AuthorisationService Release Notes [C OG]
The following items on the list encompass breaking changes, features, and fixes that are relevant for the major release.
Release 23.1.17
General
With release 23.1, AuthService for Enterprise and VidiNet joined into one release. This version uses KeyCloak to manage users and groups and sync with different identity and user federation providers like LDAP oder VidiCore.
KeyCloak brings its own database and synchs users and groups regularly with the user federation provider. The time for synchronization can be configured in ConfigPortal. A manual sync process can also be triggered from CP or via the AuthService API.
Both the AuthService and the KeyCloak service can be deployed in multiple redundant instances for failover scenarios.
KeyCloak is used in version 18.
Changed login behavior with LDAP connection
The previous version of AuthService had the option to automatically fill in the domain suffix on the login screen. The user had to add the username and the password to log in.
With AuthService 23.1 it is no longer supported to inject the domain suffix into the login screen. If the user needs to specify a domain, it has to be typed in. But on the other hand, it is possible to just enter a username (without domain suffix) and password and AuthService tries to match this user to all configured ADs. If the user is found with a matching password, then the domain is automatically used.
Multiple LDAP environments
AuthService 23.1 support connecting to more than one LDAP environment for authentication authorization. This can be configured in ConfigPortal.
Be aware that users and groups are always uniquely assigned to an Active Directory and are never used across AD.
Multiple search bases for Active Directory
Users and groups to be synched with AuthService can be organized in different areas of the AD. To avoid the whole AD tree having to be synched, it is possible to configure multiple search bases.
Fixes
Item # | Item |
---|---|
211500 | AS: Add version number and main page to the AS Keycloak |
211719 | AS with Keyclaok does not manage re-login in a proper way |
211757 | AS: Arvato Systems Brand Login Page (include localisation) |
212573 | AS: Add option to disable CRL if needed |
213545 | AS: Issue with failure when adding new Role (KC) |
214081 | AS: Authservice keycloak helm chart to support dbAdmin parameters |
214614 | AS: Failed to add/update client with custom role claims |
214450 | AS: Keycloak Domain LDAP: Unable to sync group when user and group are located in the same CN/OU |
214753 | Domain LDAP sync not added user to the added group |
215308 | AS: Missing preferrable_username in Group & User claims |
215227 | AS: Failed to filter group and user using username with domain |
215202 | AS: Duplicate CLIENT ID, CLIENT HOST protocol mappers in Client_Credentials |
207563 | AS: Add default roles to user based on the VPMS Product Roles |