Skip to content

Releases: kanidm/kanidm

v1.2.1

18 May 03:08
ba82b1a
Compare
Choose a tag to compare

2024-05-18 - Kanidm 1.2.1

In 1.2.0 a bug was discovered where the dynamic groups idm_all_persons and idm_all_accounts were not loaded correctly on restart. This caused users created after the restart to be missing these dynamic groups.

This patch release resolves the loading of these groups and contains an automated fix that triggers all dynamic groups to re-evaluate their members at start up to automatically fix any missing memberships.

We would like to thank @rungmc for their assistance to isolate and resolve this issue.

.deb Packages

17 May 06:21
39ac38e
Compare
Choose a tag to compare
.deb Packages Pre-release
Pre-release

Commits

v1.2.0

01 May 03:02
9efa91a
Compare
Choose a tag to compare

2024-05-01 - Kanidm 1.2.0

This is the first stable release of the Kanidm Identity Management project. We want to thank every
one in our community who has supported to the project to this point with their invaluable
contributions, comments, questions, feedback and support.

Importantly this release makes a number of changes to our project's support processes. You should
review our support documentation
as this may have important effects on your distribution or upgrades in future.

1.2.0 Important Changes

  • On upgrade all OAuth2 sessions and user sessions will be reset due to changes in cryptographic key handling. This does not affect api tokens.
  • There is a maximum limit of 48 interactive sessions for persons where older sessions are automatically removed.

1.2.0 Release Highlights

  • The book now contains a list of supported RFCs and standards
  • Add code challenge methods to OIDC discovery
  • CLI lists authentication methods in security preference order
  • Mark replication as stable for two node usage
  • Automatically conflict and disable nscd and sssd in the unixd resolver
  • Harden unixd resolver against memory inspection
  • Enable unixd hardware TPM support
  • Allow setting resource limits in account policy to raise query limits
  • Reduce logging noise on /status checks
  • Allow /dev/tpmrm0 access on older systemd versions
  • Add an improved migration test framework
  • Create an object graph in the experimental admin ui
  • Add a built-in class for all entries that are system provided
  • Fix uid number range handling with systemd
  • Remodel orca for improved load testing features
  • Upgrade concread with non-blocking read transaction acquisition
  • ldap-sync allows re-use of attributes on entry import
  • Support improved MFA challenge response process in unixd
  • Add support for async tasks in unixd
  • Add improved TPM handling for unixd
  • Migrate cryptographic key handling to an object model with future HSM support
  • Limit maximum active sessions on an account to 48

v1.2.0-pre

26 Apr 07:12
Compare
Choose a tag to compare
v1.2.0-pre Pre-release
Pre-release

Staged release for 1.2.0, due to be finalised on 2024-05-01.

v1.1.0-rc.16

07 Feb 04:43
7567514
Compare
Choose a tag to compare

2024-02-07 - Kanidm 1.1.0-rc.16

This is the sixteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

This is the final release candidate before we publish a release version. We believe that the API and
server interfaces are stable and reliable enough for people to depend on, and to develop external
tools to interact with Kanidm.

Advisories

Oauth2 Client Configurations now require their client name to be unique. During upgrade you may encounter an attribute unique warning preventing upgrade. If this occurs, you must either rename the conflicting group, service account or person, or delete and recreate the Oauth2 Client Configuration with a new client name.

1.1.0-rc.16 Release Highlights

  • Replication for two node environments is now supported
  • Account policy supports password minimum length
  • Improve performance of webui
  • Add transitional compatability with SSSD
  • Improve TPM interfaces in unix clients
  • Allow importing more weak password schemes from FreeIPA
  • Support Attestation of Passkeys/Webauthn - this makes us the first IDM to support this!
  • Add entry-managed-by and hierarchial access control profiles
  • Rework and improve default access controls to further restrict default privileges
  • New replicated domain migration framework for distributed updates
  • Start to add PIV/Smartcard authentication groundwork
  • Allow changes to OAuth2 RS origin
  • Support RFC8414 OAuth2 metadata
  • Improve TLS error dialogs to assist administrators
  • Support RFC6749 Client Credentials Grant
  • Support custom claim maps in OIDC

v1.1.0-rc.15

31 Oct 12:08
6642139
Compare
Choose a tag to compare

2023-10-31 - Kanidm 1.1.0-beta15

This is the fourteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

At this point we believe we are on the final stretch to making something we consider "release
ready". After this we will start to ship release candidates as our focus will now be changing to
finish our production components and the stability of the API's for longer term support.

1.1.0-beta15 Release Highlights

  • Replication is in Beta! Please test carefully!
  • Web UI WASM has been split up, significantly improving the responsiveness.
  • Resolved API JSON issues from 1.1.0-beta13
  • Swapped a lot of internal string constants for enums.
  • Added shortcuts for RW token sessions.
  • TLS client validation improvement
  • Minimum TLS key length enforcement on server code.
  • Improvements to exit code returns on CLI commands.
  • Credential reset link timeout issues resolved.
  • Removed a lot of uses of unwrap and expect to improve reliabilty.
  • Account policy framework is now in place.

v1.1.0-beta.13

01 Aug 05:15
689c7c7
Compare
Choose a tag to compare

2023-05-01 - Kanidm 1.1.0-beta13

This is the thirteenth pre-release of the Kanidm Identity Management project. Pre-releases are to
help get feedback and ideas from the community on how we can continue to make this project better.

At this point we believe we are on the final stretch to making something we consider "release
ready". After this we will start to ship release candidates as our focus will now be changing to
finish our production components and the stability of the API's for longer term support.

Release Highlights

  • Replication foundations
    • Full implementation of replication refresh
    • Full implementation of incremental replication
    • RUV consistency is now stricter
  • Allow tpm binding unixd password hash cache
  • Use argon2id for all password hash types
  • Allow distros to set default shell
  • Convert from tide to axum
  • Modularise unix integration for third party modules
  • Improve account recovery by performing over unix socket for live changes
  • Support hsts in all responses
  • Allow sync agreements to yield some attrs to kanidm
  • Fix bug with posix account gid setting causing gid to be randomised
  • Improve account sync import, including mail attrs and better session handling
  • Bug fix in unixd when certain operation orders could cause group cache to be ignored
  • pre-compress all wasm to improve loading times
  • Add preflight headers for SPA oauth2 clients
  • Persist nonce through refresh tokens to support public clients
  • Allow public (pkce) oauth2 clients
  • Add client UX for external credential portals for synchronised accounts
  • Improve migration durability with a global transaction
  • Cli now shows spn instead of username to allow better multidomain admin
  • Add qrcode for self-enrolling other devices with auth methods
  • Add tls certgen to main binary to improve developer and quickstart setup
  • Unixd now blocks all local account names and id's resolving prevent priv-esc
  • Fix bug with service-account session logout access
  • Oauth2 app list shows when no applications are available
  • Improve ip audit logging
  • Improve cli with re-auth when session is expired
  • Support legacy cron syntax in backup config
  • Improve socket startup in main daemon
  • Add support for selinux labeling of home dirs by tasks daemon
  • Resolve bug in ssh key management if key tag has a space in it
  • Allow tokens to be identified
  • Remove incompatible credentials for service accounts during recovery
  • Fix issues with signal handling for unix tasks daemon
  • Improve create-reset-token user experience
  • Improve self-healing for some reference issues

Ubuntu Packages

10 Jul 07:43
69dfea3
Compare
Choose a tag to compare
Ubuntu Packages Pre-release
Pre-release

Chores

Commits

  • 7495224: headless webdriver testing, starting on brotli feature (#1844) (James Hodgkinson) #1844
  • 6e01c48: Resolve issue with order of operations causing group memberships to disappear (#1845) (Firstyear) #1845

v1.1.0-alpha.12

01 May 01:14
bcdbb18
Compare
Choose a tag to compare

2023-02-01 - Kanidm 1.1.0-alpha12

This is the twelfth alpha series release of the Kanidm Identity Management project. Alpha releases
are to help get feedback and ideas from the community on how we can continue to make this project
better for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon! The main reason we haven't
done so yet is we haven't decided if we want to commit to the current API layout and freeze it yet.
There are still things we want to change there. Otherwise the server is stable and reliable for
production usage.

Release Highlights

  • Allow full server content replication in testing (yes we're finally working on replication!)
  • Improve oauth2 to allow scoped members to see RS they can access for UI flows
  • Performance improvement by reducing clones
  • Track credential uuid used for session authentication in the session
  • Remove the legacy webauthn types for newer attributes
  • Improve the logo to recurse
  • Add privilege separation and re-authentication for time limited access
  • Improve builds on windows
  • Cleanup source tree layout to make it easier for new contributors
  • Improve exit codes of unixd tools
  • Restrict valid chars in some string contexts in entries
  • Allow configuration of ldap basedn
  • Extend oauth2 session lifetimes, add refresh token support
  • Improve user experience of credential updates via intent tokens
  • Consolidate unix tools
  • Add exclusive process lock to daemon
  • Allow dns/rdns in ldap search contexts

v1.1.0-alpha.11

05 Feb 23:53
d3a2a6b
Compare
Choose a tag to compare

2023-02-01 - Kanidm 1.1.0-alpha11

This is the eleventh alpha series release of the Kanidm Identity Management project. Alpha releases are
to help get feedback and ideas from the community on how we can continue to make this project better
for a future supported release.

The project is shaping up very nicely, and a beta will be coming soon! The main reason we haven't done
so yet is we haven't decided if we want to commit to the current API layout and freeze it yet. There
are still things we want to change there. Otherwise the server is stable and reliable.

Release Highlights

  • Support /etc/skel home dir templates in kanidm-unixd
  • Improve warning messages for openssl when a cryptographic routine is not supported
  • Support windows for server tests
  • Add a kanidm tools container
  • Initial support for live sync/import of users and groups from FreeIPA
  • Oauth2 session logout and global logout support
  • UI polish based on hint flags to dynamically enable/disable elements
  • Oauth2 single sign on application portal
  • Support dn=token for ldap client binds
  • Trap more signals for daemons
  • Mail read permission group
  • Oauth2 add a groups claim
  • LDAP support for mail primary and alternate address selectors in queries
  • Fix handling of virtual attrs with '*' searches in ldap
  • Support multiple TOTP on accounts
  • Add kanidmd healthcheck for containers
  • Improve the access control module to evaluate access in a clearer way
  • Allow synced users to correct modify their local sessions