Hi Prabath, Yes, this was implemented after alpha.
Thanks On Wed, Sep 16, 2015 at 9:22 AM, Prabath Siriwardena <[email protected]> wrote: > > > On Tue, Sep 15, 2015 at 8:44 PM, Chamila Wijayarathna <[email protected]> > wrote: > >> Hi Johann/Prabath, >> >> I have already implemented to show embeded_bps profile only when IS >> started with "-Dprofile=full", >> according to above discussion this seems like that is not the proper way >> to handle this. >> > > Is this implemented after alpha? > > >> If so what will be the better way to do this? >> >> Thanks! >> >> On Wed, Sep 16, 2015 at 12:22 AM, Prabath Siriwardena <[email protected]> >> wrote: >> >>> Tested the basic functionality of the workflows.. it works as expected! >>> Nice work folks :-) >>> >>> Will test further and let you know if there are any issues.. >>> >>> Thanks & regards, >>> -Prabath >>> >>> On Tue, Sep 15, 2015 at 11:45 AM, Prabath Siriwardena <[email protected]> >>> wrote: >>> >>>> FYI. >>>> >>>> After talking to Johann - I started the IS with -Dprofile=full - and >>>> then it works. >>>> >>>> Please do not give the embedded_bps option - when we do not do that... >>>> >>>> Thanks & regards, >>>> -Prabath >>>> >>>> On Tue, Sep 15, 2015 at 11:20 AM, Prabath Siriwardena <[email protected] >>>> > wrote: >>>> >>>>> I was trying to test workflow with this pack.. But result in the >>>>> following error when trying to create a workflow.. >>>>> >>>>> Manage --> Add Workflows --> Add Approval Step --> embedded bps --> >>>>> Finish >>>>> >>>>> Error: >>>>> >>>>> >>>>> TID: [-1234] [] [2015-09-15 11:16:30,390] ERROR >>>>> {org.apache.tiles.jsp.taglib.RenderTagSupport} - Error during rendering >>>>> javax.servlet.jsp.JspException: IO Error executing tag: JSPException >>>>> while including path '/workflow-mgt/user-mgt.jsp'. ServletException while >>>>> including page. >>>>> at >>>>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:84) >>>>> at >>>>> org.apache.tiles.jsp.taglib.ContainerTagSupport.doEndTag(ContainerTagSupport.java:80) >>>>> at >>>>> org.apache.jsp.admin.layout.template_jsp._jspx_meth_tiles_005finsertAttribute_005f7(template_jsp.java:640) >>>>> at >>>>> org.apache.jsp.admin.layout.template_jsp._jspService(template_jsp.java:356) >>>>> at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at >>>>> org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:432) >>>>> at >>>>> org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:395) >>>>> at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:339) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at org.wso2.carbon.ui.JspServlet.service(JspServlet.java:155) >>>>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:80) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at >>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) >>>>> at >>>>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) >>>>> at >>>>> org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:748) >>>>> at >>>>> org.apache.catalina.core.ApplicationDispatcher.processRequest(ApplicationDispatcher.java:486) >>>>> at >>>>> org.apache.catalina.core.ApplicationDispatcher.doForward(ApplicationDispatcher.java:411) >>>>> at >>>>> org.apache.catalina.core.ApplicationDispatcher.forward(ApplicationDispatcher.java:338) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.RequestDispatcherAdaptor.forward(RequestDispatcherAdaptor.java:30) >>>>> at >>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor$RequestDispatcherAdaptor.forward(ContextPathServletAdaptor.java:362) >>>>> at >>>>> org.apache.tiles.servlet.context.ServletTilesRequestContext.forward(ServletTilesRequestContext.java:198) >>>>> at >>>>> org.apache.tiles.servlet.context.ServletTilesRequestContext.dispatch(ServletTilesRequestContext.java:185) >>>>> at >>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:419) >>>>> at >>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:370) >>>>> at org.wso2.carbon.ui.action.ActionHelper.render(ActionHelper.java:52) >>>>> at org.wso2.carbon.ui.TilesJspServlet.service(TilesJspServlet.java:101) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at >>>>> org.eclipse.equinox.http.helper.ContextPathServletAdaptor.service(ContextPathServletAdaptor.java:37) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128) >>>>> at >>>>> org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68) >>>>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:727) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) >>>>> at >>>>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:61) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241) >>>>> at >>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208) >>>>> at >>>>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220) >>>>> at >>>>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122) >>>>> at >>>>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504) >>>>> at >>>>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170) >>>>> at >>>>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47) >>>>> at >>>>> org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159) >>>>> at >>>>> org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:950) >>>>> at >>>>> org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57) >>>>> at >>>>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116) >>>>> at >>>>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:421) >>>>> at >>>>> org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1074) >>>>> at >>>>> org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:611) >>>>> at >>>>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1739) >>>>> at >>>>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1698) >>>>> at >>>>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) >>>>> at >>>>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) >>>>> at >>>>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) >>>>> at java.lang.Thread.run(Thread.java:745) >>>>> Caused by: java.io.IOException: JSPException while including path >>>>> '/workflow-mgt/user-mgt.jsp'. ServletException while including page. >>>>> at >>>>> org.apache.tiles.jsp.context.JspTilesRequestContext.include(JspTilesRequestContext.java:91) >>>>> at >>>>> org.apache.tiles.jsp.context.JspTilesRequestContext.dispatch(JspTilesRequestContext.java:82) >>>>> at >>>>> org.apache.tiles.impl.BasicTilesContainer.render(BasicTilesContainer.java:465) >>>>> at >>>>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:140) >>>>> at >>>>> org.apache.tiles.jsp.taglib.InsertAttributeTag.render(InsertAttributeTag.java:117) >>>>> at >>>>> org.apache.tiles.jsp.taglib.RenderTagSupport.execute(RenderTagSupport.java:171) >>>>> at >>>>> org.apache.tiles.jsp.taglib.RoleSecurityTagSupport.doEndTag(RoleSecurityTagSupport.java:75) >>>>> >>>>> On Mon, Sep 14, 2015 at 9:28 AM, Hasintha Indrajee <[email protected]> >>>>> wrote: >>>>> >>>>>> WSO2 Identity Server 5.1.0 Alpha Released !! >>>>>> Date: 14th September 2015The WSO2 Identity Server team is pleased to >>>>>> announce the release of WSO2 Identity Server 5.1.0 Alpha. You can >>>>>> download this distribution from >>>>>> *https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha >>>>>> <https://github.com/wso2/product-is/releases/tag/v5.1.0-alpha>* >>>>>> >>>>>> Following list [1] contains all bug fixes and improvements available >>>>>> with alpha release. We encourage you to report issues, improvements >>>>>> and feature requests regarding WSO2 Identity Server through the public >>>>>> WSO2 >>>>>> Identity Server JIRA <https://wso2.org/jira/browse/IDENTITY> >>>>>> >>>>>> ~ The WSO2 Identity Server Team ~ >>>>>> >>>>>> [1] Release Notes - WSO2 Identity Server - Version 5.1.0-Alpha >>>>>> >>>>>> Bug >>>>>> >>>>>> - [IDENTITY-836 <https://wso2.org/jira/browse/IDENTITY-836>] - >>>>>> The pagination on the google chrome shows a box around the paginations >>>>>> numbers and next previous/ first last words >>>>>> - [IDENTITY-1163 <https://wso2.org/jira/browse/IDENTITY-1163>] - >>>>>> Disable use of a generated OAuth token by a user,when that user locked >>>>>> [removed from users-store] from current users-base. >>>>>> - [IDENTITY-1217 <https://wso2.org/jira/browse/IDENTITY-1217>] - >>>>>> Passwords in Ldap are stored in plain text >>>>>> - [IDENTITY-1830 <https://wso2.org/jira/browse/IDENTITY-1830>] - >>>>>> When a tenant is created in one node of the IS cluster; at the first >>>>>> attempt of login; if the request is redirected to the other node of >>>>>> the >>>>>> cluster; login will be failed >>>>>> - [IDENTITY-2512 <https://wso2.org/jira/browse/IDENTITY-2512>] - >>>>>> [Cluster setup] [Tenant mode] SAML2 SSO login fails in one node >>>>>> - [IDENTITY-2525 <https://wso2.org/jira/browse/IDENTITY-2525>] - >>>>>> [Cluster] [Tenant mode] Error observed in SAML -> SAML federated >>>>>> scenario >>>>>> - [IDENTITY-2553 <https://wso2.org/jira/browse/IDENTITY-2553>] - >>>>>> "ForceAuthn" parameter in SAML SSO request must be passed to federated >>>>>> SAML2 SSO authenticators by default >>>>>> - [IDENTITY-2585 <https://wso2.org/jira/browse/IDENTITY-2585>] - >>>>>> AuthnContextClassRef is hardcoded. >>>>>> - [IDENTITY-2602 <https://wso2.org/jira/browse/IDENTITY-2602>] - >>>>>> IDP are not loading in tenant mode under home realm discovery mode in >>>>>> Application authentication >>>>>> - [IDENTITY-2675 <https://wso2.org/jira/browse/IDENTITY-2675>] - >>>>>> NullPointerException thrown when trying to access an already >>>>>> authenticated >>>>>> session at IdP >>>>>> - [IDENTITY-2754 <https://wso2.org/jira/browse/IDENTITY-2754>] - >>>>>> SCIM filtering Eq not adhering to the SCIM 1.1 specification >>>>>> - [IDENTITY-2781 <https://wso2.org/jira/browse/IDENTITY-2781>] - >>>>>> updateRolesOfUser(String userName, String[] newUserList) in UserAdmin >>>>>> service does not working >>>>>> - [IDENTITY-2796 <https://wso2.org/jira/browse/IDENTITY-2796>] - >>>>>> Support for HTTP-POST binding for SAML2 SSO federated authenticator >>>>>> - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] - >>>>>> Receive fault response from RemoteClaimManagerService >>>>>> - [IDENTITY-2904 <https://wso2.org/jira/browse/IDENTITY-2904>] - >>>>>> exception when searching for an internal user role >>>>>> - [IDENTITY-2983 <https://wso2.org/jira/browse/IDENTITY-2983>] - >>>>>> Define Custom SSL context SSO Agent client library. >>>>>> - [IDENTITY-3102 <https://wso2.org/jira/browse/IDENTITY-3102>] - >>>>>> Creating a identity provider with malformed certificate cause to >>>>>> disappear >>>>>> the IdP's edit view and certificate file content validation needed >>>>>> when >>>>>> adding IdP certificate >>>>>> - [IDENTITY-3152 <https://wso2.org/jira/browse/IDENTITY-3152>] - >>>>>> User name case sensitivity issue with Oracle as user store. >>>>>> - [IDENTITY-3195 <https://wso2.org/jira/browse/IDENTITY-3195>] - >>>>>> Add Identity Provider page of the carbon console doesn't validate >>>>>> "Identity >>>>>> Provider Public Certificate" uploaded by the user. >>>>>> - [IDENTITY-3230 <https://wso2.org/jira/browse/IDENTITY-3230>] - >>>>>> After setting a user store from Inbound Provisioning SCIM, for >>>>>> creating >>>>>> groups and listing users SCIM uses PRIMARY user store. >>>>>> - [IDENTITY-3236 <https://wso2.org/jira/browse/IDENTITY-3236>] - >>>>>> There is no UI Entry to add DisplayNameAttribute value when creating a >>>>>> Secondary user stores >>>>>> - [IDENTITY-3254 <https://wso2.org/jira/browse/IDENTITY-3254>] - >>>>>> Error when evaluate XAML request via Tryit tool >>>>>> - [IDENTITY-3301 <https://wso2.org/jira/browse/IDENTITY-3301>] - >>>>>> Users in different tenants can log in to non-saas apps when >>>>>> response/assertion signing disabled >>>>>> - [IDENTITY-3316 <https://wso2.org/jira/browse/IDENTITY-3316>] - >>>>>> OAuth clientid, client secret encryption does not work >>>>>> - [IDENTITY-3354 <https://wso2.org/jira/browse/IDENTITY-3354>] - >>>>>> SAML to OAuth Grant not working for Tenant (Travelocity) >>>>>> - [IDENTITY-3359 <https://wso2.org/jira/browse/IDENTITY-3359>] - >>>>>> When trying creating a role with existing name all the permissions get >>>>>> removed from the existing role >>>>>> - [IDENTITY-3370 <https://wso2.org/jira/browse/IDENTITY-3370>] - >>>>>> SSO with IWA broken after the security patch >>>>>> - [IDENTITY-3416 <https://wso2.org/jira/browse/IDENTITY-3416>] - >>>>>> Tenant Creation failed When pointing to ActiveDirectory >>>>>> - [IDENTITY-3424 <https://wso2.org/jira/browse/IDENTITY-3424>] - >>>>>> Hazelcast NPE observed in a IS node when starting servers >>>>>> - [IDENTITY-3425 <https://wso2.org/jira/browse/IDENTITY-3425>] - >>>>>> Session time out not handle properly for "Home > Configure > Users and >>>>>> Roles > Roles" page >>>>>> - [IDENTITY-3438 <https://wso2.org/jira/browse/IDENTITY-3438>] - >>>>>> When role name contains block letters permissions are not get >>>>>> assigned to >>>>>> the role >>>>>> - [IDENTITY-3458 <https://wso2.org/jira/browse/IDENTITY-3458>] - >>>>>> Passive STS does not work with PassiveSTSSampleApp >>>>>> - [IDENTITY-3460 <https://wso2.org/jira/browse/IDENTITY-3460>] - >>>>>> Warning at startup ; WARN - DefaultSchemaGenerator We don't support >>>>>> method >>>>>> overloading. Ignoring [validateAudienceRestriction] >>>>>> - [IDENTITY-3465 <https://wso2.org/jira/browse/IDENTITY-3465>] - >>>>>> java.lang.NullPointerException returned when accessing an axis2 >>>>>> service >>>>>> with invalid security from one of the nodes >>>>>> - [IDENTITY-3484 <https://wso2.org/jira/browse/IDENTITY-3484>] - >>>>>> A user is provisioned twice when using the SCIM outbound connector at >>>>>> a >>>>>> fresh start of the server >>>>>> - [IDENTITY-3514 <https://wso2.org/jira/browse/IDENTITY-3514>] - >>>>>> org.wso2.carbon.identity.mgt component should not export the internal >>>>>> package >>>>>> - [IDENTITY-3530 <https://wso2.org/jira/browse/IDENTITY-3530>] - >>>>>> When try to change the password without providing current password >>>>>> exception get print in the console >>>>>> - [IDENTITY-3531 <https://wso2.org/jira/browse/IDENTITY-3531>] - >>>>>> NPE on login after a session time out >>>>>> - [IDENTITY-3533 <https://wso2.org/jira/browse/IDENTITY-3533>] - >>>>>> "unlockUserAccount email notifications" is not working for users in >>>>>> the >>>>>> secondary user store >>>>>> - [IDENTITY-3543 <https://wso2.org/jira/browse/IDENTITY-3543>] - >>>>>> Licensing issue in org.wso2.carbon.user.mgt.feature-4.5.5 when >>>>>> installing >>>>>> CEP 4.0.0 features to the kernel-4.4.1 >>>>>> >>>>>> Improvement >>>>>> >>>>>> - [IDENTITY-979 <https://wso2.org/jira/browse/IDENTITY-979>] - >>>>>> Need to sort claim URIs alphabetically in all pages >>>>>> - [IDENTITY-2007 <https://wso2.org/jira/browse/IDENTITY-2007>] - >>>>>> Service Provider based login page customization in SAML SSO >>>>>> - [IDENTITY-2858 <https://wso2.org/jira/browse/IDENTITY-2858>] - >>>>>> Configurable SAML2 SSO Elements >>>>>> - [IDENTITY-3129 <https://wso2.org/jira/browse/IDENTITY-3129>] - >>>>>> PasswordTimeStamp claim does not updated on every method which allow >>>>>> change >>>>>> password >>>>>> - [IDENTITY-3163 <https://wso2.org/jira/browse/IDENTITY-3163>] - >>>>>> Create an index on IDN_OAUTH2_ACCESS_TOKEN table TIME_CREATED >>>>>> - [IDENTITY-3227 <https://wso2.org/jira/browse/IDENTITY-3227>] - >>>>>> two request of logout generate an internal error >>>>>> - [IDENTITY-3464 <https://wso2.org/jira/browse/IDENTITY-3464>] - >>>>>> XACML based axis2 handler to authorize web service requests. >>>>>> - [IDENTITY-3476 <https://wso2.org/jira/browse/IDENTITY-3476>] - >>>>>> Add an auto increment ID in IDN_OAUTH_CONSUMER_APPS and use it as the >>>>>> foreign key from other necessary tables rather than using the >>>>>> CONSUMER_KEY >>>>>> - [IDENTITY-3493 <https://wso2.org/jira/browse/IDENTITY-3493>] - >>>>>> UserStoreActionListener come up with work flaw support should be the >>>>>> first >>>>>> UserOperationEventListener >>>>>> - [IDENTITY-3496 <https://wso2.org/jira/browse/IDENTITY-3496>] - >>>>>> Add additional configurations to sso-idp-config.xml file >>>>>> >>>>>> New Feature >>>>>> >>>>>> - [IDENTITY-3472 <https://wso2.org/jira/browse/IDENTITY-3472>] - >>>>>> Workflow Support for IS >>>>>> >>>>>> Patch >>>>>> >>>>>> - [IDENTITY-2913 <https://wso2.org/jira/browse/IDENTITY-2913>] - >>>>>> OpenID prompt=none is not working >>>>>> - [IDENTITY-3209 <https://wso2.org/jira/browse/IDENTITY-3209>] - >>>>>> Getting errors while loading service providers for LDAP users >>>>>> - [IDENTITY-3311 <https://wso2.org/jira/browse/IDENTITY-3311>] - >>>>>> Control Case Sensitivity of Username in each User Store with a >>>>>> Property >>>>>> - [IDENTITY-3422 <https://wso2.org/jira/browse/IDENTITY-3422>] - >>>>>> Single Logout with Shibboleth as IDP not working >>>>>> - [IDENTITY-3423 <https://wso2.org/jira/browse/IDENTITY-3423>] - >>>>>> Dead Lock encountered when deleting a hybrid role >>>>>> - [IDENTITY-3480 <https://wso2.org/jira/browse/IDENTITY-3480>] - >>>>>> IdentityUserMgtListener performs unnecessary registry calls on user >>>>>> deletion >>>>>> - [IDENTITY-3488 <https://wso2.org/jira/browse/IDENTITY-3488>] - >>>>>> Roles are not assigned when JIT Provisioning in Custom Federated >>>>>> Authenticator scenario for secondary user stores >>>>>> - [IDENTITY-3510 <https://wso2.org/jira/browse/IDENTITY-3510>] - >>>>>> SAML2 SSO/SLO Requests must be able to be signed by Super Tenant or >>>>>> Tenant >>>>>> if its a Shared IDP >>>>>> - [IDENTITY-3511 <https://wso2.org/jira/browse/IDENTITY-3511>] - >>>>>> Dead-Lock occurred at cluster startup >>>>>> - [IDENTITY-3550 <https://wso2.org/jira/browse/IDENTITY-3550>] - >>>>>> WSO2 IS 4.6.0 intermittent failure of user self registration "lock on >>>>>> create" feature >>>>>> - [IDENTITY-3554 <https://wso2.org/jira/browse/IDENTITY-3554>] - >>>>>> User passwords cannot contain colon (:) when using request path >>>>>> authentication with basicauth >>>>>> - [IDENTITY-3563 <https://wso2.org/jira/browse/IDENTITY-3563>] - >>>>>> Aggregate existing patches for IS 5.0.0 >>>>>> >>>>>> Task >>>>>> >>>>>> - [IDENTITY-2178 <https://wso2.org/jira/browse/IDENTITY-2178>] - >>>>>> Waffle 1.6 library in GIT needs to be released as an orbit bundle >>>>>> - [IDENTITY-2652 <https://wso2.org/jira/browse/IDENTITY-2652>] - >>>>>> TODO list for CARBON-14744 >>>>>> - [IDENTITY-2741 <https://wso2.org/jira/browse/IDENTITY-2741>] - >>>>>> Remove servlets from authenticationendpoint.war >>>>>> - [IDENTITY-2792 <https://wso2.org/jira/browse/IDENTITY-2792>] - >>>>>> Upgrade Jaggery version in IS >>>>>> - [IDENTITY-2930 <https://wso2.org/jira/browse/IDENTITY-2930>] - >>>>>> Create a separate feature to pack common configurations and dbscripts >>>>>> for >>>>>> applications concept in IS >>>>>> - [IDENTITY-3495 <https://wso2.org/jira/browse/IDENTITY-3495>] - >>>>>> Remove provisioning handler implementation from scim.common component >>>>>> - [IDENTITY-3513 <https://wso2.org/jira/browse/IDENTITY-3513>] - >>>>>> Documentation related changes for >>>>>> https://github.com/wso2/carbon-identity/pull/757 >>>>>> >>>>>> Sub-task >>>>>> >>>>>> - [IDENTITY-2686 <https://wso2.org/jira/browse/IDENTITY-2686>] - >>>>>> Need to write a DB based Security Policy Deployer for STS >>>>>> - [IDENTITY-3166 <https://wso2.org/jira/browse/IDENTITY-3166>] - >>>>>> XSS and CSRF prevention >>>>>> - [IDENTITY-3367 <https://wso2.org/jira/browse/IDENTITY-3367>] - >>>>>> Create IS dashboard gadget for workflow feature >>>>>> - [IDENTITY-3492 <https://wso2.org/jira/browse/IDENTITY-3492>] - >>>>>> Provide support get workflow requests initiated by a user at workflow >>>>>> core >>>>>> level >>>>>> - [IDENTITY-3500 <https://wso2.org/jira/browse/IDENTITY-3500>] - >>>>>> Workflow feature should handle conflicts occur when two operations >>>>>> which >>>>>> depend on each other are on workflows simultanously >>>>>> - [IDENTITY-3501 <https://wso2.org/jira/browse/IDENTITY-3501>] - >>>>>> UI in Management Console to Check Workflow Status >>>>>> - [IDENTITY-3502 <https://wso2.org/jira/browse/IDENTITY-3502>] - >>>>>> Encrypt passwords stored within workflow component >>>>>> - [IDENTITY-3506 <https://wso2.org/jira/browse/IDENTITY-3506>] - >>>>>> Listing Workflow Pending Entities in the Management Console >>>>>> - [IDENTITY-3518 <https://wso2.org/jira/browse/IDENTITY-3518>] - >>>>>> Extend workflows to support multiple workflows for single operation >>>>>> - [IDENTITY-3521 <https://wso2.org/jira/browse/IDENTITY-3521>] - >>>>>> P2 Profile for workflow features >>>>>> - [IDENTITY-3522 <https://wso2.org/jira/browse/IDENTITY-3522>] - >>>>>> Multiple Steps Support for Approval >>>>>> - [IDENTITY-3523 <https://wso2.org/jira/browse/IDENTITY-3523>] - >>>>>> Generic User/Role Search Page to add approval list >>>>>> - [IDENTITY-3544 <https://wso2.org/jira/browse/IDENTITY-3544>] - >>>>>> [Migration] Migration from IS 5.0.0 SP01 to IS 5.1.0 >>>>>> - [IDENTITY-3558 <https://wso2.org/jira/browse/IDENTITY-3558>] - >>>>>> Ability to enable/disable workflow triggering globally >>>>>> >>>>>> >>>>>> -- >>>>>> Hasintha Indrajee >>>>>> Software Engineer >>>>>> WSO2, Inc. >>>>>> Mobile:+94 771892453 >>>>>> >>>>>> >>>>>> _______________________________________________ >>>>>> Dev mailing list >>>>>> [email protected] >>>>>> http://wso2.org/cgi-bin/mailman/listinfo/dev >>>>>> >>>>>> >>>>> >>>>> >>>>> -- >>>>> Thanks & Regards, >>>>> Prabath >>>>> >>>>> Twitter : @prabath >>>>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena >>>>> >>>>> Mobile : +1 650 625 7950 >>>>> >>>>> http://blog.facilelogin.com >>>>> http://blog.api-security.org >>>>> >>>> >>>> >>>> >>>> -- >>>> Thanks & Regards, >>>> Prabath >>>> >>>> Twitter : @prabath >>>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena >>>> >>>> Mobile : +1 650 625 7950 >>>> >>>> http://blog.facilelogin.com >>>> http://blog.api-security.org >>>> >>> >>> >>> >>> -- >>> Thanks & Regards, >>> Prabath >>> >>> Twitter : @prabath >>> LinkedIn : http://www.linkedin.com/in/prabathsiriwardena >>> >>> Mobile : +1 650 625 7950 >>> >>> http://blog.facilelogin.com >>> http://blog.api-security.org >>> >>> _______________________________________________ >>> Dev mailing list >>> [email protected] >>> http://wso2.org/cgi-bin/mailman/listinfo/dev >>> >>> >> >> >> -- >> *Chamila Dilshan Wijayarathna,* >> Software Engineer >> Mobile:(+94)788193620 >> WSO2 Inc., http://wso2.com/ >> > > > > -- > Thanks & Regards, > Prabath > > Twitter : @prabath > LinkedIn : http://www.linkedin.com/in/prabathsiriwardena > > Mobile : +1 650 625 7950 > > http://blog.facilelogin.com > http://blog.api-security.org > -- *Chamila Dilshan Wijayarathna,* Software Engineer Mobile:(+94)788193620 WSO2 Inc., http://wso2.com/
_______________________________________________ Dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/dev
