Releases: ITfoxtec/FoxIDs
Releases · ITfoxtec/FoxIDs
Version 1.17.5
- Make Control Client prettier when using least privilege.
- Make it possible to query environments with least privileges and get a result based on the access.
- Log and show request method in logs.
Bugs fixed:
- Spelling mistakes in code, change the scope/role access rights element from
BasetoBasicand thus follow the documentation. - Add missing access rights for environments to accept the overall scope/roles
foxids:tenant:trackandfoxids:tenant:track[xxxx]instead of only access rights with least privileges.
Version 1.17.4
- When a new tenant is created, an administrator user is added to the master environment with the admin role. If the administrator user does not need to change the password. The administrator user is now also added in the other environments in the tenant as basic users without the admin role.
Bugs fixed:
- The FoxIDs logo was displayed with incorrect font on iOS due to missing imbedded font.
Version 1.17.3
- Support OpenSearch with self-signed certificate by using the setting
Settings.OpenSearch.AllowInsecureCertificates: true. - Support OpenSearch migration with optional OpenSearch query configuration and cross-cluster search.
- Support SMTP without username and password authenticate.
Version 1.17.2
- Support IIS deployment on Windows server.
- Support both HTTP and HTTPS, but you should always use HTTPS in production.
- When a new user is created in the login UI. Changed to not confirm the account if not configured.
Version 1.16.9
Version 1.16.7
- Support matching issuer and authority with application specific issuers in OpenID Connect and OAuth 2.0 applications.
Version 1.16.5
- Add
refresh_token_expires_inin token response. Contains the number of seconds remaining until the refresh token expires. Not included if the refresh token has unlimited lifetime.
Bugs resolved:
- https://control.foxids.com/api/swagger/v1/swagger.json return blank page because incorrect namespace in API method.
Version 1.16.4
- Support SAML 2.0 IdP-Initiated login in SAML 2.0 authentication methods and forward the login to SAML 2.0 and OpenID Connect applications.
- Control API methods to list users locked for an observation period and remove the user from the observation period.
- Control Client UI to show users locked for an observation period and remove the user from the observation period.
- Not send emails and SMS if the user are locked for an observation period.
- Delete the users refresh token grants in all Login authentication methods (it is possible to configure more then one).
Version 1.16.1
- Control API methods to list and invalidate refresh token grants.
- Control Client UI to list and invalidate refresh token grants.

Bugs resolved:
- Not invalidating track cache when the JWT to SAML 2.0 claim mapping is updated automatically.
- Refresh token grants is not deleted on logout in environment links.
Version 1.15.22
- Change the SAML 2.0 relay state's maximum length to 20,000 characters (before 2,000 characters).
- Query error and warning logs separately.