Skip to content

Releases: ITfoxtec/FoxIDs

Version 1.17.5

01 May 15:09
d61d784

Choose a tag to compare

  • Make Control Client prettier when using least privilege.
  • Make it possible to query environments with least privileges and get a result based on the access.
  • Log and show request method in logs.

Bugs fixed:

  • Spelling mistakes in code, change the scope/role access rights element from Base to Basic and thus follow the documentation.
  • Add missing access rights for environments to accept the overall scope/roles foxids:tenant:track and foxids:tenant:track[xxxx] instead of only access rights with least privileges.

Version 1.17.4

30 Apr 09:12
1bd167f

Choose a tag to compare

  • When a new tenant is created, an administrator user is added to the master environment with the admin role. If the administrator user does not need to change the password. The administrator user is now also added in the other environments in the tenant as basic users without the admin role.

Bugs fixed:

  • The FoxIDs logo was displayed with incorrect font on iOS due to missing imbedded font.

Version 1.17.3

25 Apr 12:28
713a3dc

Choose a tag to compare

  • Support OpenSearch with self-signed certificate by using the setting Settings.OpenSearch.AllowInsecureCertificates: true.
  • Support OpenSearch migration with optional OpenSearch query configuration and cross-cluster search.
  • Support SMTP without username and password authenticate.

Version 1.17.2

22 Apr 14:36
bd06cf2

Choose a tag to compare

  • Support IIS deployment on Windows server.
  • Support both HTTP and HTTPS, but you should always use HTTPS in production.
  • When a new user is created in the login UI. Changed to not confirm the account if not configured.

Version 1.16.9

03 Apr 14:00
a13f68d

Choose a tag to compare

  • Support Home Realm Discovery (HRD) based on IP addresses, IP Ranges and regular expressions, docs.
  • Full support for SAML 2.0 IdP-Initiated Login in OpenID Connect applications with IdP-Initiated Login grant functionality to avoid an extra round-trip to the external IdP, docs.

Version 1.16.7

27 Mar 13:33
6244da2

Choose a tag to compare

  • Support matching issuer and authority with application specific issuers in OpenID Connect and OAuth 2.0 applications.

Version 1.16.5

24 Mar 10:58
057b8c6

Choose a tag to compare

  • Add refresh_token_expires_in in token response. Contains the number of seconds remaining until the refresh token expires. Not included if the refresh token has unlimited lifetime.

Bugs resolved:

Version 1.16.4

20 Mar 13:23
7face05

Choose a tag to compare

  • Support SAML 2.0 IdP-Initiated login in SAML 2.0 authentication methods and forward the login to SAML 2.0 and OpenID Connect applications.
  • Control API methods to list users locked for an observation period and remove the user from the observation period.
  • Control Client UI to show users locked for an observation period and remove the user from the observation period.
  • Not send emails and SMS if the user are locked for an observation period.
  • Delete the users refresh token grants in all Login authentication methods (it is possible to configure more then one).

Version 1.16.1

13 Mar 13:21
2e45aff

Choose a tag to compare

  • Control API methods to list and invalidate refresh token grants.
  • Control Client UI to list and invalidate refresh token grants.
    image

Bugs resolved:

  • Not invalidating track cache when the JWT to SAML 2.0 claim mapping is updated automatically.
  • Refresh token grants is not deleted on logout in environment links.

Version 1.15.22

06 Mar 15:01
f4e78a2

Choose a tag to compare

  • Change the SAML 2.0 relay state's maximum length to 20,000 characters (before 2,000 characters).
  • Query error and warning logs separately.