Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Current »

10 November 2014

The Utoolity team is pleased to present Identity Federation for AWS 2.1 – this release adds a new principal type 'Assume Role' to support IAM roles for delegating API access to AWS resources in other accounts (cross-account usage) and enabling API access to the IAM service itself.

Learn more and try it for free in:

On this page:

Highlights

Third Principal Type 'Assume Role'

Use temporary credentials for configured IAM roles to delegate API access to AWS resources in other accounts (cross-account usage) and enable API access to AWS Identity and Access Management (IAM) itself.

Details

This release addresses the following issues:

  • Stories

    • IFAWS-48 (UAA-32) - As an administrator, I want to facilitate the AssumeRole API so that I gain configuration via AWS and cross-account IAM usage

  • Bugs

    • IFAWS-293 - Fix CSS regression for large inline dialog buttons in JIRA 6.3

    • IFAWS-315 - Fix obsolete constraint for Elastic Beanstalk in principal type inline dialog help

Updates

Release 2.1.2

This release addresses the following issues:

  • Bugs

    • IFAWS-359 - Fix redirect to connector REST endpoints on login in Bamboo

Release 2.1.1

This release addresses the following issues:

  • Improvements

    • IFAWS-289 - Prevent Federation Error due to PackedPolicyTooLargeException

  • Bugs

    • IFAWS-70 (UAA-57) - Fix infinite redirect when logged in non admin user tries to access an admin page

    • IFAWS-80 - Fix missing placeholder value replacement in license error message

    • IFAWS-128 - Fix menu error message for invalid license

    • IFAWS-335 - Fix CSS regression for large inline dialog buttons in Bamboo 5.7

    • IFAWS-336 - Fix error message on license mismatch

    • IFAWS-337 (UAA-55) - Fix feature discovery dialog blocking buttons

  • No labels