Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Status
    titleSCIM
    New setup wizard for SAML and OIDC identity providers

  • Status
    colourPurple
    titleSAML/OIDC
    New identity provider overview page

  • Status
    colourPurple
    titleOIDC
    Ability to only allow authentication from an OIDC identity provider when MFA is used for logging in

  • Status
    colourGreen
    titleGlobal
    Configuration status page for compatibility and upgrades

Improvements

  • Status
    colourPurple
    titleSAML/OIDC
    Removed old onboarding, which was out of date with the rest of the app

  • Status
    colourRed
    titleKerberos
    Status
    colourYellow
    titleAPI Tokens
    Status
    titleUsername from header
    More powerful IP address restrictions for Kerberos, Username from Header and API tokens, now support Full IP addresses, CIDR, and stricter regex formats (start with ^ and ends with $) to specify ranges of IP addresses

...

Bug Fixes

  • Status
    colourPurple
    titleSAML/OIDC
    Users are removed from and immediately added to the same group again

...

  • RV_ABSOLUTE_VALUE_OF_RANDOM_INT: RV: Bad attempt to compute absolute value of signed random integer in API Connector ID generator

  • DM_DEFAULT_ENCODING: String to byte or byte to string conversions using default platform encoding instead of consistent standard charset encoding

  • SECLDAPI - LDAP_INJECTION: Potential LDAP injection in user lookup due to missing sanitization of special LDAP characters

  • CRLF_INJECTION_LOGS: Potential CRLF Injection for logs: unsanitized user input put directly into logger

  • XSS_SERVLET: Potential XSS in Servlets that utilize printwriter

  • INSECURE_COOKIE: Cookie without HttpOnly or secure flag

  • UNSAFE_HASH_EQUALS: Unsafe hash equals in API Token validation. An attacker might be able to detect the value of the secret hash due to the exposure of comparison timing. When the functions Arrays.equals() or String.equals() are called, they will exit earlier if fewer bytes are matched

  • Update io.jsonwebtoken jjwt libraries used for JWT validation in OpenID Connect to latest version 0.11.2

  • Increased CSRF protection: Origin header required in POST requests on Kantega SSO Enterprise pages

Changes in 5.0.1

Bugs

  • [SCIM]

    Status
    titleSCIM
    Link to 'SCIM network requirements' is incorrect in step 'Network preparation in SCIM setup.

  • [

    Status
    titleAPI Connector
    ]
    Link to 'Setup provider' in API Connector is incorrect.[

  • Status
    colourPurple
    titleSAML/OIDC
    ]
    Links to Identity Provider in will not render in JSM portal[

  • Status
    colourPurple
    titleSAML/OIDC
    ]
    Links to Identity Provider on Jira baseUrl (which is redirected to /secure/MyJiraHome.jspa) will not render

  • [Update of config]

    Status
    colourGreen
    titleUpdate COnfig
    Regular expressions in IP restrictions on Kerberos, Username from header and API Tokens are not translated to new format upon update of config

...