The WSO2 Identity and Access Management team is pleased to announce the release of WSO2 Identity Server 5.4.0 Alpha 10.
You can build the distribution from the source tag https://github.com/wso2/ product-is/releases/tag/v5.4.0-alpha10 following the steps below. *Building from the source* 1. Install Java8 or above 2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#) 3. Get a clone from https://github.com/wso2/product-is.git and checkout to v5.4.0-alpha10 tag or you can directly download the source for the tag from https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha10 4. Run the one of the below maven commands from product-is directory, - *mvn** clean install* (To build the binary and source distributions with the tests) - *mvn** clean install -Dmaven.test.skip=true* (To build the binary and source distributions, without running any of the unit/integration tests) 5. You can find the wso2is-5.4.0-alpha10.zip binary distribution in product-is/modules/distribution/target directory. The following list contains all the features, improvements, and bug fixes available with the WSO2 Identity Server 5.4.0 Alpha 10 release. Patch - [IDENTITY-6299 <https://wso2.org/jira/browse/IDENTITY-6299>] - User creation via SCIM API does not return updated attribute values of the user - [IDENTITY-6800 <https://wso2.org/jira/browse/IDENTITY-6800>] - SAML Logout does not work as expected - [IDENTITY-6914 <https://wso2.org/jira/browse/IDENTITY-6914>] - Account creation (Adding users) take extensive amount of time when a large number of confirmation codes are present in the registry - [IDENTITY-6921 <https://wso2.org/jira/browse/IDENTITY-6921>] - Updating supported grant types of an oauth application through soap service will cause to return tokens for invalid user Bug - [IDENTITY-3754 <https://wso2.org/jira/browse/IDENTITY-3754>] - Identity Server is only reading the http response status code, not the SAML LogoutResponse Messsage - [IDENTITY-5031 <https://wso2.org/jira/browse/IDENTITY-5031>] - RegistryException Unable to create fixed remote mounts for the initial SAML SSO request - [IDENTITY-5887 <https://wso2.org/jira/browse/IDENTITY-5887>] - commonauth logout throws NPE intermittently - [IDENTITY-6078 <https://wso2.org/jira/browse/IDENTITY-6078>] - SSO login not responding for some users - [IDENTITY-6347 <https://wso2.org/jira/browse/IDENTITY-6347>] - Not support some valid URL encoding character for Callback URL when creating oauth app - [IDENTITY-6356 <https://wso2.org/jira/browse/IDENTITY-6356>] - Self sign up flow gives an error in backend when trying to login before user is verified - [IDENTITY-6363 <https://wso2.org/jira/browse/IDENTITY-6363>] - Content of the sts-client.sh is wrong - [IDENTITY-6392 <https://wso2.org/jira/browse/IDENTITY-6392>] - refresh_grant is not working with RenewRefreshTokenForRefreshGrant=false - [IDENTITY-6408 <https://wso2.org/jira/browse/IDENTITY-6408>] - Self-signup-REST api - unlocks the account even if the validation is done aginst a different tenant domain - [IDENTITY-6420 <https://wso2.org/jira/browse/IDENTITY-6420>] - The "sub" value is not consistent when invoking UserInfo Endpoint with enabled email as user name - [IDENTITY-6427 <https://wso2.org/jira/browse/IDENTITY-6427>] - Dumb mode update user/group and delete user/group doesn't work - [IDENTITY-6448 <https://wso2.org/jira/browse/IDENTITY-6448>] - Error while creating saml app with metadata file or url - [IDENTITY-6470 <https://wso2.org/jira/browse/IDENTITY-6470>] - When invoking .well-known/openid-configuration it returns deprecated DCR endpoint - [IDENTITY-6548 <https://wso2.org/jira/browse/IDENTITY-6548>] - Subject identifier in id_token and user_info is different when "Use tenant domain in local subject identifier" config is enabled in SP - [IDENTITY-6570 <https://wso2.org/jira/browse/IDENTITY-6570>] - Previously added Inbound Authentication Configuration is not visible inside SAML2 Web SSO Configuration and adding the same lateron gives a duplication error - [IDENTITY-6583 <https://wso2.org/jira/browse/IDENTITY-6583>] - Assigning groups to users does not provisioned correctly in SCIM outbound provisioning - [IDENTITY-6679 <https://wso2.org/jira/browse/IDENTITY-6679>] - Mapping Roles are not updating accordingly in User/Group update in SCIM outbound provisioning - [IDENTITY-6702 <https://wso2.org/jira/browse/IDENTITY-6702>] - When the Federation Proxy is trying to authenticate with the Federation Hub, the SAML Assertion is not found in the Response - [IDENTITY-6719 <https://wso2.org/jira/browse/IDENTITY-6719>] - OAuth Client Secret gets corrupted or disappeared after TokenPersistenceProcessor is set to EncryptionDecryptionPersistenceProcessor - [IDENTITY-6765 <https://wso2.org/jira/browse/IDENTITY-6765>] - check_session_iframe and end_session_endpoint do not appear in the configuration documentation in OpenID Connect Session Management Support - [IDENTITY-6828 <https://wso2.org/jira/browse/IDENTITY-6828>] - scim id returned after creating the user is not equal to the scim id actually stored in the user store - [IDENTITY-6834 <https://wso2.org/jira/browse/IDENTITY-6834>] - Invalid response when in token request, the authorization code is in invalid format - [IDENTITY-6917 <https://wso2.org/jira/browse/IDENTITY-6917>] - SQL error when JWT token issuer is configured to issue self contained access tokens - [IDENTITY-6937 <https://wso2.org/jira/browse/IDENTITY-6937>] - OAuth apps created with DCR requests show invalid (0s) expiry times in UI - [IDENTITY-6939 <https://wso2.org/jira/browse/IDENTITY-6939>] - OIDC DCR Request with an unknown parameter throws 500 - [IDENTITY-6940 <https://wso2.org/jira/browse/IDENTITY-6940>] - OIDC DCR request with no redirect_uri responds with invalid redirect uri values - [IDENTITY-6944 <https://wso2.org/jira/browse/IDENTITY-6944>] - Role based provisioning fails when group endpoint is not configured for SCIM outbound connector Task - [IDENTITY-5561 <https://wso2.org/jira/browse/IDENTITY-5561>] - Debug log message can cause java.lang.IllegalArgumentException - [IDENTITY-6948 <https://wso2.org/jira/browse/IDENTITY-6948>] - Remove unnecessary cache configs which are not used from identity.xml file Improvement - [IDENTITY-6450 <https://wso2.org/jira/browse/IDENTITY-6450>] - Add a field to playground to get input for response_type - [IDENTITY-6509 <https://wso2.org/jira/browse/IDENTITY-6509>] - Properly validate recovery endpoint webapp url before showing the recovery links in login page - [IDENTITY-6774 <https://wso2.org/jira/browse/IDENTITY-6774>] - Authorization Code Grant type tightly coupled to client_id, client_secret authentication - [IDENTITY-6899 <https://wso2.org/jira/browse/IDENTITY-6899>] - Provide an extension to change the OIDC Claim filtering logic - [IDENTITY-6902 <https://wso2.org/jira/browse/IDENTITY-6902>] - Refactor UserInfoResponseBuilder implementations to avoid code duplication. - [IDENTITY-6942 <https://wso2.org/jira/browse/IDENTITY-6942>] - Improve debug logs of the ProvisioningClient used with SCIM outbound connector *Contribute to WSO2 Identity Server* *Mailing Lists* Join our mailing lists and correspond with the developers directly. We also encourage you to take part in discussions related to the product in the architecture mailing list. If you have any questions regarding the product you can use our StackOverflow forum to raise them as well. - Developer List: dev@wso2.org - Architecture List: architect...@wso2.org - User Forum: StackOverflow <http://stackoverflow.com/questions/tagged/wso2is> Reporting Issues We encourage you to report issues, improvements, and feature requests regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA <https://wso2.org/jira/projects/IDENTITY/issues>. ~ The WSO2 Identity and Access Management Team ~ *Jayanga Kaushalya* Software Engineer Mobile: +94777860160 <+94%2077%20786%200160> WSO2 Inc. | http://wso2.com lean.enterprise.middleware
_______________________________________________ Dev mailing list Dev@wso2.org http://wso2.org/cgi-bin/mailman/listinfo/dev