Skip to content

Releases: indigo-iam/iam

INDIGO Identity and Access Management Service v1.4.0

18 May 12:27
Compare
Choose a tag to compare

1.4.0 (2018-05-18)

Added

  • New paginated user and group search API (#217)

  • Support for login hint on authorization requests: this feature allows a
    relying party to specify a preference on which external SAML IdP should be
    used for authentication (#230)

  • Doc: documentation for the IAM group request API (#228)

Fixed

  • A problem that caused the device code expiration time setting to 0 seconds
    for dynamically registered clients has been fixed (#236)

  • Dashboard: the tokens management section now shows a loading modal when
    loading information (#234)

  • Notification: a problem that caused the sending of a "null" string instead of
    the IAM URL in notification has been fixed (#232)

INDIGO Identity and Access Management Service v1.3.0

12 Apr 17:49
Compare
Choose a tag to compare

1.3.0 (2018-04-12)

Added

  • New group membership requests API: this API allows user to submit requests
    for membership in groups, and provide administrators the ability to
    approve/reject such requests. Support for the API will be included in the IAM
    dashboard in a future release (#200)

  • IAM now includes additional claims in the issued ID token:
    preferred_username, email, organisation_name, groups (#202)

  • IAM now can be configured to include additional claims in the issued access
    tokens: preferred_username, email, organisation_name, groups. This
    behaviour is controlled with the IAM_ACCESS_TOKEN_INCLUDE_AUTHN_INFO
    environment variable (#208)

Fixed

  • Dashboard: a problem that prevented the correct setting of the token exchange grant for
    clients has been fixed (#223)

  • Dashboard: protection against double clicks has been added to approve/reject requests
    buttons (#222)

  • Dashboard: a broken import has been removed from the IAM main page (#215)

  • A problem in the tokens API that prevented the filtering of expired tokens
    has been fixed (#213)

  • Dashboard: token pagination is now correctly leveraged by the IAM dashboard
    in the token management page (#211)

  • Dashboard: OpenID connect account manangement panel is now hidden when Google
    authentication is disabled (#206)

  • Dashboard: SAML account management panel is now hidden when SAML
    authentication is disabled (#203)

INDIGO Identity and Access Management Service v1.2.1

01 Mar 17:28
Compare
Choose a tag to compare

1.2.1 (2018-03-01)

Changed

The token management section in the dashboard introduced in 1.2.0 has been
disabled due to performance issues in the token pagination code. We will add
the interface back as soon as these issues are resolved (#211).

INDIGO Identity and Access Management Service v1.2.0

01 Mar 10:53
Compare
Choose a tag to compare

1.2.0 (2018-03-01)

Added

  • IAM documentation has been migrate from Gitbook to its own dedicated
    site
    on Github pages

  • IAM now provides a token management section in the dashboard that can be used
    by administrators to view active tokens in the system, filter tokens (by user
    and client) and revoke tokens (#161)

  • IAM now provides an Acceptable Usage Policy (AUP) API that can be used to require
    that users accept the AUP terms at registration time or later (#86)

  • IAM now exposes the 'iss' claim in the response retuned by the token
    introspection endpoint (#58)

Fixed

  • IAM now provides user-friendlier X.509 authentication support. When a client
    certificate is found linked to the TLS session, IAM displays
    certificate information and a button that can be used to sign in
    with the certificate (#193)
  • Admin-targeted email notifications that result from membership requests now
    include the contents of the Notes field (#190)
  • Tokens linked to an account are now removed when the account is removed
    (#204)

Changed

  • IAM now depends on MitreID connect v. 1.3.2.cnaf.rc0 (#180)

INDIGO Identity and Access Management Service v1.1.0

29 Sep 14:47
Compare
Choose a tag to compare

1.1.0 (2017-9-29)

Added

  • The login button text can now be customised for local (#185) and SAML
    login (#177)
  • A privacy policy can now be linked to the IAM login page (#182)
  • Improved error pages rendering (#178)
  • SAML metadata can now be filtered according to certain conditions (e.g.,
    SIRTFI compliance)
  • The organisation name is now included in the IAM dashboard top bar (#186)
  • IAM now implements a scope policy management API that allows to restrict the
    use of OAuth scopes only to selected users or group of users (#80)

Fixed

  • IAM now correctly enforces SAML metadata signature checks (#175)
  • The subject of IAM notification messages now includes the organisation name
    (#163)
  • EPPN is used as username for users registered via SAML (#188)

INDIGO Identity and Access Management Service v1.0.0

31 Aug 15:19
Compare
Choose a tag to compare

1.0.0 (2017-8-31)

This release provides improvements, bug fixes and new features:

  • IAM now supports hierarchical groups. The SCIM group management API has been
    extended to support nested group creation and listing, and the IAM dashboard
    can now leverage these new API functions (#88)
  • IAM now supports native X.509 authentication (#119) and the ability to
    link/unlink X.509 certificates to a user membership (#120)
  • IAM now supports configurable on-demand account provisioning for trusted SAML
    IDPs; this means that the IAM can be configured to automatically on-board
    users from a trusted IdP/federation after a succesfull external
    authentication (i.e. no former registration or administration approval is
    required to on-board users) (#130)
  • IAM now provides an enhanced token management and revocation API that can be
    used by IAM administrators to see and revoke active tokens in the system (#121)
  • IAM dashboard now correctly displays valid active access tokens for a user
    (#112)
  • A problem that caused IAM registration access tokens to expire after the
    first use has been fixed (#134)
  • IAM now provides an endpoint than can be used to monitor the service
    connectivity to external service (ie. Google) (#150)
  • Improved SAML metadata handling (#146) and reloading (#115)
  • Account linking can now be disabled via a configuration option (#142)
  • The IAM audit log now provides fine-grained information for many events
    (#137)
  • The IAM token introspection endpoint now correctly supports HTTP form
    authentication (#149)
  • Notes in registration requests are now required (#114) to make life easier
    for VO administrators that wants to understand the reason for a registration
    request
  • Password reset emails now contain the username of the user that has requested
    the password reset (#108)
  • A stronger SAML account linking logic is now in place (#116)
  • Starting from this release, we provide RPM and Deb packages (#110) and a
    puppet module to configure the IAM service (#109)
  • The spring-boot dependency has been updated to version 1.3.8.RELEASE (#144)
  • An issue that prevented access to the token revocation endpoint has been
    fixed (#159)

INDIGO Identity and Access Management Service v0.6.0

31 Mar 16:18
Compare
Choose a tag to compare

0.6.0 (2017-3-31)

This release provides improvements and bug fixes:

  • IAM now implements an audit log that keeps track of all interesting security
    events (#79)
  • Password grant logins are now correctly logged (#98)
  • The MitreID logic for resolving user access and refresh token has been
    replaced with a more efficient implementation (#94)
  • Audience restrictions can be enforced on tokens obtained through all
    supported OAuth/OIDC flows (#92)
  • The tokens and site approval cleanup periods are now configurable (#96)

INDIGO Identity and Access Management Service v0.5.0

28 Dec 13:04
Compare
Choose a tag to compare

0.5.0 (2016-12-6)

This release provides new functionality and bug fixes:

  • It is now possible for users to link external authentication accounts
    (Google, SAML) to the user IAM account (#39)
  • It is now possible to register at the IAM starting from an external
    authentication (#44)
  • The IAM now exposes an authority management endpoint (integrated in the
    dashboard) that allows to assign/remove administrative rights to/from users
    (#46)
  • The token exchange granter now enforces audience restrictions correctly (#32)
  • It is now possible to set custom SAML maxAssertionTime and
    maxAuthenticationAge to customize how the SAML filter should check incoming
    SAML responses and assertions (#65)
  • Improved token exchange documentation (#51,#52)
  • The IAM now includes spring boot actuator endpoints that allow fine-grained
    monitoring of the status of the service (#62)
  • Group creation in the dashboard now behaves as expected (#34)
  • Editing first name and other information from the dashboard now behaves as
    expected (#57)
  • The IAM now provides a refactored SAML WAYF service that remembers the identity
    provider chosen by the user (#59)
  • The overall test coverage has been improved

INDIGO Identity and Access Management Service v0.4.0

30 Sep 09:46
Compare
Choose a tag to compare

0.4.0 (2016-09-30)

This release provides new functionality and some fixes:

  • Groups are now encoded in the JSON returned by the IAM /userinfo
    endpoint as an array of group names.
  • Group information is also exposed by the token introspection endpoint
  • External authentication information (i.e. when a user authenticates with
    Google or SAML instead of username/password) is now provided in the JSON
    returned by the /userinfo endpoint
  • The first incarnation of the administrative dashboard is now included in the
    service
  • The first incarnation of the registration service is now included. The
    registration service implements a "self-register with admin approval"
    registration flow
  • User passwords are now encoded in the database using the Bcrypt encoder
  • A password forgotten service is now provided

More information about bug fixes and other developments can be found on
our JIRA release board

INDIGO Identity and Access Management Service v. 0.3.0

08 Aug 17:19
Compare
Choose a tag to compare

0.3.0 (2016-07-12)

This is the first public release of the INDIGO Identity and Access Management
Service.

The IAM is an OpenID-connect identity provider which provides:

The IAM is currently released as a Docker image hosted on Dockerhub.

Documentation on how to build and run the service can be found in the IAM GitBook manual or on Github.