The WSO2 Identity and Access Management team is pleased to announce the
release of WSO2 Identity Server 5.4.0 Alpha 9.

You can build the distribution from the source tag https://github.com/wso2/
product-is/releases/tag/v5.4.0-alpha9 following the steps below.


*Building from the source*

   1. Install Java8 or above
   2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#)
   3. Get a clone from https://github.com/wso2/product-is.git and checkout
   to v5.4.0-alpha9 tag or you can directly download the source for the tag
   from https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha9
   4. Run the one of the below maven commands from product-is directory,
      - *mvn** clean install* (To build the binary and source distributions
      with the tests)
      - *mvn** clean install -Dmaven.test.skip=true* (To build the binary
      and source distributions, without running any of the
unit/integration tests)
   5. You can find the wso2is-5.4.0-alpha9.zip binary distribution in
   product-is/modules/distribution/target directory.

Please note that you need to have Java SE Development Kit *1.8 *to run the
binary distribution.

The following list contains all the features, improvements, and bug fixes
available with the WSO2 Identity Server 5.4.0 Alpha 9 release.
Patch

   - [IDENTITY-6488 <https://wso2.org/jira/browse/IDENTITY-6488>] - SAML
   Error when IDP init login, ACS not sent to notification.do

Bug

   - [IDENTITY-3355 <https://wso2.org/jira/browse/IDENTITY-3355>] - Better
   if only warning is shown for siganture varification failures (not the whole
   exception)
   - [IDENTITY-4956 <https://wso2.org/jira/browse/IDENTITY-4956>] -
   Inconsistency in displaying the subject claim when a domain is set
   - [IDENTITY-4995 <https://wso2.org/jira/browse/IDENTITY-4995>] - Cannot
   change the certificate alias for a service provider when there's more than
   one certificate
   - [IDENTITY-5866 <https://wso2.org/jira/browse/IDENTITY-5866>] - KeyId
   hard-coded in DefaultIDTokenBuilder
   - [IDENTITY-5922 <https://wso2.org/jira/browse/IDENTITY-5922>] - When
   invoking OAuth2TokenValidationService, updated user roles are not reflected
   in retrieved claims of the JWT token, till cache timeout or server restart
   - [IDENTITY-5994 <https://wso2.org/jira/browse/IDENTITY-5994>] - NPE
   thrown when testing cause of exception in OAuth2Service.
   issueAccessToken()
   - [IDENTITY-6075 <https://wso2.org/jira/browse/IDENTITY-6075>] -
   Receives the Primary-IS admin user info, when calling userinfo endpoint
   with SAML2 Bearer grant type with SAML federated scenario
   - [IDENTITY-6288 <https://wso2.org/jira/browse/IDENTITY-6288>] - Move
   the common code in id token and userinfo, to util
   - [IDENTITY-6327 <https://wso2.org/jira/browse/IDENTITY-6327>] - List of
   claims returned in IDToken and Userinfo don't get updated when we update
   requested claims configuration
   - [IDENTITY-6331 <https://wso2.org/jira/browse/IDENTITY-6331>] - alg
   header in JWT token is not valid for IS 5.0.0
   - [IDENTITY-6332 <https://wso2.org/jira/browse/IDENTITY-6332>] - The
   “exp” value in the JWT tokens must in RFC7519 compliant format
   - [IDENTITY-6354 <https://wso2.org/jira/browse/IDENTITY-6354>] - Two
   confirmation windows coming when updating the user with all existing roles
   - [IDENTITY-6358 <https://wso2.org/jira/browse/IDENTITY-6358>] - Error
   when adding workflows in tenant mode for external BPS profiles
   - [IDENTITY-6376 <https://wso2.org/jira/browse/IDENTITY-6376>] - SAML2
   Web SSO Configuration (Federated Authenticator) default Signature Algorithm
   is set to DSA with SHA1
   - [IDENTITY-6385 <https://wso2.org/jira/browse/IDENTITY-6385>] -
   Internal Server Error for Client Credential Grant with openid scope OOB
   - [IDENTITY-6386 <https://wso2.org/jira/browse/IDENTITY-6386>] - self
   sign up not working in tenant mode
   - [IDENTITY-6391 <https://wso2.org/jira/browse/IDENTITY-6391>] -
   [Service Provider SAML2 Web SSO configuration] Default Value of Certificate
   Alias should be wso2carbon
   - [IDENTITY-6404 <https://wso2.org/jira/browse/IDENTITY-6404>] - Error
   in SAML2 Bear token grant validation for tenant users when "Use tenant
   domain in local subject identifier" option is unchecked
   - [IDENTITY-6480 <https://wso2.org/jira/browse/IDENTITY-6480>] - Calling
   OAuth2ValidationService with a valid token when
   AuthorizationContextTokenGeneration is enabled throws a back end error
   - [IDENTITY-6496 <https://wso2.org/jira/browse/IDENTITY-6496>] - A
   white-space in-between Authorization: Basic and
<Base64Encoded(Client_Id:Client_Secret)>
   leads to a Nullpointer when generating access token using refresh token
   - [IDENTITY-6505 <https://wso2.org/jira/browse/IDENTITY-6505>] -
   Invoking user-info endpoint using playground sample fails when using email
   as the user name
   - [IDENTITY-6558 <https://wso2.org/jira/browse/IDENTITY-6558>] -
   SAML2.IsPassiveAuthn=true is not available in travelocity.properties
   - [IDENTITY-6581 <https://wso2.org/jira/browse/IDENTITY-6581>] - Error
   with SAML Extension Grant Type
   - [IDENTITY-6703 <https://wso2.org/jira/browse/IDENTITY-6703>] - Bad
   Grammar in the exception: "SAML Assertion not found in the Response"
   - [IDENTITY-6736 <https://wso2.org/jira/browse/IDENTITY-6736>] - All the
   query params in "Additional Query Parameters" of federated oauth/openid
   connect IDP config is not visible in management console
   - [IDENTITY-6797 <https://wso2.org/jira/browse/IDENTITY-6797>] - Stack
   trace of exception displayed in web browser in case of empty SAMLRequest
   - [IDENTITY-6805 <https://wso2.org/jira/browse/IDENTITY-6805>] - NPE
   possibility in NTLMAuthenticationGrantHandler
   - [IDENTITY-6895 <https://wso2.org/jira/browse/IDENTITY-6895>] - Claims
   not returned properly after SP requested claims updated
   - [IDENTITY-6896 <https://wso2.org/jira/browse/IDENTITY-6896>] - Oauth2
   Revoke endpoint does not validate repeated parameters
   - [IDENTITY-6897 <https://wso2.org/jira/browse/IDENTITY-6897>] - Claim
   filtering not handled in UserInfoJWTResponseBuilder
   - [IDENTITY-6898 <https://wso2.org/jira/browse/IDENTITY-6898>] - Revoke
   endpoint sends an Unauthorized response when Invalid Authorization header
   exists, but the token is empty.
   - [IDENTITY-6901 <https://wso2.org/jira/browse/IDENTITY-6901>] -
   Validate subjectConfirmationData time limits to fall within the time window
   given in the Conditions in the saml assertion
   - [IDENTITY-6909 <https://wso2.org/jira/browse/IDENTITY-6909>] - HTML
   tags should be closed properly

Improvement

   - [IDENTITY-2530 <https://wso2.org/jira/browse/IDENTITY-2530>] - Make
   refresh tokens optional for SAML2 Bearer grant type
   - [IDENTITY-4980 <https://wso2.org/jira/browse/IDENTITY-4980>] -
   Exception during access token generation right after expiration
   - [IDENTITY-5483 <https://wso2.org/jira/browse/IDENTITY-5483>] -
   Validate user against given user store and save correct user domain in
   saml2-bearer grant type.
   - [IDENTITY-5975 <https://wso2.org/jira/browse/IDENTITY-5975>] - Need to
   handle errors in oAuth Endpoints
   - [IDENTITY-6224 <https://wso2.org/jira/browse/IDENTITY-6224>] - Improve
   logs in controlClaimsFromScope() of SAMLAssertionClaimsCallback class
   - [IDENTITY-6900 <https://wso2.org/jira/browse/IDENTITY-6900>] - Make
   subject claim consistent across all grant types



*Contribute to WSO2 Identity Server*

*Mailing Lists*

Join our mailing lists and correspond with the developers directly. We also
encourage you to take part in discussions related to the product in the
architecture mailing list. If you have any questions regarding the product
you can use our StackOverflow forum to raise them as well.

   - Developer List: d...@wso2.org
   - Architecture List: architecture@wso2.org
   - User Forum: StackOverflow
   <http://stackoverflow.com/questions/tagged/wso2is>

Reporting Issues
We encourage you to report issues, improvements, and feature requests
regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA
<https://wso2.org/jira/projects/IDENTITY/issues>.

~ The WSO2 Identity and Access Management Team ~



Thanks,
Farasath Ahamed
Software Engineer, WSO2 Inc.; http://wso2.com
Mobile: +94777603866
Blog: blog.farazath.com
Twitter: @farazath619 <https://twitter.com/farazath619>
<http://wso2.com/signature>
_______________________________________________
Architecture mailing list
Architecture@wso2.org
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to