On Tue, Sep 15, 2015 at 8:44 PM, Chamila Wijayarathna <cham...@wso2.com>
wrote:

> Hi Johann/Prabath,
>
> I have already implemented to show embeded_bps profile only when IS
> started with "-Dprofile=full",
> according to above discussion this seems like that is not the proper way
> to handle this.
>

Is this implemented after alpha?


> If so what will be the better way to do this?
>
> Thanks!
>
> On Wed, Sep 16, 2015 at 12:22 AM, Prabath Siriwardena <prab...@wso2.com>
> wrote:
>
>> Tested the basic functionality of the workflows.. it works as expected!
>> Nice work folks :-)
>>
>> Will test further and let you know if there are any issues..
>>
>> Thanks & regards,
>> -Prabath
>>
>> On Tue, Sep 15, 2015 at 11:45 AM, Prabath Siriwardena <prab...@wso2.com>
>> wrote:
>>
>>> FYI.
>>>
>>> After talking to Johann - I started the IS with -Dprofile=full - and
>>> then it works.
>>>
>>> Please do not give the embedded_bps option - when we do not do that...
>>>
>>> Thanks & regards,
>>> -Prabath
>>>
>>> On Tue, Sep 15, 2015 at 11:20 AM, Prabath Siriwardena <prab...@wso2.com>
>>> wrote:
>>>
>>>> I was trying to test workflow with this pack.. But result in the
>>>> following error when trying to create a workflow..
>>>>
>>>> Manage --> Add Workflows --> Add Approval Step --> embedded bps -->
>>>> Finish
>>>>
>>>> Error:
>>>>
>>>>
>>>> TID: [-1234] [] [2015-09-15 11:16:30,390] ERROR
>>>> {org.apache.tiles.jsp.taglib.RenderTagSupport} -  Error during rendering
>>>> javax.servlet.jsp.JspException: IO Error executing tag: JSPException
>>>> while including path '/workflow-mgt/user-mgt.jsp'. ServletException while
>>>> including page.
>>>> at
>>>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:84)
>>>> at
>>>> org.apache.tiles.jsp.taglib.ContainerTagSupport.doEndTag(ContainerTagSupport.java:80)
>>>> at
>>>> org.apache.jsp.admin.layout.template_jsp._jspx_meth_tiles_005finsertAttribute_005f7(template_jsp.java:640)
>>>> at
>>>> org.apache.jsp.admin.layout.template_jsp._jspService(template_jsp.java:356)
>>>> at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at
>>>> org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:432)
>>>> at
>>>> org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395)
>>>> at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155)
>>>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at
>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>> at
>>>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>> at
>>>> org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:748)
>>>> at
>>>> org.apache.catalina.core.ApplicationDispatcher.processRequest(ApplicationDispatcher.java:486)
>>>> at
>>>> org.apache.catalina.core.ApplicationDispatcher.doForward(ApplicationDispatcher.java:411)
>>>> at
>>>> org.apache.catalina.core.ApplicationDispatcher.forward(ApplicationDispatcher.java:338)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.RequestDispatcherAdaptor.forward(RequestDispatcherAdaptor.java:30)
>>>> at
>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor$RequestDispatcherAdaptor.forward(ContextPathServletAdaptor.java:362)
>>>> at
>>>> org.apache.tiles.servlet.context.ServletTilesRequestContext.forward(ServletTilesRequestContext.java:198)
>>>> at
>>>> org.apache.tiles.servlet.context.ServletTilesRequestContext.dispatch(ServletTilesRequestContext.java:185)
>>>> at
>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:419)
>>>> at
>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:370)
>>>> at org.wso2.carbon.ui.action.ActionHelper.render(ActionHelper.java:52)
>>>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:101)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at
>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
>>>> at
>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>> at
>>>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:61)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>>>> at
>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>> at
>>>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220)
>>>> at
>>>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122)
>>>> at
>>>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504)
>>>> at
>>>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170)
>>>> at
>>>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
>>>> at
>>>> org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
>>>> at
>>>> org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:950)
>>>> at
>>>> org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
>>>> at
>>>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
>>>> at
>>>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:421)
>>>> at
>>>> org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1074)
>>>> at
>>>> org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:611)
>>>> at
>>>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1739)
>>>> at
>>>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1698)
>>>> at
>>>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
>>>> at
>>>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
>>>> at
>>>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
>>>> at java.lang.Thread.run(Thread.java:745)
>>>> Caused by: java.io.IOException: JSPException while including path
>>>> '/workflow-mgt/user-mgt.jsp'. ServletException while including page.
>>>> at
>>>> org.apache.tiles.jsp.context.JspTilesRequestContext.include(JspTilesRequestContext.java:91)
>>>> at
>>>> org.apache.tiles.jsp.context.JspTilesRequestContext.dispatch(JspTilesRequestContext.java:82)
>>>> at
>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:465)
>>>> at
>>>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:140)
>>>> at
>>>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:117)
>>>> at
>>>> org.apache.tiles.jsp.taglib.RenderTagSupport.execute(RenderTagSupport.java:171)
>>>> at
>>>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:75)
>>>>
>>>> On Mon, Sep 14, 2015 at 9:28 AM, Hasintha Indrajee <hasin...@wso2.com>
>>>> wrote:
>>>>
>>>>> WSO2 Identity Server 5.1.0 Alpha Released !!
>>>>> Date: 14th September 2015The WSO2 Identity Server team is pleased to
>>>>> announce the release of WSO2 Identity Server 5.1.0 Alpha. You can
>>>>> download this distribution from 
>>>>> *https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha
>>>>> <https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha>*
>>>>>
>>>>> Following list [1] contains all bug fixes and improvements available
>>>>> with alpha release. We encourage you to report issues, improvements
>>>>> and feature requests regarding WSO2 Identity Server through the public 
>>>>> WSO2
>>>>> Identity Server JIRA <https://wso2.org/jira/browse/IDENTITY>
>>>>>
>>>>> ~ The WSO2 Identity Server Team ~
>>>>>
>>>>> [1] Release Notes - WSO2 Identity Server - Version 5.1.0-Alpha
>>>>>
>>>>> Bug
>>>>>
>>>>>    - [IDENTITY-836 <https://wso2.org/jira/browse/IDENTITY-836>] - The
>>>>>    pagination on the google chrome shows a box around the paginations 
>>>>> numbers
>>>>>    and next previous/ first last words
>>>>>    - [IDENTITY-1163 <https://wso2.org/jira/browse/IDENTITY-1163>] -
>>>>>    Disable use of a generated OAuth token by a user,when that user locked
>>>>>    [removed from users-store] from current users-base.
>>>>>    - [IDENTITY-1217 <https://wso2.org/jira/browse/IDENTITY-1217>] -
>>>>>    Passwords in Ldap are stored in plain text
>>>>>    - [IDENTITY-1830 <https://wso2.org/jira/browse/IDENTITY-1830>] -
>>>>>    When a tenant is created in one node of the IS cluster; at the first
>>>>>    attempt of login; if the request is redirected to the other node of the
>>>>>    cluster; login will be failed
>>>>>    - [IDENTITY-2512 <https://wso2.org/jira/browse/IDENTITY-2512>] -
>>>>>    [Cluster setup] [Tenant mode] SAML2 SSO login fails in one node
>>>>>    - [IDENTITY-2525 <https://wso2.org/jira/browse/IDENTITY-2525>] -
>>>>>    [Cluster] [Tenant mode] Error observed in SAML -> SAML federated 
>>>>> scenario
>>>>>    - [IDENTITY-2553 <https://wso2.org/jira/browse/IDENTITY-2553>] -
>>>>>    "ForceAuthn" parameter in SAML SSO request must be passed to federated
>>>>>    SAML2 SSO authenticators by default
>>>>>    - [IDENTITY-2585 <https://wso2.org/jira/browse/IDENTITY-2585>] -
>>>>>    AuthnContextClassRef is hardcoded.
>>>>>    - [IDENTITY-2602 <https://wso2.org/jira/browse/IDENTITY-2602>] -
>>>>>    IDP are not loading in tenant mode under home realm discovery mode in
>>>>>    Application authentication
>>>>>    - [IDENTITY-2675 <https://wso2.org/jira/browse/IDENTITY-2675>] -
>>>>>    NullPointerException thrown when trying to access an already 
>>>>> authenticated
>>>>>    session at IdP
>>>>>    - [IDENTITY-2754 <https://wso2.org/jira/browse/IDENTITY-2754>] -
>>>>>    SCIM filtering Eq not adhering to the SCIM 1.1 specification
>>>>>    - [IDENTITY-2781 <https://wso2.org/jira/browse/IDENTITY-2781>] -
>>>>>    updateRolesOfUser(String userName, String[] newUserList) in UserAdmin
>>>>>    service does not working
>>>>>    - [IDENTITY-2796 <https://wso2.org/jira/browse/IDENTITY-2796>] -
>>>>>    Support for HTTP-POST binding for SAML2 SSO federated authenticator
>>>>>    - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] -
>>>>>    Receive fault response from RemoteClaimManagerService
>>>>>    - [IDENTITY-2904 <https://wso2.org/jira/browse/IDENTITY-2904>] -
>>>>>    exception when searching for an internal user role
>>>>>    - [IDENTITY-2983 <https://wso2.org/jira/browse/IDENTITY-2983>] -
>>>>>    Define Custom SSL context SSO Agent client library.
>>>>>    - [IDENTITY-3102 <https://wso2.org/jira/browse/IDENTITY-3102>] -
>>>>>    Creating a identity provider with malformed certificate cause to 
>>>>> disappear
>>>>>    the IdP's edit view and certificate file content validation needed when
>>>>>    adding IdP certificate
>>>>>    - [IDENTITY-3152 <https://wso2.org/jira/browse/IDENTITY-3152>] -
>>>>>    User name case sensitivity issue with Oracle as user store.
>>>>>    - [IDENTITY-3195 <https://wso2.org/jira/browse/IDENTITY-3195>] -
>>>>>    Add Identity Provider page of the carbon console doesn't validate 
>>>>> "Identity
>>>>>    Provider Public Certificate" uploaded by the user.
>>>>>    - [IDENTITY-3230 <https://wso2.org/jira/browse/IDENTITY-3230>] -
>>>>>    After setting a user store from Inbound Provisioning SCIM, for creating
>>>>>    groups and listing users SCIM uses PRIMARY user store.
>>>>>    - [IDENTITY-3236 <https://wso2.org/jira/browse/IDENTITY-3236>] -
>>>>>    There is no UI Entry to add DisplayNameAttribute value when creating a
>>>>>    Secondary user stores
>>>>>    - [IDENTITY-3254 <https://wso2.org/jira/browse/IDENTITY-3254>] -
>>>>>    Error when evaluate XAML request via Tryit tool
>>>>>    - [IDENTITY-3301 <https://wso2.org/jira/browse/IDENTITY-3301>] -
>>>>>    Users in different tenants can log in to non-saas apps when
>>>>>    response/assertion signing disabled
>>>>>    - [IDENTITY-3316 <https://wso2.org/jira/browse/IDENTITY-3316>] -
>>>>>    OAuth clientid, client secret encryption does not work
>>>>>    - [IDENTITY-3354 <https://wso2.org/jira/browse/IDENTITY-3354>] -
>>>>>    SAML to OAuth Grant not working for Tenant (Travelocity)
>>>>>    - [IDENTITY-3359 <https://wso2.org/jira/browse/IDENTITY-3359>] -
>>>>>    When trying creating a role with existing name all the permissions get
>>>>>    removed from the existing role
>>>>>    - [IDENTITY-3370 <https://wso2.org/jira/browse/IDENTITY-3370>] -
>>>>>    SSO with IWA broken after the security patch
>>>>>    - [IDENTITY-3416 <https://wso2.org/jira/browse/IDENTITY-3416>] -
>>>>>    Tenant Creation failed When pointing to ActiveDirectory
>>>>>    - [IDENTITY-3424 <https://wso2.org/jira/browse/IDENTITY-3424>] -
>>>>>    Hazelcast NPE observed in a IS node when starting servers
>>>>>    - [IDENTITY-3425 <https://wso2.org/jira/browse/IDENTITY-3425>] -
>>>>>    Session time out not handle properly for "Home > Configure > Users and
>>>>>    Roles > Roles" page
>>>>>    - [IDENTITY-3438 <https://wso2.org/jira/browse/IDENTITY-3438>] -
>>>>>    When role name contains block letters permissions are not get assigned 
>>>>> to
>>>>>    the role
>>>>>    - [IDENTITY-3458 <https://wso2.org/jira/browse/IDENTITY-3458>] -
>>>>>    Passive STS does not work with PassiveSTSSampleApp
>>>>>    - [IDENTITY-3460 <https://wso2.org/jira/browse/IDENTITY-3460>] -
>>>>>    Warning at startup ; WARN - DefaultSchemaGenerator We don't support 
>>>>> method
>>>>>    overloading. Ignoring [validateAudienceRestriction]
>>>>>    - [IDENTITY-3465 <https://wso2.org/jira/browse/IDENTITY-3465>] -
>>>>>    java.lang.NullPointerException returned when accessing an axis2 service
>>>>>    with invalid security from one of the nodes
>>>>>    - [IDENTITY-3484 <https://wso2.org/jira/browse/IDENTITY-3484>] - A
>>>>>    user is provisioned twice when using the SCIM outbound connector at a 
>>>>> fresh
>>>>>    start of the server
>>>>>    - [IDENTITY-3514 <https://wso2.org/jira/browse/IDENTITY-3514>] -
>>>>>    org.wso2.carbon.identity.mgt component should not export the internal
>>>>>    package
>>>>>    - [IDENTITY-3530 <https://wso2.org/jira/browse/IDENTITY-3530>] -
>>>>>    When try to change the password without providing current password
>>>>>    exception get print in the console
>>>>>    - [IDENTITY-3531 <https://wso2.org/jira/browse/IDENTITY-3531>] -
>>>>>    NPE on login after a session time out
>>>>>    - [IDENTITY-3533 <https://wso2.org/jira/browse/IDENTITY-3533>] -
>>>>>    "unlockUserAccount email notifications" is not working for users in the
>>>>>    secondary user store
>>>>>    - [IDENTITY-3543 <https://wso2.org/jira/browse/IDENTITY-3543>] -
>>>>>    Licensing issue in org.wso2.carbon.user.mgt.feature-4.5.5 when 
>>>>> installing
>>>>>    CEP 4.0.0 features to the kernel-4.4.1
>>>>>
>>>>> Improvement
>>>>>
>>>>>    - [IDENTITY-979 <https://wso2.org/jira/browse/IDENTITY-979>] -
>>>>>    Need to sort claim URIs alphabetically in all pages
>>>>>    - [IDENTITY-2007 <https://wso2.org/jira/browse/IDENTITY-2007>] -
>>>>>    Service Provider based login page customization in SAML SSO
>>>>>    - [IDENTITY-2858 <https://wso2.org/jira/browse/IDENTITY-2858>] -
>>>>>    Configurable SAML2 SSO Elements
>>>>>    - [IDENTITY-3129 <https://wso2.org/jira/browse/IDENTITY-3129>] -
>>>>>    PasswordTimeStamp claim does not updated on every method which allow 
>>>>> change
>>>>>    password
>>>>>    - [IDENTITY-3163 <https://wso2.org/jira/browse/IDENTITY-3163>] -
>>>>>    Create an index on IDN_OAUTH2_ACCESS_TOKEN table TIME_CREATED
>>>>>    - [IDENTITY-3227 <https://wso2.org/jira/browse/IDENTITY-3227>] -
>>>>>    two request of logout generate an internal error
>>>>>    - [IDENTITY-3464 <https://wso2.org/jira/browse/IDENTITY-3464>] -
>>>>>    XACML based axis2 handler to authorize web service requests.
>>>>>    - [IDENTITY-3476 <https://wso2.org/jira/browse/IDENTITY-3476>] -
>>>>>    Add an auto increment ID in IDN_OAUTH_CONSUMER_APPS and use it as the
>>>>>    foreign key from other necessary tables rather than using the 
>>>>> CONSUMER_KEY
>>>>>    - [IDENTITY-3493 <https://wso2.org/jira/browse/IDENTITY-3493>] -
>>>>>    UserStoreActionListener come up with work flaw support should be the 
>>>>> first
>>>>>    UserOperationEventListener
>>>>>    - [IDENTITY-3496 <https://wso2.org/jira/browse/IDENTITY-3496>] -
>>>>>    Add additional configurations to sso-idp-config.xml file
>>>>>
>>>>> New Feature
>>>>>
>>>>>    - [IDENTITY-3472 <https://wso2.org/jira/browse/IDENTITY-3472>] -
>>>>>    Workflow Support for IS
>>>>>
>>>>> Patch
>>>>>
>>>>>    - [IDENTITY-2913 <https://wso2.org/jira/browse/IDENTITY-2913>] -
>>>>>    OpenID prompt=none is not working
>>>>>    - [IDENTITY-3209 <https://wso2.org/jira/browse/IDENTITY-3209>] -
>>>>>    Getting errors while loading service providers for LDAP users
>>>>>    - [IDENTITY-3311 <https://wso2.org/jira/browse/IDENTITY-3311>] -
>>>>>    Control Case Sensitivity of Username in each User Store with a Property
>>>>>    - [IDENTITY-3422 <https://wso2.org/jira/browse/IDENTITY-3422>] -
>>>>>    Single Logout with Shibboleth as IDP not working
>>>>>    - [IDENTITY-3423 <https://wso2.org/jira/browse/IDENTITY-3423>] -
>>>>>    Dead Lock encountered when deleting a hybrid role
>>>>>    - [IDENTITY-3480 <https://wso2.org/jira/browse/IDENTITY-3480>] -
>>>>>    IdentityUserMgtListener performs unnecessary registry calls on user 
>>>>> deletion
>>>>>    - [IDENTITY-3488 <https://wso2.org/jira/browse/IDENTITY-3488>] -
>>>>>    Roles are not assigned when JIT Provisioning in Custom Federated
>>>>>    Authenticator scenario for secondary user stores
>>>>>    - [IDENTITY-3510 <https://wso2.org/jira/browse/IDENTITY-3510>] -
>>>>>    SAML2 SSO/SLO Requests must be able to be signed by Super Tenant or 
>>>>> Tenant
>>>>>    if its a Shared IDP
>>>>>    - [IDENTITY-3511 <https://wso2.org/jira/browse/IDENTITY-3511>] -
>>>>>    Dead-Lock occurred at cluster startup
>>>>>    - [IDENTITY-3550 <https://wso2.org/jira/browse/IDENTITY-3550>] -
>>>>>    WSO2 IS 4.6.0 intermittent failure of user self registration "lock on
>>>>>    create" feature
>>>>>    - [IDENTITY-3554 <https://wso2.org/jira/browse/IDENTITY-3554>] -
>>>>>    User passwords cannot contain colon (:) when using request path
>>>>>    authentication with basicauth
>>>>>    - [IDENTITY-3563 <https://wso2.org/jira/browse/IDENTITY-3563>] -
>>>>>    Aggregate existing patches for IS 5.0.0
>>>>>
>>>>> Task
>>>>>
>>>>>    - [IDENTITY-2178 <https://wso2.org/jira/browse/IDENTITY-2178>] -
>>>>>    Waffle 1.6 library in GIT needs to be released as an orbit bundle
>>>>>    - [IDENTITY-2652 <https://wso2.org/jira/browse/IDENTITY-2652>] -
>>>>>    TODO list for CARBON-14744
>>>>>    - [IDENTITY-2741 <https://wso2.org/jira/browse/IDENTITY-2741>] -
>>>>>    Remove servlets from authenticationendpoint.war
>>>>>    - [IDENTITY-2792 <https://wso2.org/jira/browse/IDENTITY-2792>] -
>>>>>    Upgrade Jaggery version in IS
>>>>>    - [IDENTITY-2930 <https://wso2.org/jira/browse/IDENTITY-2930>] -
>>>>>    Create a separate feature to pack common configurations and dbscripts 
>>>>> for
>>>>>    applications concept in IS
>>>>>    - [IDENTITY-3495 <https://wso2.org/jira/browse/IDENTITY-3495>] -
>>>>>    Remove provisioning handler implementation from scim.common component
>>>>>    - [IDENTITY-3513 <https://wso2.org/jira/browse/IDENTITY-3513>] -
>>>>>    Documentation related changes for
>>>>>    https://github.com/wso2/carbon-identity/pull/757
>>>>>
>>>>> Sub-task
>>>>>
>>>>>    - [IDENTITY-2686 <https://wso2.org/jira/browse/IDENTITY-2686>] -
>>>>>    Need to write a DB based Security Policy Deployer for STS
>>>>>    - [IDENTITY-3166 <https://wso2.org/jira/browse/IDENTITY-3166>] -
>>>>>    XSS and CSRF prevention
>>>>>    - [IDENTITY-3367 <https://wso2.org/jira/browse/IDENTITY-3367>] -
>>>>>    Create IS dashboard gadget for workflow feature
>>>>>    - [IDENTITY-3492 <https://wso2.org/jira/browse/IDENTITY-3492>] -
>>>>>    Provide support get workflow requests initiated by a user at workflow 
>>>>> core
>>>>>    level
>>>>>    - [IDENTITY-3500 <https://wso2.org/jira/browse/IDENTITY-3500>] -
>>>>>    Workflow feature should handle conflicts occur when two operations 
>>>>> which
>>>>>    depend on each other are on workflows simultanously
>>>>>    - [IDENTITY-3501 <https://wso2.org/jira/browse/IDENTITY-3501>] -
>>>>>    UI in Management Console to Check Workflow Status
>>>>>    - [IDENTITY-3502 <https://wso2.org/jira/browse/IDENTITY-3502>] -
>>>>>    Encrypt passwords stored within workflow component
>>>>>    - [IDENTITY-3506 <https://wso2.org/jira/browse/IDENTITY-3506>] -
>>>>>    Listing Workflow Pending Entities in the Management Console
>>>>>    - [IDENTITY-3518 <https://wso2.org/jira/browse/IDENTITY-3518>] -
>>>>>    Extend workflows to support multiple workflows for single operation
>>>>>    - [IDENTITY-3521 <https://wso2.org/jira/browse/IDENTITY-3521>] -
>>>>>    P2 Profile for workflow features
>>>>>    - [IDENTITY-3522 <https://wso2.org/jira/browse/IDENTITY-3522>] -
>>>>>    Multiple Steps Support for Approval
>>>>>    - [IDENTITY-3523 <https://wso2.org/jira/browse/IDENTITY-3523>] -
>>>>>    Generic User/Role Search Page to add approval list
>>>>>    - [IDENTITY-3544 <https://wso2.org/jira/browse/IDENTITY-3544>] -
>>>>>    [Migration] Migration from IS 5.0.0 SP01 to IS 5.1.0
>>>>>    - [IDENTITY-3558 <https://wso2.org/jira/browse/IDENTITY-3558>] -
>>>>>    Ability to enable/disable workflow triggering globally
>>>>>
>>>>>
>>>>> --
>>>>> Hasintha Indrajee
>>>>> Software Engineer
>>>>> WSO2, Inc.
>>>>> Mobile:+94 771892453
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Dev mailing list
>>>>> Dev@wso2.org
>>>>> http://wso2.org/cgi-bin/mailman/listinfo/dev
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>> Thanks & Regards,
>>>> Prabath
>>>>
>>>> Twitter : @prabath
>>>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena
>>>>
>>>> Mobile : +1 650 625 7950
>>>>
>>>> http://blog.facilelogin.com
>>>> http://blog.api-security.org
>>>>
>>>
>>>
>>>
>>> --
>>> Thanks & Regards,
>>> Prabath
>>>
>>> Twitter : @prabath
>>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena
>>>
>>> Mobile : +1 650 625 7950
>>>
>>> http://blog.facilelogin.com
>>> http://blog.api-security.org
>>>
>>
>>
>>
>> --
>> Thanks & Regards,
>> Prabath
>>
>> Twitter : @prabath
>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena
>>
>> Mobile : +1 650 625 7950
>>
>> http://blog.facilelogin.com
>> http://blog.api-security.org
>>
>> _______________________________________________
>> Dev mailing list
>> Dev@wso2.org
>> http://wso2.org/cgi-bin/mailman/listinfo/dev
>>
>>
>
>
> --
> *Chamila Dilshan Wijayarathna,*
> Software Engineer
> Mobile:(+94)788193620
> WSO2 Inc., http://wso2.com/
>



-- 
Thanks & Regards,
Prabath

Twitter : @prabath
LinkedIn : http://www.linkedin.com/in/prabathsiriwardena

Mobile : +1 650 625 7950

http://blog.facilelogin.com
http://blog.api-security.org
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to