Kantega SSO Enterprise 7.42.x release notes

Kantega SSO Enterprise 7.42.x release notes

We are pleased to announce a new version of Kantega SSO Enterprise.

Compatible applications

In general, the latest version of Kantega SSO Enterprise is compatible with the oldest version that has not reached end of life. For this release however, there is a gap in Atlassian’s major architecture rewrite in what they call Platform 7. Its lower compatibility is with versions that have implemented platform 7. This means the following major versions and later are compatible:

Note that 7.42.x is a functional copy of 6.42.x and should only contain minor differences caused by platform 7.

Changelog

Changes in 7.42.2

Jun 17, 2025

Release summary: Security patches and remove license expiry warning banner

Security fixes

  • Beanutils Upgrade apache commons beanutils from version 1.9.4 to 1.11.0 to patch CVE-2025-48734 and CVE-2020-15250 from the dependency.

Improvements

  • plugin license banner When the plugin license closed to expiry, we used to issue a warning to administrators, warning them to update the SSO license. This warning caused some annoyance, particularly because the “dismiss” button did not behave consistently. To avoid this annoyance, the banner was removed.

Changes in 7.42.1

Jun 6, 2025

Release summary: License check in filter crashed host upon expired license

Bug fixes

  • license check The code used by the license check in the filter crashes due to a deprecated type in the UPM licensing API suddenly removed from OSGI in newer versions of UPM. Only occurs when license expired. The error handling for this part of the license check was lacking. Introduced a catch-all fix to avoid crash, looking for more robust solution to come.

Changes in 7.42.0

May 30, 2025

Release summary: Better performance API connector calls, fixes for user redirect and lookup

Improvements

  • API connector Introduce cache to avoid background sync calls from Atlassian products creating a full sync over API. Now only ordinary syncs will do full sync.

  • SAML/OIDC Support for redirect by group and directory also when user gives built-in username when configuration is using other lookup attribute, e.g. email or userPrincipalName as username

    SAML/OIDC Ignore disabled user accounts when user lookup via e-mail is configured so the one active account is allowed to be used

Bug fixes

  • JIRA Fix websudo login to work Jira has contextPath (for example runs on server.com/jira)

  • Confluence Fix setting userProperties when other lookup attributes like email or userPrincipalName has been used for SAML/OIDC logins.

  • SAML/OIDC fix so updateUser can be used in combination with other username lookup attribute