Release Notes

Note: Pivotal Platform is now part of VMware Tanzu. In v1.12 and later, Pivotal Single Sign‑On is named Single Sign‑On for VMware Tanzu.

These are release notes for the Single Sign‑On for VMware Tanzu.

For product versions and upgrade paths, see Upgrade Planner.

v1.13.2

Release Date: December 23, 2020

Resolved Issues

This release has the following fix:

  • In Apps Manager, the Manage link for SSO service instances now links to the correct page for all instances. Previously, this link did not work for SSO service instances created with Single Sign‑On v1.8 or earlier.

    For an example of how the Manage link is used, see Monitor App Events.

Known Issues

This release has the following issue:

  • Authorization for Okta OpenID Connect (OIDC): When using an Okta OIDC provider, the roles claim in the ID token does not get populated with external identity provider (IdP) groups. This impacts the mapping of external IdP groups to scopes. Despite this limitation, you can still use Okta OIDC provider for authentication.

v1.13.1

Release Date: October 28, 2020

Security Fixes

This release includes the following security fix:

Known Issues

This release has the following issues:

  • Authorization for Okta OpenID Connect (OIDC): When using an Okta OIDC provider, the roles claim in the ID token does not get populated with external identity provider (IdP) groups. This impacts the mapping of external IdP groups to scopes. Despite this limitation, you can still use Okta OIDC provider for authentication.

v1.13.0

Release Date: September 29, 2020

Features

New features and changes in this release:

  • Upgraded Operator Dashboard UI:
    • Improved external group mapping workflow
    • Easier dashboard navigation
    • With the exception of the Internal User Store, the new Operator Dashboard has the same functionality as the Legacy Dashboard
    • Ability to switch back to the Legacy Dashboard

Known Issues

This release has the following issues:

  • Authorization for Okta OpenID Connect (OIDC): When using an Okta OIDC provider, the roles claim in the ID token does not get populated with external identity provider (IdP) groups. This impacts the mapping of external IdP groups to scopes. Despite this limitation, you can still use Okta OIDC provider for authentication.

Viewing Release Notes for Another Version

To view the release notes for another product version, select the version from the dropdown at the top of this page.