The WSO2 Identity Server team is pleased to announce the 1st Milestone of WSO2 IdentityServer 5.4.0. You can download this distribution from following location.
https://github.com/wso2/product-is/releases/tag/v5.4.0-m1 Following list contains all the features, improvements and bug fixes available with this milestone. Wish - [IDENTITY-4428 <https://wso2.org/jira/browse/IDENTITY-4428>] - Claim mapping for given name is incorecct Patch - [IDENTITY-5834 <https://wso2.org/jira/browse/IDENTITY-5834>] - Under high concurrency UserStoreConfigXMLProcessor fails to decrypt the connection password in the secondary userstore file - [IDENTITY-5846 <https://wso2.org/jira/browse/IDENTITY-5846>] - Facebook authenticator does not work properly after recent Facebook API changes - [IDENTITY-5852 <https://wso2.org/jira/browse/IDENTITY-5852>] - OIDC logout fails when opbs cookie not properly cleared - [IDENTITY-5853 <https://wso2.org/jira/browse/IDENTITY-5853>] - SQL Syntax Error in VALIDATE_AUTHZ_CODE Query. - [IDENTITY-5919 <https://wso2.org/jira/browse/IDENTITY-5919>] - No tenant check when validating scopes in JDBCScopeValidator - [IDENTITY-5985 <https://wso2.org/jira/browse/IDENTITY-5985>] - In Postgres CON_APP_KEY constraint becomes all lower case, causing it to skip error handling procedure. - [IDENTITY-6026 <https://wso2.org/jira/browse/IDENTITY-6026>] - Retrieving user claims from cache always assume token, even when authorization code is given. Bug - [IDENTITY-3001 <https://wso2.org/jira/browse/IDENTITY-3001>] - Exchanging SAML2 bearer tokens with OAuth2 not working when server(AM) is restarted - [IDENTITY-3198 <https://wso2.org/jira/browse/IDENTITY-3198>] - IS Dashboard Account Recovery blank page and exception in backend after changing challenge question of the user from SoapUI calling UserIdentityManagementAdminService - [IDENTITY-3222 <https://wso2.org/jira/browse/IDENTITY-3222>] - Challenge questions set through setChallengeQuestions operation are not shown in dashbaord - [IDENTITY-3473 <https://wso2.org/jira/browse/IDENTITY-3473>] - Web UI not creating valid XACML - [IDENTITY-3815 <https://wso2.org/jira/browse/IDENTITY-3815>] - [IS510][Cluster][OAuth/SAML][Load/Long] NPE - exception while processing task:com.hazelcast.spi.impl.eventservice.impl.LocalEventDispatcher - [IDENTITY-3863 <https://wso2.org/jira/browse/IDENTITY-3863>] - [RemoteUserStoreManagerService] Secondary user store users are not listed with getUserList - [IDENTITY-3967 <https://wso2.org/jira/browse/IDENTITY-3967>] - Claim related error after authenticating with OpenID Connect - [IDENTITY-4003 <https://wso2.org/jira/browse/IDENTITY-4003>] - Can not add users from console UI when multiple 'user search base' configured to user-mgt with '#' separated - [IDENTITY-4043 <https://wso2.org/jira/browse/IDENTITY-4043>] - [IS510][Cluster][OAuth/SAML][Long][mysql] SQLException: The total number of locks exceeds the lock table size - [IDENTITY-4112 <https://wso2.org/jira/browse/IDENTITY-4112>] - Revoked Access Token and Revoked Refresh Token returned back in token revoke endpoint response - [IDENTITY-4172 <https://wso2.org/jira/browse/IDENTITY-4172>] - ClassNotFoundException when trying to authentication with fido - [IDENTITY-4173 <https://wso2.org/jira/browse/IDENTITY-4173>] - Unlocking the locked users when restarting the server - [IDENTITY-4276 <https://wso2.org/jira/browse/IDENTITY-4276>] - Encrypting values in EndpointConfig.properties file with cipher tool fails to deploy authenticationendpoint web app - [IDENTITY-4332 <https://wso2.org/jira/browse/IDENTITY-4332>] - [Dashboard] Internal Error occured when Password is inputted with less than 5 characters via Create Account - [IDENTITY-4394 <https://wso2.org/jira/browse/IDENTITY-4394>] - OpenID Connect Session Management Assumptions and Limitations - [IDENTITY-4420 <https://wso2.org/jira/browse/IDENTITY-4420>] - Error adding SAML2 Web SSO Configuration on Identity Server - [IDENTITY-4423 <https://wso2.org/jira/browse/IDENTITY-4423>] - Error in marshalling SAML response when use custom claim for objectSID - [IDENTITY-4427 <https://wso2.org/jira/browse/IDENTITY-4427>] - The regular expression to check valid user/rolename in user-mgmt.xml is wrong - [IDENTITY-4464 <https://wso2.org/jira/browse/IDENTITY-4464>] - SQL error while running following query - UPDATE IDN_OAUTH2_ACCESS_TOKEN set USER_DOMAIN = 'PRIMARY' where USER_DOMAIN is null; - [IDENTITY-4470 <https://wso2.org/jira/browse/IDENTITY-4470>] - Tenant domain is not returning within the JWT. - [IDENTITY-4512 <https://wso2.org/jira/browse/IDENTITY-4512>] - Cannot generate signed Authentication Context JWT for custom grant type sample - [IDENTITY-4534 <https://wso2.org/jira/browse/IDENTITY-4534>] - Error response for implicit flow is in wrong format - [IDENTITY-4915 <https://wso2.org/jira/browse/IDENTITY-4915>] - 'sub' claim not returned in id_tokens generated with Client credential grant type - [IDENTITY-4925 <https://wso2.org/jira/browse/IDENTITY-4925>] - Repeated parameters and multiple credentials are allowed in token requests - [IDENTITY-4927 <https://wso2.org/jira/browse/IDENTITY-4927>] - Incorrect error responses for missing grant_type parameter and value - [IDENTITY-4931 <https://wso2.org/jira/browse/IDENTITY-4931>] - Claims are not retreived properly for id_tokens generated based on client_credentials grant type for SP's created by email users - [IDENTITY-4935 <https://wso2.org/jira/browse/IDENTITY-4935>] - UserInfo is not retrieved for the password grant type even though it is returned in the decoded id token - [IDENTITY-4936 <https://wso2.org/jira/browse/IDENTITY-4936>] - sub claim returned from user info endpoint behaves inconsistently with required claim values in SP - [IDENTITY-4937 <https://wso2.org/jira/browse/IDENTITY-4937>] - 'sub' claim returned for a id_token obtained using authorization grant from userinfo endpoint behaves inconsistently after change in SP claim config - [IDENTITY-4941 <https://wso2.org/jira/browse/IDENTITY-4941>] - Single Logout fail depend of logout sequence from Service Providers - [IDENTITY-4942 <https://wso2.org/jira/browse/IDENTITY-4942>] - Cannot Try SAML passive Auth from travelocity sample application - [IDENTITY-4943 <https://wso2.org/jira/browse/IDENTITY-4943>] - Userinfo subject format inconsistency among grant types - [IDENTITY-4950 <https://wso2.org/jira/browse/IDENTITY-4950>] - Token obtained from SAML bearer grant active until cache timeout even after being revoked when subject claim contains @ value - [IDENTITY-4963 <https://wso2.org/jira/browse/IDENTITY-4963>] - Access token is not revoked when Call back URL/allowed grant types are updated - [IDENTITY-4966 <https://wso2.org/jira/browse/IDENTITY-4966>] - Inconsistent behaviour when UserInfo is retrieved after updating the profile - [IDENTITY-4967 <https://wso2.org/jira/browse/IDENTITY-4967>] - OAuth2TokenValidation service returns a server error when trying a validate a token issued by a deleted app - [IDENTITY-4976 <https://wso2.org/jira/browse/IDENTITY-4976>] - Time Skew is not properly handled in OAuth2 - [IDENTITY-4981 <https://wso2.org/jira/browse/IDENTITY-4981>] - Access token generated for SP for a different tenant's user is not revoked when SaaS is disabled - [IDENTITY-4983 <https://wso2.org/jira/browse/IDENTITY-4983>] - General SP initiated SAML SSO and Request path SAML SSO need to be consistent - [IDENTITY-4999 <https://wso2.org/jira/browse/IDENTITY-4999>] - OAuth response token expiry times are not consistent and accurate - [IDENTITY-5006 <https://wso2.org/jira/browse/IDENTITY-5006>] - Claim attribute ID inconsistency in ID token for federated authentication in super tenant - [IDENTITY-5013 <https://wso2.org/jira/browse/IDENTITY-5013>] - Observed inconsistency in returning "sub" attribute for userinfo endpoint when simply click on update button of SP - [IDENTITY-5022 <https://wso2.org/jira/browse/IDENTITY-5022>] - Inapplicable claims returned for OIDC scopes when mapped attributes are updated - [IDENTITY-5023 <https://wso2.org/jira/browse/IDENTITY-5023>] - Observed a SQL Exception when requesting token mulitiple time with implicit grant - using mssql DB - [IDENTITY-5039 <https://wso2.org/jira/browse/IDENTITY-5039>] - [JIT provision] Issue when provisioning Facebook user to IS' secondary userstore AD - [IDENTITY-5052 <https://wso2.org/jira/browse/IDENTITY-5052>] - [IS520][Cluster]NPE occurred issuing the access token . - [IDENTITY-5055 <https://wso2.org/jira/browse/IDENTITY-5055>] - CLONE - Trying to connect to Disabled user stores at the server startup - [IDENTITY-5068 <https://wso2.org/jira/browse/IDENTITY-5068>] - Footer is not at the right place while resolution is changing in Authentication Endpoint Login page - [IDENTITY-5073 <https://wso2.org/jira/browse/IDENTITY-5073>] - Subject claim could not be found amongst service provider mapped unfiltered local claims - [IDENTITY-5100 <https://wso2.org/jira/browse/IDENTITY-5100>] - Identity Password timestamp is not updated in user profile - [IDENTITY-5104 <https://wso2.org/jira/browse/IDENTITY-5104>] - Tenant domain is appended to the subject claim even when 'Use tenant domain in local subject identifier' is not selected - [IDENTITY-5116 <https://wso2.org/jira/browse/IDENTITY-5116>] - Cannot create user with "-" character - [IDENTITY-5124 <https://wso2.org/jira/browse/IDENTITY-5124>] - Logout issue with Request path authenticator - [IDENTITY-5128 <https://wso2.org/jira/browse/IDENTITY-5128>] - Server Error response when calling the token revocation endpoint with invalid authorization header - [IDENTITY-5129 <https://wso2.org/jira/browse/IDENTITY-5129>] - Exception thrown when updating claims with EncryptionDecryptionPersistenc eProcessor - [IDENTITY-5131 <https://wso2.org/jira/browse/IDENTITY-5131>] - Deadlock during session cleanup task (SAML SSO) - [IDENTITY-5134 <https://wso2.org/jira/browse/IDENTITY-5134>] - Cache invalidation does not happend when PKCE mandatory option is removed from an OAuth App configuration - [IDENTITY-5148 <https://wso2.org/jira/browse/IDENTITY-5148>] - Incorrect error response for token request using authorization code when the authorization code is invalid - [IDENTITY-5157 <https://wso2.org/jira/browse/IDENTITY-5157>] - Get request to identity/register and identity/connect/register endpoints causes NullPointerException - [IDENTITY-5161 <https://wso2.org/jira/browse/IDENTITY-5161>] - Under OIDC - the service provider requested claims should take the priority over the scopes - [IDENTITY-5175 <https://wso2.org/jira/browse/IDENTITY-5175>] - Role claim is not returned when added as a requested claim - [IDENTITY-5189 <https://wso2.org/jira/browse/IDENTITY-5189>] - Deadlock while doing user registration - [IDENTITY-5207 <https://wso2.org/jira/browse/IDENTITY-5207>] - Email template changes done from management console are lost after server restart - [IDENTITY-5217 <https://wso2.org/jira/browse/IDENTITY-5217>] - Regex specified in the error message is not correct when "EnableEmailUserName" is true - [IDENTITY-5231 <https://wso2.org/jira/browse/IDENTITY-5231>] - Functionality worked in IS 5.1 is not working in IS 5.2 - [IDENTITY-5240 <https://wso2.org/jira/browse/IDENTITY-5240>] - Sql exception thrown when authorizing role - [IDENTITY-5278 <https://wso2.org/jira/browse/IDENTITY-5278>] - Logout request is generated for other session participants, although SP is not enabled for SLO - [IDENTITY-5305 <https://wso2.org/jira/browse/IDENTITY-5305>] - Intermitantly getting error when trying to logout from dashboard app - [IDENTITY-5306 <https://wso2.org/jira/browse/IDENTITY-5306>] - Error when session timeout from dashboard app - [IDENTITY-5314 <https://wso2.org/jira/browse/IDENTITY-5314>] - Result set is not properly close in user core - [IDENTITY-5334 <https://wso2.org/jira/browse/IDENTITY-5334>] - Warning messages for unfilled fields are incorrect in email template edit - [IDENTITY-5344 <https://wso2.org/jira/browse/IDENTITY-5344>] - Returns refresh tokens for saml bearer grant type - [IDENTITY-5384 <https://wso2.org/jira/browse/IDENTITY-5384>] - Intermittent NPE in OAuth endpoint - [IDENTITY-5463 <https://wso2.org/jira/browse/IDENTITY-5463>] - Can't assign all permissions to a role - [IDENTITY-5464 <https://wso2.org/jira/browse/IDENTITY-5464>] - No Bulk Import Users possible - [IDENTITY-5508 <https://wso2.org/jira/browse/IDENTITY-5508>] - Access Token Partitioning does not work - [IDENTITY-5529 <https://wso2.org/jira/browse/IDENTITY-5529>] - Getting HTTP/1.1 201 every time as a response when run the same curl command in DCR - [IDENTITY-5541 <https://wso2.org/jira/browse/IDENTITY-5541>] - Authenticated IdPs list not returned - [IDENTITY-5547 <https://wso2.org/jira/browse/IDENTITY-5547>] - Cannot login after the account lock timeout is passed - [IDENTITY-5550 <https://wso2.org/jira/browse/IDENTITY-5550>] - Typo in userstore add page - [IDENTITY-5554 <https://wso2.org/jira/browse/IDENTITY-5554>] - User having Login permissions can't change his password neither edit his profile - [IDENTITY-5571 <https://wso2.org/jira/browse/IDENTITY-5571>] - CONFIRM_SIGN_UP entry get created at recovery DB even when account lock on creation disabled - [IDENTITY-5577 <https://wso2.org/jira/browse/IDENTITY-5577>] - "Clear Decision Cache" of XACML PDP is not working - [IDENTITY-5580 <https://wso2.org/jira/browse/IDENTITY-5580>] - Engaging access control policies in authentication flow is broken in Tenants - [IDENTITY-5581 <https://wso2.org/jira/browse/IDENTITY-5581>] - oauth2/authorize call throws a NPE when the session is expired - [IDENTITY-5596 <https://wso2.org/jira/browse/IDENTITY-5596>] - Make oauth direction page 'message and button' editable. - [IDENTITY-5597 <https://wso2.org/jira/browse/IDENTITY-5597>] - SAML federated authenticated has hard coded NameID format for Authn request and LogoutRequest - [IDENTITY-5607 <https://wso2.org/jira/browse/IDENTITY-5607>] - Blank page after clicking on Resident in "Service Providers" in 5.3.0 - [IDENTITY-5636 <https://wso2.org/jira/browse/IDENTITY-5636>] - Provide and endpoint to keep the session live in WSO2 IS side that can be called by Applications. - [IDENTITY-5659 <https://wso2.org/jira/browse/IDENTITY-5659>] - Error in uploading sp metadata file in tenant - [IDENTITY-5660 <https://wso2.org/jira/browse/IDENTITY-5660>] - Certificate added through sp metadata not persisted properly - [IDENTITY-5661 <https://wso2.org/jira/browse/IDENTITY-5661>] - Need a way to sync the certificates uploaded from saml sp metadata file among the cluster nodes - [IDENTITY-5724 <https://wso2.org/jira/browse/IDENTITY-5724>] - IDN_OPENID_USER_RPS table data not getting removed when removing authorized apps from the dashboard. - [IDENTITY-5757 <https://wso2.org/jira/browse/IDENTITY-5757>] - PDP's Decision cache is not working for REST API call with JSON body - [IDENTITY-5783 <https://wso2.org/jira/browse/IDENTITY-5783>] - Oauth2 session doesn't invalidate in (APIM 1.10 & IS 5.1.0) - [IDENTITY-5802 <https://wso2.org/jira/browse/IDENTITY-5802>] - OPT Email uses wrong template for email - [IDENTITY-5803 <https://wso2.org/jira/browse/IDENTITY-5803>] - SCIM cannot be changed using UI in secundary user store - [IDENTITY-5804 <https://wso2.org/jira/browse/IDENTITY-5804>] - Xacml policy change does not get affected. Instead response comes from cache - [IDENTITY-5811 <https://wso2.org/jira/browse/IDENTITY-5811>] - There exist image files which are not available in distribution but refered in the html hence throwing 404 - [IDENTITY-5812 <https://wso2.org/jira/browse/IDENTITY-5812>] - PDP Caches are not sync inside the clustered environment - [IDENTITY-5818 <https://wso2.org/jira/browse/IDENTITY-5818>] - Identity Server is throwing an error when deleting a user which has + sign in the username - [IDENTITY-5822 <https://wso2.org/jira/browse/IDENTITY-5822>] - Unable to share samlssoTokenId cookie with SPs in subdomain - [IDENTITY-5825 <https://wso2.org/jira/browse/IDENTITY-5825>] - When LDAP userstore is used, H2 database is used to store claim mapping - [IDENTITY-5828 <https://wso2.org/jira/browse/IDENTITY-5828>] - Fido authentication does not work in 5.3.0 - [IDENTITY-5830 <https://wso2.org/jira/browse/IDENTITY-5830>] - When same auth code is used twice while OAuth cache is not enabled, Getting a null pointer. - [IDENTITY-5831 <https://wso2.org/jira/browse/IDENTITY-5831>] - reCaptcha on the self-registration page dose not working - [IDENTITY-5848 <https://wso2.org/jira/browse/IDENTITY-5848>] - SAML Inbound Extension Points Broken - [IDENTITY-5856 <https://wso2.org/jira/browse/IDENTITY-5856>] - Add proper error message for org.wso2.carbon.identity.sso.s aml.builders.SignKeyDataHolder - [IDENTITY-5858 <https://wso2.org/jira/browse/IDENTITY-5858>] - Incorrect error logged when UI validation fails for the identity dashboard - [IDENTITY-5867 <https://wso2.org/jira/browse/IDENTITY-5867>] - Stack Overflow message occurs when processing a WS-Security message - [IDENTITY-5870 <https://wso2.org/jira/browse/IDENTITY-5870>] - Handle expired token correctly in UserInfo flow - [IDENTITY-5874 <https://wso2.org/jira/browse/IDENTITY-5874>] - Logins with leading whitespace Identity Server lead to partially successful authentication and assertions missing claims - [IDENTITY-5875 <https://wso2.org/jira/browse/IDENTITY-5875>] - Exceptions being swallowed and not printed when carrying out worklflows - [IDENTITY-5880 <https://wso2.org/jira/browse/IDENTITY-5880>] - Application created using DCR is not properly populated in Mgt Console UI - [IDENTITY-5881 <https://wso2.org/jira/browse/IDENTITY-5881>] - NPE in DefaultClaimHandler#retrieveAllNunNullUserClaimValues if the MultiAttributeSeparate property is not specified in user-mgt.xml - [IDENTITY-5882 <https://wso2.org/jira/browse/IDENTITY-5882>] - Possible NPE error in authentication framework - [IDENTITY-5886 <https://wso2.org/jira/browse/IDENTITY-5886>] - Refresh token requests fails in a multiple node deployments when servers are not time synchronized - [IDENTITY-5888 <https://wso2.org/jira/browse/IDENTITY-5888>] - OpenID connect token spec violation when we try to get JWT Bearer Grant working - [IDENTITY-5900 <https://wso2.org/jira/browse/IDENTITY-5900>] - Tenant registry is not loading with enableing the SaaS - [IDENTITY-5909 <https://wso2.org/jira/browse/IDENTITY-5909>] - OIDC claims parameter does not work in userinfo endpoint - [IDENTITY-5910 <https://wso2.org/jira/browse/IDENTITY-5910>] - When the access token type is set invalid in tokenValidationResponse, the response comes as Server error. - [IDENTITY-5911 <https://wso2.org/jira/browse/IDENTITY-5911>] - If the custom grant type registration has any issues, oauth app registration also fails - [IDENTITY-5925 <https://wso2.org/jira/browse/IDENTITY-5925>] - Default JITUserProvisioningEnabled property in authenticators.xml is incorrect - [IDENTITY-5936 <https://wso2.org/jira/browse/IDENTITY-5936>] - OAuth application allowed grant types are not updating without restarting the server. - [IDENTITY-5939 <https://wso2.org/jira/browse/IDENTITY-5939>] - JWT token generation at OAuth 2 token validation, needs to properly handle federated scenario - [IDENTITY-5947 <https://wso2.org/jira/browse/IDENTITY-5947>] - Password updates via notification email causing exhaustion of database connection pool - [IDENTITY-5950 <https://wso2.org/jira/browse/IDENTITY-5950>] - Identity Management 'RegistryCleanUpTask' loads all tenants when being executed - [IDENTITY-5953 <https://wso2.org/jira/browse/IDENTITY-5953>] - HTML email templates are not working for tenant users - [IDENTITY-5959 <https://wso2.org/jira/browse/IDENTITY-5959>] - Incorrect error message for OAuth Token Request with a non exisitng client_id - [IDENTITY-5962 <https://wso2.org/jira/browse/IDENTITY-5962>] - Incorrect tenant id stored when persisting session data - [IDENTITY-5970 <https://wso2.org/jira/browse/IDENTITY-5970>] - Null Pointer due to fix in IDENTITY-4120 - [IDENTITY-5990 <https://wso2.org/jira/browse/IDENTITY-5990>] - Error when adding Resident Identity Provider entry for super tenant - [IDENTITY-6035 <https://wso2.org/jira/browse/IDENTITY-6035>] - Making <Resource context="(.*)/.well-known(.*)" secured="false" http-method="all"/> doesn't work Task - [IDENTITY-5916 <https://wso2.org/jira/browse/IDENTITY-5916>] - Remove duplicates in Claim configurations - [IDENTITY-6033 <https://wso2.org/jira/browse/IDENTITY-6033>] - Set default timeStampScrew value to 0. Improvement - [IDENTITY-5241 <https://wso2.org/jira/browse/IDENTITY-5241>] - Improve error log in SAML carbon authenticator certificate not found scenario - [IDENTITY-5303 <https://wso2.org/jira/browse/IDENTITY-5303>] - We can't get different type of property on UI when we create custom federated authenticator. - [IDENTITY-5423 <https://wso2.org/jira/browse/IDENTITY-5423>] - OAuth Error code "temporarily_unavailable". - [IDENTITY-5484 <https://wso2.org/jira/browse/IDENTITY-5484>] - Package Name Update - [IDENTITY-5570 <https://wso2.org/jira/browse/IDENTITY-5570>] - Mandatory Claims are not retrieved from user profile when Custom Claim Dialect is used - [IDENTITY-5574 <https://wso2.org/jira/browse/IDENTITY-5574>] - Adding Form-Post support to Playground2 App - [IDENTITY-5575 <https://wso2.org/jira/browse/IDENTITY-5575>] - Wrong extension point config name is given for PostAuthenticationHandler - [IDENTITY-5635 <https://wso2.org/jira/browse/IDENTITY-5635>] - Custom grant handlers won't show up in UI - [IDENTITY-5814 <https://wso2.org/jira/browse/IDENTITY-5814>] - Any audiences to be added in ID token should be added in identity.xml - [IDENTITY-5865 <https://wso2.org/jira/browse/IDENTITY-5865>] - Pass all request parameters sent in Token Request to grant handlers - [IDENTITY-5873 <https://wso2.org/jira/browse/IDENTITY-5873>] - NPE while rendering resident IDP UI when governance connectors are not available - [IDENTITY-5923 <https://wso2.org/jira/browse/IDENTITY-5923>] - Event publishers in IS 5.3.0 in a fresh pack have encrypted passwords Sub-task - [IDENTITY-6044 <https://wso2.org/jira/browse/IDENTITY-6044>] - Fixing possible Null Pointer in scope validator *How To Contribute* Your feedback are most welcome! Mailing Lists Join our mailing list and correspond with the developers directly. - Developer List : dev@wso2.org | Subscribe <dev-requ...@wso2.org> | Mail Archive <http://wso2.org/mailarchive/dev/> - User Forum : StackOverflow <http://stackoverflow.com/questions/tagged/wso2is> Reporting Issues We encourage you to report issues, improvements and feature requests regarding WSO2 IdentityServer through public WSO2 Identity Server Runtime JIRA <https://wso2.org/jira/browse/IDENTITY> and Analytics JIRA <https://wso2.org/jira/browse/ANLYIS> ~ The WSO2 Identity Server Team ~ -- *Pulasthi Mahawithana* Senior Software Engineer WSO2 Inc., http://wso2.com/ Mobile: +94-71-5179022 <+94%2071%20517%209022> Blog: https://medium.com/@pulasthi7/ <https://wso2.com/signature>
_______________________________________________ Dev mailing list Dev@wso2.org http://wso2.org/cgi-bin/mailman/listinfo/dev