On Fri, Dec 1, 2017 at 10:57 PM, Jayanga Kaushalya <jayan...@wso2.com>
wrote:

> The WSO2 Identity and Access Management team is pleased to announce the
> release of WSO2 Identity Server 5.4.0 Beta.
>
> You can build the distribution from the source tag,
>
> Runtime: https://github.com/wso2/product-is/releases/tag/v5.4.0-beta
> Analytics: https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta
>
> following the steps given below.
>
> *Building from the source*
>
>    1. Install Java8 or above
>    2. Install Apache Maven 3.x.x(https://maven.apache.org/download.cgi#)
>    3. Get the source,
>       - For the Runtime: Get a clone from https://github.com/wso2/p
>       roduct-is.git and checkout to v5.4.0-beta tag or you can directly
>       download the source for the tag from https://github.com/wso2/p
>       roduct-is/releases/tag/v5.4.0-beta
>       <https://github.com/wso2/product-is/releases/tag/v5.4.0-beta>
>       - For the Analytics: Get a clone from https://github.com/wso2/
>       analytics-is.git and checkout to v5.4.0-beta tag or you can
>       directly download the source for the tag from
>       https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta
>       <https://github.com/wso2/analytics-is/releases/tag/v5.4.0-beta>
>    4. Run the one of the below maven commands from product-is directory,
>       - *mvn** clean install* (To build the binary and source
>       distributions with the tests)
>       - *mvn** clean install -Dmaven.test.skip=true* (To build the binary
>       and source distributions, without running any of the unit/integration 
> tests)
>    5. You can find the,
>       - wso2is-5.4.0-beta.zip binary distribution in
>       product-is/modules/distribution/target directory.
>       - wso2is-analytics-5.4.0-beta.zip binary distribution in
>       analytics-is/modules/distribution/target directory.
>
> The following list contains all the features, improvements, and bug fixes
> available with the WSO2 Identity Server 5.4.0 Beta release.
>

What is reason for following two sections patch & bug.  What is the
difference ?

Thanks,
Asela.


>
>
> Patch
>
>    - [IDENTITY-6198 <https://wso2.org/jira/browse/IDENTITY-6198>] - IS
>    Authentication Flow Behavior Between Multiple Service Providers Not Handled
>    - [IDENTITY-6924 <https://wso2.org/jira/browse/IDENTITY-6924>] - Add
>    ability to sign SAML response using different key other than the private
>    key defined in the primary keystore in the carbon.xml
>    - [IDENTITY-6931 <https://wso2.org/jira/browse/IDENTITY-6931>] -
>    Adding logout support for outbound WS-Federation(Passive)
>    - [IDENTITY-6988 <https://wso2.org/jira/browse/IDENTITY-6988>] -
>    ClientAuthHandler configuration in identity.xml only read last property in
>    OAuthServerConfiguration
>
> Bug
>
>    - [IDENTITY-2861 <https://wso2.org/jira/browse/IDENTITY-2861>] -
>    Receive fault response from RemoteClaimManagerService
>    - [IDENTITY-4331 <https://wso2.org/jira/browse/IDENTITY-4331>] - When
>    you add Google Prov Connector in a SP OB Provisioning Configuration
>    section, You cannot edit IDP again. Lead to a blank page and NPE
>    - [IDENTITY-4655 <https://wso2.org/jira/browse/IDENTITY-4655>] -
>    Google provisioning not working with IS 5.2.0 beta
>    - [IDENTITY-4968 <https://wso2.org/jira/browse/IDENTITY-4968>] -
>    Subject claim is returned in the incorrect format when subject claim uri is
>    added/removed
>    - [IDENTITY-5154 <https://wso2.org/jira/browse/IDENTITY-5154>] - When
>    select Domain as PRIMARY Count users always set to -1
>    - [IDENTITY-6102 <https://wso2.org/jira/browse/IDENTITY-6102>] -
>    System claims can be modified by the User
>    - [IDENTITY-6118 <https://wso2.org/jira/browse/IDENTITY-6118>] - Some
>    properties of a Custom Inbound Authenticator is not displaying in UI
>    properly
>    - [IDENTITY-6286 <https://wso2.org/jira/browse/IDENTITY-6286>] - OIDC
>    - Wrong claim value in ID token when multiple IDPs used through federated
>    authentication
>    - [IDENTITY-6345 <https://wso2.org/jira/browse/IDENTITY-6345>] - Ask
>    passoword with management console (SOAP service)not working
>    - [IDENTITY-6350 <https://wso2.org/jira/browse/IDENTITY-6350>] -
>    Account gets locked even if the fails are not consecutive
>    - [IDENTITY-6352 <https://wso2.org/jira/browse/IDENTITY-6352>] -
>    cannot edit existing workflow without changing workflow name
>    - [IDENTITY-6353 <https://wso2.org/jira/browse/IDENTITY-6353>] -
>    cannot disable workflow engagements
>    - [IDENTITY-6355 <https://wso2.org/jira/browse/IDENTITY-6355>] -
>    secondary roles are not displayed when creating workflows in tenant mode
>    - [IDENTITY-6361 <https://wso2.org/jira/browse/IDENTITY-6361>] -
>    NumberFormatException with server startup with Oracle
>    - [IDENTITY-6369 <https://wso2.org/jira/browse/IDENTITY-6369>] -
>    Intermittent error when login in to dashboard after some idle time
>    - [IDENTITY-6371 <https://wso2.org/jira/browse/IDENTITY-6371>] -
>    Account Recovery - Password Reset with email notification has a placeholder
>    in confirmation url
>    - [IDENTITY-6378 <https://wso2.org/jira/browse/IDENTITY-6378>] - High
>    load average observed in OAuth scnearios during performance tests
>    - [IDENTITY-6381 <https://wso2.org/jira/browse/IDENTITY-6381>] -
>    Account Recovery via Security Questions(using dashboard)fails for a tenant
>    user
>    - [IDENTITY-6387 <https://wso2.org/jira/browse/IDENTITY-6387>] -
>    Forced Password Reset - OTP fails when user tries to reset the password
>    - [IDENTITY-6388 <https://wso2.org/jira/browse/IDENTITY-6388>] -
>    Forced Password Reset - Offline fails when user tries to reset the password
>    - [IDENTITY-6394 <https://wso2.org/jira/browse/IDENTITY-6394>] -
>    Creating roles with no permission/normal permissions not working once the
>    flow failed
>    - [IDENTITY-6397 <https://wso2.org/jira/browse/IDENTITY-6397>] -
>    Google federation with Passive STS fails
>    - [IDENTITY-6401 <https://wso2.org/jira/browse/IDENTITY-6401>] - SAML
>    federation with Passive STS with email usernames fails
>    - [IDENTITY-6407 <https://wso2.org/jira/browse/IDENTITY-6407>] -
>    Userstore domain does not append with the subject identifier for 'Primary'
>    userstore users even the SP is configured to append userstore domain
>    - [IDENTITY-6411 <https://wso2.org/jira/browse/IDENTITY-6411>] -
>    Grammatical error in the error message.
>    - [IDENTITY-6412 <https://wso2.org/jira/browse/IDENTITY-6412>] - OIDC
>    federation with Passive STS with email usernames fails
>    - [IDENTITY-6414 <https://wso2.org/jira/browse/IDENTITY-6414>] - When
>    associating two local users to the same IDP it should display a proper
>    error messgage
>    - [IDENTITY-6415 <https://wso2.org/jira/browse/IDENTITY-6415>] - Error
>    during session cleanup task
>    - [IDENTITY-6416 <https://wso2.org/jira/browse/IDENTITY-6416>] - Need
>    UI validation when changing the password of the logged in user
>    - [IDENTITY-6422 <https://wso2.org/jira/browse/IDENTITY-6422>] -
>    Secondary User Store creation failure in windows
>    - [IDENTITY-6423 <https://wso2.org/jira/browse/IDENTITY-6423>] - Two
>    update clicks removes Enable Dumb Mode for SCIM tick - UI update issue
>    - [IDENTITY-6424 <https://wso2.org/jira/browse/IDENTITY-6424>] -
>    Server start-up throws an error when email UserName is enabled
>    - [IDENTITY-6428 <https://wso2.org/jira/browse/IDENTITY-6428>] - SCIM
>    Endpoints shows in the resident IDP UI does not change when the default
>    9443 port is changed in the server
>    - [IDENTITY-6432 <https://wso2.org/jira/browse/IDENTITY-6432>] - Error
>    log prints when enable old identity listeners with oracle database
>    - [IDENTITY-6435 <https://wso2.org/jira/browse/IDENTITY-6435>] - Error
>    when try to setup challenge questions using dasboard (for email username)-
>    with old identity listeners
>    - [IDENTITY-6439 <https://wso2.org/jira/browse/IDENTITY-6439>] -
>    ChallengeQuestions based Password Recovery does not work
>    - [IDENTITY-6443 <https://wso2.org/jira/browse/IDENTITY-6443>] -
>    Increase column size for access token and refresh token to support token
>    encryption with 2048 key size
>    - [IDENTITY-6449 <https://wso2.org/jira/browse/IDENTITY-6449>] -
>    Warning log in server startup regarding the secondary userstore
>    - [IDENTITY-6452 <https://wso2.org/jira/browse/IDENTITY-6452>] - SAML
>    logout response sending failure in windows
>    - [IDENTITY-6460 <https://wso2.org/jira/browse/IDENTITY-6460>] - Git
>    provisioning with facebook IDP throws an error when email user name is NOT
>    enabled
>    - [IDENTITY-6465 <https://wso2.org/jira/browse/IDENTITY-6465>] - Set
>    of claims of the federated user is sent when the federated user is
>    associated to a local user and there is no requested claims at SP configs.
>    - [IDENTITY-6550 <https://wso2.org/jira/browse/IDENTITY-6550>] -
>    Possible NPE
>    - [IDENTITY-6573 <https://wso2.org/jira/browse/IDENTITY-6573>] - NPE
>    observed when click on edit link to update IDP
>    - [IDENTITY-6582 <https://wso2.org/jira/browse/IDENTITY-6582>] - List
>    new endpoints - e.g. DCR - in Resident IdP UI
>    - [IDENTITY-6585 <https://wso2.org/jira/browse/IDENTITY-6585>] -
>    Removing users from a role completely delete the provisioned user in SCIM
>    outbound provisioning
>    - [IDENTITY-6648 <https://wso2.org/jira/browse/IDENTITY-6648>] -
>    Cannot initialize Balana by reading a configuration file
>    - [IDENTITY-6680 <https://wso2.org/jira/browse/IDENTITY-6680>] -
>    Claims with same claim URI (i.e. without the dialect URI prefix) as in
>    other dialects, are not getting added to IDN_CLAIM table
>    - [IDENTITY-6682 <https://wso2.org/jira/browse/IDENTITY-6682>] - Add
>    ClaimDialectUri and PrefixClaimDialectUri facebook authenticator configs in
>    application-authentication.xml
>    - [IDENTITY-6743 <https://wso2.org/jira/browse/IDENTITY-6743>] - "User
>    self registration code expiry time" UI config is not enabled by default
>    - [IDENTITY-6749 <https://wso2.org/jira/browse/IDENTITY-6749>] -
>    [Intermittent] Only one user is provisioned when I configured Salesforce
>    outbound provisioning.
>    - [IDENTITY-6755 <https://wso2.org/jira/browse/IDENTITY-6755>] -
>    Salesforce users are not provisioned when you define rules
>    - [IDENTITY-6778 <https://wso2.org/jira/browse/IDENTITY-6778>] -
>    JSPException while including path 
> '/application/configure-service-provider.jsp'
>    with custom inbound authenticators
>    - [IDENTITY-6811 <https://wso2.org/jira/browse/IDENTITY-6811>] - CSRF
>    token validation fails for 'My Login Sessions' gadget in IS user dashboard
>    - [IDENTITY-6816 <https://wso2.org/jira/browse/IDENTITY-6816>] -
>    [CLUSTER] Unable to log in to the IS Dashbaord
>    - [IDENTITY-6819 <https://wso2.org/jira/browse/IDENTITY-6819>] - When
>    Updating the IDP, Backend gives the following error
>    - [IDENTITY-6821 <https://wso2.org/jira/browse/IDENTITY-6821>] - TOTP
>    is not working with WUM updated 5.3.0 pack
>    - [IDENTITY-6840 <https://wso2.org/jira/browse/IDENTITY-6840>] - TOTP
>    is not working with WUM updated IS-KM 5.3.0 pack
>    - [IDENTITY-6841 <https://wso2.org/jira/browse/IDENTITY-6841>] -
>    Cannot log in to analytics dashboard portal with created credentials
>    - [IDENTITY-6877 <https://wso2.org/jira/browse/IDENTITY-6877>] -
>    remote-user-mgt sample which is a web service client for authentication and
>    user admin services doesn't work
>    - [IDENTITY-6915 <https://wso2.org/jira/browse/IDENTITY-6915>] - Error
>    when using multiple federated authenticators in second step authentication
>    and sending fidp parameter as a query param
>    - [IDENTITY-6927 <https://wso2.org/jira/browse/IDENTITY-6927>] -
>    Tenant rewrite valve does not work with tomcat 7.0.81 upgrade
>    - [IDENTITY-6941 <https://wso2.org/jira/browse/IDENTITY-6941>] - SCIM
>    1.1 Group PUT does not work
>    - [IDENTITY-6946 <https://wso2.org/jira/browse/IDENTITY-6946>] - JWKS
>    endpoint modulus value 'n' contains an additional bit
>    - [IDENTITY-6951 <https://wso2.org/jira/browse/IDENTITY-6951>] - User
>    management UI fails to identify the logged in user when user use different
>    case for domain name or user name
>    - [IDENTITY-6954 <https://wso2.org/jira/browse/IDENTITY-6954>] -
>    Authorization Code not revoked after first use when PKCE is enabled and
>    invalid verifier is submitted
>    - [IDENTITY-6955 <https://wso2.org/jira/browse/IDENTITY-6955>] - With
>    the introspection response the user name comes with the appended tenant
>    domain.
>    - [IDENTITY-6957 <https://wso2.org/jira/browse/IDENTITY-6957>] - User
>    list does not get refreshed during the retry, after getting an error during
>    the role add flow
>    - [IDENTITY-6958 <https://wso2.org/jira/browse/IDENTITY-6958>] -
>    OAuth/DCR does not rollback properly if the app creation fails due to an
>    error.
>    - [IDENTITY-6959 <https://wso2.org/jira/browse/IDENTITY-6959>] -
>    Tenant flow might not close properly if an exception occurs during app
>    creation
>    - [IDENTITY-6961 <https://wso2.org/jira/browse/IDENTITY-6961>] - OIDC
>    DCR throws 500 for an invalid registration request instead of 400
>    - [IDENTITY-6963 <https://wso2.org/jira/browse/IDENTITY-6963>] - Rule
>    based outbound provisioning is not working
>    - [IDENTITY-6965 <https://wso2.org/jira/browse/IDENTITY-6965>] -
>    Intermitent issue in SCIM group creation
>    - [IDENTITY-6967 <https://wso2.org/jira/browse/IDENTITY-6967>] -
>    Initializing issue in provisioning connectors
>    - [IDENTITY-6970 <https://wso2.org/jira/browse/IDENTITY-6970>] -
>    Secondary user stores Users not loading in Workflow user search UI
>    - [IDENTITY-6974 <https://wso2.org/jira/browse/IDENTITY-6974>] -
>    Federated links disappear after failing first attempt in basicauth in SSO
>    login flow
>    - [IDENTITY-6975 <https://wso2.org/jira/browse/IDENTITY-6975>] -
>    AccessTokenDAOImpl connection pool rollback Error
>    - [IDENTITY-6976 <https://wso2.org/jira/browse/IDENTITY-6976>] -
>    Logout from the user-dashboard fails with an error
>    - [IDENTITY-6993 <https://wso2.org/jira/browse/IDENTITY-6993>] -
>    Authorization code grant type is not working
>    - [IDENTITY-6994 <https://wso2.org/jira/browse/IDENTITY-6994>] -
>    Reusing authorization code twice does not revoke the access token issued to
>    it
>
> Task
>
>    - [IDENTITY-6538 <https://wso2.org/jira/browse/IDENTITY-6538>] -
>    Improve unit tests coverage for identity-application-authz-xacml
>
> Improvement
>
>    - [IDENTITY-5007 <https://wso2.org/jira/browse/IDENTITY-5007>] -
>    Register OAuth/OpenID Connect Service provider using single request.
>    - [IDENTITY-5514 <https://wso2.org/jira/browse/IDENTITY-5514>] -
>    Change grant-type via configuration
>    - [IDENTITY-5638 <https://wso2.org/jira/browse/IDENTITY-5638>] - OIDC
>    - Support to extend IDP session
>    - [IDENTITY-5861 <https://wso2.org/jira/browse/IDENTITY-5861>] - SAML2
>    AuthnContextClassRef returned from the Federated IDP should return to the
>    applications.
>    - [IDENTITY-6077 <https://wso2.org/jira/browse/IDENTITY-6077>] -
>    Create JWT access token in Identity Server
>    - [IDENTITY-6512 <https://wso2.org/jira/browse/IDENTITY-6512>] -
>    [Workflows] Cannot edit other attributes of the workflow without editing
>    the workflow name
>    - [IDENTITY-6589 <https://wso2.org/jira/browse/IDENTITY-6589>] -
>    Supplementary OSGi service for adding new claims to ID token
>    - [IDENTITY-6801 <https://wso2.org/jira/browse/IDENTITY-6801>] -
>    Proper UI indication needed where there are no service providers to list
>    - [IDENTITY-6966 <https://wso2.org/jira/browse/IDENTITY-6966>] -
>    Implemented Self contained access token validator
>    - [IDENTITY-6980 <https://wso2.org/jira/browse/IDENTITY-6980>] - Add
>    wildcard * support for scim group name filtering
>
>
> *Contribute to WSO2 Identity Server*
>
> *Mailing Lists*
>
> Join our mailing lists and correspond with the developers directly. We
> also encourage you to take part in discussions related to the product in
> the architecture mailing list. If you have any questions regarding the
> product you can use our StackOverflow forum to raise them as well.
>
>    - Developer List: dev@wso2.org
>    - Architecture List: architect...@wso2.org
>    - User Forum: StackOverflow
>    <http://stackoverflow.com/questions/tagged/wso2is>
>
> Reporting Issues
> We encourage you to report issues, improvements, and feature requests
> regarding WSO2 Identity Server through our public WSO2 Identity Server
> JIRA <https://wso2.org/jira/projects/IDENTITY/issues>.
>
> ~ The WSO2 Identity and Access Management Team ~
>
> *Jayanga Kaushalya*
> Senior Software Engineer
> Mobile: +94777860160 <+94%2077%20786%200160>
> WSO2 Inc. | http://wso2.com
> lean.enterprise.middleware
>
>
>


-- 
Thanks & Regards,
Asela

ATL
Mobile : +94 777 625 933
             +358 449 228 979

http://soasecurity.org/
http://xacmlinfo.org/
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to