Release highlights
This release focuses on introduction of the following new features and improvements:
We have improved OAuth2.0 flow support, according to RFC6749 section 2.3.1, to include URL encoded client credentials. This feature is being released with a feature flag, off as a default. This means if your environment requires URL encoding of client credentials you will need to activate the feature flag. NOTE: this feature should be tested for backwards compatibility in your environment. Ensure that you review both the ClientID and the secret URL decoding prior to enabling this feature in your production environment. You can review specifics here. And general guidance for OAuth 2.0 integration here.
Important change for customers with multi-node LDAP deployments, the default setting for the cleanuplockEnabled has been updated to true, or on. This setting ensures that the memory management improvements added in SSO 9.3 and SSO 9.4 will be taken into use, optimising the caching and memory management of SSO in large, active environments. See the IDS-4926 ticket below.
Important - see IDS-4449 SSO OAuth2 should support URL encoded client credentials to support section 2.3.1 of RFC6749.
NOTES
Postgres Update see. IDS-4904
LDAP remains on 2.5.16, no substantial improvements or requirements found in 2.5.18
Centos OS removal
Tomcat - there were backward incompatible changes discovered by the global community with Tomcat 9.0.91, these were resolved and tomcat has been updated to 9.0.xx for SSO 9.5
CertAP IDS-4895 runs in java11 with slf4j
Please ensure you review the updated System Recommendations page and are aware of the 3rd Party License page.
Contents
Table of Contents | ||
---|---|---|
|
Change log
SSO 9.5.0
New Features
Improvements
- IDS-2429 - An often requested, but low level improvement to SSO is to create an example-template location within the installation package to permit Administrators creating new environments to more easily locate all of the available configuration options. create or show link here.
- IDS-4926 - Customers with multi-node LDAP deployments will benefit from the memory management improvement made in SSO session manager. Specifically, the "cleanupLockEnabled" has been set to default true, which means this memory management improvement is applied as default. Please see the Configuring cleanup of expired SSO sessions in OpenLDAP for more information.
- IDS-4818 - An improvement has been made to both UI and API for SSO when creating or updated an applications metadata to ensure a unique clientID is used. For more detail please see OAuth 2.0 provider implementation reference - SSO, specifically the Request Parameters table.
- IDS-3429 - Improved SMS authentication method (SPI Mobile Phone) to include both GET and POST message sending methods. Default remains as a GET. Please see the documentation, section 6. Click SPI Mobile Phone tab, for more detail.
- IDS-4856 - Improvements found in Audit Logging for the external module supporting Swedish BankID. The AuditClientDisplayName will enable the Client Display name to be logged with each login event.
- IDS-3330 - Ability to configure the timeout value within Redis when used with SSO. Please see Timeout Configuration on Redis Configuration - SSO.
- IDS-4885 - Password applications which use URL encoded client secret will function, see also IDS-4886 in the CustomerID section.
- IDS-4449 - see ticket
Corrections
- IDS-4868 - Through a customers low level auditing of SSO there was a hypothetical XML expansion bug found within SSO. With extensive knowledge of SSO, it is possible to craft a hypothetical attack, however in testing these attacks were found to result in "Ticket Validation Error" being displayed to the user (attemptive attacker) and ERROR messages being logged. During the investigation an implementable solution was found, therefore it was decided to remove even this theoretical attack vector.
- IDS-4763 - (need to work this one)
- IDS-4526 -
- IDS-4431 - client credentials Oauth response improvement
- IDS-3117 - removal of body option from TOTP GET call
- IDS-3026 - Corrected deviation found in the use of RSA-OAEP-256 encryption and decryption.
IDS-2314 - This item is not a defect, SSO verifies the account represented by refresh token still exists, is enabled etc. when a refresh token is used to get a new access token. This is obviously not possible with unregistered users where we by definition have no record of the account. Historically, this ticket carried the following description: There is a known issue with passing a refresh token to token endpoint results in "invalid_grant" error, if the refresh token has been issued to an unregistered user from an authentication method having a connected Directory Service. This issue is now closed. Please open a Service Desk ticket if you require additional details.
Modules
- Within IDS 2024.2, SSO 9.5, our external module Metadate Updater has been improved to update its functionality when used within Identity Cloud, specifically for use on linux systems and with Java11. These updates will be included in downloadable updates which will be provided as a supplemental release during the upcoming months. If you or your customer utilises Metadata Updater, please open a support ticket which includes your environment parameters (windows/linux and which version of SSO and CustomerID are in place) to determine if the updated Metadata Updater should be used.
- SAML SP for Java with SSO 9.5 - see IDS-3838, as this has been updated for Java11 and slf4j logging.