Configuration File | Changes |
---|
carbon.xml file stored in the <IS_HOME>/repository/conf directory. | The version property value has been changed to 5.8.0. Why? This property indicates the version of WSO2 IS. |
axis2.xml file stored in the <IS_HOME>/repository/conf/axis2 directory. | The following property values have been changed to 5.8.0.
<parameter name="userAgent" locked="true">
WSO2 Identity Server-5.8.0
</parameter>
<parameter name="server" locked="true">
WSO2 Identity Server-5.8.0
</parameter>
|
The following property has been added.
<parameter name="forceIncludeNullElements">false</parameter>
Why? Enabling this property forces elements that have the @IgnoreNullElement annotation to be returned as well even though the value is null. The default value for this property is 'false'. |
Endpointconfig.properties file stored in the <IS_HOME>/repository/conf/identity directory.
| The following property has been added.
mutualSSLManagerEnabled=true
Why? Enabling this property allows the MutualSSLManager to initialize the keystores. If it is set to 'false', the MutualSSLManager will not initialize the keystore. |
application-authentication.xml file stored in the <IS_HOME>/repository/conf/identity
directory.
| The following property has been added to the following authenticators under the relevant tags. - BasicAuthenticator -
<AuthenticatorConfig name="BasicAuthenticator" enabled="true"> - BasicAuthRequestPathAuthenticator -
<AuthenticatorConfig name="BasicAuthRequestPathAuthenticator" enabled="true">
<Parameter name="AuthMechanism">basic</Parameter>
Why? This property is used to help identify the authentication mechanism used by the authenticator. |
The following parameters were added under the <AuthenticatorConfig name="EmailOTP" enabled="true"> tag.
<Parameter name="EMAILOTPAuthenticationEndpointURL">emailotpauthenticationendpoint/emailotp.jsp</Parameter>
<Parameter name="EmailOTPAuthenticationEndpointErrorPage">emailotpauthenticationendpoint/emailotpError.jsp</Parameter>
<Parameter name="EmailAddressRequestPage">emailotpauthenticationendpoint/emailAddress.jsp</Parameter>
Why? The following parameters make the Email OTP URLs configurable. |
The totp authenticator configurations were uncommented and the following parameters have been added under the <AuthenticatorConfig name="totp" enabled="true"> tag.
<Parameter name="Issuer">WSO2</Parameter>
<Parameter name="UseCommonIssuer">true</Parameter>
Why? The added parameters make the totp issuer configurable instead of showing the domain name. |
The following parameter has been removed from the totp authenticator as it is redundant.
<Parameter name="redirectToMultiOptionPageOnFailure">false</Parameter>
|
The following property has been added under the <ApplicationAuthentication> tag.
<!--Similar to the 'AuthenticationEndpointQueryParams' above, the following section defines the parameters that should be included/excluded in the redirection responses from authentication framework. These parameters may be generated internally from the framework, handlers or authenticators. The filtered parameters will be available via the REST API for authentication framework. "removeOnConsumeFromAPI" defines whether to make the filtered parameters unavailable from the API on the first consumption. -->
<AuthenticationEndpointRedirectParams action="exclude" removeOnConsumeFromAPI="true">
<AuthenticationEndpointRedirectParam name="loggedInUser"/>
</AuthenticationEndpointRedirectParams>
|
captcha-config.properties file stored in the <IS_HOME>/repository/conf/identity directory.
| The following properties have been added.
#reCaptcha failed redirect urls
#recaptcha.failed.redirect.urls=
Why? The properties listed above allow configuring the list of URLs that can be used for redirection when reCaptcha fails. |
scim2-schema-extension.config file stored in the <IS_HOME>/repository/conf/ directory. | The urn:ietf:params:scim:schemas:extension:enterprise:2.0:User attribute name has been changed from what is reflected in the 5.7.0 code block to the configuration shown in the 5.8.0 code block.
"attributeURI":"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User",
"attributeName":"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User",
attributeURI":"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User",
"attributeName":"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User"
Why? This change is done in order to comply with the SCIM2 specification. For more details, see behavioral change #1 in the behavioral changes table given above. |
identity-event.properties file stored in the <IS_HOME>/repository/conf/identity directory.
| The password policy error message has been modified as follows.
passwordPolicy.errorMsg='Password pattern policy violated. Password should contain a digit[0-9], a lower case letter[a-z], an upper case letter[A-Z], and one of !@#$%&* characters'
|
The following handlers have been added.
module.name.17=SAMLLogoutHandler
SAMLLogoutHandler.subscription.1=SESSION_TERMINATE
SAMLLogoutHandler.enable=true
# To delete registration code in database once the user deletion
module.name.18=confirmationCodesInvalidate
confirmationCodesInvalidate.subscription.1=POST_DELETE_USER
Why? These handlers are introduced to support the cross-protocol logout feature and for migration of existing data publishers to event handlers that subscribe to authentication events. For more information about migrating existing data publishers to event handlers, see Migrating Data Publishers.
|
The following properties were added.
module.name.14=analyticsLoginDataPublisher
analyticsLoginDataPublisher.subscription.1=AUTHENTICATION_STEP_SUCCESS
analyticsLoginDataPublisher.subscription.2=AUTHENTICATION_STEP_FAILURE
analyticsLoginDataPublisher.subscription.3=AUTHENTICATION_SUCCESS
analyticsLoginDataPublisher.subscription.4=AUTHENTICATION_FAILURE
analyticsLoginDataPublisher.enable=false
module.name.15=analyticsSessionDataPublisher
analyticsSessionDataPublisher.subscription.1=SESSION_CREATE
analyticsSessionDataPublisher.subscription.2=SESSION_UPDATE
analyticsSessionDataPublisher.subscription.3=SESSION_TERMINATE
analyticsSessionDataPublisher.enable=true
module.name.13=authenticationAuditLogger
authenticationAuditLogger.subscription.1=AUTHENTICATION_STEP_SUCCESS
authenticationAuditLogger.subscription.2=AUTHENTICATION_STEP_FAILURE
authenticationAuditLogger.subscription.3=AUTHENTICATION_SUCCESS
authenticationAuditLogger.subscription.4=AUTHENTICATION_FAILURE
authenticationAuditLogger.subscription.5=SESSION_TERMINATE
authenticationAuditLogger.enable=true"
module.name.16=failLoginAttemptValidator
failLoginAttemptValidator.subscription.1=AUTHENTICATION_STEP_FAILURE
failLoginAttemptValidator.enable=true
Why? The properties listed above are added to support the event listeners that were added for migrating data publishers to event handlers. For more details, see behavioral change #3 in the behavioral changes table given above. |
identity.xml file stored in the <IS_HOME>/repository/conf/identity directory.
| The following property has been added to the IntrospectionDataProvider interface.
<Introspection>
<EnableDataProviders>false</EnableDataProviders>
</Introspection>
Why? This property is used to inject additional data to the introspection response. |
The default CleanUpPeriod value has been modified to 1440.
<CleanUpPeriod>1440</CleanUpPeriod>
|
The default value of the following property has been changed from false to true.
<SignJWTWithSPKey>true</SignJWTWithSPKey>
Why? For details about this change, see behavioral change #2 in the behavioral changes table given above. |
The following property has been added under the <SessionDataPersist> tag.
<UserSessionMapping>
<Enable>true</Enable>
</UserSessionMapping>
Why? This property enables terminating all the active sessions of a user during password reset, user deletion, and username renaming. |
The following event listeners have been removed.
<EventListener type="org.wso2.carbon.identity.core.handler.AbstractIdentityMessageHandler" name="org.wso2.carbon.identity.data.publisher.application.authentication.impl.DASLoginDataPublisherImpl" orderId="10" enable="true"/>
<EventListener type="org.wso2.carbon.identity.core.handler.AbstractIdentityMessageHandler" name="org.wso2.carbon.identity.data.publisher.application.authentication.impl.DASSessionDataPublisherImpl" orderId="11" enable="true"/>
<EventListener type="org.wso2.carbon.identity.core.handler.AbstractIdentityMessageHandler" name="org.wso2.carbon.identity.captcha.validator.FailLoginAttemptValidator" orderId="10" enable="true"/>
Why? From WSO2 IS 5.8.0 onwards, data publishers are migrated to act as event handlers that subscribe to authentication events. Hence, the event listeners listed above have been removed by default. For more details, see behavioral change #3 in the behavioral changes table given above. |
The following property has been added.
<FilterUsersAndGroupsOnlyFromPrimaryDomain>false</FilterUsersAndGroupsOnlyFromPrimaryDomain>
Why? Enabling this property filters users or groups only from the PRIMARY user store, regardless of the Users and Groups endpoints. If it is set to 'false' it filters users or groups across all user stores. |
The following property has been added.
<MandateDomainForUsernamesAndGroupNamesInResponse>false</MandateDomainForUsernamesAndGroupNamesInResponse>
Why? Enabling this property prepends the "PRIMARY/" prefix to the user name and role name (group name) that belongs to the PRIMARY user store, in the SCIM2 response regardless of the Users and Groups endpoint. When it is set to 'false', the "PRIMARY/" prefix will not be prepended. For more details, see behavioral change #4 in the behavioral changes table given above. |
The following property has been added.
<MandateDomainForGroupNamesInGroupsResponse>false</MandateDomainForGroupNamesInGroupsResponse>
Why? Enabling this property in the Groups endpoints prepends the "PRIMARY/" prefix to the role name (group name) that belongs to the PRIMARY user store. When it is set to 'false', the "PRIMARY/" prefix will not be prepended. For more details, see behavioral change #4 in the behavioral changes table given above. |
The following properties have been added under the <Server> tag.
<!--This configuration is used to define the Service Provider name regex in DCR and IdentityApplicationManagementService-->
<!--<ServiceProviders>-->
<!--<SPNameRegex>^[a-zA-Z0-9._-]*$</SPNameRegex>-->
<!--</ServiceProviders>-->
|
The following properties have been added under the <OAuth> tag.
<!-- If enabled, resident Idp entity id will be honoured as the issuer location in OpenId Connect Discovery -->
<UseEntityIdAsIssuerInOidcDiscovery>true</UseEntityIdAsIssuerInOidcDiscovery>
|
The UMA grant type has been added as a supported grant type under the <SupportedGrantTypes> tag.
<!-- Supported versions: IS 5.7.0 onwards.-->
<SupportedGrantType>
<GrantTypeName>urn:ietf:params:oauth:grant-type:uma-ticket</GrantTypeName>
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth.uma.grant.UMA2GrantHandler</GrantTypeHandlerImplClass>
<GrantTypeValidatorImplClass>org.wso2.carbon.identity.oauth.uma.grant.GrantValidator</GrantTypeValidatorImplClass>
</SupportedGrantType>
|
The following properties have been added under the <OAuth> tag.
<!-- Configurations for JWT bearer grant. Supported versions: IS 5.8.0 onwards. -->
<JWTGrant>
<!-- Validate issued at time (iat) of JWT token. The validity can be set using 'IATValidity' configuration.
Default value is 'true'.
-->
<EnableIATValidation>true</EnableIATValidation>
<!-- Reject the JWT if the iat of JWT is pass a certain time period. Time period is in minutes.
'EnableIATValidation' configuration should be set to 'true' in order to make use of the validity
period.
Default value is '30' minutes.
-->
<IATValidityPeriod>30</IATValidityPeriod>
</JWTGrant>
|
The following properties have been added under the <OpenIDConnect> tag.
<!-- Add tenant domain to 'realm' claim of ID Token-->
<AddTenantDomainToIdToken>false</AddTenantDomainToIdToken>
<!-- Add userstore domain to 'realm' claim of ID Token-->
<AddUserstoreDomainToIdToken>false</AddUserstoreDomainToIdToken>
|
The following properties have been added under the <OAuth> tag.
<!--Configuration provides the ability to renew the access token and the refresh token(where applicable) per each token request and revoke previously available active token for a matching clientid, user and scopes combination.
Not applicable for refresh token grant type and when when self-contained access tokens are used.
Default value : false
Supported versions : IS 5.8.0 onwards -->
<!--<RenewTokenPerRequest>true</RenewTokenPerRequest>-->
<!--By enabling this property, in a logout request if the opbs cookie or a valid session does not exist instead of showing the invalid request error page the user will be redirected to the successfully logged out page of the IS or if a valid id_token_hint and a valid post_logout_redirect_uri is available user will be redirected to the post_logout_redirect_uri-->
<HandleAlreadyLoggedOutSessionsGracefully>false</HandleAlreadyLoggedOutSessionsGracefully>
|
The following properties have been added under the <SSOService> tag.
<ArtifactResolutionEndpoint>${carbon.protocol}://${carbon.host}:${carbon.management.port}/samlartresolve</ArtifactResolutionEndpoint>
<SAMLECPEndpoint>${carbon.protocol}://${carbon.host}:${carbon.management.port}/samlecp</SAMLECPEndpoint>
Why? These properties allow adding the Artifact URL as a Resident IDP property in the WSO2 IS management console. |
The following properties have been added under the <SCIM2> tag.
<!--<ComplexMultiValuedAttributeSupportEnabled>true</ComplexMultiValuedAttributeSupportEnabled>-->
<!--<EnableFilteringEnhancements>true</EnableFilteringEnhancements>-->
Why? The <EnableFilteringEnhancements> property was introduced for the purpose of applying filtering enhancements for SCIM2 filter results. Enabling this ensures that the Eq filter strictly checks for a string match (in this case cross user store search should not be performed). This configuration also enforces consistency on the filtered attribute formats in the response when filtering is done via different endpoints. e.g. Users and Groups endpoints. |
The following properties have been added under the <Recovery> tag.
<ReCaptcha>
<Password>
<Enable>false</Enable>
</Password>
<Username>
<Enable>false</Enable>
</Username>
</ReCaptcha>
<CallbackRegex>${carbon.protocol}://${carbon.host}:${carbon.management.port}/authenticationendpoint/login.do</CallbackRegex>
Why? This configuration block is used to enable ReCaptcha verification for password recovery and username recovery. |
The following property have been added under the <SelfRegistration> tag.
<CallbackRegex>${carbon.protocol}://${carbon.host}:${carbon.management.port}/authenticationendpoint/login.do</CallbackRegex>
Why? This property enables configuring a regex pattern for the callback URLs of the account recovery and self registration APIs. The callbackURL included in the requests is then validated with the configured regex pattern. |
The following new event listener has been added under the <EventListeners> tag.
<EventListener type="org.wso2.carbon.identity.core.handler.AbstractIdentityHandler"
name="org.wso2.carbon.identity.data.publisher.oauth.listener.OAuthTokenIssuanceLogPublisher"
orderId="12" enable="false">
<Property name="Log.Token">false</Property>
</EventListener>
<EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener"
name="org.wso2.carbon.identity.mgt.listener.UserSessionTerminationListener"
orderId="85" enable="true"/>
<EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener"
name="org.wso2.carbon.user.mgt.listeners.UserClaimsAuditLogger"
orderId="9" enable="false"/>
Why? AbstractIdentityHandler - Enabling this listener logs the audit data for OAuth token issuance and token introspection. Adding this property allows you to disable logging, else if this property is not present in the configuration file, logging is enabled by default. For more information about auditing, see OAuth Transaction Logs .
UserOperationEventListener - This event listener is used to support session termination at the point renaming the username.
UserOperationEventListener - This event listener allows adding claims to the audit logs.
|
The following caches have been added under the <CacheManager name="IdentityApplicationManagementCacheManager"> tag.
<Cache name="JWKSCache" enable="true" timeout="300" capacity="5000" isDistributed="false"/>
<Cache name="ServiceProviderCache.ID" enable="true" timeout="900" capacity="5000" isDistributed="false"/>
<Cache name="ServiceProvideCache.InboundAuth" enable="true" timeout="900" capacity="5000" isDistributed="false"/>
Why? JKWSCache - This property has been added to support JWKS Endpoint Cache invalidation.
ServiceProviderCache.ID and ServiceProvideCache.InboundAuthKey - These two properties have been added in order to cache the service provider against the ID and inboundAuth. If these new properties is not present in the configuration file, the configuration value of the ServiceProviderCache is applied for these caches. |
The following resources have been added under the <ResourceAccessControl> tag.
<Resource context="(.*)/api/identity/config-mgt/v1.0/search(.*)" secured="true" http-method="GET">
<Permissions>/permission/admin/manage/identity/configmgt/list</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource-type" secured="true" http-method="POST">
<Permissions>/permission/admin/manage/identity/configmgt/add</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource-type" secured="true" http-method="PUT">
<Permissions>/permission/admin/manage/identity/configmgt/update</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource-type/(.*)" secured="true" http-method="GET"/>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource-type/(.*)" secured="true" http-method="DELETE">
<Permissions>/permission/admin/manage/identity/configmgt/delete</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)" secured="true" http-method="POST">
<Permissions>/permission/admin/manage/identity/configmgt/add</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)" secured="true" http-method="PUT">
<Permissions>/permission/admin/manage/identity/configmgt/update</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)" secured="true" http-method="GET"/>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)" secured="true" http-method="DELETE">
<Permissions>/permission/admin/manage/identity/configmgt/delete</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)" secured="true" http-method="POST">
<Permissions>/permission/admin/manage/identity/configmgt/add</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)" secured="true" http-method="PUT">
<Permissions>/permission/admin/manage/identity/configmgt/update</Permissions>
</Resource>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)/(.*)" secured="true" http-method="GET"/>
<Resource context="(.*)/api/identity/config-mgt/v1.0/resource/(.*)/(.*)/(.*)" secured="true" http-method="DELETE">
<Permissions>/permission/admin/manage/identity/configmgt/delete</Permissions>
</Resource>
Why? These resources control access to the configuration management resources in WSO2 IS. |
The resource context /scim2/ResourceType to /scim2/ResourceTypes found under the <ResourceAccessControl> tag has been modified as shown below.
<Resource context="/scim2/ResourceTypes" secured="false" http-method="all">
Why? This change is done in order to comply with the SCIM2 specification . |
The following resource found under the <ResourceAccessControl> tag has been removed.
<Resource context="(.*)/api/identity/auth/(.*)" secured="true" http-method="all"/>
Why? This change has been made in order to remove protection for the /api/identity/auth/v1.2/authenticate API. This is because the API itself authenticates the user. |
The following resources have been added under the <ResourceAccessControl> tag.
<Resource context="(.*)/api/identity/auth/v1.2/data(.*)" secured="true" http-method="all"/>
<Resource context="(.*)/api/identity/auth/v1.2/context(.*)" secured="true" http-method="all"/>
<Resource context="(.*)/api/identity/template/mgt/v1.0.0/(.*)" secured="true" http-method="all"/>
<Resource context="(.*)/api/identity/user/v1.0/update-username(.*)" secured="true" http-method="PUT">
<Permissions>/permission/admin/manage/identity/usermgt/update</Permissions>
</Resource>
Why? These resources have been added to secure the update-username API. |
The following properties have been added under the <Server> tag..
<!--Intermediate certificate validation for certificate based requests-->
<IntermediateCertValidation enable="false">
<IntermediateCerts>
<!--Add intermediate certificate CN. Multiple <CertCN> elements can be used for multiple certificates.-->
<CertCN>localhost</CertCN>
</IntermediateCerts>
<ExemptContext>
<!--Add exemptable context paths. Multiple <Context> elements can be used for multiple contexts.-->
<Context>scim2</Context>
</ExemptContext>
</IntermediateCertValidation>
<!--This is the separator that use to separate multiple roles in the role claim value coming from IDP side-->
<FederatedIDPRoleClaimValueAttributeSeparator>,</FederatedIDPRoleClaimValueAttributeSeparator>
<!--This configuration is used for X509 Certificate based authentication. -->
<!--<X509>-->
<!--During ssl termination at LB, the X509 certificate is passed over the HTTP header. This configuration
provides the facility to configure HTTP request header name which is configured at LB. -->
<!--<X509RequestHeaderName>X-SSL-CERT</X509RequestHeaderName>-->
<!--</X509>-->
<!-- This configuration specifies the claims that should be logged to "audit.log" upon changes. -->
<!--<LoggableUserClaims>-->
<!--<LoggableUserClaim>http://wso2.org/claims/identity/accountLocked</LoggableUserClaim>-->
<!--<LoggableUserClaim>http://wso2.org/claims/role</LoggableUserClaim>-->
<!--</LoggableUserClaims>-->
<!--Configuration Store properties-->
<ConfigurationStore>
<!--Set an upper limit to the database call queries. Configuration store uses dynamic query generation,
specially for searching resources. This property will prevent any unwanted errors due to too large queries.
Default value is the maximum packet size for MySQL 5.7 in bytes.-->
<MaximumQueryLength>4194304</MaximumQueryLength>
</ConfigurationStore>
|
jaas.conf file stored in the <IS_HOME>/repository/conf/identity directory. | The value of the following property value has been corrected from 'tfalse' to 'false'. |
Webapp-classloading-environments.xml file stored in the <IS_HOME>/repository/conf/ directory.
| The following ExclusiveEnvironment has been added under the <Classloading> tag.
<ExclusiveEnvironments>
<ExclusiveEnvironment>
<Name>CXF3</Name>
<Classpath>${carbon.home}/lib/runtimes/cxf3/*.jar;${carbon.home}/lib/runtimes/cxf3/</Classpath>
</ExclusiveEnvironment>
</ExclusiveEnvironments>
|
carbon.xml file stored in the <IS_HOME>/repository/conf directory. | The following properties related to the tenant deletion feature have been added under the <Server> <Tenant> tag.
<!-- Flag to enable or disable tenant deletion. By default tenant deletion is enabled-->
<TenantDelete>true</TenantDelete>
<!-- Configurations related to listener invocation by tenant admin service-->
<ListenerInvocationPolicy>
<!-- Flag to enable or disable listener invocation on tenant delete. This is disabled by default-->
<InvokeOnDelete>false</InvokeOnDelete>
</ListenerInvocationPolicy>
|
The following property has been added under the <Server> tag.
<!--EnablePasswordTrim>false</EnablePasswordTrim-->
|
The following property has been added.
<ForceLocalCache>true</ForceLocalCache>
Why? Enabling this property forces all the caches to behave as local caches. It is required to enable this in order to have cache invalidation in between the IS nodes in a clustered enviornment. For more details, see behavioral change #5 in the behavioral changes table given above. |
claim-config.xml file stored in the <IS_HOME>/repository/conf directory. | The AttributeID of the http://wso2.org/claims/resourceType claim has been modified to "resourceType".
<AttributeID>resourceType</AttributeID>
|
The RegEx of the http://wso2.org/claims/phoneNumbers claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The RegEx of the urn:scim:schemas:core:1.0:phoneNumbers claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The AttributeID of the claim urn:ietf:params:scim:schemas:core:2.0:meta.resourceType claim has been modified to "resourceType" instead of "userType".
<AttributeID>resourceType</AttributeID>
Why? The value "Ref" is reserved in open LDAPs for referrals. Therefore, this attributeID was modified to avoid the errors when using Active Directory open LDAPs. |
The RegEx of the urn:ietf:params:scim:schemas:core:2.0:User:phoneNumbers claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The Regex of the urn:ietf:params:scim:schemas:core:2.0:User:phoneNumbers.mobile claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The RegEx of the urn:ietf:params:scim:schemas:core:2.0:User:phoneNumbers.home claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The RegEx of the urn:ietf:params:scim:schemas:core:2.0:User:phoneNumbers.work claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
The RegEx of the urn:ietf:params:scim:schemas:core:2.0:User:phoneNumbers.other claim has been modified as follows.
<RegEx>^\s*(?:\+?(\d{1,3}))?[-. (]*(\d{3})[-. )]*(\d{3})[-. ]*(\d{4})(?: *x(\d+))?\s*$</RegEx>
|
Why?The default regular expression values for phone numbers were modified in the claim-config.xml file in order to recognize US and Canadian numbers with the extension code as well. |
log4j.properties file stored in the <IS_HOME>/repository/conf directory. | The following properties have been added.
log4j.logger.TRANSACTION_LOGGER=INFO, TRANSACTION_LOGGER
log4j.appender.TRANSACTION_LOGGER=org.apache.log4j.FileAppender
log4j.appender.TRANSACTION_LOGGER.File=${carbon.home}/repository/logs/transaction.log
log4j.appender.TRANSACTION_LOGGER.Append=true
log4j.appender.TRANSACTION_LOGGER.layout=org.apache.log4j.PatternLayout
log4j.appender.TRANSACTION_LOGGER.layout.ConversionPattern=[%d] - %m %n
log4j.appender.TRANSACTION_LOGGER.threshold=INFO
log4j.additivity.TRANSACTION_LOGGER=false
# Appender config to put correlation Log.
log4j.logger.correlation=INFO, CORRELATION
log4j.additivity.correlation=false
log4j.appender.CORRELATION=org.apache.log4j.RollingFileAppender
log4j.appender.CORRELATION.File=${carbon.home}/repository/logs/${instance.log}/correlation.log
log4j.appender.CORRELATION.MaxFileSize=10MB
log4j.appender.CORRELATION.layout=org.apache.log4j.PatternLayout
log4j.appender.CORRELATION.Threshold=INFO
log4j.appender.CORRELATION.layout.ConversionPattern=%d{yyyy-MM-dd HH:mm:ss,SSS}|%X{Correlation-ID}|%t|%m%n
|
user-mgt.xml file stored in the <IS_HOME>/repository/conf directory. | The following properties have been added under the <UserManager> <Realm> <Configuration> tag.
<!-- Enable username claim retrieve from the UM_USER_NAME in JDBC datasources -->
<OverrideUsernameClaimFromInternalUsername>true</OverrideUsernameClaimFromInternalUsername
|
The following property has been under under the JDBCUserStoreManager configuration block.
<Property name="LeadingOrTrailingSpaceAllowedInUserName">false</Property>
The value of the <UserNameListFilter> property under the ReadOnlyLDAPUserStoreManager configuration block has been modified to the value given below.
(&(objectClass=person)(!(sn=Service)))
The value of the <UserNameListFilter> property under the ActiveDirectoryUserStoreManager and ReadWriteLDAPUserStoreManager configuration blocks has been modified as follows.
(&(objectClass=user)(!(sn=Service)))
The following property has been added under the ActiveDirectoryUserStoreManager and the ReadWriteLDAPUserStoreManager configuration blocks.
<Property name="StartTLSEnabled">false</Property>
|