In general, the latest version of Kantega SSO Enterprise is compatible with the oldest version that has not been ended of life. See Atlassian’s End-of-life (EOL) policy to get an overview of versions and EOL dates.
Changelog
Excerpt
Changes in 6.22.3
16:00 CET
Release summary: Dependency update and bug fix.
Improvements
Status
title
Global
Updated dependencies.
Bug fixes
Status
colour
Red
title
saml
Status
colour
Yellow
title
oidc
Fixed switching between full name and first and last name on Just-In-Time User Provisioning page.
Changes in 6.22.2
14:15 CET
Release summary: Under-the-hood improvements and bug fixes
Improvements
Status
colour
Purple
title
Api connector
Comply with user directory encryption in Bamboo
Status
colour
Red
title
saml
Status
colour
Yellow
title
oidc
Validate IDP priority during deletion and removal of Identity Provider settings.
Status
title
global
Remove insistent warning flag of expired license.
Status
colour
Blue
title
kerberos
Improve explanations on Kerberos testpage
Bug fixes
Status
colour
Red
title
saml
Status
colour
Yellow
title
oidc
Fix visual issues and broken link in federated SSO for Jira Service Management
Status
colour
Blue
title
user cleanup
Fix broken API reference after changes with unintentional removal of GET method for get cleanup rule.
Fix performance issue with plugin collecting user agent info because of high-frequent rotation. Now togglable (off by default) and persisted in cache replicated across nodes
Status
colour
Red
title
saml
Support uid as an LDAP user mapping attribute relevant for Sun Directory Server LDAP
Status
colour
Green
title
scim
Fetch name from display_name attribute in sync because Okta syncs updated value in display_name and not in the formatted attribute
Rename references to Azure AD to new product name: Entra ID.
Status
colour
Red
title
saml
Status
colour
Yellow
title
oidc
Improve test page since certain attributes were out of sync on dirty settings before save
Bug fixes
Status
colour
Red
title
saml
Status
colour
Yellow
title
oidc
Fix broken navigation links between dashboards
Status
title
global
Fix issue with a specific user agent that doesn’t persist sessions at least in Confluence because a cookie is set during username/password login
Changes in 6.22.0
15:00 CET
Release summary: SCIM PATCH request adjustments for Okta OIN applications
Features
Status
colour
Green
title
SCIM
User linking on creation: Enable this option to link existing users automatically when they are created in Confluence. This results in POST requests with duplicate username to look up the user by externalId and link them to the existing user. If your SCIM source causes POST requests to fail with 409 response codes on user creation, this option may be a solution linking existing users with the same externalId. This behaviour is outside SCIM standard and may cause unexpected behavior and some SCIM test suits to fail. Disabled by default.