...
Out this week
Final testing and fine-tunings for DPoP, PAR and JAR
Ian
John
Marvin
Phil
Closed off the issues preventing v1 release of the WebAuthn plugin
Jira Legacy server System Jira serverId f52c7d31-6eab-3f0e-93c3-231b5754d506 key JWEBAUTHN-26 Jira Legacy server System Jira serverId f52c7d31-6eab-3f0e-93c3-231b5754d506 key JWEBAUTHN-21 Jira Legacy server System Jira serverId f52c7d31-6eab-3f0e-93c3-231b5754d506 key JWEBAUTHN-24 Jira Legacy server System Jira serverId f52c7d31-6eab-3f0e-93c3-231b5754d506 key JWEBAUTHN-22
I’ve been testing it. It seems ready.
Timo has been testing it. It seems to have fixed his issues.
He has made a few more improvement suggestions which I think I will target for a v1.1.0.
Support the JSON list of passkey providers not in the FIDO Metadata Service (basically, the untrusted software authenticators)
This would only be to improve the UI for registrations for these authenticators
Add a more granular version of the allow/deny AAGUID policy I was looking at post v1, to say allow/deny for 2FA v sole-factor
Release next Tuesday?
Rod
A bit of JDBC apart from that nothing
Normal service should resume in October (starting with finishing the windows configuration for the Jetty plugin).
Has anyone had a chance to try it on real Unix?
...
Did some cleanup on SP 3 for a 3.5 patch, mostly done except for all the “outside” work
Work mostly completed on new SP SAML consumer flow, close to doing the flow unit test
Everything but the final steps are copied from proxy flow
Final steps just suck out data into IdPATtribu
Lot of support activity, some quite involved or frustrating
Probably seeing uptick of V5 upgrades
Jira Legacy server System Jira serverId f52c7d31-6eab-3f0e-93c3-231b5754d506 key OSJ-416 Significant? bug in V4, but was accidentally patched for V5
Original issue I filed holds, we don’t have unit tests for this case and definitely should
We may have a significant issue with the override of included algorithms, need to reproduce for member
...