Releases: Yvand/LDAPCP
Releases · Yvand/LDAPCP
Beta
Changes:
- 7b5c6df Update CHANGELOG.md
- bfab1be Improve logging in method GetGroupsFromLDAPDirectory
- 9572d3a Add property MaxSearchResultsCount
- c53279c Update DevOps-Compile.yml
- 350173d Update DevOps pipelines
- e41d684 Update azure-pipelines.yml
- f7e9b86 Update NuGet package NUnit3TestAdapter to v3.13
- fd87fe5 Cache result returned by FileVersionInfo.GetVersionInfo() to avoid potential hangs
- f7ba3fe Update CustomConfigTests.cs
- f11c0c0 Re-introduce lock on TestDynamicTokens tests
See more
- 443d392 Update NUnit3TestAdapter to 3.12.0
- d1e10d5 Set NonParallelizable attribute on test methods that update configuration
- 0259774 Update version information
- d7ef6fa Update azure-pipelines.yml
- c64fecd Update compilation settings of tests project
- 0207bd0 Update azure-pipelines.yml
- 8902377 Update CustomConfigTests.cs
- c2a6ed2 Update logging
- 51ca45d Remove Parallelizable class attribute
- 50e7311 Update azure-pipelines.yml
- 405382f Update LDAPCP.Tests.csproj
- 64ca236 Update tests
- 3faad40 Update azure-pipelines.yml
- 809ce06 Reorganize tests to cover more scenarios and avoid concurrent updates
- 0946296 Fix poolName values
- 796aece Update azure-pipelines.yml
- f184dad Add test jobs for 2016 and 2019
- 19972c1 Rename DevTestLab variables
- 2d4d9b0 Update azure-pipelines.yml
- cb07524 Update azure-pipelines.yml
- e0ed376 Update azure-pipelines.yml
- 644e0fe Update azure-pipelines.yml
- 958f924 Update azure-pipelines.yml
- 4e5c9ed Update azure-pipelines.yml
- 69d29cb Update azure-pipelines.yml
- 7f34117 Update azure-pipelines.yml
- a01e765 Update azure-pipelines.yml
- b7e50ea Update azure-pipelines.yml
- 3311c5b Update azure-pipelines.yml
- 0e0b2dd Fix variable names
- 7b40cf9 Update build pipeline and tests initialization
- be541d0 Set timeout on job CreateTestEnvironment and remove blank lines
- 1d64898 Update azure-pipelines.yml
- 1b79c8c Update azure-pipelines.yml
- 8f6b021 Add jobs
- 99f91a9 Update azure-pipelines.yml
- 7264755 Create root site collection if it's missing
- 6c0f93b Clean azure-pipelines.yml
- ff75362 Set timeoutInMinutes to 90
- b7d50b6 Update azure-pipelines.yml
- 8640327 Update azure-pipelines.yml
- 8bd0a69 Update azure-pipelines.yml
- d5c6f5c Update azure-pipelines.yml
- e782c9d Update UnitTestsHelper.cs
- ae404be Update logging
- f3bee8b Handle that claims provider configuration may not already exists
- f07beec Add tracing to tests execution
- e4cb89d Remove unused reference to System.Configuration
- 161bd54 Use Int32.MaxValue if exact number of entities is unknown
- 84253ae Add preprocessor directives on debug methods
- fe918f6 Set TargetPlatform to x64
- 016a867 Replace app.config with a .runsettings file
- 69ec96f Add property GroupMembershipAttributes to allow customize LDAP attributes used for augmentation
- 3fa9530 Update CHANGELOG.md
- f374eb5 Update App.config
- 886e6f7 Ensure that LDAPCP augments only entities from the TrustedProvider it is associated with
- 09b14aa Fix sign-in of users failing if LDAPCP configuration does not exist
- f72cb63 Improve tests
- 7b2d3a1 Update NuGet packages
- 60eb4d7 Add MajorMinorVersion
- 2c25300 Update azure-pipelines.yml
- 959f4f6 Create azure-pipelines.yml
- c00858c Suppress warning during compilation
- 920c4ea Update LDAPCP/Properties/AssemblyInfo.cs
- 4c4c062 Update README.md
- ea7c53c Change format of key to sign assembly
- fc1adb9 Handle possible exceptions in PrincipalContext constructor and update logging
- 16bb259 Updated tests
- 213f02d Updated tests
- 8ff7e7b Improved managemend of special LDAP characters
- 34325e1 Added property CustomData to ILDAPCPConfiguration
- eaf6f08 Added more strict checks on the claim type passed during augmentation and validation, to record a more meaningful error if needed
- aa704ab Update LDAPCP.Tests/CustomConfigTests.cs
- df361a8 Updated ReturnDefaultClaimTypesConfig
- 1959ed7 Set property ClaimTypes in method ReturnDefaultClaimTypesConfig
This list of changes was auto generated.
v11
LDAPCP v11 enhancements & bug-fixes
- Fixed no result returned under high load, caused by a thread safety issue where the same filter was used in all threads regardless of the actual input
- Fixed the augmentation that randomly failed under high load, caused by a thread safety issue on list ILDAPCPConfiguration.LDAPConnectionsProp
- Added handling of special characters for LDAP filters as documented in https://ldap.com/ldap-filters/
- Added the first nae (givenName) in the list of attributes queried by default
- Improved validation of changes made to ClaimTypes collection
- Added method ClaimTypeConfigCollection.GetByClaimType()
- Implemented unit tests
- Explicitely encode HTML messages shown in admin pages and renderred from server side code to comply with tools scanning code to detect security vulnerabilities
- Deactivating farm-scoped feature "LDAPCP" removes the claims provider from the farm, but it does not delete its configuration anymore. Configuration is now deleted when feature is uninstalled (typically when retracting the solution)
- Added user identifier properties in global configuration page
v10
About this release
This release introduces a lot of changes and improvements.
Important: This version has breaking changes, please check this page if you update from an earlier version.
Changelog
- LDAPCP can be entirely configured with PowerShell, including claim types configuration
- LDAPCP administration pages were updated to be easier to udnerstand, especially the page that configures claim types.
- LDAPCP administration pages can now be easily reused by developers.
- Augmentation can now handle multiple group claim types, and uses the credentials set when LDAP connection was added.
- Number of results returned by LDAP servers is now limited to improve performance of LDAP servers.
- Logging is more relevant and generates less messages.
- Beaking change: Due to the amount of changes in this area, the claim types configuration will be reset if you update from an earlier version.
- Many bug fixes and optimizations
LDAPCP v2017-10
- Fixed issue #22: Improve augmentation when identity claim type is email and users are in AD
LDAPCP v2017-09
- Fixed issue #16: Check if identity attribute exists on each result returned by LDAP to avoid an ArgumentOutOfRangeException exception.
- Reduced logging level from medium to verbose on message informing that a user key was returned.
LDAPCP v2017-06
New release v2017-06 (#9)
- Added ability to make augmentation on non Active Directory LDAP servers. There are now 2 ways:
- Call .NET method UserPrincipal.GetAuthorizationGroups (works only with AD).
- Read LDAP attribute memberOf/uniquememberof of the user, which should work with all LDAP servers (new method introduced in this release).
- Updated LDAPCP configuration page to let administrators choose either way to perform augmentation, individually per LDAP server.
- Improved logging to reduce amount of messages generated while providing more information, such as the time spent by LDAP server(s) to run the query
LDAPCP v5.1
What's new
- Improved augmentation