[prev in list] [next in list] [prev in thread] [next in thread]
List: wsf-c-dev
Subject: [Dev] WSO2 Identity Server 5.4.0 Alpha3 Released!
From: Thilina Madumal <thilinamad () wso2 ! com>
Date: 2017-09-22 6:20:49
Message-ID: CACmw6AngktY0rzrj7+29FFzk5xd7iXkLHX7sWbaWET7RQhdS+A () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha3. This distribution can be
downloaded from the following location.
https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3
The following list contains all the features, improvements, and bug fixes
available with the 5.4.0 Alpha3 release.
Patch
- [IDENTITY-5968 <https://wso2.org/jira/browse/IDENTITY-5968>] - Old
email templates are stored in registry even when they are never used
- [IDENTITY-6136 <https://wso2.org/jira/browse/IDENTITY-6136>] - Results
are not retrieved for 'http://wso2.org/claims/identity/' claims of
GetUserList in the RemoteUserStoreManagerService
- [IDENTITY-6190 <https://wso2.org/jira/browse/IDENTITY-6190>] - Error
while validating SAML assertion timestamp when IDP is hosted in different
time zone
- [IDENTITY-6451 <https://wso2.org/jira/browse/IDENTITY-6451>] - In Saml
error relay state is not returned to the saml notification jsp. No way to
return the relay state back to SP in error case
Bug
- [IDENTITY-4036 <https://wso2.org/jira/browse/IDENTITY-4036>] -
[Logging] Error in backend when Clicking on Restore Defaults and it display
message as "Restoring of Global Log4j Configuration is failed" but gets
restored successfully
- [IDENTITY-5722 <https://wso2.org/jira/browse/IDENTITY-5722>] - WSO2IS
does not work for the LDAP users with DN with special characters such as "\"
- [IDENTITY-5808 <https://wso2.org/jira/browse/IDENTITY-5808>] -
Performance degradation due to expired Oauth2 authorization codes which
have ACTIVE status
- [IDENTITY-6048 <https://wso2.org/jira/browse/IDENTITY-6048>] - User
list of a role is shown as empty for AD userstore when role has 1500+ users
- [IDENTITY-6131 <https://wso2.org/jira/browse/IDENTITY-6131>] - IDP
Resident IDP update button promt message even without doing any changes
- [IDENTITY-6146 <https://wso2.org/jira/browse/IDENTITY-6146>] -
ReadOnlyUserStoreManager has DisplayName property set to 'uid'
- [IDENTITY-6195 <https://wso2.org/jira/browse/IDENTITY-6195>] - OIDC
address claim is not in the required format
- [IDENTITY-6216 <https://wso2.org/jira/browse/IDENTITY-6216>] -
RemoteUserStoreManagerService getUserList for "
http://wso2.org/claims/username" claim not working for JDBC user store
manager.
- [IDENTITY-6217 <https://wso2.org/jira/browse/IDENTITY-6217>] - User
profile get update to incorrect value, when attribute value has
intersection with MultiAttributeSeparator
- [IDENTITY-6257 <https://wso2.org/jira/browse/IDENTITY-6257>] -
Deploying multiple travelocity applications by renaming the web application
name
- [IDENTITY-6277 <https://wso2.org/jira/browse/IDENTITY-6277>] -
NullPointerException thrown when enabling debug logs in OpenID Connect
federated authenticator
- [IDENTITY-6306 <https://wso2.org/jira/browse/IDENTITY-6306>] -
Identity server not allowed to use role name with @ character
- [IDENTITY-6307 <https://wso2.org/jira/browse/IDENTITY-6307>] -
Auth_time is changing to session updated time
- [IDENTITY-6313 <https://wso2.org/jira/browse/IDENTITY-6313>] - Typo in
Add User Store
- [IDENTITY-6346 <https://wso2.org/jira/browse/IDENTITY-6346>] - Account
lock with failed login attempts not working for old identity listener
configurations
- [IDENTITY-6375 <https://wso2.org/jira/browse/IDENTITY-6375>] - cannot
provision users to seconday userstores with outbound provisioning SCIM
- [IDENTITY-6377 <https://wso2.org/jira/browse/IDENTITY-6377>] - Errors
in DB2 scripts
- [IDENTITY-6379 <https://wso2.org/jira/browse/IDENTITY-6379>] - OAuth
DCRM send Internal Server Error when tried to retrieve application with
invalid client id
- [IDENTITY-6382 <https://wso2.org/jira/browse/IDENTITY-6382>] - Oracle
sql script error with creating index
- [IDENTITY-6383 <https://wso2.org/jira/browse/IDENTITY-6383>] - -Dsetup
is not working for Oracle databases
- [IDENTITY-6389 <https://wso2.org/jira/browse/IDENTITY-6389>] -
Recovery with security questions(one by one and all at once)-REST api fails
for tenant user
- [IDENTITY-6393 <https://wso2.org/jira/browse/IDENTITY-6393>] -
Couldn't add roles with admin permission when logged in with primary or
secondary users
- [IDENTITY-6402 <https://wso2.org/jira/browse/IDENTITY-6402>] - SCIM
Create user response's 'location' is invalid
- [IDENTITY-6409 <https://wso2.org/jira/browse/IDENTITY-6409>] - Can not
update a SP name
- [IDENTITY-6444 <https://wso2.org/jira/browse/IDENTITY-6444>] -
Couldn't update the user profile when using AD(Active directory) as
primary/secondary user store
- [IDENTITY-6445 <https://wso2.org/jira/browse/IDENTITY-6445>] - New DCR
endpoint should update correctly in swagger file
- [IDENTITY-6447 <https://wso2.org/jira/browse/IDENTITY-6447>] - UI
capability to configure "UsernameWithEmailJavaScriptRegEx" attribute for
Secondary User-Stores
- [IDENTITY-6466 <https://wso2.org/jira/browse/IDENTITY-6466>] - Using
invalid username as resource throws StringIndexOutOfBoundsException when
invoking webfinger Endpoint
- [IDENTITY-6467 <https://wso2.org/jira/browse/IDENTITY-6467>] -
Identity claims does not support query users with filters like *foo*
- [IDENTITY-6477 <https://wso2.org/jira/browse/IDENTITY-6477>] -
ResourceAccessControl config for SCIM 2 endpoints in identity.xml does not
secure tenant endpoints
- [IDENTITY-6478 <https://wso2.org/jira/browse/IDENTITY-6478>] - Add
correct permissions to ResourceAccessControl config for SCIM 2 endpoints in
identity.xml
- [IDENTITY-6485 <https://wso2.org/jira/browse/IDENTITY-6485>] - Default
claim dialects are not populated for tenants when Active Directory is used
as the primary user store
- [IDENTITY-6494 <https://wso2.org/jira/browse/IDENTITY-6494>] - Stop
issuing tokens in client credential grant type with the scope 'openid'
- [IDENTITY-6495 <https://wso2.org/jira/browse/IDENTITY-6495>] - SAML
attributes are not returned in the assertion for tenant users when AD user
store is used
- [IDENTITY-6497 <https://wso2.org/jira/browse/IDENTITY-6497>] - Issue
in AskPassword email template
- [IDENTITY-6499 <https://wso2.org/jira/browse/IDENTITY-6499>] -
product-is release build size is high
- [IDENTITY-6500 <https://wso2.org/jira/browse/IDENTITY-6500>] - Claim
configurations not effective for default user profile
- [IDENTITY-6501 <https://wso2.org/jira/browse/IDENTITY-6501>] -
Nullpointer execption when essential claims are not returned.
- [IDENTITY-6502 <https://wso2.org/jira/browse/IDENTITY-6502>] -
Travelocity sample app does not show multi-valued user claims properly.
Task
- [IDENTITY-2091 <https://wso2.org/jira/browse/IDENTITY-2091>] - UI help
for the "ConnectionName" parameter in Multiple UserStores Configuration UI
states the connection has to be an admin user of the LDAP which is incorrect
- [IDENTITY-6483 <https://wso2.org/jira/browse/IDENTITY-6483>] - Add SMS
OTP configurations OOTB
- [IDENTITY-6484 <https://wso2.org/jira/browse/IDENTITY-6484>] - Update
carbon-kernel version to 4.4.18
- [IDENTITY-6504 <https://wso2.org/jira/browse/IDENTITY-6504>] - Add
TOTP configurations OOTB
Improvement
- [IDENTITY-5835 <https://wso2.org/jira/browse/IDENTITY-5835>] - Remove
the cookie from url query parameter
- [IDENTITY-5920 <https://wso2.org/jira/browse/IDENTITY-5920>] -
Increase the version of carbon-commons to 4.5.5 in product IS
- [IDENTITY-5971 <https://wso2.org/jira/browse/IDENTITY-5971>] - Fix the
Sonar reported issues for Oauth
- [IDENTITY-5982 <https://wso2.org/jira/browse/IDENTITY-5982>] - Support
to Get JWT Token from userinfo endpoint
- [IDENTITY-6058 <https://wso2.org/jira/browse/IDENTITY-6058>] - Set the
'CaseInsensitiveUsername' property to false in the JDBC user store manager
configuration
- [IDENTITY-6419 <https://wso2.org/jira/browse/IDENTITY-6419>] - Allow
to use database tuning parameters in secondary user stores
- [IDENTITY-6446 <https://wso2.org/jira/browse/IDENTITY-6446>] - Create
common endpoint for oauth2 resources
*How To Contribute*
Your feedback is most welcome!
Mailing Lists
Join our mailing list and correspond with the developers directly.
- Developer List: dev@wso2.org | Subscribe <dev-request@wso2.org> | Mail
Archive <http://wso2.org/mailarchive/dev/>
- User Forum: StackOverflow
<http://stackoverflow.com/questions/tagged/wso2is>
Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.
*~ The WSO2 Identity and Access Management Team ~*
--
*Thilina Madumal*
*Software Engineer | **WSO2*
Email: thilinamad@wso2.com
Mobile: *+ <+94%2077%20767%201807>94 774553167*
Web: <http://goog_716986954>http://wso2.com
<http://wso2.com/signature>
[Attachment #5 (text/html)]
<div dir="ltr"><span style="color:rgb(51,51,51)">The WSO2 Identity and Access \
Management team is pleased to announce the <span \
class="gmail-m_-7668440989836845950gmail-il">release</span></span><span \
style="color:rgb(51,51,51)"> of WSO2 Identity Server </span><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-m_-3927493916118923628gmail-il" \
style="color:rgb(51,51,51)"><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-il">5.4</span></span><span \
style="color:rgb(51,51,51)">.</span><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-m_-3927493916118923628gmail-il" \
style="color:rgb(51,51,51)"><span \
class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-474445892331418 \
6368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-m_5634528764577236942gmail-il">0 \
<span class="gmail-m_-7668440989836845950gmail-m_5779255972603698732gmail-m_-4744458923314186368gmail-m_9145761152680358395gmail-m_-6587578767689991654gmail-il"><span \
class="gmail-m_-7668440989836845950gmail-il">Alpha3</span></span></span></span><span \
style="color:rgb(51,51,51)">. This distribution can be downloaded from the following \
location.</span><div><font color="#333333"><span \
style="font-size:14px"><br></span></font></div><div><font color="#333333"><span \
style="font-size:14px"><a \
href="https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3">https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha3</a></span></font></div><div><font \
color="#333333"><br></font></div><div><font color="#333333">The following list \
contains all the features, improvements, and bug fixes available with the 5.4.0 \
Alpha3 release.</font></div><div><h2 style="margin:30px 0px \
0px;padding:0px;line-height:1.5"><font color="#333333" face="Arial, sans-serif" \
size="4"><span style="font-weight:normal">Patch</span></font><br></h2><ul \
style="margin:10px 0px 0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5968" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5968</a>] - Old \
email templates are stored in registry even when they are never used</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6136" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6136</a>] - Results \
are not retrieved for '<a \
href="http://wso2.org/claims/identity/">http://wso2.org/claims/identity/</a>' \
claims of GetUserList in the RemoteUserStoreManagerService</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6190" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6190</a>] - Error \
while validating SAML assertion timestamp when IDP is hosted in different time \
zone</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6451" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6451</a>] - In Saml \
error relay state is not returned to the saml notification jsp. No way to return the \
relay state back to SP in error case</li></ul><h2 style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Bug</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-4036" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-4036</a>] - \
[Logging] Error in backend when Clicking on Restore Defaults and it display message \
as "Restoring of Global Log4j Configuration is failed" but gets restored \
successfully</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-5722" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5722</a>] - WSO2IS \
does not work for the LDAP users with DN with special characters such as \
"\"</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-5808" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5808</a>] - \
Performance degradation due to expired Oauth2 authorization codes which have ACTIVE \
status</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6048" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6048</a>] - User \
list of a role is shown as empty for AD userstore when role has 1500+ \
users</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6131" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6131</a>] - IDP \
Resident IDP update button promt message even without doing any changes</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6146" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6146</a>] - \
ReadOnlyUserStoreManager has DisplayName property set to 'uid'</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6195" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6195</a>] - OIDC \
address claim is not in the required format</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6216" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6216</a>] - \
RemoteUserStoreManagerService getUserList for "<a \
href="http://wso2.org/claims/username">http://wso2.org/claims/username</a>" \
claim not working for JDBC user store manager.</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6217" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6217</a>] - User \
profile get update to incorrect value, when attribute value has intersection with \
MultiAttributeSeparator</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6257" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6257</a>] - \
Deploying multiple travelocity applications by renaming the web application \
name</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6277" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6277</a>] - \
NullPointerException thrown when enabling debug logs in OpenID Connect federated \
authenticator</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6306" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6306</a>] - Identity \
server not allowed to use role name with @ character</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6307" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6307</a>] - \
Auth_time is changing to session updated time</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6313" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6313</a>] - Typo in \
Add User Store</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6346" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6346</a>] - Account \
lock with failed login attempts not working for old identity listener \
configurations</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6375" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6375</a>] - cannot \
provision users to seconday userstores with outbound provisioning SCIM</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6377" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6377</a>] - Errors \
in DB2 scripts</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6379" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6379</a>] - OAuth \
DCRM send Internal Server Error when tried to retrieve application with invalid \
client id</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6382" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6382</a>] - Oracle \
sql script error with creating index</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6383" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6383</a>] - -Dsetup \
is not working for Oracle databases</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6389" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6389</a>] - Recovery \
with security questions(one by one and all at once)-REST api fails for tenant \
user</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6393" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6393</a>] - \
Couldn't add roles with admin permission when logged in with primary or secondary \
users</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6402" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6402</a>] - SCIM \
Create user response's 'location' is invalid</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6409" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6409</a>] - Can not \
update a SP name</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6444" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6444</a>] - \
Couldn't update the user profile when using AD(Active directory) as \
primary/secondary user store</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6445" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6445</a>] - New DCR \
endpoint should update correctly in swagger file</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6447" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6447</a>] - UI \
capability to configure "UsernameWithEmailJavaScriptRegEx" attribute for \
Secondary User-Stores</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6466" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6466</a>] - Using \
invalid username as resource throws StringIndexOutOfBoundsException when invoking \
webfinger Endpoint</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6467" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6467</a>] - Identity \
claims does not support query users with filters like *foo*</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6477" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6477</a>] - \
ResourceAccessControl config for SCIM 2 endpoints in identity.xml does not secure \
tenant endpoints</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6478" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6478</a>] - Add \
correct permissions to ResourceAccessControl config for SCIM 2 endpoints in \
identity.xml</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6485" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6485</a>] - Default \
claim dialects are not populated for tenants when Active Directory is used as the \
primary user store</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6494" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6494</a>] - Stop \
issuing tokens in client credential grant type with the scope \
'openid'</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6495" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6495</a>] - SAML \
attributes are not returned in the assertion for tenant users when AD user store is \
used</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6497" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6497</a>] - Issue in \
AskPassword email template</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6499" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6499</a>] - \
product-is release build size is high</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6500" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6500</a>] - Claim \
configurations not effective for default user profile</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6501" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6501</a>] - \
Nullpointer execption when essential claims are not returned.</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6502" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6502</a>] - \
Travelocity sample app does not show multi-valued user claims properly.</li></ul><h2 \
style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Task</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-2091" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-2091</a>] - UI help \
for the "ConnectionName" parameter in Multiple UserStores Configuration UI \
states the connection has to be an admin user of the LDAP which is \
incorrect</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6483" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6483</a>] - Add SMS \
OTP configurations OOTB</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6484" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6484</a>] - Update \
carbon-kernel version to 4.4.18</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6504" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6504</a>] - Add TOTP \
configurations OOTB</li></ul><h2 style="margin:30px 0px \
0px;padding:0px;color:rgb(51,51,51);font-weight:normal;line-height:1.5;font-family:Arial,sans-serif"><font \
size="4">Improvement</font></h2><ul style="margin:10px 0px \
0px;color:rgb(51,51,51);font-family:Arial,sans-serif"><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5835" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5835</a>] - Remove \
the cookie from url query parameter</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5920" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5920</a>] - Increase \
the version of carbon-commons to 4.5.5 in product IS</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5971" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5971</a>] - Fix the \
Sonar reported issues for Oauth</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-5982" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-5982</a>] - Support \
to Get JWT Token from userinfo endpoint</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6058" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6058</a>] - Set the \
'CaseInsensitiveUsername' property to false in the JDBC user store manager \
configuration</li><li>[<a href="https://wso2.org/jira/browse/IDENTITY-6419" \
style="color:rgb(59,115,175);text-decoration-line:none">IDENTITY-6419</a>] - Allow to \
use database tuning parameters in secondary user stores</li><li>[<a \
href="https://wso2.org/jira/browse/IDENTITY-6446" \
</div></div>
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic