[prev in list] [next in list] [prev in thread] [next in thread] 

List:       wsf-c-dev
Subject:    [Dev] WSO2 Identity Server 5.4.0 Alpha3 Released!
From:       Thilina Madumal <thilinamad () wso2 ! com>
Date:       2017-09-22 6:20:49
Message-ID: CACmw6AngktY0rzrj7+29FFzk5xd7iXkLHX7sWbaWET7RQhdS+A () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha3. This distribution can be
downloaded from the following location.

https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3

The following list contains all the features, improvements, and bug fixes
available with the 5.4.0 Alpha3 release.
Patch

   - [IDENTITY-5968 <https://wso2.org/jira/browse/IDENTITY-5968>] - Old
   email templates are stored in registry even when they are never used
   - [IDENTITY-6136 <https://wso2.org/jira/browse/IDENTITY-6136>] - Results
   are not retrieved for 'http://wso2.org/claims/identity/' claims of
   GetUserList in the RemoteUserStoreManagerService
   - [IDENTITY-6190 <https://wso2.org/jira/browse/IDENTITY-6190>] - Error
   while validating SAML assertion timestamp when IDP is hosted in different
   time zone
   - [IDENTITY-6451 <https://wso2.org/jira/browse/IDENTITY-6451>] - In Saml
   error relay state is not returned to the saml notification jsp. No way to
   return the relay state back to SP in error case

Bug

   - [IDENTITY-4036 <https://wso2.org/jira/browse/IDENTITY-4036>] -
   [Logging] Error in backend when Clicking on Restore Defaults and it display
   message as "Restoring of Global Log4j Configuration is failed" but gets
   restored successfully
   - [IDENTITY-5722 <https://wso2.org/jira/browse/IDENTITY-5722>] - WSO2IS
   does not work for the LDAP users with DN with special characters such as "\"
   - [IDENTITY-5808 <https://wso2.org/jira/browse/IDENTITY-5808>] -
   Performance degradation due to expired Oauth2 authorization codes which
   have ACTIVE status
   - [IDENTITY-6048 <https://wso2.org/jira/browse/IDENTITY-6048>] - User
   list of a role is shown as empty for AD userstore when role has 1500+ users
   - [IDENTITY-6131 <https://wso2.org/jira/browse/IDENTITY-6131>] - IDP
   Resident IDP update button promt message even without doing any changes
   - [IDENTITY-6146 <https://wso2.org/jira/browse/IDENTITY-6146>] -
   ReadOnlyUserStoreManager has DisplayName property set to 'uid'
   - [IDENTITY-6195 <https://wso2.org/jira/browse/IDENTITY-6195>] - OIDC
   address claim is not in the required format
   - [IDENTITY-6216 <https://wso2.org/jira/browse/IDENTITY-6216>] -
   RemoteUserStoreManagerService getUserList for "
   http://wso2.org/claims/username" claim not working for JDBC user store
   manager.
   - [IDENTITY-6217 <https://wso2.org/jira/browse/IDENTITY-6217>] - User
   profile get update to incorrect value, when attribute value has
   intersection with MultiAttributeSeparator
   - [IDENTITY-6257 <https://wso2.org/jira/browse/IDENTITY-6257>] -
   Deploying multiple travelocity applications by renaming the web application
   name
   - [IDENTITY-6277 <https://wso2.org/jira/browse/IDENTITY-6277>] -
   NullPointerException thrown when enabling debug logs in OpenID Connect
   federated authenticator
   - [IDENTITY-6306 <https://wso2.org/jira/browse/IDENTITY-6306>] -
   Identity server not allowed to use role name with @ character
   - [IDENTITY-6307 <https://wso2.org/jira/browse/IDENTITY-6307>] -
   Auth_time is changing to session updated time
   - [IDENTITY-6313 <https://wso2.org/jira/browse/IDENTITY-6313>] - Typo in
   Add User Store
   - [IDENTITY-6346 <https://wso2.org/jira/browse/IDENTITY-6346>] - Account
   lock with failed login attempts not working for old identity listener
   configurations
   - [IDENTITY-6375 <https://wso2.org/jira/browse/IDENTITY-6375>] - cannot
   provision users to seconday userstores with outbound provisioning SCIM
   - [IDENTITY-6377 <https://wso2.org/jira/browse/IDENTITY-6377>] - Errors
   in DB2 scripts
   - [IDENTITY-6379 <https://wso2.org/jira/browse/IDENTITY-6379>] - OAuth
   DCRM send Internal Server Error when tried to retrieve application with
   invalid client id
   - [IDENTITY-6382 <https://wso2.org/jira/browse/IDENTITY-6382>] - Oracle
   sql script error with creating index
   - [IDENTITY-6383 <https://wso2.org/jira/browse/IDENTITY-6383>] - -Dsetup
   is not working for Oracle databases
   - [IDENTITY-6389 <https://wso2.org/jira/browse/IDENTITY-6389>] -
   Recovery with security questions(one by one and all at once)-REST api fails
   for tenant user
   - [IDENTITY-6393 <https://wso2.org/jira/browse/IDENTITY-6393>] -
   Couldn't add roles with admin permission when logged in with primary or
   secondary users
   - [IDENTITY-6402 <https://wso2.org/jira/browse/IDENTITY-6402>] - SCIM
   Create user response's 'location' is invalid
   - [IDENTITY-6409 <https://wso2.org/jira/browse/IDENTITY-6409>] - Can not
   update a SP name
   - [IDENTITY-6444 <https://wso2.org/jira/browse/IDENTITY-6444>] -
   Couldn't update the user profile when using AD(Active directory) as
   primary/secondary user store
   - [IDENTITY-6445 <https://wso2.org/jira/browse/IDENTITY-6445>] - New DCR
   endpoint should update correctly in swagger file
   - [IDENTITY-6447 <https://wso2.org/jira/browse/IDENTITY-6447>] - UI
   capability to configure "UsernameWithEmailJavaScriptRegEx" attribute for
   Secondary User-Stores
   - [IDENTITY-6466 <https://wso2.org/jira/browse/IDENTITY-6466>] - Using
   invalid username as resource throws StringIndexOutOfBoundsException when
   invoking webfinger Endpoint
   - [IDENTITY-6467 <https://wso2.org/jira/browse/IDENTITY-6467>] -
   Identity claims does not support query users with filters like *foo*
   - [IDENTITY-6477 <https://wso2.org/jira/browse/IDENTITY-6477>] -
   ResourceAccessControl config for SCIM 2 endpoints in identity.xml does not
   secure tenant endpoints
   - [IDENTITY-6478 <https://wso2.org/jira/browse/IDENTITY-6478>] - Add
   correct permissions to ResourceAccessControl config for SCIM 2 endpoints in
   identity.xml
   - [IDENTITY-6485 <https://wso2.org/jira/browse/IDENTITY-6485>] - Default
   claim dialects are not populated for tenants when Active Directory is used
   as the primary user store
   - [IDENTITY-6494 <https://wso2.org/jira/browse/IDENTITY-6494>] - Stop
   issuing tokens in client credential grant type with the scope 'openid'
   - [IDENTITY-6495 <https://wso2.org/jira/browse/IDENTITY-6495>] - SAML
   attributes are not returned in the assertion for tenant users when AD user
   store is used
   - [IDENTITY-6497 <https://wso2.org/jira/browse/IDENTITY-6497>] - Issue
   in AskPassword email template
   - [IDENTITY-6499 <https://wso2.org/jira/browse/IDENTITY-6499>] -
   product-is release build size is high
   - [IDENTITY-6500 <https://wso2.org/jira/browse/IDENTITY-6500>] - Claim
   configurations not effective for default user profile
   - [IDENTITY-6501 <https://wso2.org/jira/browse/IDENTITY-6501>] -
   Nullpointer execption when essential claims are not returned.
   - [IDENTITY-6502 <https://wso2.org/jira/browse/IDENTITY-6502>] -
   Travelocity sample app does not show multi-valued user claims properly.

Task

   - [IDENTITY-2091 <https://wso2.org/jira/browse/IDENTITY-2091>] - UI help
   for the "ConnectionName" parameter in Multiple UserStores Configuration UI
   states the connection has to be an admin user of the LDAP which is incorrect
   - [IDENTITY-6483 <https://wso2.org/jira/browse/IDENTITY-6483>] - Add SMS
   OTP configurations OOTB
   - [IDENTITY-6484 <https://wso2.org/jira/browse/IDENTITY-6484>] - Update
   carbon-kernel version to 4.4.18
   - [IDENTITY-6504 <https://wso2.org/jira/browse/IDENTITY-6504>] - Add
   TOTP configurations OOTB

Improvement

   - [IDENTITY-5835 <https://wso2.org/jira/browse/IDENTITY-5835>] - Remove
   the cookie from url query parameter
   - [IDENTITY-5920 <https://wso2.org/jira/browse/IDENTITY-5920>] -
   Increase the version of carbon-commons to 4.5.5 in product IS
   - [IDENTITY-5971 <https://wso2.org/jira/browse/IDENTITY-5971>] - Fix the
   Sonar reported issues for Oauth
   - [IDENTITY-5982 <https://wso2.org/jira/browse/IDENTITY-5982>] - Support
   to Get JWT Token from userinfo endpoint
   - [IDENTITY-6058 <https://wso2.org/jira/browse/IDENTITY-6058>] - Set the
   'CaseInsensitiveUsername' property to false in the JDBC user store manager
   configuration
   - [IDENTITY-6419 <https://wso2.org/jira/browse/IDENTITY-6419>] - Allow
   to use database tuning parameters in secondary user stores
   - [IDENTITY-6446 <https://wso2.org/jira/browse/IDENTITY-6446>] - Create
   common endpoint for oauth2 resources



*How To Contribute*
Your feedback is most welcome!
Mailing Lists
Join our mailing list and correspond with the developers directly.

   - Developer List: dev@wso2.org | Subscribe <dev-request@wso2.org> | Mail
   Archive <http://wso2.org/mailarchive/dev/>
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.


*~ The WSO2 Identity and Access Management Team ~*


-- 
*Thilina Madumal*
*Software Engineer | **WSO2*
Email: thilinamad@wso2.com
Mobile: *+ <+94%2077%20767%201807>94 774553167*
Web:  <http://goog_716986954>http://wso2.com

<http://wso2.com/signature>

[Attachment #5 (text/html)]

<div dir="ltr"><span style="color:rgb(51,51,51)">The WSO2 Identity and Access \
Management team is pleased to announce the  <span \
class="gmail-m_-7668440989836845950gmail-il">release</span></span><span \
style="color:rgb(51,51,51)">  of WSO2 Identity Server  </span><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-m_-3927493916118923628gmail-il" \
style="color:rgb(51,51,51)"><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-il">5.4</span></span><span \
style="color:rgb(51,51,51)">.</span><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-m_-3927493916118923628gmail-il" \
style="color:rgb(51,51,51)"><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-il">0 \
<span class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-4744458923314186368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-il"><span \
class="gmail-m_-7668440989836845950gmail-il">Alpha3</span></span></span></span><span \
style="color:rgb(51,51,51)">. This distribution can be downloaded from the following \
location.</span><div><font color="#333333"><span \
style="font-size:14px"><br></span></font></div><div><font color="#333333"><span \
style="font-size:14px"><a \
href="https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3">https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3</a></span></font></div><div><font \
color="#333333"><br></font></div><div><font color="#333333">The following list \
contains all the features, improvements, and bug fixes available with the 5.4.0 \
Alpha3 release.</font></div><div><h2 style="margin:30px 0px \
0px;padding:0px;line-height:1.5"><font color="#333333" face="Arial, sans-serif" \
size="4"><span style="font-weight:normal">Patch</span></font><br></h2><ul \
style="margin:10px 0px 0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5968" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5968</a>] - Old \
email templates are stored in registry even when they are never used</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6136" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6136</a>] - Results \
are not retrieved for &#39;<a \
href="http://wso2.org/claims/identity/">http://wso2.org/claims/identity/</a>&#39; \
claims of GetUserList in the RemoteUserStoreManagerService</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6190" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6190</a>] - Error \
while validating SAML assertion timestamp when IDP is hosted in different time \
zone</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6451" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6451</a>] - In Saml \
error relay state is not returned to the saml notification jsp. No way to return the \
relay state back to SP in error case</li></ul><h2 style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Bug</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-4036" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-4036</a>] - \
[Logging] Error in backend when Clicking on Restore Defaults and it display message \
as &quot;Restoring of Global Log4j Configuration is failed&quot; but gets restored \
successfully</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-5722" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5722</a>] - WSO2IS \
does not work for the LDAP users with DN with special characters such as \
&quot;\&quot;</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-5808" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5808</a>] - \
Performance degradation due to expired Oauth2 authorization codes which have ACTIVE \
status</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6048" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6048</a>] - User \
list of a role is shown as empty for AD userstore when role has 1500+ \
users</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6131" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6131</a>] - IDP \
Resident IDP update button promt message even without doing any changes</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6146" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6146</a>] - \
ReadOnlyUserStoreManager has DisplayName property set to &#39;uid&#39;</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6195" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6195</a>] - OIDC \
address claim is not in the required format</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6216" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6216</a>] - \
RemoteUserStoreManagerService getUserList for &quot;<a \
href="http://wso2.org/claims/username">http://wso2.org/claims/username</a>&quot; \
claim not working for JDBC user store manager.</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6217" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6217</a>] - User \
profile get update to incorrect value, when attribute value has intersection with \
MultiAttributeSeparator</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6257" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6257</a>] - \
Deploying multiple travelocity applications by renaming the web application \
name</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6277" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6277</a>] - \
NullPointerException thrown when enabling debug logs in OpenID Connect federated \
authenticator</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6306" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6306</a>] - Identity \
server not allowed to use role name with @ character</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6307" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6307</a>] - \
Auth_time is changing to session updated time</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6313" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6313</a>] - Typo in \
Add User Store</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6346" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6346</a>] - Account \
lock with failed login attempts not working for old identity listener \
configurations</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6375" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6375</a>] - cannot \
provision users to seconday userstores with outbound provisioning SCIM</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6377" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6377</a>] - Errors \
in DB2 scripts</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6379" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6379</a>] - OAuth \
DCRM send Internal Server Error when tried to retrieve application with invalid \
client id</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6382" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6382</a>] - Oracle \
sql script error with creating index</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6383" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6383</a>] - -Dsetup \
is not working for Oracle databases</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6389" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6389</a>] - Recovery \
with security questions(one by one and all at once)-REST api fails for tenant \
user</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6393" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6393</a>] - \
Couldn&#39;t add roles with admin permission when logged in with primary or secondary \
users</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6402" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6402</a>] - SCIM \
Create user response&#39;s &#39;location&#39; is invalid</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6409" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6409</a>] - Can not \
update a SP name</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6444" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6444</a>] - \
Couldn&#39;t update the user profile when using AD(Active directory) as \
primary/secondary user store</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6445" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6445</a>] - New DCR \
endpoint should update correctly in swagger file</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6447" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6447</a>] - UI \
capability to configure &quot;UsernameWithEmailJavaScriptRegEx&quot; attribute for \
Secondary User-Stores</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6466" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6466</a>] - Using \
invalid username as resource throws StringIndexOutOfBoundsException when invoking \
webfinger Endpoint</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6467" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6467</a>] - Identity \
claims does not support query users with filters like *foo*</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6477" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6477</a>] - \
ResourceAccessControl config for SCIM 2 endpoints in identity.xml does not secure \
tenant endpoints</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6478" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6478</a>] - Add \
correct permissions to ResourceAccessControl config for SCIM 2 endpoints in \
identity.xml</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6485" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6485</a>] - Default \
claim dialects are not populated for tenants when Active Directory is used as the \
primary user store</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6494" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6494</a>] - Stop \
issuing tokens in client credential grant type with the scope \
&#39;openid&#39;</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6495" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6495</a>] - SAML \
attributes are not returned in the assertion for tenant users when AD user store is \
used</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6497" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6497</a>] - Issue in \
AskPassword email template</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6499" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6499</a>] - \
product-is release build size is high</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6500" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6500</a>] - Claim \
configurations not effective for default user profile</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6501" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6501</a>] - \
Nullpointer execption when essential claims are not returned.</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6502" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6502</a>] - \
Travelocity sample app does not show multi-valued user claims properly.</li></ul><h2 \
style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Task</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-2091" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-2091</a>] - UI help \
for the &quot;ConnectionName&quot; parameter in Multiple UserStores Configuration UI \
states the connection has to be an admin user of the LDAP which is \
incorrect</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6483" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6483</a>] - Add SMS \
OTP configurations OOTB</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6484" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6484</a>] - Update \
carbon-kernel version to 4.4.18</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6504" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6504</a>] - Add TOTP \
configurations OOTB</li></ul><h2 style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Improvement</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5835" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5835</a>] - Remove \
the cookie from url query parameter</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5920" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5920</a>] - Increase \
the version of carbon-commons to 4.5.5 in product IS</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5971" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5971</a>] - Fix the \
Sonar reported issues for Oauth</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5982" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5982</a>] - Support \
to Get JWT Token from userinfo endpoint</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6058" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6058</a>] - Set the \
&#39;CaseInsensitiveUsername&#39; property to false in the JDBC user store manager \
configuration</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6419" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6419</a>] - Allow to \
use database tuning parameters in secondary user stores</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6446" \
</div></div>



_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic