WSO2 Identity Server 5.1.0 Milestone 6 Released!
Date: 7th August 2015The WSO2 Identity Server team is pleased to announce
the 6th Milestone of WSO2 Identity Server 5.1.0. You can download this
distribution from https://github.com/wso2/product-is/releases/tag/v5.1.0-m6

Following list [1] contains all bug fixes and improvements available with
this milestone. We encourage you to report issues, improvements and feature
requests regarding WSO2 Identity Server through the public WSO2 Identity
Server JIRA <https://wso2.org/jira/browse/IDENTITY>

~ The WSO2 Identity Server Team ~

[1] Release Notes - WSO2 Identity Server - Version 5.1.0-M6

Bug

   - [IDENTITY-764 <https://wso2.org/jira/browse/IDENTITY-764>] - When
   assigning users to an internal role currently the user can only assign one
   user from one pagination and has to come back to add another
   - [IDENTITY-1890 <https://wso2.org/jira/browse/IDENTITY-1890>] - Not
   able to filter users on the basis of group name/id
   - [IDENTITY-2495 <https://wso2.org/jira/browse/IDENTITY-2495>] - NPE
   when trying to logout after session times out
   - [IDENTITY-2630 <https://wso2.org/jira/browse/IDENTITY-2630>] - Issuers
   does not match on OpenID Connect
   - [IDENTITY-3106 <https://wso2.org/jira/browse/IDENTITY-3106>] - "You
   have not privilege to assign user to Admin permission role" message is
   given even if the admin role is not selected
   - [IDENTITY-3288 <https://wso2.org/jira/browse/IDENTITY-3288>] -
   SAML+OpenID Federated Authentication scenario is not working when two IS
   nodes are intergrated
   - [IDENTITY-3308 <https://wso2.org/jira/browse/IDENTITY-3308>] - SCIM
   Group PATCH gives NullPointerException when "DisplayName" attribute is not
   available in the request body
   - [IDENTITY-3309 <https://wso2.org/jira/browse/IDENTITY-3309>] - SCIM
   patch should be able to receive attributes to be deleted through
   meta.attributes Sub-Attribute
   - [IDENTITY-3319 <https://wso2.org/jira/browse/IDENTITY-3319>] - NPE
   thrown when session timeouts when SSO is enabled.
   - [IDENTITY-3439 <https://wso2.org/jira/browse/IDENTITY-3439>] - No
   exception was throwing from IS server when gives a wrong access token in
   Oauth2

Improvement

   - [IDENTITY-561 <https://wso2.org/jira/browse/IDENTITY-561>] - The
   hostnames & ports of OpenIDServerUrl, OpenIDUserPattern, RequestTokenUrl
   etc. need to be read from a common file
   - [IDENTITY-1045 <https://wso2.org/jira/browse/IDENTITY-1045>] - SAML
   2.0 Web Browser SSO Response's Assertion element must be signed by default
   - [IDENTITY-2964 <https://wso2.org/jira/browse/IDENTITY-2964>] -
   Providing support for proxy context path in Identity Server dashboard
   - [IDENTITY-2980 <https://wso2.org/jira/browse/IDENTITY-2980>] - Control
   Hostname Verification with a property for the service call in SSO Login
   page dropdown
   - [IDENTITY-2981 <https://wso2.org/jira/browse/IDENTITY-2981>] - Add
   secure vault to the keystore/truststore passwords used in SSO Login page
   dropdown feature
   - [IDENTITY-3174 <https://wso2.org/jira/browse/IDENTITY-3174>] - SAML
   SLO should separate response URL
   - [IDENTITY-3443 <https://wso2.org/jira/browse/IDENTITY-3443>] - SAML1.0
   OAuth bearer grant type support
   - [IDENTITY-3455 <https://wso2.org/jira/browse/IDENTITY-3455>] -
   Provisioning Listener should able to be disabled
   - [IDENTITY-3476 <https://wso2.org/jira/browse/IDENTITY-3476>] - Add an
   auto increment ID in IDN_OAUTH_CONSUMER_APPS and use it as the foreign key
   from other necessary tables rather than using the CONSUMER_KEY

New Feature

   - [IDENTITY-250 <https://wso2.org/jira/browse/IDENTITY-250>] -
   Implementing IdP initiated SAML 2 based Single Logout
   - [IDENTITY-3314 <https://wso2.org/jira/browse/IDENTITY-3314>] -
   Associate multiple Assertion Consumer Service (ACS) URLs for a service
   provider

Patch

   - [IDENTITY-2855 <https://wso2.org/jira/browse/IDENTITY-2855>] - HTTP
   Redirect Support for Single Logout Responses (Liferay Compatibility)
   - [IDENTITY-2856 <https://wso2.org/jira/browse/IDENTITY-2856>] - Sign
   Single Logout Request and add destination (Liferay Compatibility)
   - [IDENTITY-3470 <https://wso2.org/jira/browse/IDENTITY-3470>] - Fine
   grained permission model for EntitlementPolicyAdminService &
   EntitlementAdminService
   - [IDENTITY-3475 <https://wso2.org/jira/browse/IDENTITY-3475>] - Fine
   grained permission model for EntitlementPolicyAdminService &
   EntitlementAdminService
   - [IDENTITY-3488 <https://wso2.org/jira/browse/IDENTITY-3488>] - Roles
   are not assigned when JIT Provisioning in Custom Federated Authenticator
   scenario for secondary user stores

Task

   - [IDENTITY-1851 <https://wso2.org/jira/browse/IDENTITY-1851>] - Remove
   wso2is-user-certs.jks and userRP.jks from the distribution.


-- 
Hasintha Indrajee
Software Engineer
WSO2, Inc.
Mobile:+94 771892453
_______________________________________________
Dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to