Hi all,
We are working on supporting JWT revocation for synapse gateway. Please
note that the default token format for 3.0 synapse gateway is JWT.
Please find the discussed design for this feature.
[image: JWT.jpg]
In summary, we will be storing the revoked token signatures against the
expiry
Hi All,
Thanks for testing WSO2 Identity Server 5.9.0-RC2.
Since this vote has passed with 22 [+1]s and 0 [-1]s, we’re hereby closing
this vote and proceeding with the WSO2 Identity Server 5.9.0 GA release.
Best Regards,
- WSO2 Identity Server Team -
*Piraveena Paralogarajah*
Software Engineer
Hi Yasara,
This will be the next-gen authentication mechanism of the Identity Server
and I'm glad that we've started to implement the idea. I have a few queries.
1. Are we planning to implement a mobile app as well with this effort?
Or can we use some third-party app that's already
Hi All,
I have tested the following scenarios and it works as expected, +1 to go
ahead and release.
- Basic functionality with EmailOTP (Basic authenticator/Federated
Authenticator as first step and EmailOTP as the second step) with secondary
user stores.
- EmailOTP with Email Templates
- X509
Hi all,
I tested the following scenarios on IS-5.9.0-RC2 with MySQL database.
- Viewing, terminating sessions from the user portal
- Create a service provider, configure SAML SSO, authenticate with Basic
Authenticator for travelocity app
- Create, retrieve and delete Oauth2 app using
Hi,
As I was able to perform the following tests successfully on
IS-5.9.0-RC2, +1 to go ahead and release.
User self-registration with email confirmation
Username Recovery
Password Recovery
Email OTP
OIDC - auth code flow
User challenges - self-care REST API
Browsing management console
[+]
Hi all,
Tested below scenarios on IS 5.9.0-RC2 pack.
- SAML2 Bearer Assertion Profile for OAuth 2.0
- Federated authentication with a second instance of IS as the Identity
Provider.
- JIT provisioning with a second instance of IS as the Identity Provider.
No blocking issues found.
Hi all,
Tested below scenarios on IS 5.9.0-RC2 pack using the Postgresql database.
- Add service provider, configured SAML SSO, authenticate with *the
dispatch *sample web app.
- Add new SP with Open ID OAuth/OpenID Connect Configuration and
authenticate with *the playground *sample
Hi,
I've tested following scenarios with default database setup.
Using REST APIs via XACML to manage entitlement.
UMA 2.0 flow
- Obtain PAT using password grant.
- Create, delete, update, list resources and read resource description of a
resource by invoking UMA resource registration
I think using a common library would make both synapse and micro gateways
behaves the same way when validating the schemas. Maintaining our own
library would become difficult as open API spec add more and more
validations(with newer versions) , we will have to keep track of it and
include those
Hi All,
I have been working on JBallerina upgrade for the schema validator filter
which validates the request/response payloads against the schema in the
swagger file. Significant changes have been introduced with the b7 release
and thus we need to revamp the feature accordingly. This is an
Hi All,
I have tested the following API implementations and no blocking issues found.
- Session management API
- User Account Association API
- Export User profile
- Consent Management API
[+] Stable - go ahead and release
Thanks,
Thanuja
On Thu, Oct 3, 2019 at 6:16 PM Piraveena
:All
I have tested the following scenarios and no blocking issues found:
- Outbound provisioning with SCIM and Salesforce
- Federated authentication using Facebook
[+] Stable - go ahead and release
Thanks
Isuranga
On Thu, Oct 3, 2019 at 6:16 PM Piraveena Paralogarajah
wrote:
> Hi
Hi all.
I have tested the following scenarios:
- Scope Management REST API
- XACML based scope validation for token issuing phase in the following
OAuth grant types
- Authorization code flow
- password grant
- client_credentials
- Implicit flow
- XACML based
Hi All,
I have tested the following scenarios and no blocking issues found.
- SSO with SAML
- Federated authentication with Google
- Federated authentication with Facebook
- SSO with multi-option and multi-step authentication
- Role-based Adaptive authentication
[+] Stable - go
Hi all,
Verified and validated below listed features are working as expected.
Test Environment OS- MAC O/S, Windows-Server-2016-standard-64bit
Java version- 1.8.0_171, 11.0.4
Database - H2, Oracle 12c
User type, Primary, Secondary, Super user and
Hi All,
Tested and verified with performance test and long running test. Test
result match with the expectations.
*Performance test*
Summary*: *Performance has been improved comparing to the product version
5.8
Deployment
- OS: Ubuntu
- DB: Mysql
- Heap: 4G/2G
- CPU cores: 4
-
Hi all
Verified and validated below listed features are working as expected.
QSG
- Single-Sign-On with SAML2
- Single-Sign-On with OIDC
- Multi-Factor Authentication
- Google as a Federated Authenticator
- Self-Signup
- Creating a workflow
Multi Options Authentication with local authenticators
Hi All,
I have tested the following features and no issues found
Ubuntu 16.04 | MSSQL | Embedded Ldap Primary User Store | Super Tenant
-
Manage roles with SCIM 2.0 Create Group, Delete Group, Filter Groups,
Search Groups, Update Group - PATCH, Update Group - PUT
-
Manage
Hi All,
Tested the below scenarios on MySQL.
- Create an OAuth app using DCR
- Get OAuth App information using DCR
- Revoke the app
- Regenerate the client_secret
- Authorization Code flow without client secret (public client)
- OIDC custom claims
- OIDC role claim with role
Hi All,
Tested the following flows and working as expected.
*DB type:- db2*
- Obtained access tokens using
- authorization code grant type
- password grant type
- refresh token grant type
- implicit grant type
- client-credential grant type
- Access token
21 matches
Mail list logo