This section contains release notes for OneWelcome Access.
In the release notes we mention new features and bug fixes. If anything is unclear, feel free to contact OneWelcome Support.
Release date: 2023-01-24
- The end-user is now redirected to a whitelisted
post-logout-urlafter a OIDC logout request, even when the provided ID token is recently expired or there is no active session for that client.
- The Device API now returns a timestamp for
removeScopesfeature in the Customize Access Token Web Hook will now be respected when used together with Custom registration.
Release date: 2023-01-18
- For Custom registration events, we now log the
Client idto make it easier to correlate the events to a client or mobile device.
- While adding a mobile authentication type "SMS", the
SMS sender idalways returned a validation error in the UI. This is now fixed.
Release date: 2023-01-11
- We introduced a new
TulipIdentity Provider Type.
Release date: 2022-12-15
- Fixed a bug where the introspection endpoint returned a
rpSetclaim instead of user attributes.
- We now also remove the Mobile push message capabilities for users that remove their last mobile device.
Release date: 2022-12-01
- Next to an instance in the EU, we also released an instance in the US.
Release date: 2022-11-30
- We improved the performance and stability of the application.
Release date: 2022-11-11
- We improved the performance caused by clients with multiple redirectUris.
- We improved the performance of the Events page for customers with mobile devices.
Release date: 2022-11-01
- Fixed a bug where Access tokens were not revoked after a logout request if the session was created based on a cookie.
Release date: 2022-10-11
- Added an API to delete all tokens for a specific user per type.
- Fixed an issue where token introspection showed claims with the value
null. These are now hidden.
Release date: 2022-08-29
- Support for custom registration for Web clients.
- Reduced the number of calls to our caching database for templates.
Release date: 2022-08-16
- We introduced a
v2of the token introspection endpoint to comply with RFP7662 for the
- We now make a SAML SLO request succeed even without a session, based on SpNameQualifier in the SAML metadata.
Release date: 2022-07-06
- Removed support for the deprecated algorithms
- The generated
Server Public Keyis now visible as text on the mobile app's configuration page.
- Fixed an issue that caused exceptions when making calls to our caching database.
Release date: 2022-06-29
- It is now possible to add an extra param
hook_context_custom_param.*to the authorization endpoint. This param is then available in the Onegini Customize Access Token Web Hook as context.
Release date: 2022-06-09
- In the authentication response, we now indicate which external IDP was used by the end-user to authenticate. E.g. when a user uses Digid, we fill the
- It's now impossible to configure an API based custom authenticator with the PCKE grant type.
- We aligned the
expvalue in our token introspection endpoint with the RFC 7662. It now is an integer timestamp, measured in the number of seconds since January 1 1970 UTC. To use this new value, please switch to the v2 of our token introspection endpoint.
Release date: 2021-09-14
- Added the ability to delete access and refresh tokens when using the End-session endpoint for OpenID
Connect. This is enabled by default for clients with the authentication method
PKCE. Refer to the
OpenID Connect configuration for more information
- Added the token revocation endpoint to the OpenID Connect discovery endpoint.
- Improved the integrity check for mobile apps. This improved integrity check is required for new mobile apps introduced to the Google Play Store after August 1st, 2021. The existing apps, both running on Android and iOS, will continue to work without any changes. Still, it is recommended to plan an update of the Onegini SDK and use the improved integrity check.
- The OpenID End-session endpoint did not properly handle encoded parameters when it was called via HTTP POST. This prevented users from being redirected back to the website after logout. This has been fixed.
- Several endpoints for Mobile Authentication returned responses in a different format than documented. These responses have been fixed.
Release date: 2021-05-10
- It is now possible to configure multiple redirect URLs for mobile apps. This makes it possible to change the app scheme of the mobile app in a new version while the existing app installations use the old app scheme.
- Relying Parties (RP) can resolve user attributes from Access by calling the User Info endpoint or by requesting an ID Token. Both means are defined by OpenID Connect (OIDC) standard. The returned set of identity related claims couldn't be modified, extended or filtered other than by using scopes. With the new User Details Customization Web Hook serves these purposes.
- When the user device domain state changes, Access will publish a corresponding event to the event bus notifying all interested parties about the change. Device domain state changes are: a new user device registration, deregistration, user logging in with the device, or mobile authentication enrollment changes.
- The process of registering a new mobile application requires both parties, the device, and the server, to have their time/date settings set correctly. Some users are explicitly modifying their time which prevents them from successfully finishing the onboarding process. To improve the user experience Access will handle such situations more gracefully by detecting clock skew and informing the client about the root cause of the rejection.
- When Access failed to successfully send a PUSH notification via Apple Push Notification Service (APNS), it returned a generic error to the client. To help diagnose the root cause of the issue, Access will log more detailed information about why the notification got rejected in the corresponding event.
- The mobile applications that were using the Custom Registration feature had to send additional request in order to obtain an ID Token. This will no longer be required as the ID Token will be returned to the client along with the Access Token when configured.
- Users who are either members of many Delegated Administration for Business Partners (DABP) groups or are having many DABP policies assigned, could experience issues when logging out from DABP or Onegini Console applications. The logout request in such scenarios will no longer be rejected.
Release date: 2021-03-09
- First official release of the access components.