WSO2 Identity Server 5.1.0 Milestone 6 Released! Date: 7th August 2015The WSO2 Identity Server team is pleased to announce the 6th Milestone of WSO2 Identity Server 5.1.0. You can download this distribution from https://github.com/wso2/product-is/releases/tag/v5.1.0-m6
Following list [1] contains all bug fixes and improvements available with this milestone. We encourage you to report issues, improvements and feature requests regarding WSO2 Identity Server through the public WSO2 Identity Server JIRA <https://wso2.org/jira/browse/IDENTITY> ~ The WSO2 Identity Server Team ~ [1] Release Notes - WSO2 Identity Server - Version 5.1.0-M6 Bug - [IDENTITY-764 <https://wso2.org/jira/browse/IDENTITY-764>] - When assigning users to an internal role currently the user can only assign one user from one pagination and has to come back to add another - [IDENTITY-1890 <https://wso2.org/jira/browse/IDENTITY-1890>] - Not able to filter users on the basis of group name/id - [IDENTITY-2495 <https://wso2.org/jira/browse/IDENTITY-2495>] - NPE when trying to logout after session times out - [IDENTITY-2630 <https://wso2.org/jira/browse/IDENTITY-2630>] - Issuers does not match on OpenID Connect - [IDENTITY-3106 <https://wso2.org/jira/browse/IDENTITY-3106>] - "You have not privilege to assign user to Admin permission role" message is given even if the admin role is not selected - [IDENTITY-3288 <https://wso2.org/jira/browse/IDENTITY-3288>] - SAML+OpenID Federated Authentication scenario is not working when two IS nodes are intergrated - [IDENTITY-3308 <https://wso2.org/jira/browse/IDENTITY-3308>] - SCIM Group PATCH gives NullPointerException when "DisplayName" attribute is not available in the request body - [IDENTITY-3309 <https://wso2.org/jira/browse/IDENTITY-3309>] - SCIM patch should be able to receive attributes to be deleted through meta.attributes Sub-Attribute - [IDENTITY-3319 <https://wso2.org/jira/browse/IDENTITY-3319>] - NPE thrown when session timeouts when SSO is enabled. - [IDENTITY-3439 <https://wso2.org/jira/browse/IDENTITY-3439>] - No exception was throwing from IS server when gives a wrong access token in Oauth2 Improvement - [IDENTITY-561 <https://wso2.org/jira/browse/IDENTITY-561>] - The hostnames & ports of OpenIDServerUrl, OpenIDUserPattern, RequestTokenUrl etc. need to be read from a common file - [IDENTITY-1045 <https://wso2.org/jira/browse/IDENTITY-1045>] - SAML 2.0 Web Browser SSO Response's Assertion element must be signed by default - [IDENTITY-2964 <https://wso2.org/jira/browse/IDENTITY-2964>] - Providing support for proxy context path in Identity Server dashboard - [IDENTITY-2980 <https://wso2.org/jira/browse/IDENTITY-2980>] - Control Hostname Verification with a property for the service call in SSO Login page dropdown - [IDENTITY-2981 <https://wso2.org/jira/browse/IDENTITY-2981>] - Add secure vault to the keystore/truststore passwords used in SSO Login page dropdown feature - [IDENTITY-3174 <https://wso2.org/jira/browse/IDENTITY-3174>] - SAML SLO should separate response URL - [IDENTITY-3443 <https://wso2.org/jira/browse/IDENTITY-3443>] - SAML1.0 OAuth bearer grant type support - [IDENTITY-3455 <https://wso2.org/jira/browse/IDENTITY-3455>] - Provisioning Listener should able to be disabled - [IDENTITY-3476 <https://wso2.org/jira/browse/IDENTITY-3476>] - Add an auto increment ID in IDN_OAUTH_CONSUMER_APPS and use it as the foreign key from other necessary tables rather than using the CONSUMER_KEY New Feature - [IDENTITY-250 <https://wso2.org/jira/browse/IDENTITY-250>] - Implementing IdP initiated SAML 2 based Single Logout - [IDENTITY-3314 <https://wso2.org/jira/browse/IDENTITY-3314>] - Associate multiple Assertion Consumer Service (ACS) URLs for a service provider Patch - [IDENTITY-2855 <https://wso2.org/jira/browse/IDENTITY-2855>] - HTTP Redirect Support for Single Logout Responses (Liferay Compatibility) - [IDENTITY-2856 <https://wso2.org/jira/browse/IDENTITY-2856>] - Sign Single Logout Request and add destination (Liferay Compatibility) - [IDENTITY-3470 <https://wso2.org/jira/browse/IDENTITY-3470>] - Fine grained permission model for EntitlementPolicyAdminService & EntitlementAdminService - [IDENTITY-3475 <https://wso2.org/jira/browse/IDENTITY-3475>] - Fine grained permission model for EntitlementPolicyAdminService & EntitlementAdminService - [IDENTITY-3488 <https://wso2.org/jira/browse/IDENTITY-3488>] - Roles are not assigned when JIT Provisioning in Custom Federated Authenticator scenario for secondary user stores Task - [IDENTITY-1851 <https://wso2.org/jira/browse/IDENTITY-1851>] - Remove wso2is-user-certs.jks and userRP.jks from the distribution. -- Hasintha Indrajee Software Engineer WSO2, Inc. Mobile:+94 771892453
_______________________________________________ Dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/dev
