uaa

CloudFoundry User Account and Authentication (UAA) Server

APACHE-2.0 License

Stars
1.5K
Committers
208

Bot releases are visible (Hide)

uaa - Do-Not-Use

Published by cf-identity over 6 years ago

uaa - Do-Not-Use

Published by cf-identity over 6 years ago

uaa - Do-Not-Use

Published by cf-identity over 6 years ago

release pipeline testing in progress

uaa - UAA Release Notes 4.13.4

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.12.2

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.13.0

Published by cf-identity over 6 years ago

Do not use

Please use 4.13.4

Features

Stories included in release

Breaking Change

As of UAA 4.13.0, UAA will require an active encryption passphrase to be defined in order to start-up.

Encryption key pass-phrases can be set via the BOSH manifest. Multiple keys can be specified, and can be any value greater than or equal to 8 characters. One specified key must be set as the active key.

An example property would look like below:

encryption:
  active_key_label: key-1
  encryption_keys:
  - label: key-1
    passphrase: CHANGE-ME-DO-NOT-USE-1
  - label: key-2
    passphrase: CHANGE-ME-DO-NOT-USE-2
  - label: key-3
    passphrase: CHANGE-ME-DO-NOT-USE-3

Known Issue

Monit health check and route registrar break if uaa.port is set to -1 to disable HTTP traffic.

Features

Bug Fixes

uaa - UAA Release Notes 4.12.1

Published by tnwang over 6 years ago

Do not use

Please use 4.12.2

Features

Fixes an issue found with 4.12.0 related to large numbers of authorization requests being issued when used in conjunction with UAA Singular.

uaa - UAA Release Notes 4.12.0

Published by cf-identity over 6 years ago

Do not use

This release introduces an issue when used in conjunction with UAA Singular that causes a large number of authorization requests to be issued, which is resolved in 4.12.1

Informational Notes

  • Older database migrations have been updated to introduce primary keys to tables without primary keys. Users deploying UAA using the uaa bosh release should not be impacted by this change. If you were performing custom verification of flyaway migrations, you may encounter errors related to checksums during verification.
  • Account Chooser cookies will no longer set cookies when account chooser is disabled. Users can be instructed to clear their browser cookies.

Stories included in release

Features

Bug Fixes

Documentation

uaa - UAA Release Notes 4.11.0

Published by cf-identity over 6 years ago

Stories included in release

Features

Bug Fixes

uaa - UAA Release Notes 3.20.3

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 3.9.17

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.8.3

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.7.4

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.5.5

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - UAA Release Notes 4.9.0

Published by cf-identity over 6 years ago

Stories included in release

Breaking Changes

Manage Identity Providers via API for UAA Default Zone

UAA now allows operators to manage identity providers via APIs for the default system identity zone, which changes how UAA manifest values for identity providers behave. Previously UAA would disable any API made changes made by an operator on restart even though operators were able to make create and update identity providers using UAA’s API.

As a result, identity providers removed from the manifest must now also be explicitly deleted via manifest configuration (delete.identityProviders) or disabled/deleted via the UAA APIs.

  • For SAML and OIDC identity providers, the delete.identityProviders has been added to allow deletion of these identity providers from the manifest using the origin key.
  • For LDAP, the identity provider should only be disabled.

In addition, SAML, OIDC, and LDAP providers now have an override flag that defaults to true which specifics the manifest properties should overwrite any changes made via API. This value can be set to false to allow API updates of your existing manifest identity providers.

Features

Multifactor Authentication (Available for Preview Use)

Misc.

Bug Fixes

uaa - UAA Release Notes 3.20.2

Published by tnwang over 6 years ago

This is a security release addressing the following issues:

uaa - Do-Not-Use Use 4.8.3 Instead

Published by sreetummidi almost 7 years ago

uaa - UAA Release Notes 4.7.3

Published by tnwang almost 7 years ago

Backport of a performance related fix: