Show / Hide Table of Contents

    Safewhere Identify 5.19 Release Notes

    New features and improvements

    Add Language Chooser to Login Selector Page

    The Language Chooser allows users to change the language based on their preference, rather than relying on the browser's default language setting. This feature is particularly useful when users need to interact with Identify login page in a language different from their browser's default.

    This release introduces the following enhancements:

    • The ability to add the Language Chooser to a login selector page.
    • Configuration options for the Language Chooser tailored to specific applications.

    For more details, refer to Add Language Chooser to Login Selector Page.

    Simplify the "sub" value for token exchange flow using refresh_token grant type

    In previous versions, when a refresh token was issued, it included all associated claims but lacked information about which claim was the original NameID claim. When requesting a new access token using the refresh_token grant type, the sub claim in the new access token was derived from the original name claim. This could lead to inconsistencies when the original access token's sub claim didn't match the subject information in the refresh token.

    Identify has been updated to simplify the sub claim value handling for the refresh_token grant type. The new implementation now consistently uses the subject information directly from the refresh token, ensuring that the sub value remains consistent between the initial access token and any subsequent tokens obtained through the token exchange flow.

    Certificate logging optimization on LDAP provider

    In previous versions, Identify would log every certificate detail when searching for AD user credentials, creating thousands of log entries for users with numerous certificates. The improved code now implements smarter logging that prevents performance degradation in environments with large certificate collections. Additionally, a new event ID 5008 is used to log the certificate data for the user being validated, ensuring that only relevant information is logged while maintaining performance.

    Telemetry client management on Application Insights

    Identify resolved a resource leak in error handling where each unhandled exception created a new TelemetryClient instance with a permanent background task. This fix prevents the accumulation of thousands of orphaned background tasks, dramatically reducing memory consumption and improving system stability over time.

    Bug fixes

    • Fixed: #3457 [REST] dependencyConnectionNames returned empty string ("") when invoking GET method on /admin/api/rest/v2/connections
    • Fixed: #4087 Exception returned: The provided anti-forgery token was meant for user "", but the current user is "{username}". This error occurred when a user logged in, then used ForceAuthn or logged out and logged in again, triggering a second-factor authentication. When the second factor was triggered, the username from the previous authentication session interfered with the CSRF token, causing the error.
    Back to top Generated by DocFX