Skip to content
This repository has been archived by the owner on Dec 21, 2022. It is now read-only.

Commit

Permalink
Adding CHANGELOG.md (#63)
Browse files Browse the repository at this point in the history
  • Loading branch information
Stig Lindqvist authored and mateusz committed Apr 8, 2016
1 parent a9762c1 commit 5670a0a
Show file tree
Hide file tree
Showing 2 changed files with 52 additions and 0 deletions.
48 changes: 48 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
# Changelog

## 2.0.0

LDAP functionality that modifies user data (i.e. password reset) will require
binding credentials with LDAP write access.

- SAML defaults to the SHA-256 hash signature hash
- An issue was fixed where absolute paths couldn't be used for certificates and
keys in YAML configuration.
- Better LDAP group syncing that isn't as likely to crash and leave the database
in an unknown state.
- Removes LDAP group mappings when a security group is deleted
- Minor UI changes for the login form
- Moved the AD fields in the CMS to a separate tab and made them read-only.
- Member "last synced" time is now showing the correct date and time.
- Adding a script to rotate LDAP binding credentials for system administrators
- Samba has been confirmed to work
- Automatic syncing of LDAP groups and users via the `LDAPAllSyncJob` build task
- Users can now reset their AD password via the "I've lost my password" on the
login form.
- Updated documentation

The source code is now following the SilverStripe supported modules standard.

## 1.0.0

Initial release.

# Migration

## 2.0.0

This module is now using SHA-256 hashing algorithm for the SAML integration.
SHA-1 is no longer recommended.

If you are upgrading from an earlier version you will need to change the "secure
hash algorithm" setting in ADFS from `SHA-1` to `SHA-256`, see
[Set the secure hash algorithm](docs/en/adfs.md#set-the-secure-hash-algorithm).

If you can't change the ADFS setting, you will need to downgrade to SHA-1
in YAML, i.e `mysite/_config/saml.yml`:

```
SAMLConfiguration:
Security:
signatureAlgorithm: "http://www.w3.org/2000/09/xmldsig#rsa-sha1"
```
4 changes: 4 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,3 +62,7 @@ AD user synchronisation and authentication is hidden behind the backend (server
* [ADFS administrator guide](docs/en/adfs.md) - prepare the Identity Provider
* [CMS usage guide](docs/en/usage.md) - manage LDAP group mappings
* [Troubleshooting](docs/en/troubleshooting.md) - common problems

## Changelog

The changelog can be found at [CHANGELOG.MD](CHANGELOG.MD).

0 comments on commit 5670a0a

Please sign in to comment.