Releases: ITfoxtec/FoxIDs
Version 2.9.12
This release strengthens session lifecycle management across FoxIDs, improving how user sessions are created, updated, and removed.
It introduces new APIs for retrieving and deleting individual active sessions, prevents unintended session creation when session tracking is disabled, and improves robustness through safer active session updates.
New Features
-
Session cleanup on Control Client login
Ensure that user sessions are deleted when logging in through the Control Client, preventing stale sessions from persisting. -
Active session retrieval and deletion APIs
Added new APIs to:- Retrieve a single active session
- Delete a single active session
-
Respect disabled session settings
Sessions are no longer created in the Login authentication method when session settings are set to0(disabled). -
Safer active session updates
Added null checks before assigning applications and authentication methods to an active session, preventing unexpected failures.
Version 2.10.0-beta1
This release upgrades FoxIDs to .NET 10, bringing the latest runtime improvements and long term support benefits.
It also resolves a critical Windows Server issue where certificates could not be read reliably and adding fallback read methods.
New Features
Upgraded to .NET 10
FoxIDs now runs on .NET 10 for improved performance, security, and platform support.
Bug Resolved
Certificate loading reliability fix
A reliability issue affecting certificate loading on Windows Server in certain cases has been resolved.
Fallback certificate read methods have been added to ensure stable behavior across environments.
Version 2.9.9
This release introduces extensive improvements to claim handling, session management, authentication flows, UI functionality, and security hardening across FoxIDs.
Enhancements include richer claim transform capabilities, improved login and environment management in the Control Client, extended dynamic content and CSS generator support, stronger session validation, improved certificate handling, and refined security headers.
New Features
Claim Transform Enhancements
- Added support for saving claims on both internal and external users through a claim transform task.
- Added support for querying external users using the linked claim value in a claim transform task.
- Added the ability to select which claims are queried on internal or external users within a claim transform task.
- Added support for logging events that include claim values during claim transform execution.
- Added support for large text translations, used in UI elements displaying content such as terms and conditions.
- Dynamic content now supports checkbox fields, large text fields, and large HTML elements.
- Width support for Markdown formatting in text and large text fields.
Control Client Improvements
- Added easy access to log in to the test application again after logout.
- Environment Settings now auto-scrolls to the top after deleting an environment.
- Updated CSS generator with support for large content and checkbox elements.
Authentication and Protocol Improvements
- OpenID Connect now displays invalid redirect URIs on the generic error page.
- The SAML 2.0 application now checks the HTTP form for a login hint if it is not supplied via query parameters or the SAML 2.0 request from the relying party.
- Default behavior updated (new environments): refresh tokens are now deleted when a user changes or sets a password in master environments.
- Added support for active sessions stored in the database, allowing remote session termination.
- Access token sessions are now validated using the
sidclaim and active session data in the UserInfo endpoint. - Added support for deleting refresh token grants per session ID.
Security and System Enhancements
- Health checks can now verify individual dependencies separately.
- Updated jQuery Validate JavaScript library.
- Improved handling of security headers by allowing any request headers (not only Content-Type and Authorization) in Control.
- Added broader support for Permissions-Policy security headers.
- Stream logger now flushes only Application Insights data for improved performance.
- Improved certificate upload flow and added support for PEM files (
.crt+.key).
Version 2.9.6-beta3
This release introduces extensive improvements to claim handling, session management, authentication flows, UI functionality, and security hardening across FoxIDs.
Enhancements include richer claim transform capabilities, improved login and environment management in the Control Client, extended dynamic content and CSS generator support, stronger session validation, improved certificate handling, and refined security headers.
A critical bug related to certificate reading on Windows Server has also been resolved.
New Features
Claim Transform Enhancements
- Added support for saving claims on both internal and external users through a claim transform task.
- Added support for querying external users using the linked claim value in a claim transform task.
- Added the ability to select which claims are queried on internal or external users within a claim transform task.
- Added support for logging events that include claim values during claim transform execution.
Control Client Improvements
- Added easy access to log in to the test application again after logout.
- Environment Settings now auto-scrolls to the top after deleting an environment.
- Added support for large text translations, used in UI elements displaying content such as terms and conditions.
- Dynamic content now supports checkbox fields, large text fields, and large HTML elements.
- Updated CSS generator with support for large content and checkbox elements.
Authentication and Protocol Improvements
- OpenID Connect now displays invalid redirect URIs on the generic error page.
- The SAML 2.0 application now checks the HTTP form for a login hint if it is not supplied via query parameters or the SAML 2.0 request from the relying party.
- Default behavior updated (new environments): refresh tokens are now deleted when a user changes or sets a password in master environments.
- Added support for active sessions stored in the database, allowing remote session termination.
- Access token sessions are now validated using the
sidclaim and active session data in the UserInfo endpoint. - Added support for deleting refresh token grants per session ID.
Security and System Enhancements
- Health checks can now verify individual dependencies separately.
- Updated jQuery Validate JavaScript library.
- Improved handling of security headers by allowing any request headers (not only Content-Type and Authorization) in Control.
- Added broader support for Permissions-Policy security headers.
- Stream logger now flushes only Application Insights data for improved performance.
- Improved certificate upload flow and added support for PEM files (
.crt+.key).
Bug Resolved
Certificate loading reliability fix
A reliability issue affecting certificate loading on Windows Server in certain cases has been resolved.
Version 2.9.6-beta1
This release introduces extensive improvements to claim handling, session management, authentication flows, UI functionality, and security hardening across FoxIDs.
Enhancements include richer claim transform capabilities, improved login and environment management in the Control Client, extended dynamic content support, stronger session validation, and refined security headers.
A critical bug related to certificate reading on Windows Server has also been resolved.
New Features
Claim Transform Enhancements
- Added support for saving claims on both internal and external users through a claim transform task.
- Added support for querying external users using the linked claim value in a claim transform task.
- Added the ability to select which claims are queried on internal or external users within a claim transform task.
- Added support for logging events that include claim values during claim transform execution.
Control Client Improvements
- Added easy access to log in to the test application again after logout.
- Environment Settings now auto-scrolls to the top after deleting an environment.
- Added support for large text translations, used in UI elements displaying content such as terms and conditions.
- Dynamic content now supports checkbox fields, large text fields, and large HTML elements.
Authentication and Protocol Improvements
- OpenID Connect now displays invalid redirect URIs on the generic error page.
- The SAML 2.0 application now checks the HTTP form for a login hint if it is not supplied via query parameters or the SAML 2.0 request from the relying party.
- Default behavior updated (new environments): refresh tokens are now deleted when a user changes or sets a password in master environments.
- Added support for active sessions stored in the database, allowing remote session termination.
- Access token sessions are now validated using the
sidclaim and active session data in the UserInfo endpoint.
Security and System Enhancements
- Health checks can now verify individual dependencies separately.
- Updated jQuery Validate JavaScript library.
- Improved handling of security headers by allowing any request headers (not only Content-Type and Authorization) in Control.
- Added broader support for Permissions-Policy security headers.
- Stream logger now flushes only Application Insights data for improved performance.
Bug Resolved
- Certificate loading reliability fix
The Read Certificate API now usesEphemeralKeySet, ensuring certificates are processed entirely in memory instead of disk.
This fixes an issue where certificates could not be read on Windows Server in certain cases.
Version 2.8.4
This release addresses a bug in the Control Client where OpenID Connect applications displayed an incorrect authority value.
The fix ensures that applications now show the correct authority configuration.
Bugs Fixed
- Incorrect authority displayed in OpenID Connect applications
The Control Client previously showed an incorrect authority for OpenID Connect applications.
This issue has been resolved - the correct authority is now displayed.
Version 2.8.3
This update introduces a configuration change to how refresh token grants are handled during request password changes.
It improves flexibility by allowing administrators to control whether refresh tokens should be deleted when a password change or password setup is requested via email or SMS confirmation.
Changing Feature
- Configurable refresh token grant deletion
Refresh token grants are no longer automatically deleted when a password change or a password setup via email or SMS confirmation code is requested for a user in the Control Client or Control API.
Instead, it is configurable perLoginauthentication method whether refresh token grants should be deleted when a password change occurs.