*WSO2 Identity Server 5.1.0 Released !* WSO2 Identity Server team is pleased to announce the release of version 5.1.0 of the WSO2 Identity Server (IS).
WSO2 Identity Server is an open source Identity and Entitlement management server. It supports a wide array of authentication protocols such as SAML 2.0 Web SSO, OpenID, OAuth 2.0/1.0a, OpenID Connect and WS-Federation Passive. It supports role based authorization and fined grained authorization with XACML 2.0/3.0 while inbound/outbound provisioning is supported through SCIM and SPML WSO2 Identity Server is developed on top of the revolutionary WSO2 Carbon platform <http://wso2.com/products/carbon>, an OSGi based framework that provides seamless modularity to your SOA via componentization. All the major features have been developed as pluggable Carbon components. You can download this distribution from http://wso2.com/products/identity-server/. The online documentation is available at http://docs.wso2.org/wiki/display/IS510/WSO2+Identity+Server+Documentation. <http://docs.wso2.org/wiki/display/IS510/WSO2+Identity+Server+Documentation> How to Run 1. Extract the downloaded zip 2. Go to the bin directory in the extracted folder 3. Run the wso2server.sh or wso2server.bat as appropriate 4. If you need to start the OSGi console with the server use the property -DosgiConsole when starting the server. New Features in This Release - Workflow support for Identity Server This release supports engaging BPEL and Human Tasks based workflows using WSO2 BPS server, for any kind of user/role management operations carried out using Identity Server's management console or APIs. - FIDO compliance Fast Identity Online (FIDO) is a specification developed to reduce the reliance on password for user authentication. The standard will enable any Web/cloud application to interface with a variety of FIDO-enabled security devices. - Link multiple user accounts In cases where users will have multiple entries in their respective user stores, to avoid requiring multiple logins to an application to obtain a fully privileged view for a single user's details, we now support merging of multiple user profiles. - PATCH operation support for SCIM 1.1 PUT supports the replace operation but not the update operation. Since group is a heavy resource, the operation that alters without replacement (PATCH) needs to be implemented. If not each time a new user is added to the group, all the users should be sent in the PUT request. - SAML 2.0 Bearer Token Renewal In IS 5.0.0, STS feature supports renewing Bearer type SAML 1.1 tokens only; attempts to renew Bearer type SAML 2.0 Tokens get failed. With IS 5.1.0 product will facilitate renewing expired Bearer type SAML 2.0 Tokens. - OpenID Connect Core 1.0 Compliance The IS 5.0.0 had OpenID Connect Support, however there were some points that were not spec complaint. Now that the specification is finalized we have made IS 5.1.0 OpenID Connect support specification compliant. A major improvement this area is support for IDToken response type from the OpenID Connect authorization endpoint. - Ability to notify external endpoints when changes are made to Identities WSO2 Identity Server is now able to send invalidation notifications to external endpoints when there is a change in user roles, permissions or attributes as well as clear the internal cache when user roles, permissions or attributes been updated Key Features of WSO2 Identity Server - Dynamically discovered federation - Identity Bridge - translation between heterogeneous Identity authentication protocols - SP Initiated and IDP Initiated SAML 2.0 Web Browser SSO provider - SAML2 Single Logout profile support - OpenID 2.0 Provider - OpenID Connect Authorization Server - Social login with Facebook, Google, Yahoo and Windows Live - XACML 3.0/2.0 based Entitlement Engine with WS-XACML support - OAuth 2.0/1.0a Authorization Server with OAuth 2.0/1.0a support - Inbound and Outbound Identity Provisioning with SCIM 1.1 - Outbound Identity Provisioning with SPML 2.0, Salesforce and GoogleApps - Integrated Windows Authentication and webSEAL authentication - Multi-option and multi-step (multi-factor) authentication - Claim based Security Token Service(STS) with SAML 2.0/1.1 support. - Support for various types of User Stores such as JDBC, Cassandra, LDAP, Active Directory in Read/Write mode. - Claim Management - User Profiles and Profile Management - Separable front-end and back-end - a single front-end server can be used to administer several back-endservers - Identity Bridge - Multi-option and multi-step authentication - Request Path Authenticators - Social Login with Facebook / Google / Microsoft Windows Live - Ability to plug-in custom developed authenticators - Provisioning Bridge - Just-in-time provisioning - Ability to plug-in custom developed provisioning connectors - User Dashboard - SAML2 Web SSO profile Request / Response validator - Remote User Store Management - Custom permissions - Encrypted SAML2 Assertions - NTLM grant type for OAuth 2.0 - Workflows for user management operations - 2 factor authentication with FIDO - Linking 2 or more local/federated user accounts Issues Fixed in This Release This release of WSO2 Identity Server comes with a number of bug fixes, both in the base Carbon framework and in the Identity Server specific components. All the issues which have been fixed in this release can be found at: - Fixed Issues for WSO2 Identity Server 5.1.0 <https://wso2.org/jira/issues/?filter=12586> Known Issues All the known issues in WSO2 Identity Server 5.1.0 are reported at: - Known issues in WSO2 Identity Server 5.1.0 <https://wso2.org/jira/issues/?filter=12587> How You Can ContributeMailing Lists Join our mailing list and correspond with the developers directly. - Developer list : [email protected] | Subscribe <[email protected]?subject=subscribe> | Mail Archive <http://wso2.org/mailarchive/dev/> - User forum : StackOverflow <http://stackoverflow.com/questions/tagged/wso2> Reporting Issues We encourage you to report issues, documentation faults and feature requests regarding WSO2 Identity Server or in the Carbon base framework through the public WSO2 Identity Server JIRA <https://wso2.org/jira/browse/IDENTITY> or Carbon JIRA <http://www.wso2.org/jira/browse/CARBON>. Support We are committed to ensuring that your enterprise middleware deployment is completely supported from evaluation to production. Our unique approach ensures that all support leverages our open development methodology and is provided by the very same engineers who build the technology. For more details and to take advantage of this unique opportunity http://wso2.com/support/ For more information about WSO2 Identity Server, please see http://wso2.com/products/identity-server or visit the WSO2 Oxygen Tank <http://wso2.org/library> developer portal for additional resources. Thank you for your interest in WSO2 Identity Server. *The WSO2 Identity Server Team* -- Hasintha Indrajee Software Engineer WSO2, Inc. Mobile:+94 771892453
_______________________________________________ Dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/dev
