- [TD-7696]
- [TD-7861]
- New permisssion
link_quality_control_to_concept - New permission
link_quality_control_to_structure
- New permisssion
- [TD-7693] Allow regex configuration for OIDC_ALLOWED_GROUPS
- [TD-7693] Remove OIDC config in favor of TdAuth.HttpClient
- [TD-7693] Configuration for SSL options on OIDC
- [TD-7693] Add configuration for SSL options on OIDC
- [TD-7636] Handle group creation on OIDC authentication
- [TD-6370] Update library to allow OIDC without Client Secret
- [TD-7401] Update
td-cacheversion
- [TD-7299] Refactor gitlab-ci pipeline and add Trivy check
- [TD-7176] Add Grant Request logic for foreign requests
-[TD-7226] Enhance SSL configuration handling in production
- License and libraries
- [TD-7126] Enable the creation of LDAP-based groups using params from Distinguished Name.
- [TD-6862] Optimize QX permissions
- [TD-6911]
- update Elixir 1.18
- update dependencies
- update Docker RUNTIME_BASE=alpine:3.21
- remove unused dependencies
- remove swagger
- remove cabagge
- [TD-6865] Automatically create groups based on LDAP
- [TD-6989] Roolback 6811 and include profile_mapping configuration in runtime
- [TD-6991] Put permission roles in cache when roles are edited
- [TD-6811] Add uid field to LDAP integration
- [TD-6950] Fix add and delete user role functionality
- [TD-6184] Role for Agents, and remove role_type fro users
- [TD-6602] Update cache when ACL resource is created, edited or deleted
- [TD-6619] Fix pattern matching for empty sslopts
- [TD-6619] Add sslopt to exladp.open
- [TD-6619] Function typo
- [TD-6619] Add ad sslops and remove environment variables for booleans
- [TD-6619] Environment variables for booleans in td-auth
- [TD-5520] Added new permissions group to visualize grants
- [TD-5495] Foreing keys columns should match original ID columns in all tables
- [TD-6386] Users listing with Default Role Permissions
- [TD-4110] Allow structure scoped permissions management
- [TD-6425] Ensure SSL if configured for release migration
- [TD-6195] Permissions for Business Concept Ai Suggestions
- [TD-6336] Get test-truedat-eks config on deploy stage
- [TD-6152] Permissions for QX executions
- [TD-6140] Added permissions for Ai suggestions
- [TD-5505] Added permissions for
manage_grant_removalandmanage_foreign_grant_removal
- [TD-6059] Added permissions for QualityControls
- [TD-6079] Allow all users to get roles
- [TD-5468] Change the resource_acl_path to acl_path for kong update version
- [TD-5912]
.gitlab-ci.ymladaptations for develop and main branches
- [TD-5770] Add database TSL configuration
- [TD-5691] Domains and role filter for grant requests
- [TD-5297] Added
DB_SSLenvironment variable for Database SSL connection
- [TD-5509] link_structure_to_structure permission
- [TD-4300] manage_basic_implementations permission
- [TD-5258] Add
roleto user data - [TD-5256] Update dependencies, build with
elixir-1.13.4-alpine
- [TD-5284] Phoenix 1.6.x
- [TD-4903] Include
sobelowstatic code analysis in CI pipeline
- [TD-5082] view_protected_metadata permission
- [TD-5133] filter on /user/search for retreaving users with a specific permission
- [TD-5036] Support for custom permissions
- [TD-3614] Support short-lived access tokens with refresh mechanism using secure cookie
- [TD-4412] Support for caching groups and group related acls
- [TD-4431] New permission
request_grant_removal - [TD-4918] Refactor quality implementations permissions
- [TD-4540] New permissions for implementation workflow
- [TD-4089] New permission
manage_ruleless_implementations
- [TD-4538] New permission
manage_segmentsindata_quality
- [TD-4271] New permissions
link_implementation_structure
- [TD-4625]
RoleLoader.load_roles/0was failing when no roles exist
- [TD-4271] New permissions
link_implementation_business_concept - [TD-3233] Rule result remediation plan
manage_remediationspermission - [TD-4577] Move view
StructureNotespermissions todata_structuregroup
- [TD-2501] Database timeout and pool size can now be configured using
DB_TIMEOUT_MILLISandDB_POOL_SIZEenvironment variables - [TD-4491] Caching of permissions has been refactored
- [TD-4604] Removed route
/api/users/me/permissions
- New permissions:
- [TD-4437]
manage_rule_results - [TD-4481]
manage_business_concepts_domain
- [TD-4437]
- [TD-4456] Include user external_id in UserCache.put (removes [TD-4212])
- [TD-4228] Include optional
external_idfor users
- [TD-4212]
- Remove ACLs after domain member deletion
- Remove ACLs after user deletion
- [TD-4203] Update
td-cachefor role permissions
- [TD-4205] TdAuth.Permissions.RoleLoader server was not started on application
- [TD-4044] Filter permissions without role before putting to cache
- [TD-4057] OIDC: Allow discovery uri to be self-signed
- New permission
approve_grant_request - [TD-4076] store roles with permissions in cache
- [TD-4030] Conflict with permission
create_grant_request
- [TD-3931] Update acl entry resource
- [TD-3982] New permission
create_grant_request
- [TD-3833] Allow to setup user groups to be allowed to enter the application for SAML integration
- [TD-3945] New permissions to view and manage grants
- [TD-3947] Updated td-cache to write cache for user_name
- [TD-3873] Include a specific permission to be able to share a concept with a domain
- [TD-3833] Allow to setup user groups to be allowed to enter the application for SAML integration
- [TD-3894] User email is now optional
- Removed deprecated
is_adminfield in user requests and responses
- [TD-3617] url in state for auth0 and idc
- [TD-3720] New permission
manage_structures_domain - [TD-3900] Allow proxy authentication in
OpenIdConnect
- [TD-3522] Added permissions to StructureNotes management
- [TD-3816] Build using Elixir 1.12 and Erlang/OTP 23
- [TD-3102] Improve change password functionality
- [TD-3753] Build using Elixir 1.12 and Erlang/OTP 24
- [TD-3503]
- Created APIs
api/users/searchandapi/groups/search - Removed permissions for non-admin users to
:indexusers and groups
- Created APIs
- [TD-3526]
link_data_structure_tagpermission to link a structure to a tag
- [TD-3628] Force release to update base image
- [TD-3445] Postgres port configurable through
DB_PORTenvironment variable
- [TD-3326] Configure JWT token TTL using environment variables
- [TD-3297] PKCE code verifier length is now configurable using environment
variable
PKCE_CODE_VERIFIER_LENGTH(defaults to 128)
- [TD-1389] Generates events for login attempts and successes
- [TD-2951] Permission
profile_structures.
- Build with
elixir:1.11.3-alpine, runtimealpine:3.13
- [TD-3245] Tested compatibility with PostgreSQL 9.6, 10.15, 11.10, 12.5 and
13.1. CI pipeline changed to use
postgres:12.5-alpine.
- [TD-3296] Support for PKCE in OAuth 2.0 authentication code flow. To enable
PKCE, set the environment varible
PKCE_CODE_CHALLENGE_METHODtoS256.
- [TD-3146] Delete acl entries from deleted domain ids collection
- [TD-3163] Initial support for service accounts
- [TD-3164] Service accounts can view auth API resources
- [TD-3163] Auth tokens now include rule claim instead of is_admin flag
- [TD-3182] Allow to use redis with password
- [TD-3074] Allow to query
usersandgroupsfor users having permissions in bg
- [TD-3162] users
is_protectedfield
- [TD-3170] Build docker image which runs with non-root user
- [TD-3139]
/api/initnow creates the initial admin user as unprotected unlessis_protected: trueis specified in the payload
- [TD-3143] Support Azure Active Directory with OAuth 2.0 auth code flow
- [TD-2486] Permissions
manage_data_sourcesandmanage_configurations
- [TD-2461] Split
business_glossarypermission group into groupsbusiness_glossary_viewandbusiness_glossary_management
- [TD-3101]
GET /api/users/init/canVerifies if unprotected users exists
- [TD-3110] Increased maximum accepted length of HTTP request header values
- [TD-3047] Renamed permission
execute_quality_ruletoexecute_quality_rule_implementations
- [TD-2872]
GET /api/users/init/canCan create initial user
- [TD-2534] Refresh acl cache after group is updated
- [TD-2280] Do not reference to domains by their names
- [TD-2687] Remove
emailandis_adminfrom principal in ACL entry responses - [TD-2684]
POST /api/:resource_type/:resource_id/acl_entriesto create a new ACL entry for a resource - Updated to Phoenix 1.5
- [TD-2684]
PATCH /api/:resource_type/:resource_id/acl_entriesis no longer used, removed unusedupdate_acl_entrypermission check - Prometheus metrics exporter
- [TD-2361] Manage raw rule implementations permission
- [TD-2394] Endpoint for returning user permissions domains
- [TD-940] Migrated to Elixir 1.10, simplified routes, improved hypermedia on
/api/:resource_type/:resource_id/acl_entries
- [TD-2281] Include permission groups in JWT token, added permissions for dashboards and lineage
- [TD-2330] Allow custom login validations based on Ldap attributes
- [TD-832] Group api for permissions
- Default log format is now with UTC timestamp and includes PID and module metadata
- [TD-2170] permission to manage metadata
- [TD-2181] Proxy login now returns token on first step
- Use td-cache 3.7.0
- [TD-740] Group users endpoint
- Use td-cache 3.5.1
- Use td-hypermedia 3.6.1
- [TD-2044] Permission execute_quality_rule
- [TD-1775] Permission manage quality rule implementations
- [TD-1776] Permission view_quality_rule
- [TD-2002] Update td-cache and delete permissions list from config
- [TD-1594] fix allow_proxy_login config to accept environment value
- [TD-1618] Cache improvements (use td-cache instead of td-perms)
- [TD-1594] Support for proxy login
- [TD-1893] Use CI_JOB_ID instead of CI_PIPELINE_ID
- [TD-1702] New permission view_data_structures_profile
- [TD-1699] New flow for ldap authentication
- [TD-1535] New permission manage_ingest_relations
- [TD-1774] Newline is missing in logger format
- [TD-1605] Remove acl entry from cache at delete
- [TD-1636] Use alpine:3.9 as base image for docker runtime
- [TD-1544] Added a connection parameter to Auth0 config
- [TD-1571] Elixir's Logger config will check for EX_LOGGER_FORMAT variable to override format
- [TD-1463] Added a description field to acl_entries
- [TD-1463] Description field has now 120 charactes length
- [TD-1087] control role name uniqueness on changeset
- Updated esaml to v4.1.0
- Removed access_method variable from session create
- [TD-980] An user can change his password if he is logged with username and password
/api/initis now a POST method allowing initial credentials to be specified- Improve naming of Auth0 configuration variables
- [TD-1379] SAML authentication: allow certain roles to be rejected
- Variable Auth0 Configuration
- [TD-1326] include SAML name attribute in profile mapping
- rename init endpoint to api/init
- [TD-1357] removed default users from migration and added init_credential endpoint
- [TD-1326] support for SAML authentication flow
- CI builds are now on OTP 21.2 and Elixir 1.7.4
- Update to distillery 2.0
- Removed unused edeliver artifacts
- Response codes 403 (forbidden) and 401 (unauthorized) were sometimes being used incorrectly
- Update to phoenix 1.4.0, ecto 3.0
- Remove unused channels / phoenix_pubsub artifacts
- Added manage_confidential_structures permission
- Update td_perms version 2.10.0
- Update to openid_connect 0.2.0 and specify id_token as resposne type
- [TD-1172] Fixed missing authorization for update_acl_entry
- [TD-1153] Refactor /api/auth :index. Now it returns a map with the various available auth methods configurated
- Production build requires new environment variable: AUTH_CLIENT_ID
- Get surname in login with Auth0
- Update dependencies (td-perms 0.8.2, credo 0.10.2)
- Configurable log level for controllers and reduce logging in PingController
- User cache loader writes user email by full_name
- API endpoint to list authentication methods (currently only returns OIDC endpoint)
- Prevent application startup from failing if OIDC environment variables are absent
- Failure loading acl cache when user list is empty
- Support for OpenID Connect