The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha6.

You can build the distribution from the source tag
https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha6 following the
steps below.


*Building from the source*

   1. Install Java7 or above
   2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#)
   3. Get a clone from https://github.com/wso2/product-is.git and checkout
   to v5.4.0-alpha6 tag or you can directly download the source for the tag
   from https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha6
   4. Run the one of the below maven commands from product-is directory,
      - *mvn** clean install* (To build the binary and source distributions
      with the tests)
      - *mvn** clean install -Dmaven.test.skip=true* (To build the binary
      and source distributions, without running any of the
unit/integration tests)
   5. You can find the wso2is-5.4.0-alpha6.zip binary distribution in
   product-is/modules/distribution/target directory.

The following list contains all the features, improvements, and bug fixes
available with the WSO2 Identity Server 5.4.0 Alpha6 release.

Patch

   - [IDENTITY-5511 <https://wso2.org/jira/browse/IDENTITY-5511>] - Handle
   SCIM users GET API when same SCIM ID exists in multiple user stores
   - [IDENTITY-6425 <https://wso2.org/jira/browse/IDENTITY-6425>] - Issues
   in TOTP Authentication flow(i.e. verification code generation and totp
   authentication) in IS cluster fronted with a Load Balancer
   - [IDENTITY-6643 <https://wso2.org/jira/browse/IDENTITY-6643>] - Improve
   SCIM /Me GET performance
   - [IDENTITY-6777 <https://wso2.org/jira/browse/IDENTITY-6777>] - Tokens
   expire prior to their expiration time
   - [IDENTITY-6791 <https://wso2.org/jira/browse/IDENTITY-6791>] - Pass
   OAuth app display name to Consent page
   - [IDENTITY-6809 <https://wso2.org/jira/browse/IDENTITY-6809>] - Proxy
   server blocks connection made outside the network after enabling captcha
   feature

Bug

   - [IDENTITY-4455 <https://wso2.org/jira/browse/IDENTITY-4455>] -
   Updating user profile fails, but identity claims get updated
   - [IDENTITY-5849 <https://wso2.org/jira/browse/IDENTITY-5849>] - SCIM -
   Edit user fails due to NullPointerException when authenticating with OAuth
   token
   - [IDENTITY-6045 <https://wso2.org/jira/browse/IDENTITY-6045>] - a token
   gets expired even though the expiry time is set to be more.
   - [IDENTITY-6179 <https://wso2.org/jira/browse/IDENTITY-6179>] -
   Properly handling SAML AuthnContextClassRef
   - [IDENTITY-6205 <https://wso2.org/jira/browse/IDENTITY-6205>] - [SCIM]
   When listing all the groups, admin group details won't retrieved
   - [IDENTITY-6372 <https://wso2.org/jira/browse/IDENTITY-6372>] - When
   add a secondary userstore get a warning in the backend
   - [IDENTITY-6462 <https://wso2.org/jira/browse/IDENTITY-6462>] - Access
   Token Partitioning does not works
   - [IDENTITY-6464 <https://wso2.org/jira/browse/IDENTITY-6464>] - A
   foreign key violation in Access Token partitioning when using 'openid' as
   the scope
   - [IDENTITY-6610 <https://wso2.org/jira/browse/IDENTITY-6610>] - XACML
   policy editor returns 403 when trying to update policy
   - [IDENTITY-6612 <https://wso2.org/jira/browse/IDENTITY-6612>] - Role
   claim not returned in User Info Response
   - [IDENTITY-6633 <https://wso2.org/jira/browse/IDENTITY-6633>] - [UI]
   Incorrect button appearing when searching a role to assign when creating a
   new user
   - [IDENTITY-6638 <https://wso2.org/jira/browse/IDENTITY-6638>] -
   Incorrect error message when using an unconfigured SP
   - [IDENTITY-6640 <https://wso2.org/jira/browse/IDENTITY-6640>] - Cannot
   login to the Publisher of App Manager after configuring the IS as the
   trusted Identity Provider
   - [IDENTITY-6642 <https://wso2.org/jira/browse/IDENTITY-6642>] - NPE in
   IdP init login for an invalid issuer
   - [IDENTITY-6660 <https://wso2.org/jira/browse/IDENTITY-6660>] - Null
   values are not handled within URL building methods in IdentityUtils
   - [IDENTITY-6662 <https://wso2.org/jira/browse/IDENTITY-6662>] -
   Hostname's trailing '/' characters are not handled for some cases in
   IdentityUtils.getServerURL()
   - [IDENTITY-6676 <https://wso2.org/jira/browse/IDENTITY-6676>] - Cookie
   takes null value in OIDCSessionManagementUtil
   - [IDENTITY-6677 <https://wso2.org/jira/browse/IDENTITY-6677>] - Idle
   account suspension functionality doesn't work
   - [IDENTITY-6690 <https://wso2.org/jira/browse/IDENTITY-6690>] -
   [Secondary User store] Backend shows some warning when user searching
   - [IDENTITY-6692 <https://wso2.org/jira/browse/IDENTITY-6692>] - Cannot
   login to mgt-console with admin user after IS server was idle for sometime

Task

   - [IDENTITY-6551 <https://wso2.org/jira/browse/IDENTITY-6551>] - Update
   x509Authenticator in IS 5.4.0

Improvement

   - [IDENTITY-2944 <https://wso2.org/jira/browse/IDENTITY-2944>] - OIDC
   returns only the claims that are at both "http://wso2.org/oidc/claim";
   and default dialect
   - [IDENTITY-3542 <https://wso2.org/jira/browse/IDENTITY-3542>] -
   Improvements/Fixes to SSO Agent Library
   - [IDENTITY-5121 <https://wso2.org/jira/browse/IDENTITY-5121>] -
   Dashboard "Authorized Apps" gadget be shown only to users with permission
   to list apps operation
   - [IDENTITY-5200 <https://wso2.org/jira/browse/IDENTITY-5200>] -
   alphabetize the list of roles
   - [IDENTITY-5567 <https://wso2.org/jira/browse/IDENTITY-5567>] -
   Implement Ask Password feature in Management console
   - [IDENTITY-5637 <https://wso2.org/jira/browse/IDENTITY-5637>] - Getting
   error after the idle timeout on calling /Authorize?prompt=none
   - [IDENTITY-5937 <https://wso2.org/jira/browse/IDENTITY-5937>] - Update
   the OAuth component SCR plugin version to 1.8.0
   - [IDENTITY-5949 <https://wso2.org/jira/browse/IDENTITY-5949>] - Needs
   to change the pop-up error message with useful details
   - [IDENTITY-6200 <https://wso2.org/jira/browse/IDENTITY-6200>] - Send
   custom errors propagated from Authentication Framework to RP via the OAuth2
   Authorization Endpoint
   - [IDENTITY-6454 <https://wso2.org/jira/browse/IDENTITY-6454>] -
   Capability to restrict case sensitivity in case sensitive userstores from
   IS level
   - [IDENTITY-6620 <https://wso2.org/jira/browse/IDENTITY-6620>] - In
   "Password Policy Authenticator" if decimal value is provided ( represent
   half day ) the signin process fails
   - [IDENTITY-6655 <https://wso2.org/jira/browse/IDENTITY-6655>] - SCIM2
   connector claim-config-diff instruction is misleading



*Contribute to WSO2 Identity Server*

*Mailing Lists*

Join our mailing lists and correspond with the developers directly. We also
encourage you to take part in discussions related to the product in the
architecture mailing list. If you have any questions regarding the product
you can use our StackOverflow forum to raise them as well.

   - Developer List: [email protected]
   - Architecture List: [email protected]
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.



~ The WSO2 Identity and Access Management Team ~


Thanks,
Farasath Ahamed
Software Engineer, WSO2 Inc.; http://wso2.com
Mobile: +94777603866
Blog: blog.farazath.com
Twitter: @farazath619 <https://twitter.com/farazath619>
<http://wso2.com/signature>
_______________________________________________
Dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to