The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha 10.

You can build the distribution from the source tag https://github.com/wso2/
product-is/releases/tag/v5.4.0-alpha10 following the steps below.


*Building from the source*

   1. Install Java8 or above
   2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#)
   3. Get a clone from https://github.com/wso2/product-is.git and checkout
   to v5.4.0-alpha10 tag or you can directly download the source for the tag
   from https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha10
   4. Run the one of the below maven commands from product-is directory,
      - *mvn** clean install* (To build the binary and source distributions
      with the tests)
      - *mvn** clean install -Dmaven.test.skip=true* (To build the binary
      and source distributions, without running any of the
unit/integration tests)
   5. You can find the wso2is-5.4.0-alpha10.zip binary distribution in
   product-is/modules/distribution/target directory.

The following list contains all the features, improvements, and bug fixes
available with the WSO2 Identity Server 5.4.0 Alpha 10 release.

Patch

   - [IDENTITY-6299 <https://wso2.org/jira/browse/IDENTITY-6299>] - User
   creation via SCIM API does not return updated attribute values of the user
   - [IDENTITY-6800 <https://wso2.org/jira/browse/IDENTITY-6800>] - SAML
   Logout does not work as expected
   - [IDENTITY-6914 <https://wso2.org/jira/browse/IDENTITY-6914>] - Account
   creation (Adding users) take extensive amount of time when a large number
   of confirmation codes are present in the registry
   - [IDENTITY-6921 <https://wso2.org/jira/browse/IDENTITY-6921>] -
   Updating supported grant types of an oauth application through soap service
   will cause to return tokens for invalid user

Bug

   - [IDENTITY-3754 <https://wso2.org/jira/browse/IDENTITY-3754>] -
   Identity Server is only reading the http response status code, not the SAML
   LogoutResponse Messsage
   - [IDENTITY-5031 <https://wso2.org/jira/browse/IDENTITY-5031>] -
   RegistryException Unable to create fixed remote mounts for the initial SAML
   SSO request
   - [IDENTITY-5887 <https://wso2.org/jira/browse/IDENTITY-5887>] -
   commonauth logout throws NPE intermittently
   - [IDENTITY-6078 <https://wso2.org/jira/browse/IDENTITY-6078>] - SSO
   login not responding for some users
   - [IDENTITY-6347 <https://wso2.org/jira/browse/IDENTITY-6347>] - Not
   support some valid URL encoding character for Callback URL when creating
   oauth app
   - [IDENTITY-6356 <https://wso2.org/jira/browse/IDENTITY-6356>] - Self
   sign up flow gives an error in backend when trying to login before user is
   verified
   - [IDENTITY-6363 <https://wso2.org/jira/browse/IDENTITY-6363>] - Content
   of the sts-client.sh is wrong
   - [IDENTITY-6392 <https://wso2.org/jira/browse/IDENTITY-6392>] -
   refresh_grant is not working with RenewRefreshTokenForRefreshGrant=false
   - [IDENTITY-6408 <https://wso2.org/jira/browse/IDENTITY-6408>] -
   Self-signup-REST api - unlocks the account even if the validation is done
   aginst a different tenant domain
   - [IDENTITY-6420 <https://wso2.org/jira/browse/IDENTITY-6420>] - The
   "sub" value is not consistent when invoking UserInfo Endpoint with enabled
   email as user name
   - [IDENTITY-6427 <https://wso2.org/jira/browse/IDENTITY-6427>] - Dumb
   mode update user/group and delete user/group doesn't work
   - [IDENTITY-6448 <https://wso2.org/jira/browse/IDENTITY-6448>] - Error
   while creating saml app with metadata file or url
   - [IDENTITY-6470 <https://wso2.org/jira/browse/IDENTITY-6470>] - When
   invoking .well-known/openid-configuration it returns deprecated DCR
   endpoint
   - [IDENTITY-6548 <https://wso2.org/jira/browse/IDENTITY-6548>] - Subject
   identifier in id_token and user_info is different when "Use tenant domain
   in local subject identifier" config is enabled in SP
   - [IDENTITY-6570 <https://wso2.org/jira/browse/IDENTITY-6570>] -
   Previously added Inbound Authentication Configuration is not visible inside
   SAML2 Web SSO Configuration and adding the same lateron gives a duplication
   error
   - [IDENTITY-6583 <https://wso2.org/jira/browse/IDENTITY-6583>] -
   Assigning groups to users does not provisioned correctly in SCIM outbound
   provisioning
   - [IDENTITY-6679 <https://wso2.org/jira/browse/IDENTITY-6679>] - Mapping
   Roles are not updating accordingly in User/Group update in SCIM outbound
   provisioning
   - [IDENTITY-6702 <https://wso2.org/jira/browse/IDENTITY-6702>] - When
   the Federation Proxy is trying to authenticate with the Federation Hub, the
   SAML Assertion is not found in the Response
   - [IDENTITY-6719 <https://wso2.org/jira/browse/IDENTITY-6719>] - OAuth
   Client Secret gets corrupted or disappeared after TokenPersistenceProcessor
   is set to EncryptionDecryptionPersistenceProcessor
   - [IDENTITY-6765 <https://wso2.org/jira/browse/IDENTITY-6765>] -
   check_session_iframe and end_session_endpoint do not appear in the
   configuration documentation in OpenID Connect Session Management Support
   - [IDENTITY-6828 <https://wso2.org/jira/browse/IDENTITY-6828>] - scim id
   returned after creating the user is not equal to the scim id actually
   stored in the user store
   - [IDENTITY-6834 <https://wso2.org/jira/browse/IDENTITY-6834>] - Invalid
   response when in token request, the authorization code is in invalid format
   - [IDENTITY-6917 <https://wso2.org/jira/browse/IDENTITY-6917>] - SQL
   error when JWT token issuer is configured to issue self contained access
   tokens
   - [IDENTITY-6937 <https://wso2.org/jira/browse/IDENTITY-6937>] - OAuth
   apps created with DCR requests show invalid (0s) expiry times in UI
   - [IDENTITY-6939 <https://wso2.org/jira/browse/IDENTITY-6939>] - OIDC
   DCR Request with an unknown parameter throws 500
   - [IDENTITY-6940 <https://wso2.org/jira/browse/IDENTITY-6940>] - OIDC
   DCR request with no redirect_uri responds with invalid redirect uri values
   - [IDENTITY-6944 <https://wso2.org/jira/browse/IDENTITY-6944>] - Role
   based provisioning fails when group endpoint is not configured for SCIM
   outbound connector

Task

   - [IDENTITY-5561 <https://wso2.org/jira/browse/IDENTITY-5561>] - Debug
   log message can cause java.lang.IllegalArgumentException
   - [IDENTITY-6948 <https://wso2.org/jira/browse/IDENTITY-6948>] - Remove
   unnecessary cache configs which are not used from identity.xml file

Improvement

   - [IDENTITY-6450 <https://wso2.org/jira/browse/IDENTITY-6450>] - Add a
   field to playground to get input for response_type
   - [IDENTITY-6509 <https://wso2.org/jira/browse/IDENTITY-6509>] -
   Properly validate recovery endpoint webapp url before showing the recovery
   links in login page
   - [IDENTITY-6774 <https://wso2.org/jira/browse/IDENTITY-6774>] -
   Authorization Code Grant type tightly coupled to client_id, client_secret
   authentication
   - [IDENTITY-6899 <https://wso2.org/jira/browse/IDENTITY-6899>] - Provide
   an extension to change the OIDC Claim filtering logic
   - [IDENTITY-6902 <https://wso2.org/jira/browse/IDENTITY-6902>] -
   Refactor UserInfoResponseBuilder implementations to avoid code duplication.
   - [IDENTITY-6942 <https://wso2.org/jira/browse/IDENTITY-6942>] - Improve
   debug logs of the ProvisioningClient used with SCIM outbound connector

*Contribute to WSO2 Identity Server*

*Mailing Lists*

Join our mailing lists and correspond with the developers directly. We also
encourage you to take part in discussions related to the product in the
architecture mailing list. If you have any questions regarding the product
you can use our StackOverflow forum to raise them as well.

   - Developer List: dev@wso2.org
   - Architecture List: architect...@wso2.org
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.

~ The WSO2 Identity and Access Management Team ~

*Jayanga Kaushalya*
Software Engineer
Mobile: +94777860160 <+94%2077%20786%200160>
WSO2 Inc. | http://wso2.com
lean.enterprise.middleware
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to