Skip to content

Upgrade instructions old versions

8.1.0 to 8.2.2

Zip archive handling

Zip files are now by default limited to 10MB and/or 100 files. This includes message and template zip files. These limits can be modified via environment properties as described in Zip archive handling.

8.0.0 to 8.1.0

Run all database scripts

Only for MSSQL and Oracle:

  • V8_00_01_00__inconsistencies.sql

Changes in custom Token Server plugins

The package com.onegini.tokenserver.oauth no longer exists in token-server-core. Most classes have moved to the package com.onegini.tokenserver.core. The class OauthUserImpl has been renamed to OauthUser which is not an interface anymore.

7.x.x to 8.0.0

Mobile Authentication

Mobile Authentication API v3 was added to support push authentication with multiple applications. Users can now enroll mobile authentication per application separately. There is no update needed for the applications. Your website must call the Mobile Authentication API version 3 to use this new feature.

Deprecation

The existing Mobile Authentication API version 2 will not work when a user has enrolled multiple applications for push authentication. It is deprecated starting this version and will be removed in the future.

The deprecated Mobile Authentication API version 1 has been removed now. It was deprecated since the release of Mobile Security Platform (MSP) version 3.0 (September 2016).

Remove the property TOKEN_SERVER_ENGINE_MOBILE_AUTHENTICATION_DEPRECATED_API_ENABLED which is no longer used by the Token Server.

Run all database scripts

  • V7_02_00_00__drop_unique_constraint_user_id_application_instances.sql
  • V8_00_00_01__add_unique_constraints_user_client_keys_application_instances.sql

7.2.1 to 7.2.2

The default value of ANSI_PADDING for MS SQL database is changed to ON. See MS SQL documentation for further details.

General Instructions

  • When using automatic migrations (TOKEN_SERVER_COMMON_DB_MIGRATION_ENABLED=true) make sure TOKEN_SERVER_COMMON_DB_MIGRATION_OUT_OF_ORDER is set to true to ensure V2_02_17_01__fix_ansi_padding.sql is applied.

Run all database scripts

  • V2_02_17_01__fix_ansi_padding.sql (MS SQL only)

7.1.0 to 7.2.0

General Instructions

  • Some objects that are stored in cache have been modified. To ensure consistency, it is advised to restart Redis during the upgrade process.

Run all database scripts

  • V5_08_01_00__drop_unique_constraint_on_user_id_for_user_client_keys.sql (Oracle and MSSQL only)

Update package names for custom Token Server plugins

The interface com.onegini.tokenserver.oauth.model.EventType has been moved to com.onegini.tokenserver.core.model.log.EventType. You may need to update any Token Server plugins that import com.onegini.tokenserver.oauth.model.EventType.

7.0.0 to 7.1.0

SAML Service Provider configuration

The Signing credentials and Keystore password must be configured via the admin console when using SAML. Populate these fields via the SAML Service provider section in the Admin console.

Update Thymleaf templates

  • consent.html
  • sms-step-up.html

6.x.x to 7.0.0

A few major changes have been made to the Token Server:

  • The cache mechanism has changed from EHCache to Redis. The Token Server no longer uses JGroups for cache replication in a clustered environment.
  • The Token Server does not use etcd as configuration / discovery service anymore

Adapt Docker Compose variables

Remove the following variables:

  • TOKEN_SERVER_ENGINE_CLUSTER_OPERATIONAL_MODE
  • TOKEN_SERVER_DISCOVERY_BACKEND
  • TOKEN_SERVER_PROVISIONING_ENABLED

Adapt Environment variables

Remove the following environment variables:

  • HOST_IP
  • HOSTNAME
  • JGROUPS_REPLICATION_PORT
  • JGROUPS_FAILURE_DETECTION_PORT

Install Redis

In order to run the Token Server you must have Redis configured and running. See the Redis configuration chapter for more info.

Support for Token Server extensions via etcd is dropped

Since etcd is no longer used as configuration service, the support for Token Server extensions via etcd is also dropped. You can still add extensions to the Token Server via a Docker volume mount. The volume must be mounted to the /opt/token-server/engine/lib/ folder inside the Docker container. You can place any jar files that you wish to add to the Token Server classpath in this folder.

Migration for SQL Server

There is one column that could not automatically be dropped with the migration scripts due to an automatically generated default constraint name. You can run the SQL below to properly remove the constraint and the column.

--dynamically find the constraint name for CLIENT_CONFIGS.FIDO_ENABLED' Column and drop it.
DECLARE
@var0 nvarchar(128)
SELECT @var0 = name
FROM sys.default_constraints
WHERE parent_object_id = object_id(N'dbo.CLIENT_CONFIGS')
  AND col_name(parent_object_id, parent_column_id) = 'FIDO_ENABLED';
IF
@var0 IS NOT NULL
  EXECUTE('ALTER TABLE [dbo].[CLIENT_CONFIGS] DROP CONSTRAINT [' + @var0 + ']');

ALTER TABLE [dbo].CLIENT_CONFIGS DROP COLUMN [FIDO_ENABLED];

Admin authentication with multiple LDAP servers

The character to separate multiple LDAP server URLs in the property TOKEN_SERVER_ADMIN_LDAP_SERVER_URLS has changed from space to comma.

6.4.3 to 6.5.2

Zip archive handling

Zip files are now by default limited to 10MB and/or 100 files. This includes message and template zip files. These limits can be modified via environment properties as described in Zip archive handling.

6.4.0 to 6.4.1

Run all database scripts

  • V5_08_01_00__drop_unique_constraint_on_user_id_for_user_client_keys.sql (Oracle and MSSQL only)

6.2.x to 6.4.1

SAML Service Provider configuration

The Signing credentials and Keystore password must be configured via the admin console when using SAML. Populate these fields via the SAML Service provider section in the Admin console.

Run all database scripts

  • V5_08_00_00__rename_public_key_to_user_public_key_for_transaction_signing.sql (Oracle and MSSQL only)

6.1.0 to 6.2.0

Run all database scripts

  • V6_02_00_00__add_on_delete_set_null_on_pin_policies.sql
  • V6_02_00_01__fk_delete_template_sets.sql
  • V6_02_00_02__increase_user_agent_in_events.sql
  • V6_02_00_03__add_send_badge_number_to_mobile_platform_versions.sql

Migration V6_02_00_01__fk_delete_template_sets.sql may fail with some variants of MySQL. You will get an error message that the constraints client_conf_tmpl_sets_id_fk and templates_tmpl_set_id_fk do not exist. If this is the case and you manually migrate the database schema, then execute the following migration instead:

ALTER TABLE `client_configs`
DROP
FOREIGN KEY `client_configs_ibfk_1`;
ALTER TABLE client_configs
    ADD CONSTRAINT `client_conf_template_set_fk` FOREIGN KEY (`template_set`) REFERENCES `template_sets` (`id`)
        ON DELETE SET NULL;

ALTER TABLE `templates`
DROP
FOREIGN KEY `templates_ibfk_1`;
ALTER TABLE `templates`
    ADD CONSTRAINT `templates_template_sets_fk` FOREIGN KEY (`template_set`) REFERENCES `template_sets` (`id`)
        ON DELETE CASCADE;

Update package names for custom Token Server plugins

The package names for one of the Token Server modules have been changed from com.innovation_district.* to com.onegini.oauth.*. You might need to update any Token Server plugins that import any of the com.innovation_district.* classes.

6.0.0 to 6.1.0

Run all database scripts

  • V6_01_00_00__add_on_delete_cascade_to_various_tables.sql
  • V6_01_00_01__multiple_custom_authenticators.sql
  • V6_01_00_02__drop_fido_support.sql

Adapt Docker Compose variables

Remove the following variables:

  • TOKEN_SERVER_COMMON_FEATURES_FIDO_ENABLED_BOOLEAN

Multiple Custom Authenticators

The Token Server supports multiple Custom Authenticators. In the previous versions the Custom Authenticator was automatically linked to a Mobile Authentication Type or Application. From this version you need to select the Custom Authenticators for an Application or Mobile Authentication Type.

For MySQL the existing Custom Authenticator is automatically linked to the Mobile Authentication Types with type "Push with Custom Authenticator" and to Applications that have checked "Custom Authenticators enabled".

5.7.0 to 6.0.0

See Upgrade instructions from version 5.7.0 to 6.0.0.

5.7.0 to 5.8.1

Run all database scripts

  • V5_08_00_00__rename_public_key_to_user_public_key_for_transaction_signing.sql (Oracle and MSSQL only)

5.6.0 to 5.7.0

Run all database scripts

  • V5_07_00_00__perform_postponed_db_changes.sql
  • V5_07_00_01__add_user_id_event_date_index_on_events.sql (Oracle and MSSQL only)

5.5.2 to 5.6.0

Property changes

Cache configuration

Docker compose environment variables used to configure cache are replaced in favour of providing Cache Configuration in the Admin console.

In order to use the same cache configuration as before described change, retrieve the old values of docker compose environment variables (or etcd variables) presented in a table below and set those values in corresponding fields in the Admin console configuration.

Note: To retrieve values as etcd properties you can use etcdctl get command. For example etcdctl get /token-server/engine/idp/saml-sp/signing/certificate.

The following table shows environment/etcd variables and fields in Admin console introduced to replace those variables.

Environment variable Etcd variable Field name in Admin console
TOKEN_SERVER_ENGINE_CACHE_MESSAGE​_CACHE_TTL_SECONDS /token-server/engine/cache/message-cache/ttl-seconds Message cache TTL
TOKEN_SERVER_ENGINE_CACHE_APPLICATION_PROPERTIES_CACHE_TTL_SECONDS /token-server/engine/cache/application-properties-cache/ttl-seconds Application properties cache TTL
TOKEN_SERVER_ENGINE_GENERAL_TEMPLATE​_CACHING_ENABLED_BOOLEAN /token-server/engine/general/template-caching-enabled-boolean Template caching enabled

All variables presented in the table are no longer supported.

User authentication session time to live configuration

Docker compose environment variables used to configure User authentication cookie and cache time to live are replaced in favour of providing User authentication session TTL Configuration in General section of the Admin console.

In order to use the same configuration as before described change, retrieve the old values of docker compose environment variables (or etcd variables) presented in a table below and set those values in corresponding fields in the Admin console configuration.

Note: To retrieve values as etcd properties you can use etcdctl get command. For example etcdctl get /token-server/engine/idp/saml-sp/signing/certificate.

The user authentication process uses a cookie to identify the authentication transaction. Before it was possible to set a different value for the cookie and transaction time to live. Since such a separation didn't add much value and was harder to configure correctly (cookie TTL needed to be longer than transaction TTL) those two properties were merged into one setting field in the Admin console. The following table presents described change.

Environment variable Etcd variable Field name in Admin console
TOKEN_SERVER_ENGINE_CACHE_USER_AUTHENTCATION_CACHE_TTL_SECONDS /token-server/engine/cache/user-authentication-cache/ttl-seconds User authentication session TTL
TOKEN_SERVER_ENGINE_COOKIES_USER​_AUTHENTICATION_TTL_SECONDS /token-server/engine/cookies/user-authentication/ttl-seconds User authentication session TTL

All variables presented in the table are no longer supported.

Admin changes

Application configuration

The Application configuration available on the Configuration -> App configuration -> Applications section in the Admin console was modified in the following way:

The dropdown for Allowed function(s) has been replaced. It's options have moved:

  • AUTHORIZATION_CODE: select User registration in the new dropdown called Flows.
  • CLIENT_CREDENTIALS: select Anonymous resource calls in the new dropdown called Flows.
  • REFRESH_TOKEN: this option has moved to the checkbox PIN authentication under User authentication. It is enabled by default.
  • FINGERPRINT_TOKEN: this option has moved to the checkbox Fingerprint authentication under User authentication.

Following options are no longer available:

  • IMPLICIT
  • VALIDATE_ACCESS_TOKEN

Note: If the detail view of an Application shows **Incorrect option: IMPLICIT** or **Incorrect option: VALIDATE_ACCESS_TOKEN** under Flows, edit the Application. The incorrect options are removed when the form is saved.

The Certificates section was moved to the Security settings section.

Web clients configuration

The Web clients configuration available on the Configuration -> Web clients section in the Admin console was modified in the following way:

The dropdown with Allowed function(s) has been renamed to Grant Types. The option REFRESH_TOKEN has moved to the checkbox Issue refresh tokens. The option FINGERPRINT_TOKEN is no longer available for Web clients.

It is no longer required (nor possible) to enter a value for Max PIN attempts.

Other Application/Web clients configuration changes

Field Additional Authenticator was renamed to Additional user verification

Remove the OTP Identity Provider

If any of your applications were using the OTP identity provider it needs to be removed because it is no longer supported by the Token Server. In order to remove all the OTP identity providers created in your Token Server application you need to follow the steps described below:

Note: If it is not a problem that applications that were using the OTP identity provider will now use a different identity provider (TWOWAYOTP,HEADER or CUSTOM) you only need to perform the database operations. If you want to completely delete the OTP identity provider you also must follow the steps described in the admin console operations paragraph.

1. Database operations
  1. Go to identity_providers table and search for all rows containing identity_provider_type=OTP (identity providers of the OTP type)
  2. Write down names of the all found identity providers (it will be needed later on if you continue the process in the Admin console).
  3. Change identity_provider_type to other available type (TWOWAYOTP,HEADER or CUSTOM) for the all found identity providers.
2. Admin console operations
  1. Make sure the Token Server is started.
  2. Go to the Configuration -> Identity Providers Admin section. Remove all identity providers with the names you wrote down before.
  3. If an identity provider is used by some applications you will see a warning Could not delete Identity provider, because it is used by the following applications with the list of the applications that are using this identity provider.
  4. Go to App configuration -> Applications and remove all the applications from the warning list or change the identity provider that they are using to a different one.
  5. Go to Configuration -> Identity Providers and remove the identity provider.

5.4.0 to 5.5.0

Run all database scripts

  • V5_05_00_00__move_application_keys_to_separate_table.sql

Admin toggles changes

The mobile authentication configuration settings available on the Configuration -> Mobile authentication -> General mobile config page in the Admin console were modified in the following way:

The Push authentication / Authentication enabled toggle was moved to Configuration -> System -> Features and renamed to Mobile authentication. This toggle now enables/disables not only push authentication but all mobile authentication features. If this toggle is disabled:

  • no mobile authentication (OTP, push, SMS) can be performed.
  • the more detailed configuration described below cannot be provided, since the Configuration -> Mobile authentication section becomes unavailable in the Admin console.

Warning: This toggle was renamed internally. This means it is now disabled by default, and will override previous configuration. Please configure this setting as appropriate after upgrading.

Two new toggles were added:

New toggle Role Notes
General / Enrollment enabled Enables mobile authentication enrollment If disabled all other mobile enrollment toggles become unavailable
General / Enrollment override enabled Enables override of mobile authentication enrollment

Warning: Since these toggles are new, they are disabled by default! This will override existing push authentication settings. Please configure these settings as appropriate after upgrading.

Two toggles were modified in the following way:

Old toggle New toggle Role Notes
Push authentication / Device enrollment enabled Push authentication / Enrollment enabled Enables push authentication enrollment In order this toggle configuration take an effect, General / Enrollment enabled toggle must be enabled
Push authentication / Device enrollment override enabled Push authentication / Enrollment override enabled Enables push authentication enrollment override In order this toggle configuration take an effect, General / Enrollment enabled toggle must be enabled

For more information go to Mobile authentication configuration

5.3.0 to 5.4.0

Run all database scripts

  • V5_04_00_00__add_configuration_properties

Property changes

Docker compose environment variables used to configure SAML Service Provider are replaced in favour of providing SAML Service Provider Configuration in the Admin console.

In order to use the same SAML Service Provider configuration as before described change, retrieve the old values of docker compose environment variables (or etcd variables) presented in a table below and set those values in corresponding fields in the Admin console configuration.

Note: To retrieve values as etcd properties you can use etcdctl get command. For example etcdctl get /token-server/engine/idp/saml-sp/signing/certificate.

The following table shows environment/etcd variables and fields in Admin console introduced to replace those variables.

Environment variable Etcd variable Field name in Admin console
TOKEN_SERVER_ENGINE_IDP_SAML_ENABLED_BOOLEAN /token-server/engine/idp/saml-sp/enabled-boolean SAML Service Provider enabled
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_ENTITY_ID /token-server/engine/idp/saml-sp/metadata/entity-id Metadata entity ID
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_ID /token-server/engine/idp/saml-sp/metadata/id Metadata ID
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_VALIDITY_DAYS /token-server/engine/idp/saml-sp/metadata/validity-days Metadata validity days
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_LANG /token-server/engine/idp/saml-sp/metadata/lang Metadata language
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_ORGANISATION_NAME /token-server/engine/idp/saml-sp/metadata/organisation-name Metadata organisation name
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_SUPPORT_CONTACT_NAME /token-server/engine/idp/saml-sp/metadata/support/contact-name Metadata support contact name
TOKEN_SERVER_ENGINE_IDP_SAML_METADATA_SUPPORT_CONTACT_EMAIL /token-server/engine/idp/saml-sp/metadata/support/contact-email Metadata support contact email
TOKEN_SERVER_ENGINE_IDP_SAML_KEYSTORE_PASSWORD /token-server/engine/idp/saml-sp/keystore-password Keystore password
TOKEN_SERVER_ENGINE_IDP_SAML_SIGNING_PRIVATE_KEY /token-server/engine/idp/saml-sp/signing/private-key Signing private key
TOKEN_SERVER_ENGINE_IDP_SAML_SIGNING_CERTIFICATE /token-server/engine/idp/saml-sp/signing/certificate Signing certificate
TOKEN_SERVER_ENGINE_IDP_SAML_VELOCITY_LOG_LOCATION /token-server/engine/idp/saml-sp/velocity-log-location Velocity log location

All variables presented in the table are no longer supported.

5.02.00 to 5.3.0

Property changes

Basic authentication for the APIs is replaced with the API clients functionality. The properties TOKEN_SERVER_ENGINE_API_BASIC_AUTHENTICATION_USER and TOKEN_SERVER_ENGINE_API_BASIC_AUTHENTICATION_PASSWORD are no longer supported.

Run all database scripts

  • V5_03_00_00__add_transaction_signing_data.sql
  • V5_03_00_02__persist_default_api_scope_values.sql

5.00.00 to 5.01.00

Run all database scripts

  • V5_01_00_00__add_initial_custom_authenticators_config.sql

4.04.09 to 5.00.00

This is a smooth upgrade, no special actions required.

4.04.08 to 4.04.09

Adapt Docker Compose variables

New (not required):

  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_PREEMPTIVE_AUTH_ENABLED_BOOLEAN

4.04.07 to 4.04.08

Run all database scripts

  • V4_04_08_00__add_registration_id_to_fido_user_authenticators.sql

Adapt Docker Compose variables

Configuration is now done via Docker Compose variables instead of ETCD. See the documentation for more details.

New (not required):

  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_ENABLED_BOOLEAN
  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_USERNAME
  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_PASSWORD
  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_SCHEMA
  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_HOST
  • TOKEN_SERVER_ENGINE_EXTERNAL_REST_SERVICES_PROXY_PORT

4.04.05 to 4.04.06

Run all database scripts (only for Oracle and MSSQL)

  • V4_04_06_00__correct_invalid_index_on_idp_attribute_mappings_table.sql

4.03.00 to 4.04.00

Run all database scripts

  • V4_04_00_00__change_client_id_to_fk_in_fido_user_authenticators.sql

4.04.00 to 4.04.01

Run all database scripts

  • V4_04_01_00__missing_event_index.sql
  • V4_04_01_01__add_actual_user_ids_in_events.sql

4.02.02 to 4.03.00

Run all database scripts

  • V4_03_00_01__add_fido_config.sql
  • V4_03_00_02__fido_authenticators_renamed.sql
  • V4_03_00_03__add_fido_policy_mapping_to_moble_auth_type.sql
  • V4_03_00_05__add_index_to_fido_user_authenticators.sql

Adapt config parameters in ETCD

Removed

  • /token-server/engine/mobile-authentication/fido/base-uri
  • /token-server/engine/mobile-authentication/fido/app-keys-json
  • /token-server/engine/mobile-authentication/fido/policy-mapping-json

New (not required)

  • /token-server/common/features/fido-enabled-boolean By default this property has the value true. Set it to false to disable FIDO authentication.
  • /token-server/engine/cache/application-properties-cache/ttl-seconds By default this property has the value of 300 seconds (5 minutes).

Other changes

The environment variable EXPERIMENTAL is no longer used.

4.01.01 to 4.02.00

Run all database scripts

  • V4_02_00_00__rename_statistics.sql
  • V4_02_01_00__add_device_names_encoded_to_clients.sql
  • V4_02_01_01__make_clients_redirect_url_nullable.sql
  • V4_02_01_02__add_foreign_key_to_auth_property_messages.sql (only MSSQL)

Adapt config params in ETCD:

Removed:

  • /token-server/admin/general/recent-events/period-minutes

3.17 to 4.01

Run all database scripts

  • V4_01_00_00__add_length_to_pin_policies.sql
  • V4_01_00_01__add_max_allowed_resends_to_auth_properties.sql
  • V4_01_00_02__move_push_credentials_to_separate_table.sql
  • V4_01_00_03__add_foreign_key_from_platform_to_push.sql
  • V4_01_00_04__add_api_only_to_scopes.sql
  • V4_01_00_05__add_unique_constraint_to_push_messaging_config_name_column.sql
  • V4_01_00_06__add_message_table_for_i18n.sql
  • V4_01_00_08__add_user_id_event_date_index_on_events.sql (only MySQL database)
  • V4_01_00_09__create_db_templates_structure.sql
  • V4_01_00_10__add_default_column_to_template_sets_table.sql
  • V4_01_01_00__remove_join_table_from_template_sets.sql

Adapt config params in ETCD:

New (not required):

  • /token-server/engine/notification-api/enabled-boolean By default this property has value false, to keep using the notification api enable this property.
  • /token-server/engine/mobile-authentication/deprecated-api/enabled By default this property has value false, to keep using the old mobile authentication endpoint enable this property.

Removed:

  • /token-server/admin/managementinfo/data-server/base-uri

3.16 to 3.17

Run all database scripts

  • V3_17_00_00__add_fido_authenticators.sql
  • V3_17_02_00__make_client_pk_non_clustered.sql (only MSSQL)
  • V3_17_03_00__make_auth_prop_fallback_nullable.sql (only MSSQL)

3.15 to 3.16

Run all database scripts

  • V3_16_00_00__add_callback_uri_config.sql

3.14 to 3.15

Changed environment variables

In version 3.15 The embedded ldap server is removed. So the environmental variables for ldap are not needed anymore. Also the way to configure etcd is changed.

New environment variables

  • CONFIG_BACKEND
  • CONFIG_PREFIX

Removed environment variables

  • TOKENSERVER_LDAP_ENABLED
  • ETCD_PORT
  • ETCD_HOST
  • ETCD_URI
  • ETCD_PREFIX

Environment variable that became mandatory

  • TOKENSERVER_ENGINE_ENABLED
  • TOKENSERVER_CLIENT_ENABLED
  • TOKENSERVER_ADMIN_ENABLED

Run all database scripts

  • V3_15_00_00__add_statistics.sql
  • V3_15_00_01__migrate_idp_attributes_to_separate_table.sql
  • V3_15_00_02__add_fido_enable_column.sql
  • V3_15_00_03__add_secret_to_identity_providers.sql

Changed mandatory etcd parameters

Move

  • /token-server/admin/general/app-config/token-server-engine/base-uri to /token-server/common/engine-base-uri

Remove

  • /token-server/engine/authentication/onegini

3.13 to 3.14

End user api upgrade

In version 3.14 a new version of the device api was introduced. It is mandatory to use this api version when using the multiple profiles feature.

3.12 to 3.13

Run all database scripts

  • V3_13_00_00__add_profile_id_to_access_tokens.sql
  • V3_13_00_01__add_token_attempt_failure_count.sql
  • V3_13_00_02__make_name_field_in_pin_policy_longer.sql (only MSSQL)
  • V3_13_00_03__remove_push_token_unique.sql
  • V3_13_00_04__add_profile_id_to_application_instance.sql

New mandatory etcd parameters

  • /token-server/client/client/profileId
  • /token-server/client/client/testUserId

3.11 to 3.12

Run all database scripts (only MSSQL)

  • V3_12_01_00__certificates_uniqueidentifier.sql
  • V3_12_01_01__events_uniqueidentifier.sql
  • V3_12_01_02__access_grant_uniqueidentifier.sql
  • V3_12_01_03__access_tokens_uniqueidentifier.sql
  • V3_12_01_04__application_instances_uniqueidentifier.sql
  • V3_12_01_05__auth_properties_uniqueidentifier.sql
  • V3_12_01_06__auth_property_messages_uniqueidentifier.sql
  • V3_12_01_07__client_config_uniqueidentifier.sql
  • V3_12_01_08__mobile_platform_version_uniqueidentifier.sql
  • V3_12_01_09__pin_policy_uniqueidentifier.sql
  • V3_12_01_10__clients_uniqueidentifier.sql
  • V3_12_01_11__mobile_platforms_uniqueidentifier.sql
  • V3_12_01_12__identity_providers_uniqueidentifier.sql
  • V3_12_01_13__idp_attribute_mapping_uniqueidentifier.sql
  • V3_12_01_14__consents_uniqueidentifier.sql
  • V3_12_01_15__add_missing_indices.sql
  • V3_12_01_16__remove_idp_entity_id_unique_index.sql

New mandatory etcd parameters

  • /token-server/client/dynamic/register/os/version
  • /token-server/client/dynamic/register/client/architecture

3.09 to 3.10

Run all database scripts

  • V3_10_00_00__add_pin_retry_counter.sql

3.08 to 3.09

Run all database scripts

  • V3_09_00_00__certificates.sql
  • V3_09_00_01__add_public_base_uri_to_client_config.sql
  • V3_09_00_02__add_certificates_to_client_config.sql
  • V3_09_00_03__add_client_resource_gateway.sql

3.07 to 3.08

Run all database scripts

  • V3_08_00_00__add_non_persistent_scope_type.sql
  • V3_08_00_01__add_api_version_to_oauth_client.sql
  • V3_08_00_02__add_apns_environment.sql
  • V3_08_00_03__remove_unused_auth_props.sql

Adapt config params in ETCD:

New:

  • /token-server/engine/header-auth/parameters/white-list
  • /token-server/common/app-config/apns/production/host
  • /token-server/common/app-config/apns/production/port
  • /token-server/common/app-config/apns/sandbox/host
  • /token-server/common/app-config/apns/sandbox/port
  • /token-server/common/app-config/apns-feedback/production/host
  • /token-server/common/app-config/apns-feedback/production/port
  • /token-server/common/app-config/apns-feedback/sandbox/host
  • /token-server/common/app-config/apns-feedback/sandbox/port

Removed:

  • /token-server/engine/mobile-authentication/pgp/disabled-boolean

3.06 to 3.07

Run all database scripts

  • V3_07_00_00__add_type_to_access_tokens.sql
  • V3_07_00_01__add_index_on_access_tokens_for_type.sql

3.05 to 3.06

There are no specific actions necessary to upgrade from version 3.05 to 3.06.

3.04 to 3.05

Run all database scripts

  • V3_05_00_01__add_mobile_platforms.sql
  • V3_05_00_02__add_development_mode_to_client_config.sql
  • V3_05_00_03__platform_version_add_payload_encryption_flag.sql

3.03 to 3.04

Run all database scripts

  • V3_03_03_00__added_architecture_to_clients.sql

3.02 to 3.03

Automatic schema migrations

  • If you want to use the automatic flyway database schema migrations the database schema needs to be up-to-date (schema version: 3.02.00.01) before you start the 3.03.xx version of the TS.
  • If you do not want to use the automatic schema migrations you need to disable this option. Please have a look at the database paragraph in the Token Server configuration section.

Change templates

  • New template two-way-otp-cancel.html
  • The two-way-otp-dead-end.html page has an extra parameter ${redirectUri} which can be used to send the client back to the app.
<a th:href="${redirectUri}" href="about:blank"><p th:text="#{twoWayOtp.deadEnd.body}">
  _Your authentication session timed out. Please return to the APP to authenticate again.
</p></a>

Run all database scripts

  • V3_03_00_00__added_wns_properties_to_mobile_platform_versions.sql

3.00 to 3.02

Change endpoints in use

  • If you are using the client validation endpoint /validation/client you should now switch to /client/validate
  • Add X-Onegini-App-.. headers to the request

Change templates

  • All templates named authorization_complete.html should now be named authorization-complete.html

Change properties

A new property is introduced for retrieving data from Elasticsearch. Add the base URI of Elasticsearch to the etcd configuration:

curl 'http://127.0.0.1:4001/v2/keys/token-server/admin/managementinfo/data-server/base-uri' -XPUT -d value=http://localhost:9200

Run all database scripts

  • V3_02_00_00__platform_version_force_upgrade_support.sql
  • V3_02_00_01__platform_version_add_tampering_protection_flag.sql

2.04.05 to 3.00

Change properties

Move all properties to etcd. Onegini will help you with that migration.

Run database scripts

  • V3_00_00_00__added_additional_authenticator_type.sql

2.04.04 to 2.04.05

Run:

  • V2_04_04_05__add_complete_page_disabled_to_client_config.sql

2.03.x to 2.04.04

Run database scripts

Run the following database scripts in the given order

  • V2_04_00_00__renamed_meta_data_uri_in_identity_providers.sql
  • V2_04_00_01__add_metadata_to_identity_providers.sql
  • V2_04_00_02__add_pin_policies.sql
  • V2_04_00_03__add_fingerprint_to_client.sql
  • V2_04_00_04__openid_scope_to_scopes.sql
  • V2_04_03_00__added_openid_attribute_mapping.sql
  • V2_04_03_01__inserted_openid_user_info_scopes.sql
  • V2_04_03_02__added_signature_and_encryption_to_client_config.sql
  • V2_04_04_00__added_push_server_endpoint.sql
  • V2_04_04_02__added_expiration_to_openid_client_config.sql
  • V2_04_04_03__added_public_private_key_column_to_open_id_config.sql
  • V2_04_04_04__added_on_delete_cascade_to_application_related_constraints.sql