...
Each employment type now offers a flag to indicate whether or not users are able to create an employment with that employment type from within the organization management in the CoreOne Self-Service Portal. The default is false, so you might need to check your existing configuration.
While assigning a role or resource to various entities, you are now able to select the assignment context.
The new API V2 is now part of the health check page.
Core Identities now have a state of either
active
,deleted
orsupended
All context mappings still contain the
active
flag, so existing mappings do not need to be changedNew context mappings for
StateId
andStateSystemName
are available to account for the new states
By suspending a Core Identity, you set all it’s associated identities into a deactivated state but all assignments that are valid, stay assigned. Read here for more.
There is a new Attribute tab on the detail page of a Core Identity that allows for a more precise editing of the attribute values.
There is a new Role tab on the detail page of a RessourceResource.
Employment types can now be marked as
not assignalbeassignable
from within the CoreOne Self-Service PortalThere are various new security roles. The most important one is the new CoreOne Organization Unit Permission Manager Security Role. When assigned in the context of an organization unit, this role gives permission to manage the permission in accordance with the configured catalogs for all Core Identities, associated to that organization unit.
...
If the current LoA only contains an external identity provider, you can now initiate a direct redirect to that provider.
Users with expired re-certification processes are prevented from login in to other applications other then than the CoreOne Self-Service Portal.
If the only possible path for an authentication is an external logon identity provider, the user will now be redirected automatically.
Local claims and attributes can now be updated automatically from external authentication providers. The update occurs upon each login request of a user.
The Core Identity entity now has a read only e-mail address for easier access.
JWT Certification Secrets for clients are now supported.
The matching attributes for external identities is now configurable on the external identity provider configuration. By default, external and internal identities are matched on the email address.
BREAKING CHANGE: The SMS setting classes have been moved to the Infrastructure library.
...