The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha3. This distribution can be
downloaded from the following location.

https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3

The following list contains all the features, improvements, and bug fixes
available with the 5.4.0 Alpha3 release.
Patch

   - [IDENTITY-5968 <https://wso2.org/jira/browse/IDENTITY-5968>] - Old
   email templates are stored in registry even when they are never used
   - [IDENTITY-6136 <https://wso2.org/jira/browse/IDENTITY-6136>] - Results
   are not retrieved for 'http://wso2.org/claims/identity/' claims of
   GetUserList in the RemoteUserStoreManagerService
   - [IDENTITY-6190 <https://wso2.org/jira/browse/IDENTITY-6190>] - Error
   while validating SAML assertion timestamp when IDP is hosted in different
   time zone
   - [IDENTITY-6451 <https://wso2.org/jira/browse/IDENTITY-6451>] - In Saml
   error relay state is not returned to the saml notification jsp. No way to
   return the relay state back to SP in error case

Bug

   - [IDENTITY-4036 <https://wso2.org/jira/browse/IDENTITY-4036>] -
   [Logging] Error in backend when Clicking on Restore Defaults and it display
   message as "Restoring of Global Log4j Configuration is failed" but gets
   restored successfully
   - [IDENTITY-5722 <https://wso2.org/jira/browse/IDENTITY-5722>] - WSO2IS
   does not work for the LDAP users with DN with special characters such as "\"
   - [IDENTITY-5808 <https://wso2.org/jira/browse/IDENTITY-5808>] -
   Performance degradation due to expired Oauth2 authorization codes which
   have ACTIVE status
   - [IDENTITY-6048 <https://wso2.org/jira/browse/IDENTITY-6048>] - User
   list of a role is shown as empty for AD userstore when role has 1500+ users
   - [IDENTITY-6131 <https://wso2.org/jira/browse/IDENTITY-6131>] - IDP
   Resident IDP update button promt message even without doing any changes
   - [IDENTITY-6146 <https://wso2.org/jira/browse/IDENTITY-6146>] -
   ReadOnlyUserStoreManager has DisplayName property set to 'uid'
   - [IDENTITY-6195 <https://wso2.org/jira/browse/IDENTITY-6195>] - OIDC
   address claim is not in the required format
   - [IDENTITY-6216 <https://wso2.org/jira/browse/IDENTITY-6216>] -
   RemoteUserStoreManagerService getUserList for "
   http://wso2.org/claims/username"; claim not working for JDBC user store
   manager.
   - [IDENTITY-6217 <https://wso2.org/jira/browse/IDENTITY-6217>] - User
   profile get update to incorrect value, when attribute value has
   intersection with MultiAttributeSeparator
   - [IDENTITY-6257 <https://wso2.org/jira/browse/IDENTITY-6257>] -
   Deploying multiple travelocity applications by renaming the web application
   name
   - [IDENTITY-6277 <https://wso2.org/jira/browse/IDENTITY-6277>] -
   NullPointerException thrown when enabling debug logs in OpenID Connect
   federated authenticator
   - [IDENTITY-6306 <https://wso2.org/jira/browse/IDENTITY-6306>] -
   Identity server not allowed to use role name with @ character
   - [IDENTITY-6307 <https://wso2.org/jira/browse/IDENTITY-6307>] -
   Auth_time is changing to session updated time
   - [IDENTITY-6313 <https://wso2.org/jira/browse/IDENTITY-6313>] - Typo in
   Add User Store
   - [IDENTITY-6346 <https://wso2.org/jira/browse/IDENTITY-6346>] - Account
   lock with failed login attempts not working for old identity listener
   configurations
   - [IDENTITY-6375 <https://wso2.org/jira/browse/IDENTITY-6375>] - cannot
   provision users to seconday userstores with outbound provisioning SCIM
   - [IDENTITY-6377 <https://wso2.org/jira/browse/IDENTITY-6377>] - Errors
   in DB2 scripts
   - [IDENTITY-6379 <https://wso2.org/jira/browse/IDENTITY-6379>] - OAuth
   DCRM send Internal Server Error when tried to retrieve application with
   invalid client id
   - [IDENTITY-6382 <https://wso2.org/jira/browse/IDENTITY-6382>] - Oracle
   sql script error with creating index
   - [IDENTITY-6383 <https://wso2.org/jira/browse/IDENTITY-6383>] - -Dsetup
   is not working for Oracle databases
   - [IDENTITY-6389 <https://wso2.org/jira/browse/IDENTITY-6389>] -
   Recovery with security questions(one by one and all at once)-REST api fails
   for tenant user
   - [IDENTITY-6393 <https://wso2.org/jira/browse/IDENTITY-6393>] -
   Couldn't add roles with admin permission when logged in with primary or
   secondary users
   - [IDENTITY-6402 <https://wso2.org/jira/browse/IDENTITY-6402>] - SCIM
   Create user response's 'location' is invalid
   - [IDENTITY-6409 <https://wso2.org/jira/browse/IDENTITY-6409>] - Can not
   update a SP name
   - [IDENTITY-6444 <https://wso2.org/jira/browse/IDENTITY-6444>] -
   Couldn't update the user profile when using AD(Active directory) as
   primary/secondary user store
   - [IDENTITY-6445 <https://wso2.org/jira/browse/IDENTITY-6445>] - New DCR
   endpoint should update correctly in swagger file
   - [IDENTITY-6447 <https://wso2.org/jira/browse/IDENTITY-6447>] - UI
   capability to configure "UsernameWithEmailJavaScriptRegEx" attribute for
   Secondary User-Stores
   - [IDENTITY-6466 <https://wso2.org/jira/browse/IDENTITY-6466>] - Using
   invalid username as resource throws StringIndexOutOfBoundsException when
   invoking webfinger Endpoint
   - [IDENTITY-6467 <https://wso2.org/jira/browse/IDENTITY-6467>] -
   Identity claims does not support query users with filters like *foo*
   - [IDENTITY-6477 <https://wso2.org/jira/browse/IDENTITY-6477>] -
   ResourceAccessControl config for SCIM 2 endpoints in identity.xml does not
   secure tenant endpoints
   - [IDENTITY-6478 <https://wso2.org/jira/browse/IDENTITY-6478>] - Add
   correct permissions to ResourceAccessControl config for SCIM 2 endpoints in
   identity.xml
   - [IDENTITY-6485 <https://wso2.org/jira/browse/IDENTITY-6485>] - Default
   claim dialects are not populated for tenants when Active Directory is used
   as the primary user store
   - [IDENTITY-6494 <https://wso2.org/jira/browse/IDENTITY-6494>] - Stop
   issuing tokens in client credential grant type with the scope 'openid'
   - [IDENTITY-6495 <https://wso2.org/jira/browse/IDENTITY-6495>] - SAML
   attributes are not returned in the assertion for tenant users when AD user
   store is used
   - [IDENTITY-6497 <https://wso2.org/jira/browse/IDENTITY-6497>] - Issue
   in AskPassword email template
   - [IDENTITY-6499 <https://wso2.org/jira/browse/IDENTITY-6499>] -
   product-is release build size is high
   - [IDENTITY-6500 <https://wso2.org/jira/browse/IDENTITY-6500>] - Claim
   configurations not effective for default user profile
   - [IDENTITY-6501 <https://wso2.org/jira/browse/IDENTITY-6501>] -
   Nullpointer execption when essential claims are not returned.
   - [IDENTITY-6502 <https://wso2.org/jira/browse/IDENTITY-6502>] -
   Travelocity sample app does not show multi-valued user claims properly.

Task

   - [IDENTITY-2091 <https://wso2.org/jira/browse/IDENTITY-2091>] - UI help
   for the "ConnectionName" parameter in Multiple UserStores Configuration UI
   states the connection has to be an admin user of the LDAP which is incorrect
   - [IDENTITY-6483 <https://wso2.org/jira/browse/IDENTITY-6483>] - Add SMS
   OTP configurations OOTB
   - [IDENTITY-6484 <https://wso2.org/jira/browse/IDENTITY-6484>] - Update
   carbon-kernel version to 4.4.18
   - [IDENTITY-6504 <https://wso2.org/jira/browse/IDENTITY-6504>] - Add
   TOTP configurations OOTB

Improvement

   - [IDENTITY-5835 <https://wso2.org/jira/browse/IDENTITY-5835>] - Remove
   the cookie from url query parameter
   - [IDENTITY-5920 <https://wso2.org/jira/browse/IDENTITY-5920>] -
   Increase the version of carbon-commons to 4.5.5 in product IS
   - [IDENTITY-5971 <https://wso2.org/jira/browse/IDENTITY-5971>] - Fix the
   Sonar reported issues for Oauth
   - [IDENTITY-5982 <https://wso2.org/jira/browse/IDENTITY-5982>] - Support
   to Get JWT Token from userinfo endpoint
   - [IDENTITY-6058 <https://wso2.org/jira/browse/IDENTITY-6058>] - Set the
   'CaseInsensitiveUsername' property to false in the JDBC user store manager
   configuration
   - [IDENTITY-6419 <https://wso2.org/jira/browse/IDENTITY-6419>] - Allow
   to use database tuning parameters in secondary user stores
   - [IDENTITY-6446 <https://wso2.org/jira/browse/IDENTITY-6446>] - Create
   common endpoint for oauth2 resources



*How To Contribute*
Your feedback is most welcome!
Mailing Lists
Join our mailing list and correspond with the developers directly.

   - Developer List: [email protected] | Subscribe <[email protected]> | Mail
   Archive <http://wso2.org/mailarchive/dev/>
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.


*~ The WSO2 Identity and Access Management Team ~*


-- 
*Thilina Madumal*
*Software Engineer | **WSO2*
Email: [email protected]
Mobile: *+ <+94%2077%20767%201807>94 774553167*
Web:  <http://goog_716986954>http://wso2.com

<http://wso2.com/signature>
_______________________________________________
Dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to