On Thu, Nov 16, 2017 at 12:27 PM, Farasath Ahamed <farasa...@wso2.com> wrote:
> The WSO2 Identity and Access Management team is pleased to announce the > release of WSO2 Identity Server 5.4.0 Alpha 9. > > You can build the distribution from the source tag > https://github.com/wso2/product-is/releases/tag/v5.4.0-alpha9 following > the steps below. > Are we not hosting the binaries...? Thanks & regards, -Prabath > > > *Building from the source* > > 1. Install Java8 or above > 2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#) > 3. Get a clone from https://github.com/wso2/product-is.git and > checkout to v5.4.0-alpha9 tag or you can directly download the source for > the tag from https://github.com/wso2/product-is/releases/tag/v5.4.0- > alpha9 > 4. Run the one of the below maven commands from product-is directory, > - *mvn** clean install* (To build the binary and source > distributions with the tests) > - *mvn** clean install -Dmaven.test.skip=true* (To build the binary > and source distributions, without running any of the unit/integration > tests) > 5. You can find the wso2is-5.4.0-alpha9.zip binary distribution in > product-is/modules/distribution/target directory. > > Please note that you need to have Java SE Development Kit *1.8 *to run > the binary distribution. > > The following list contains all the features, improvements, and bug fixes > available with the WSO2 Identity Server 5.4.0 Alpha 9 release. > Patch > > - [IDENTITY-6488 <https://wso2.org/jira/browse/IDENTITY-6488>] - SAML > Error when IDP init login, ACS not sent to notification.do > > Bug > > - [IDENTITY-3355 <https://wso2.org/jira/browse/IDENTITY-3355>] - > Better if only warning is shown for siganture varification failures (not > the whole exception) > - [IDENTITY-4956 <https://wso2.org/jira/browse/IDENTITY-4956>] - > Inconsistency in displaying the subject claim when a domain is set > - [IDENTITY-4995 <https://wso2.org/jira/browse/IDENTITY-4995>] - > Cannot change the certificate alias for a service provider when there's > more than one certificate > - [IDENTITY-5866 <https://wso2.org/jira/browse/IDENTITY-5866>] - KeyId > hard-coded in DefaultIDTokenBuilder > - [IDENTITY-5922 <https://wso2.org/jira/browse/IDENTITY-5922>] - When > invoking OAuth2TokenValidationService, updated user roles are not reflected > in retrieved claims of the JWT token, till cache timeout or server restart > - [IDENTITY-5994 <https://wso2.org/jira/browse/IDENTITY-5994>] - NPE > thrown when testing cause of exception in OAuth2Service.issueAccessToken > () > - [IDENTITY-6075 <https://wso2.org/jira/browse/IDENTITY-6075>] - > Receives the Primary-IS admin user info, when calling userinfo endpoint > with SAML2 Bearer grant type with SAML federated scenario > - [IDENTITY-6288 <https://wso2.org/jira/browse/IDENTITY-6288>] - Move > the common code in id token and userinfo, to util > - [IDENTITY-6327 <https://wso2.org/jira/browse/IDENTITY-6327>] - List > of claims returned in IDToken and Userinfo don't get updated when we update > requested claims configuration > - [IDENTITY-6331 <https://wso2.org/jira/browse/IDENTITY-6331>] - alg > header in JWT token is not valid for IS 5.0.0 > - [IDENTITY-6332 <https://wso2.org/jira/browse/IDENTITY-6332>] - The > “exp” value in the JWT tokens must in RFC7519 compliant format > - [IDENTITY-6354 <https://wso2.org/jira/browse/IDENTITY-6354>] - Two > confirmation windows coming when updating the user with all existing roles > - [IDENTITY-6358 <https://wso2.org/jira/browse/IDENTITY-6358>] - Error > when adding workflows in tenant mode for external BPS profiles > - [IDENTITY-6376 <https://wso2.org/jira/browse/IDENTITY-6376>] - SAML2 > Web SSO Configuration (Federated Authenticator) default Signature Algorithm > is set to DSA with SHA1 > - [IDENTITY-6385 <https://wso2.org/jira/browse/IDENTITY-6385>] - > Internal Server Error for Client Credential Grant with openid scope OOB > - [IDENTITY-6386 <https://wso2.org/jira/browse/IDENTITY-6386>] - self > sign up not working in tenant mode > - [IDENTITY-6391 <https://wso2.org/jira/browse/IDENTITY-6391>] - > [Service Provider SAML2 Web SSO configuration] Default Value of Certificate > Alias should be wso2carbon > - [IDENTITY-6404 <https://wso2.org/jira/browse/IDENTITY-6404>] - Error > in SAML2 Bear token grant validation for tenant users when "Use tenant > domain in local subject identifier" option is unchecked > - [IDENTITY-6480 <https://wso2.org/jira/browse/IDENTITY-6480>] - > Calling OAuth2ValidationService with a valid token when > AuthorizationContextTokenGeneration is enabled throws a back end error > - [IDENTITY-6496 <https://wso2.org/jira/browse/IDENTITY-6496>] - A > white-space in-between Authorization: Basic and > <Base64Encoded(Client_Id:Client_Secret)> leads to a Nullpointer when > generating access token using refresh token > - [IDENTITY-6505 <https://wso2.org/jira/browse/IDENTITY-6505>] - > Invoking user-info endpoint using playground sample fails when using email > as the user name > - [IDENTITY-6558 <https://wso2.org/jira/browse/IDENTITY-6558>] - > SAML2.IsPassiveAuthn=true is not available in travelocity.properties > - [IDENTITY-6581 <https://wso2.org/jira/browse/IDENTITY-6581>] - Error > with SAML Extension Grant Type > - [IDENTITY-6703 <https://wso2.org/jira/browse/IDENTITY-6703>] - Bad > Grammar in the exception: "SAML Assertion not found in the Response" > - [IDENTITY-6736 <https://wso2.org/jira/browse/IDENTITY-6736>] - All > the query params in "Additional Query Parameters" of federated oauth/openid > connect IDP config is not visible in management console > - [IDENTITY-6797 <https://wso2.org/jira/browse/IDENTITY-6797>] - Stack > trace of exception displayed in web browser in case of empty SAMLRequest > - [IDENTITY-6805 <https://wso2.org/jira/browse/IDENTITY-6805>] - NPE > possibility in NTLMAuthenticationGrantHandler > - [IDENTITY-6895 <https://wso2.org/jira/browse/IDENTITY-6895>] - > Claims not returned properly after SP requested claims updated > - [IDENTITY-6896 <https://wso2.org/jira/browse/IDENTITY-6896>] - > Oauth2 Revoke endpoint does not validate repeated parameters > - [IDENTITY-6897 <https://wso2.org/jira/browse/IDENTITY-6897>] - Claim > filtering not handled in UserInfoJWTResponseBuilder > - [IDENTITY-6898 <https://wso2.org/jira/browse/IDENTITY-6898>] - > Revoke endpoint sends an Unauthorized response when Invalid Authorization > header exists, but the token is empty. > - [IDENTITY-6901 <https://wso2.org/jira/browse/IDENTITY-6901>] - > Validate subjectConfirmationData time limits to fall within the time window > given in the Conditions in the saml assertion > - [IDENTITY-6909 <https://wso2.org/jira/browse/IDENTITY-6909>] - HTML > tags should be closed properly > > Improvement > > - [IDENTITY-2530 <https://wso2.org/jira/browse/IDENTITY-2530>] - Make > refresh tokens optional for SAML2 Bearer grant type > - [IDENTITY-4980 <https://wso2.org/jira/browse/IDENTITY-4980>] - > Exception during access token generation right after expiration > - [IDENTITY-5483 <https://wso2.org/jira/browse/IDENTITY-5483>] - > Validate user against given user store and save correct user domain in > saml2-bearer grant type. > - [IDENTITY-5975 <https://wso2.org/jira/browse/IDENTITY-5975>] - Need > to handle errors in oAuth Endpoints > - [IDENTITY-6224 <https://wso2.org/jira/browse/IDENTITY-6224>] - > Improve logs in controlClaimsFromScope() of SAMLAssertionClaimsCallback > class > - [IDENTITY-6900 <https://wso2.org/jira/browse/IDENTITY-6900>] - Make > subject claim consistent across all grant types > > > > *Contribute to WSO2 Identity Server* > > *Mailing Lists* > > Join our mailing lists and correspond with the developers directly. We > also encourage you to take part in discussions related to the product in > the architecture mailing list. If you have any questions regarding the > product you can use our StackOverflow forum to raise them as well. > > - Developer List: dev@wso2.org > - Architecture List: architect...@wso2.org > - User Forum: StackOverflow > <http://stackoverflow.com/questions/tagged/wso2is> > > Reporting Issues > We encourage you to report issues, improvements, and feature requests > regarding WSO2 Identity Server through our public WSO2 Identity Server > JIRA <https://wso2.org/jira/projects/IDENTITY/issues>. > > ~ The WSO2 Identity and Access Management Team ~ > > > > Thanks, > Farasath Ahamed > Software Engineer, WSO2 Inc.; http://wso2.com > Mobile: +94777603866 > Blog: blog.farazath.com > Twitter: @farazath619 <https://twitter.com/farazath619> > <http://wso2.com/signature> > > > -- Thanks & Regards, Prabath Twitter : @prabath LinkedIn : http://www.linkedin.com/in/prabathsiriwardena Mobile : +1 650 625 7950 http://facilelogin.com
_______________________________________________ Dev mailing list Dev@wso2.org http://wso2.org/cgi-bin/mailman/listinfo/dev