Skip to content

Releases: cmu-sei/Identity

1.5.5-rc5

09 May 20:31
Compare
Choose a tag to compare
1.5.5-rc5 Pre-release
Pre-release
wip

v1.5.5-rc4

09 May 20:16
Compare
Choose a tag to compare
v1.5.5-rc4 Pre-release
Pre-release
fix overwriting of external claims

v1.5.5-rc3

09 May 18:50
Compare
Choose a tag to compare
v1.5.5-rc3 Pre-release
Pre-release
extract external registration name from email

v1.5.5-rc2

09 May 16:02
Compare
Choose a tag to compare
v1.5.5-rc2 Pre-release
Pre-release
fix acr_value

v1.5.5-rc1

08 May 20:00
Compare
Choose a tag to compare
v1.5.5-rc1 Pre-release
Pre-release
add external-idp options

v1.5.4

23 Jun 17:08
7ce3070
Compare
Choose a tag to compare

Adds Azure Application Insights telemetry when configuration Insights__ConnectionString is set.

v1.5.3

16 Jun 13:16
Compare
Choose a tag to compare

Anonymizes default (new) resource names by removing the actor's name from them.

v1.5.2

15 Apr 01:09
Compare
Choose a tag to compare

Set minor state cookies as secure in production.
Fix issue with expired account checking.

v1.5.1

31 Mar 19:46
Compare
Choose a tag to compare

Adds an Account__Authentication__ExpireAfterDays = 0 setting that, if set greater than zero, disallows authentication for users whose last login is beyond that interval.

This setting implies a support mechanism since an administrator will need to re-enable the account if necessary.

v1.5.0

10 Mar 16:36
9f19714
Compare
Choose a tag to compare

Updates handling of client certificates.

The application assumes an upstream ssl terminator validates any client certificate and adds headers with client cert data. While the app can receive the client certificate as a header value, this has drawbacks because 1) passing multiline header values isn't standard, and 2) that work has generally already been done by the upstream terminator.

For security reasons, the operator MUST ensure that configured ssl client cert headers are ONLY set by the upstream ssl terminator.

Changes:

  • parses x500 distinguished names in addition to the existing ldapv3 formatted DNs.
  • removed the default (nginx) header names. Operators must configure with expected header names.
  • allows multiple client cert header options (changed from string to array of string)
## Header values for certificate data received from reverse proxy (i.e. nginx)
## ** These are NOT defaults. You must include your values.  Nginx values are shown.
# Account__Authentication__ClientCertHeader = X-ARR-ClientCert
# Account__Authentication__ClientCertSubjectHeaders__0 = ssl-client-subject-dn
# Account__Authentication__ClientCertIssuerHeaders__0 = ssl-client-issuer-dn
# Account__Authentication__ClientCertSerialHeaders__0 = ssl-client-serial
# Account__Authentication__ClientCertVerifyHeaders__0 = ssl-client-verify

"Security" enhancement

  • removed anonymous access from the public /api/version and /api/stats endpoints.