UAA 3.4.0 Release Announcement


Sree Tummidi
 

Hi,

On behalf of the entire Identity team I am pleased to announce the release
of UAA 3.4.0 <https://github.com/cloudfoundry/uaa/releases/tag/3.4.0>
The UAA bosh release based on this version can be found here
<http://bosh.io/releases/github.com/cloudfoundry/uaa-release>

New Features

Permanent home for UAA API Docs @ http://docs.cloudfoundry.org/api/uaa/
Identity Provider Discovery

UAA now supports Identity Provider discovery when multiple SAML or OpenID
Connect Identity Providers are enabled for any given identity zone. The
right identity provider is discovered based on the email domain associated
with the provider. The login experience has been updated to prompt the user
for the email based on which the right identity provider is discovered and
the user is redirected to the same.

The discovery flow can also be used for OAuth Clients which are associated
with more than one allowed providers. The OAuth enabled application can
also send a login hint containing the email domain so that the right
Identity Provider can be discovered without the user having to enter the
email address on the login page.

In order to enable IDP discovery for the default zone , you can set the
property below.

login.idpDiscoveryEnabled:
description: "IDP Discovery should be set to true if you have
configured more than one identity provider for UAA. The discovery
relies on email domain being set for each additional provider"
default: false


For other identity zones, this property can be updated via the Identity
Zone API <http://docs.cloudfoundry.org/api/uaa/#creating-an-identity-zone>.
The property isconfig.idpDiscoveryEnabled and the default is false.
Related Stories

- Redirect to IDP Discovery Login Page if IDP Discovery is enabled
<https://www.pivotaltracker.com/story/show/117269923>
- Support login_hint as specified in the OpenID Spec
<https://www.pivotaltracker.com/story/show/117270251>
- https://www.pivotaltracker.com/story/show/118684341
- Zonify idp discovery
<https://www.pivotaltracker.com/story/show/118971499>

Other minor features

- Support MySQL 5.5.7
<https://www.pivotaltracker.com/story/show/119465749>
- Optimize authz authentication query
<https://www.pivotaltracker.com/story/show/119005141>
- Support Allowed Providers Policy for External OIDC Provider per OAuth
Client <https://www.pivotaltracker.com/story/show/117105187>
- Implement invitation acceptance flow with external OIDC provider
<https://www.pivotaltracker.com/story/show/118964837>
- Remove need for admin to have old client secret in order to change the
password <https://www.pivotaltracker.com/story/show/119750691>

Bugs Fixes

- Unable to call /oauth/token/revoke using opaque token
<https://www.pivotaltracker.com/story/show/117586873>
- password prompt now says "Email>"
<https://www.pivotaltracker.com/story/show/118034313>
- Include timestamp on response from client create
<https://www.pivotaltracker.com/story/show/119759497>
- Zone Name not displayed under the Password entry page for IDP Discovery
<https://www.pivotaltracker.com/story/show/119487977>
- /Groups/External null pointer exception on trim()
<https://www.pivotaltracker.com/story/show/118048805>
- Fix is user token condition
<https://www.pivotaltracker.com/story/show/118199177>
- Support chinese characters in LDAP user name
<https://www.pivotaltracker.com/story/show/119024343>
- Incorrect error message during client credentials
<https://www.pivotaltracker.com/story/show/117698247>



Thanks,
Sree Tummidi
Sr. Product Manager
Identity - Pivotal Cloud Foundry

Join cf-dev@lists.cloudfoundry.org to automatically receive all group messages.