v3.0.0
github-actions
released this
18 Jan 10:21
·
63 commits
to development
since this release
Changed / COMPATIBILITY
- Dropped ACF2016
- Separated routes to it's own module Router
- COMPAT New
JwtAuthValidator
instead of mixing concerns with theJwtService
. You will have to update your configuration to use thisvalidator
instead of theJwtService
useSSL
is now defaulted totrue
for all security relocations as the default- Encapsulation of
jwt
settings from theModuleConfig
to theJwtService
CBAuthValidator
has been renamed to justAuthValidator
this way it can be used with ANY authentication service instead of binding it to justcbauth
. This validator just relies on theIAuthUser
interface now.
Added
- New
AuthValidator
now can validate permissions and roles according to ourIAuthUser
interface but can be used on ANY authentication service that implementsIAuthService
- New authorization and authentication delegates for usage in cb7
- New ability for the firewall to log all action events to a database table.
- New visualizer that can visualize all settings and all firewall events via the log table if enabled.
- New Basic Auth validator and basic auth user credentials storage system. This will allow you to secure your apps where no database interaction is needed or required.
- New global and rule action:
block
and the fireall will block the request with a 401 Unathorized page. - New event
cbSecurity_onFirewallBlock
announced whenever the firewall blocks a request into the system with a 403. DBTokenStorage
now rotates using async scheduler and not direct usage anymore.- Ability to set the
cbcsrf
module settings into thecbsecurity
settings ascsrf
. - We now default the user service class and the auth token rotation events according to used authentication service (cbauth, etc), no need to duplicate work.
- New rule based IP security. You can add a
allowedIPs
key into any rule and add which IP Addresses are allowed into the match. By default, it matches all IPs. - New rule based HTTP method security. You can add a
httpMethods
key into any rule and add which HTTP methods are allowed into the match. By default, it matches all HTTP Verbs. - New
securityHeaders
configuration to allow a developer to protect their apps from common exploits: xss, HSTS, Content Type Options, host header validation, ip validation, click jacking, non-SSL redirection and much more. - Authenticated user is now stored by the security firewall according to the
prcUserVariable
on authenticated calls viapreProcess()
no matter the validator used - Dynamic Custom Claims: You can pass a function/closure as the value for a custom claim and it will be evaluated at runtime passing in the current claims before being encoded
- Allow passing in custom refresh token claims to
attempt()
andfromUser()
andrefreshToken()
:refreshCustomClaims
- Added
TokenInvalidException
andTokenExpiredException
to therefreshToken
endpoint
Fixed
- Disable lastAccessTimeouts for JWT CacheTokenStorage BOX-128
- Fix spelling of property
datasource
on queryExecute that was causing a read issue.