Breaking changes
Here we address changes that may cause previously working configurations to stop working after the update, if they are not adjusted to handle the changes below.
SAML NameID format update
When deciding outgoing SAML assertion NameID format selection process is updated. If NameID format is configured this will supersed anything else. If not configured, requested format value from the AuthNRequest is used.
If none of the above is true, default fallback is:
Any format values in SAML meta data is ignrored.
Overriding logos has new way of configuration
Default property names, and the overriding, of logos have changed.
All logos are now configured in a "logos" property in the ui_config and ui_config_overrides.json
All Integrity Access ui's now use logos defined in the access_header and access_footer. All apps with a top header bar (Password Reset, Portal etc) use the app_logo.
This allows for better separation of logos and for using the same configuration and/or same configuration file for multiple ui apps.
New Hazel cast schema
If running cluster, update cluster configuration xml file using schema:
http://www.hazelcast.com/schema/config/hazelcast-config-5.3.xsd
Session cookie defaults
All session cookies now are set out to require User-Agent communication being done using TLS (encrypted channel)
Running in a non secure channel will require setting:
It is always recommended encrypting data transfer between User-Agent and server.
Name change
New name for Integrity web is Integrity access. Upgrading from earlier version will result in new service and default folder, "access".
It is recommended old service is removed prior to new installation. "customer" folder must be copied from old location. Any file paths from previous location referencing old location must be updated.
For any additional questions, consult Fortified ID support.
Last updated