Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In general, the latest version of Kantega SSO Enterprise is compatible with the oldest version that has not been ended of life. See Atlassian’s End-of-life (EOL) policy to get an overview of versions and EOL dates.

Changelog

Excerpt

Changes in 6.18.

0

5

04 13 15:00 30 CEST

Release summary: Improved SAML/OIDC redirect for multi-IdP setups.

Features

Fixed a bug causing Kerberos to look for the wrong keytab file

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Added a toggle for ordering identity providers. This feature allows you to configure conditional redirects while ensuring that users are automatically redirected to the correct Identity Provider.

Improvements

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Redirecting users based on directory now supports redirecting users not in the selected directories
    kerberos
    Fixed a bug causing Kerberos to look for the wrong keytab file.

Changes in 6.18.

1

4

05 08 10:30 CEST

Release summary: Fixed a bug where missing license flag was incorrectly shown.

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Missing license flag were sometimes shown despite the application having a valid license.

Changes

Due to a bug with Kerberos in 6.18

.2

15:45 CEST

Release summary: Bug fix: user directory redirect mode had wrong default value.4 this version is no longer available.

Release summary: Fixed a null pointer exception while updating API connector for Entra ID.

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    After adding the “not in” directory redirect mode in addition to “in directory” redirect, the redirect behavior was flipped to “not in” as a wrong default value after upgrade
    Entra ID api connector
    Fixed a null pointer exception while updating API connector for Microsoft Entra ID (formerly Azure AD)

Changes in 6.18.3

09:15 CEST

Release summary: Bug fix: upgrade issue with groups and directory redirect

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    After adding the “not in” directory redirect mode in addition to “in directory” redirect, upgrading the plugin flipped the value of “not in” groups redirect mode.

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Status
    colourBlue
    titlejira
    Issues with saving JSM redirect rules after adding the “not in” directory redirect mode in addition to “in directory” redirect

Changes in 6.18.

4

2

16 10 15:30 CEST
Due to a bug with Kerberos in 6.18.4 this version is no longer available.45 CEST

Release summary: Bug fix: user directory redirect mode had wrong default value

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    After adding the “not in” directory redirect mode in addition to “in directory” redirect, the redirect behavior was flipped to “not in” as a wrong default value after upgrade

Changes in 6.18.1

08:30 CEST

Release summary: Fixed a null pointer exception while updating API connector for Entra IDbug where missing license flag was incorrectly shown.

Bug fixes

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleEntra ID api connector
    Fixed a null pointer exception while updating API connector for Microsoft Entra ID (formerly Azure AD)
    oidc
    Missing license flag were sometimes shown despite the application having a valid license.

Changes in 6.18.

5

0

16 15 13:30 00 CEST

Release summary: Fixed a bug causing Kerberos to look for the wrong keytab file

Bug fixes

Status
titlekerberos
Fixed a bug causing Kerberos to look for the wrong keytab file

Improved SAML/OIDC redirect for multi-IdP setups.

Features

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Added a toggle for ordering identity providers. This feature allows you to configure conditional redirects while ensuring that users are automatically redirected to the correct Identity Provider.

Improvements

  • Status
    colourRed
    titlesaml
    Status
    colourYellow
    titleoidc
    Redirecting users based on directory now supports redirecting users not in the selected directories.