset with email notification has a placeholder > in confirmation url > - [IDENTITY-6378 <https://wso2.org/jira/browse/IDENTITY-6378>] - High > load average observed in OAuth scnearios during performance tests > - [IDENTITY-6381 <https://wso2.org/jira/browse/IDENTITY-6381>] - > Account Recovery via Security Questions(using dashboard)fails for a tenant > user > - [IDENTITY-6387 <https://wso2.org/jira/browse/IDENTITY-6387>] - > Forced Password Reset - OTP fails when user tries to reset the password > - [IDENTITY-6388 <https://wso2.org/jira/browse/IDENTITY-6388>] - > Forced Password Reset - Offline fails when user tries to reset the password > - [IDENTITY-6394 <https://wso2.org/jira/browse/IDENTITY-6394>] - > Creating roles with no permission/normal permissions not working once the > flow failed > - [IDENTITY-6397 <https://wso2.org/jira/browse/IDENTITY-6397>] - > Google federation with Passive STS fails > - [IDENTITY-6401 <https://wso2.org/jira/browse/IDENTITY-6401>] - SAML > federation with Passive STS with email usernames fails > - [IDENTITY-6407 <https://wso2.org/jira/browse/IDENTITY-6407>] - > Userstore domain does not append with the subject identifier for 'Primary' > userstore users even the SP is configured to append userstore domain > - [IDENTITY-6411 <https://wso2.org/jira/browse/IDENTITY-6411>] - > Grammatical error in the error message. > - [IDENTITY-6412 <https://wso2.org/jira/browse/IDENTITY-6412>] - OIDC > federation with Passive STS with email usernames fails > - [IDENTITY-6414 <https://wso2.org/jira/browse/IDENTITY-6414>] - When > associating two local users to the same IDP it should display a proper > error messgage > - [IDENTITY-6415 <https://wso2.org/jira/browse/IDENTITY-6415>] - Error > during session cleanup task > - [IDENTITY-6416 <https://wso2.org/jira/browse/IDENTITY-6416>] - Need > UI validation when changing the password of the logged in user > - [IDENTITY-6422 <https://wso2.org/jira/browse/IDENTITY-6422>] - > Secondary User Store creation failure in windows > - [IDENTITY-6423 <https://wso2.org/jira/browse/IDENTITY-6423>] - Two > update clicks removes Enable Dumb Mode for SCIM tick - UI update issue > - [IDENTITY-6424 <https://wso2.org/jira/browse/IDENTITY-6424>] - > Server start-up throws an error when email UserName is enabled > - [IDENTITY-6428 <https://wso2.org/jira/browse/IDENTITY-6428>] - SCIM > Endpoints shows in the resident IDP UI does not change when the default > 9443 port is changed in the server > - [IDENTITY-6432 <https://wso2.org/jira/browse/IDENTITY-6432>] - Error > log prints when enable old identity listeners with oracle database > - [IDENTITY-6435 <https://wso2.org/jira/browse/IDENTITY-6435>] - Error > when try to setup challenge questions using dasboard (for email username)- > with old identity listeners > - [IDENTITY-6439 <https://wso2.org/jira/browse/IDENTITY-6439>] - > ChallengeQuestions based Password Recovery does not work > - [IDENTITY-6443 <https://wso2.org/jira/browse/IDENTITY-6443>] - > Increase column size for access token and refresh token to support token > encryption with 2048 key size > - [IDENTITY-6449 <https://wso2.org/jira/browse/IDENTITY-6449>] - > Warning log in server startup regarding the secondary userstore > - [IDENTITY-6452 <https://wso2.org/jira/browse/IDENTITY-6452>] - SAML > logout response sending failure in windows > - [IDENTITY-6460 <https://wso2.org/jira/browse/IDENTITY-6460>] - Git > provisioning with facebook IDP throws an error when email user name is NOT > enabled > - [IDENTITY-6465 <https://wso2.org/jira/browse/IDENTITY-6465>] - Set > of claims of the federated user is sent when the federated user is > associated to a local user and there is no requested claims at SP configs. > - [IDENTITY-6550 <https://wso2.org/jira/browse/IDENTITY-6550>] - > Possible NPE > - [IDENTITY-6573 <https://wso2.org/jira/browse/IDENTITY-6573>] - NPE > observed when click on edit link to update IDP > - [IDENTITY-6582 <https://wso2.org/jira/browse/IDENTITY-6582>] - List > new endpoints - e.g. DCR - in Resident IdP UI > - [IDENTITY-6585 <https://wso2.org/jira/browse/IDENTITY-6585>] - > Removing users from a role completely delete the provisioned user in SCIM > outbound provisioning > - [IDENTITY-6648 <https://wso2.org/jira/browse/IDENTITY-6648>] - > Cannot initialize Balana by reading a configuration file > - [IDENTITY-6680 <https://wso2.org/jira/browse/IDENTITY-6680>] - > Claims with same claim URI (i.e. without the dialect URI prefix) as in > other dialects, are not getting added to IDN_CLAIM table > - [IDENTITY-6682 <https://wso2.org/jira/browse/IDENTITY-6682>] - Add > ClaimDialectUri and PrefixClaimDialectUri facebook authenticator configs in > application-authentication.xml > - [IDENTITY-6743 <https://wso2.org/jira/browse/IDENTITY-6743>] - "User > self registration code expiry time" UI config is not enabled by default > - [IDENTITY-6749 <https://wso2.org/jira/browse/IDENTITY-6749>] - > [Intermittent] Only one user is provisioned when I configured Salesforce > outbound provisioning. > - [IDENTITY-6755 <https://wso2.org/jira/browse/IDENTITY-6755>] - > Salesforce users are not provisioned when you define rules > - [IDENTITY-6778 <https://wso2.org/jira/browse/IDENTITY-6778>] - > JSPException while including path > '/application/configure-service-provider.jsp' > with custom inbound authenticators > - [IDENTITY-6811 <https://wso2.org/jira/browse/IDENTITY-6811>] - CSRF > token validation fails for 'My Login Sessions' gadget in IS user dashboard > - [IDENTITY-6816 <https://wso2.org/jira/browse/IDENTITY-6816>] - > [CLUSTER] Unable to log in to the IS Dashbaord > - [IDENTITY-6819 <https://wso2.org/jira/browse/IDENTITY-6819>] - When > Updating the IDP, Backend gives the following error > - [IDENTITY-6821 <https://wso2.org/jira/browse/IDENTITY-6821>] - TOTP > is not working with WUM updated 5.3.0 pack > - [IDENTITY-6840 <https://wso2.org/jira/browse/IDENTITY-6840>] - TOTP > is not working with WUM updated IS-KM 5.3.0 pack > - [IDENTITY-6841 <https://wso2.org/jira/browse/IDENTITY-6841>] - > Cannot log in to analytics dashboard portal with created credentials > - [IDENTITY-6877 <https://wso2.org/jira/browse/IDENTITY-6877>] - > remote-user-mgt sample which is a web service client for authentication and > user admin services doesn't work > - [IDENTITY-6915 <https://wso2.org/jira/browse/IDENTITY-6915>] - Error > when using multiple federated authenticators in second step authentication > and sending fidp parameter as a query param > - [IDENTITY-6927 <https://wso2.org/jira/browse/IDENTITY-6927>] - > Tenant rewrite valve does not work with tomcat 7.0.81 upgrade > - [IDENTITY-6941 <https://wso2.org/jira/browse/IDENTITY-6941>] - SCIM > 1.1 Group PUT does not work > - [IDENTITY-6946 <https://wso2.org/jira/browse/IDENTITY-6946>] - JWKS > endpoint modulus value 'n' contains an additional bit > - [IDENTITY-6951 <https://wso2.org/jira/browse/IDENTITY-6951>] - User > management UI fails to identify the logged in user when user use different > case for domain name or user name > - [IDENTITY-6954 <https://wso2.org/jira/browse/IDENTITY-6954>] - > Authorization Code not revoked after first use when PKCE is enabled and > invalid verifier is submitted > - [IDENTITY-6955 <https://wso2.org/jira/browse/IDENTITY-6955>] - With > the introspection response the user name comes with the appended tenant > domain. > - [IDENTITY-6957 <https://wso2.org/jira/browse/IDENTITY-6957>] - User > list does not get refreshed during the retry, after getting an error during > the role add flow > - [IDENTITY-6958 <https://wso2.org/jira/browse/IDENTITY-6958>] - > OAuth/DCR does not rollback properly if the app creation fails due to an > error. > - [IDENTITY-6959 <https://wso2.org/jira/browse/IDENTITY-6959>] - > Tenant flow might not close properly if an exception occurs during app > creation > - [IDENTITY-6961 <https://wso2.org/jira/browse/IDENTITY-6961>] - OIDC > DCR throws 500 for an invalid registration request instead of 400 > - [IDENTITY-6963 <https://wso2.org/jira/browse/IDENTITY-6963>] - Rule > based outbound provisioning is not working > - [IDENTITY-6965 <https://wso2.org/jira/browse/IDENTITY-6965>] - > Intermitent issue in SCIM group creation > - [IDENTITY-6967 <https://wso2.org/jira/browse/IDENTITY-6967>] - > Initializing issue in provisioning connectors > - [IDENTITY-6970 <https://wso2.org/jira/browse/IDENTITY-6970>] - > Secondary user stores Users not loading in Workflow user search UI > - [IDENTITY-6974 <https://wso2.org/jira/browse/IDENTITY-6974>] - > Federated links disappear after failing first attempt in basicauth in SSO > login flow > - [IDENTITY-6975 <https://wso2.org/jira/browse/IDENTITY-6975>] - > AccessTokenDAOImpl connection pool rollback Error > - [IDENTITY-6976 <https://wso2.org/jira/browse/IDENTITY-6976>] - > Logout from the user-dashboard fails with an error > - [IDENTITY-6993 <https://wso2.org/jira/browse/IDENTITY-6993>] - > Authorization code grant type is not working > - [IDENTITY-6994 <https://wso2.org/jira/browse/IDENTITY-6994>] - > Reusing authorization code twice does not revoke the access token issued to > it > > Task > > - [IDENTITY-6538 <https://wso2.org/jira/browse/IDENTITY-6538>] - > Improve unit tests coverage for identity-application-authz-xacml > > Improvement > > - [IDENTITY-5007 <https://wso2.org/jira/browse/IDENTITY-5007>] - > Register OAuth/OpenID Connect Service provider using single request. > - [IDENTITY-5514 <https://wso2.org/jira/browse/IDENTITY-5514>] - > Change grant-type via configuration > - [IDENTITY-5638 <https://wso2.org/jira/browse/IDENTITY-5638>] - OIDC > - Support to extend IDP session > - [IDENTITY-5861 <https://wso2.org/jira/browse/IDENTITY-5861>] - SAML2 > AuthnContextClassRef returned from the Federated IDP should return to the > applications. > - [IDENTITY-6077 <https://wso2.org/jira/browse/IDENTITY-6077>] - > Create JWT access token in Identity Server > - [IDENTITY-6512 <https://wso2.org/jira/browse/IDENTITY-6512>] - > [Workflows] Cannot edit other attributes of the workflow without editing > the workflow name > - [IDENTITY-6589 <https://wso2.org/jira/browse/IDENTITY-6589>] - > Supplementary OSGi service for adding new claims to ID token > - [IDENTITY-6801 <https://wso2.org/jira/browse/IDENTITY-6801>] - > Proper UI indication needed where there are no service providers to list > - [IDENTITY-6966 <https://wso2.org/jira/browse/IDENTITY-6966>] - > Implemented Self contained access token validator > - [IDENTITY-6980 <https://wso2.org/jira/browse/IDENTITY-6980>] - Add > wildcard * support for scim group name filtering > > > *Contribute to WSO2 Identity Server* > > *Mailing Lists* > > Join our mailing lists and correspond with the developers directly. We > also encourage you to take part in discussions related to the product in > the architecture mailing list. If you have any questions regarding the > product you can use our StackOverflow forum to raise them as well. > > - Developer List: [email protected] > - Architecture List: [email protected] > - User Forum: StackOverflow > <http://stackoverflow.com/questions/tagged/wso2is> > > Reporting Issues > We encourage you to report issues, improvements, and feature requests > regarding WSO2 Identity Server through our public WSO2 Identity Server > JIRA <https://wso2.org/jira/projects/IDENTITY/issues>. > > ~ The WSO2 Identity and Access Management Team ~ > > *Jayanga Kaushalya* > Senior Software Engineer > Mobile: +94777860160 <+94%2077%20786%200160> > WSO2 Inc. | http://wso2.com > lean.enterprise.middleware > > > -- Thanks & Regards, Asela ATL Mobile : +94 777 625 933 +358 449 228 979 http://soasecurity.org/ http://xacmlinfo.org/
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
