I think we will have to write the logic based on whether BPS bundles or
activated or not. We can't check for specific profile names, because
profiles can be created and renamed also. So we have to decide in runtime
if the BPS bundles are activated and show or not show the embedded BPS
profile.

On Wed, Sep 16, 2015 at 12:15 AM, Prabath Siriwardena <prab...@wso2.com>
wrote:

> FYI.
>
> After talking to Johann - I started the IS with -Dprofile=full - and then
> it works.
>
> Please do not give the embedded_bps option - when we do not do that...
>
> Thanks & regards,
> -Prabath
>
> On Tue, Sep 15, 2015 at 11:20 AM, Prabath Siriwardena <prab...@wso2.com>
> wrote:
>
>> I was trying to test workflow with this pack.. But result in the
>> following error when trying to create a workflow..
>>
>> Manage --> Add Workflows --> Add Approval Step --> embedded bps --> Finish
>>
>> Error:
>>
>>
>> TID: [-1234] [] [2015-09-15 11:16:30,390] ERROR
>> {org.apache.tiles.jsp.taglib.RenderTagSupport} -  Error during rendering
>> javax.servlet.jsp.JspException: IO Error executing tag: JSPException
>> while including path '/workflow-mgt/user-mgt.jsp'. ServletException while
>> including page.
>> at
>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:84)
>> at
>> org.apache.tiles.jsp.taglib.ContainerTagSupport.doEndTag(ContainerTagSupport.java:80)
>> at
>> org.apache.jsp.admin.layout.template_jsp._jspx_meth_tiles_005finsertAttribute_005f7(template_jsp.java:640)
>> at
>> org.apache.jsp.admin.layout.template_jsp._jspService(template_jsp.java:356)
>> at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at
>> org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:432)
>> at
>> org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395)
>> at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155)
>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at
>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
>> at
>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
>> at
>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
>> at
>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at
>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>> at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>> at
>> org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:748)
>> at
>> org.apache.catalina.core.ApplicationDispatcher.processRequest(ApplicationDispatcher.java:486)
>> at
>> org.apache.catalina.core.ApplicationDispatcher.doForward(ApplicationDispatcher.java:411)
>> at
>> org.apache.catalina.core.ApplicationDispatcher.forward(ApplicationDispatcher.java:338)
>> at
>> org.eclipse.equinox.http.servlet.internal.RequestDispatcherAdaptor.forward(RequestDispatcherAdaptor.java:30)
>> at
>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor$RequestDispatcherAdaptor.forward(ContextPathServletAdaptor.java:362)
>> at
>> org.apache.tiles.servlet.context.ServletTilesRequestContext.forward(ServletTilesRequestContext.java:198)
>> at
>> org.apache.tiles.servlet.context.ServletTilesRequestContext.dispatch(ServletTilesRequestContext.java:185)
>> at
>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:419)
>> at
>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:370)
>> at org.wso2.carbon.ui.action.ActionHelper.render(ActionHelper.java:52)
>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:101)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at
>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
>> at
>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
>> at
>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
>> at
>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>> at
>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>> at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>> at
>> org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:61)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>> at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>> at
>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220)
>> at
>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122)
>> at
>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504)
>> at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170)
>> at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
>> at
>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
>> at
>> org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
>> at
>> org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
>> at
>> org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
>> at
>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
>> at
>> org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
>> at
>> org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:950)
>> at
>> org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
>> at
>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
>> at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:421)
>> at
>> org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1074)
>> at
>> org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:611)
>> at
>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1739)
>> at
>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1698)
>> at
>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
>> at
>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
>> at
>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
>> at java.lang.Thread.run(Thread.java:745)
>> Caused by: java.io.IOException: JSPException while including path
>> '/workflow-mgt/user-mgt.jsp'. ServletException while including page.
>> at
>> org.apache.tiles.jsp.context.JspTilesRequestContext.include(JspTilesRequestContext.java:91)
>> at
>> org.apache.tiles.jsp.context.JspTilesRequestContext.dispatch(JspTilesRequestContext.java:82)
>> at
>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:465)
>> at
>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:140)
>> at
>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:117)
>> at
>> org.apache.tiles.jsp.taglib.RenderTagSupport.execute(RenderTagSupport.java:171)
>> at
>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:75)
>>
>> On Mon, Sep 14, 2015 at 9:28 AM, Hasintha Indrajee <hasin...@wso2.com>
>> wrote:
>>
>>> WSO2 Identity Server 5.1.0 Alpha Released !!
>>> Date: 14th September 2015The WSO2 Identity Server team is pleased to
>>> announce the release of WSO2 Identity Server 5.1.0 Alpha. You can
>>> download this distribution from 
>>> *https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha
>>> <https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha>*
>>>
>>> Following list [1] contains all bug fixes and improvements available
>>> with alpha release. We encourage you to report issues, improvements and
>>> feature requests regarding WSO2 Identity Server through the public WSO2
>>> Identity Server JIRA <https://wso2.org/jira/browse/IDENTITY>
>>>
>>> ~ The WSO2 Identity Server Team ~
>>>
>>> [1] Release Notes - WSO2 Identity Server - Version 5.1.0-Alpha
>>>
>>> Bug
>>>
>>>    - [IDENTITY-836 <https://wso2.org/jira/browse/IDENTITY-836>] - The
>>>    pagination on the google chrome shows a box around the paginations 
>>> numbers
>>>    and next previous/ first last words
>>>    - [IDENTITY-1163 <https://wso2.org/jira/browse/IDENTITY-1163>] -
>>>    Disable use of a generated OAuth token by a user,when that user locked
>>>    [removed from users-store] from current users-base.
>>>    - [IDENTITY-1217 <https://wso2.org/jira/browse/IDENTITY-1217>] -
>>>    Passwords in Ldap are stored in plain text
>>>    - [IDENTITY-1830 <https://wso2.org/jira/browse/IDENTITY-1830>] -
>>>    When a tenant is created in one node of the IS cluster; at the first
>>>    attempt of login; if the request is redirected to the other node of the
>>>    cluster; login will be failed
>>>    - [IDENTITY-2512 <https://wso2.org/jira/browse/IDENTITY-2512>] -
>>>    [Cluster setup] [Tenant mode] SAML2 SSO login fails in one node
>>>    - [IDENTITY-2525 <https://wso2.org/jira/browse/IDENTITY-2525>] -
>>>    [Cluster] [Tenant mode] Error observed in SAML -> SAML federated scenario
>>>    - [IDENTITY-2553 <https://wso2.org/jira/browse/IDENTITY-2553>] -
>>>    "ForceAuthn" parameter in SAML SSO request must be passed to federated
>>>    SAML2 SSO authenticators by default
>>>    - [IDENTITY-2585 <https://wso2.org/jira/browse/IDENTITY-2585>] -
>>>    AuthnContextClassRef is hardcoded.
>>>    - [IDENTITY-2602 <https://wso2.org/jira/browse/IDENTITY-2602>] - IDP
>>>    are not loading in tenant mode under home realm discovery mode in
>>>    Application authentication
>>>    - [IDENTITY-2675 <https://wso2.org/jira/browse/IDENTITY-2675>] -
>>>    NullPointerException thrown when trying to access an already 
>>> authenticated
>>>    session at IdP
>>>    - [IDENTITY-2754 <https://wso2.org/jira/browse/IDENTITY-2754>] -
>>>    SCIM filtering Eq not adhering to the SCIM 1.1 specification
>>>    - [IDENTITY-2781 <https://wso2.org/jira/browse/IDENTITY-2781>] -
>>>    updateRolesOfUser(String userName, String[] newUserList) in UserAdmin
>>>    service does not working
>>>    - [IDENTITY-2796 <https://wso2.org/jira/browse/IDENTITY-2796>] -
>>>    Support for HTTP-POST binding for SAML2 SSO federated authenticator
>>>    - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] -
>>>    Receive fault response from RemoteClaimManagerService
>>>    - [IDENTITY-2904 <https://wso2.org/jira/browse/IDENTITY-2904>] -
>>>    exception when searching for an internal user role
>>>    - [IDENTITY-2983 <https://wso2.org/jira/browse/IDENTITY-2983>] -
>>>    Define Custom SSL context SSO Agent client library.
>>>    - [IDENTITY-3102 <https://wso2.org/jira/browse/IDENTITY-3102>] -
>>>    Creating a identity provider with malformed certificate cause to 
>>> disappear
>>>    the IdP's edit view and certificate file content validation needed when
>>>    adding IdP certificate
>>>    - [IDENTITY-3152 <https://wso2.org/jira/browse/IDENTITY-3152>] -
>>>    User name case sensitivity issue with Oracle as user store.
>>>    - [IDENTITY-3195 <https://wso2.org/jira/browse/IDENTITY-3195>] - Add
>>>    Identity Provider page of the carbon console doesn't validate "Identity
>>>    Provider Public Certificate" uploaded by the user.
>>>    - [IDENTITY-3230 <https://wso2.org/jira/browse/IDENTITY-3230>] -
>>>    After setting a user store from Inbound Provisioning SCIM, for creating
>>>    groups and listing users SCIM uses PRIMARY user store.
>>>    - [IDENTITY-3236 <https://wso2.org/jira/browse/IDENTITY-3236>] -
>>>    There is no UI Entry to add DisplayNameAttribute value when creating a
>>>    Secondary user stores
>>>    - [IDENTITY-3254 <https://wso2.org/jira/browse/IDENTITY-3254>] -
>>>    Error when evaluate XAML request via Tryit tool
>>>    - [IDENTITY-3301 <https://wso2.org/jira/browse/IDENTITY-3301>] -
>>>    Users in different tenants can log in to non-saas apps when
>>>    response/assertion signing disabled
>>>    - [IDENTITY-3316 <https://wso2.org/jira/browse/IDENTITY-3316>] -
>>>    OAuth clientid, client secret encryption does not work
>>>    - [IDENTITY-3354 <https://wso2.org/jira/browse/IDENTITY-3354>] -
>>>    SAML to OAuth Grant not working for Tenant (Travelocity)
>>>    - [IDENTITY-3359 <https://wso2.org/jira/browse/IDENTITY-3359>] -
>>>    When trying creating a role with existing name all the permissions get
>>>    removed from the existing role
>>>    - [IDENTITY-3370 <https://wso2.org/jira/browse/IDENTITY-3370>] - SSO
>>>    with IWA broken after the security patch
>>>    - [IDENTITY-3416 <https://wso2.org/jira/browse/IDENTITY-3416>] -
>>>    Tenant Creation failed When pointing to ActiveDirectory
>>>    - [IDENTITY-3424 <https://wso2.org/jira/browse/IDENTITY-3424>] -
>>>    Hazelcast NPE observed in a IS node when starting servers
>>>    - [IDENTITY-3425 <https://wso2.org/jira/browse/IDENTITY-3425>] -
>>>    Session time out not handle properly for "Home > Configure > Users and
>>>    Roles > Roles" page
>>>    - [IDENTITY-3438 <https://wso2.org/jira/browse/IDENTITY-3438>] -
>>>    When role name contains block letters permissions are not get assigned to
>>>    the role
>>>    - [IDENTITY-3458 <https://wso2.org/jira/browse/IDENTITY-3458>] -
>>>    Passive STS does not work with PassiveSTSSampleApp
>>>    - [IDENTITY-3460 <https://wso2.org/jira/browse/IDENTITY-3460>] -
>>>    Warning at startup ; WARN - DefaultSchemaGenerator We don't support 
>>> method
>>>    overloading. Ignoring [validateAudienceRestriction]
>>>    - [IDENTITY-3465 <https://wso2.org/jira/browse/IDENTITY-3465>] -
>>>    java.lang.NullPointerException returned when accessing an axis2 service
>>>    with invalid security from one of the nodes
>>>    - [IDENTITY-3484 <https://wso2.org/jira/browse/IDENTITY-3484>] - A
>>>    user is provisioned twice when using the SCIM outbound connector at a 
>>> fresh
>>>    start of the server
>>>    - [IDENTITY-3514 <https://wso2.org/jira/browse/IDENTITY-3514>] -
>>>    org.wso2.carbon.identity.mgt component should not export the internal
>>>    package
>>>    - [IDENTITY-3530 <https://wso2.org/jira/browse/IDENTITY-3530>] -
>>>    When try to change the password without providing current password
>>>    exception get print in the console
>>>    - [IDENTITY-3531 <https://wso2.org/jira/browse/IDENTITY-3531>] - NPE
>>>    on login after a session time out
>>>    - [IDENTITY-3533 <https://wso2.org/jira/browse/IDENTITY-3533>] -
>>>    "unlockUserAccount email notifications" is not working for users in the
>>>    secondary user store
>>>    - [IDENTITY-3543 <https://wso2.org/jira/browse/IDENTITY-3543>] -
>>>    Licensing issue in org.wso2.carbon.user.mgt.feature-4.5.5 when installing
>>>    CEP 4.0.0 features to the kernel-4.4.1
>>>
>>> Improvement
>>>
>>>    - [IDENTITY-979 <https://wso2.org/jira/browse/IDENTITY-979>] - Need
>>>    to sort claim URIs alphabetically in all pages
>>>    - [IDENTITY-2007 <https://wso2.org/jira/browse/IDENTITY-2007>] -
>>>    Service Provider based login page customization in SAML SSO
>>>    - [IDENTITY-2858 <https://wso2.org/jira/browse/IDENTITY-2858>] -
>>>    Configurable SAML2 SSO Elements
>>>    - [IDENTITY-3129 <https://wso2.org/jira/browse/IDENTITY-3129>] -
>>>    PasswordTimeStamp claim does not updated on every method which allow 
>>> change
>>>    password
>>>    - [IDENTITY-3163 <https://wso2.org/jira/browse/IDENTITY-3163>] -
>>>    Create an index on IDN_OAUTH2_ACCESS_TOKEN table TIME_CREATED
>>>    - [IDENTITY-3227 <https://wso2.org/jira/browse/IDENTITY-3227>] - two
>>>    request of logout generate an internal error
>>>    - [IDENTITY-3464 <https://wso2.org/jira/browse/IDENTITY-3464>] -
>>>    XACML based axis2 handler to authorize web service requests.
>>>    - [IDENTITY-3476 <https://wso2.org/jira/browse/IDENTITY-3476>] - Add
>>>    an auto increment ID in IDN_OAUTH_CONSUMER_APPS and use it as the foreign
>>>    key from other necessary tables rather than using the CONSUMER_KEY
>>>    - [IDENTITY-3493 <https://wso2.org/jira/browse/IDENTITY-3493>] -
>>>    UserStoreActionListener come up with work flaw support should be the 
>>> first
>>>    UserOperationEventListener
>>>    - [IDENTITY-3496 <https://wso2.org/jira/browse/IDENTITY-3496>] - Add
>>>    additional configurations to sso-idp-config.xml file
>>>
>>> New Feature
>>>
>>>    - [IDENTITY-3472 <https://wso2.org/jira/browse/IDENTITY-3472>] -
>>>    Workflow Support for IS
>>>
>>> Patch
>>>
>>>    - [IDENTITY-2913 <https://wso2.org/jira/browse/IDENTITY-2913>] -
>>>    OpenID prompt=none is not working
>>>    - [IDENTITY-3209 <https://wso2.org/jira/browse/IDENTITY-3209>] -
>>>    Getting errors while loading service providers for LDAP users
>>>    - [IDENTITY-3311 <https://wso2.org/jira/browse/IDENTITY-3311>] -
>>>    Control Case Sensitivity of Username in each User Store with a Property
>>>    - [IDENTITY-3422 <https://wso2.org/jira/browse/IDENTITY-3422>] -
>>>    Single Logout with Shibboleth as IDP not working
>>>    - [IDENTITY-3423 <https://wso2.org/jira/browse/IDENTITY-3423>] -
>>>    Dead Lock encountered when deleting a hybrid role
>>>    - [IDENTITY-3480 <https://wso2.org/jira/browse/IDENTITY-3480>] -
>>>    IdentityUserMgtListener performs unnecessary registry calls on user 
>>> deletion
>>>    - [IDENTITY-3488 <https://wso2.org/jira/browse/IDENTITY-3488>] -
>>>    Roles are not assigned when JIT Provisioning in Custom Federated
>>>    Authenticator scenario for secondary user stores
>>>    - [IDENTITY-3510 <https://wso2.org/jira/browse/IDENTITY-3510>] -
>>>    SAML2 SSO/SLO Requests must be able to be signed by Super Tenant or 
>>> Tenant
>>>    if its a Shared IDP
>>>    - [IDENTITY-3511 <https://wso2.org/jira/browse/IDENTITY-3511>] -
>>>    Dead-Lock occurred at cluster startup
>>>    - [IDENTITY-3550 <https://wso2.org/jira/browse/IDENTITY-3550>] -
>>>    WSO2 IS 4.6.0 intermittent failure of user self registration "lock on
>>>    create" feature
>>>    - [IDENTITY-3554 <https://wso2.org/jira/browse/IDENTITY-3554>] -
>>>    User passwords cannot contain colon (:) when using request path
>>>    authentication with basicauth
>>>    - [IDENTITY-3563 <https://wso2.org/jira/browse/IDENTITY-3563>] -
>>>    Aggregate existing patches for IS 5.0.0
>>>
>>> Task
>>>
>>>    - [IDENTITY-2178 <https://wso2.org/jira/browse/IDENTITY-2178>] -
>>>    Waffle 1.6 library in GIT needs to be released as an orbit bundle
>>>    - [IDENTITY-2652 <https://wso2.org/jira/browse/IDENTITY-2652>] -
>>>    TODO list for CARBON-14744
>>>    - [IDENTITY-2741 <https://wso2.org/jira/browse/IDENTITY-2741>] -
>>>    Remove servlets from authenticationendpoint.war
>>>    - [IDENTITY-2792 <https://wso2.org/jira/browse/IDENTITY-2792>] -
>>>    Upgrade Jaggery version in IS
>>>    - [IDENTITY-2930 <https://wso2.org/jira/browse/IDENTITY-2930>] -
>>>    Create a separate feature to pack common configurations and dbscripts for
>>>    applications concept in IS
>>>    - [IDENTITY-3495 <https://wso2.org/jira/browse/IDENTITY-3495>] -
>>>    Remove provisioning handler implementation from scim.common component
>>>    - [IDENTITY-3513 <https://wso2.org/jira/browse/IDENTITY-3513>] -
>>>    Documentation related changes for
>>>    https://github.com/wso2/carbon-identity/pull/757
>>>
>>> Sub-task
>>>
>>>    - [IDENTITY-2686 <https://wso2.org/jira/browse/IDENTITY-2686>] -
>>>    Need to write a DB based Security Policy Deployer for STS
>>>    - [IDENTITY-3166 <https://wso2.org/jira/browse/IDENTITY-3166>] - XSS
>>>    and CSRF prevention
>>>    - [IDENTITY-3367 <https://wso2.org/jira/browse/IDENTITY-3367>] -
>>>    Create IS dashboard gadget for workflow feature
>>>    - [IDENTITY-3492 <https://wso2.org/jira/browse/IDENTITY-3492>] -
>>>    Provide support get workflow requests initiated by a user at workflow 
>>> core
>>>    level
>>>    - [IDENTITY-3500 <https://wso2.org/jira/browse/IDENTITY-3500>] -
>>>    Workflow feature should handle conflicts occur when two operations which
>>>    depend on each other are on workflows simultanously
>>>    - [IDENTITY-3501 <https://wso2.org/jira/browse/IDENTITY-3501>] - UI
>>>    in Management Console to Check Workflow Status
>>>    - [IDENTITY-3502 <https://wso2.org/jira/browse/IDENTITY-3502>] -
>>>    Encrypt passwords stored within workflow component
>>>    - [IDENTITY-3506 <https://wso2.org/jira/browse/IDENTITY-3506>] -
>>>    Listing Workflow Pending Entities in the Management Console
>>>    - [IDENTITY-3518 <https://wso2.org/jira/browse/IDENTITY-3518>] -
>>>    Extend workflows to support multiple workflows for single operation
>>>    - [IDENTITY-3521 <https://wso2.org/jira/browse/IDENTITY-3521>] - P2
>>>    Profile for workflow features
>>>    - [IDENTITY-3522 <https://wso2.org/jira/browse/IDENTITY-3522>] -
>>>    Multiple Steps Support for Approval
>>>    - [IDENTITY-3523 <https://wso2.org/jira/browse/IDENTITY-3523>] -
>>>    Generic User/Role Search Page to add approval list
>>>    - [IDENTITY-3544 <https://wso2.org/jira/browse/IDENTITY-3544>] -
>>>    [Migration] Migration from IS 5.0.0 SP01 to IS 5.1.0
>>>    - [IDENTITY-3558 <https://wso2.org/jira/browse/IDENTITY-3558>] -
>>>    Ability to enable/disable workflow triggering globally
>>>
>>>
>>> --
>>> Hasintha Indrajee
>>> Software Engineer
>>> WSO2, Inc.
>>> Mobile:+94 771892453
>>>
>>>
>>> _______________________________________________
>>> Dev mailing list
>>> Dev@wso2.org
>>> http://wso2.org/cgi-bin/mailman/listinfo/dev
>>>
>>>
>>
>>
>> --
>> Thanks & Regards,
>> Prabath
>>
>> Twitter : @prabath
>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena
>>
>> Mobile : +1 650 625 7950
>>
>> http://blog.facilelogin.com
>> http://blog.api-security.org
>>
>
>
>
> --
> Thanks & Regards,
> Prabath
>
> Twitter : @prabath
> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena
>
> Mobile : +1 650 625 7950
>
> http://blog.facilelogin.com
> http://blog.api-security.org
>



-- 
Thanks & Regards,

*Johann Dilantha Nallathamby*
Technical Lead & Product Lead of WSO2 Identity Server
Governance Technologies Team
WSO2, Inc.
lean.enterprise.middleware

Mobile - *+94777776950*
Blog - *http://nallaa.wordpress.com <http://nallaa.wordpress.com>*
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to