Skip to content

Releases: cloudfoundry/uaa

UAA 3.3.0.4 - Security Release (CVE-2016-5007)

15 Aug 18:25
Compare
Choose a tag to compare

This is a security release which addresses CVE-2016-5007 Spring Security / MVC Path Matching Inconsistency

This following dependencies have been updated

  • Spring Security 4.1.1
  • Spring Framework 4.3.1
  • Spring Security Oauth 2.0.10
  • Spring Security LDAP 2.1.0
  • Spring Security SAML 1.0.2
  • Apache Tomcat 8.0.36
  • Apache Tomcat jdbc-pool 7.0.70

UAA 3.6.0 Release Notes

15 Aug 18:26
Compare
Choose a tag to compare

This is a security release which addresses CVE-2016-5007 Spring Security / MVC Path Matching Inconsistency

This following dependencies have been updated

  • Spring Security 4.1.1
  • Spring Framework 4.3.1
  • Spring Security Oauth 2.0.10
  • Spring Security LDAP 2.1.0
  • Spring Security SAML 1.0.2
  • Apache Tomcat 8.0.36
  • Apache Tomcat jdbc-pool 7.0.70

UAA 3.5.0 Release Notes

15 Aug 21:21
Compare
Choose a tag to compare

IMPORTANT: Deprecation Notice

This releases marks the deprecation of the UAA properties listed here
Please make sure that you have update your UAA & LOGIN YAML configurations accordingly.

New Features

Bug Fixes

UAA 3.4.2 - Security Release (CVE-2016-5016)

19 Aug 22:29
Compare
Choose a tag to compare

UAA 3.3.0.3 - Security Release (CVE-2016-5016)

19 Aug 18:45
Compare
Choose a tag to compare

UAA 2.7.4.5 - DO NOT USE

19 Aug 22:29
Compare
Choose a tag to compare

UAA 3.4.1 - Security Release (CVE-2016-4468)

01 Jul 16:56
Compare
Choose a tag to compare

UAA 3.3.0.2 - Security Release (CVE-2016-4468)

15 Aug 17:58
Compare
Choose a tag to compare

UAA 2.7.4.4 - Security Release (CVE-2016-4468)

01 Jul 16:55
Compare
Choose a tag to compare

UAA 3.4.0 Release Notes

02 Jun 19:02
Compare
Choose a tag to compare

New Features

Permanent home for API Docs @ http://docs.cloudfoundry.org/api/uaa/

Identity Provider Discovery

UAA now supports Identity Provider discovery when multiple SAML or OpenID Connect Identity Providers are enabled for any given Identity Zone. The right identity provider is discovered based on the email domain associated with the provider. The login experience has been updated to prompt the user for the email based on which the right identity provider is discovered and the user is redirected to the same.

The discovery flow can also be used for OAuth Clients which are associated with more than one allowed providers. The OAuth enabled application can also send a login hint containing the email domain so that the right Identity Provider can be discovered without the user having to enter the email address on the login page.

In order to enable IDP discovery for the default zone , you can set the property below.

login.idpDiscoveryEnabled:
description: "IDP Discovery should be set to true if you have configured more than one identity provider for UAA. The discovery relies on email domain being set for each additional provider"
default: false

For other identity zones, this property can be updated via the Identity Zone API. The property is config.idpDiscoveryEnabled and the default is false.

Related Stories
Other minor features

Bugs Fixes