Skip to content

Commit 38afd67

Browse files
author
Oleg Kunitsyn
committed
[ODM-13113] Security improvements part 1
1 parent d3a3ad5 commit 38afd67

File tree

1 file changed

+10
-1
lines changed

1 file changed

+10
-1
lines changed

docs/release-notes/v1.60-v1.69.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,13 +128,18 @@ Starting with this release, the Template Editor includes a new feature to view t
128128

129129
![PDF Preview](../user-guide/doc-odm-user-guide/doc-odm-user-guide/images/pdf-preview.png)
130130

131-
### Tokens
131+
### Permanent tokens
132132

133133
* **Instant token display**: When creating an ODM personal access token from the Profile page, the **token value is now shown immediately** after the user confirms creation (and enters their password, if prompted).
134134
* **Email step removed**: Token creation no longer requires an email with a secure link/code exchange.
135135

136136
![New token](../user-guide/doc-odm-user-guide/doc-odm-user-guide/images/token.png)
137137

138+
### Access (Bearer) tokens
139+
140+
1. The user identifier for Azure token authentication was changed from `subject` to `oid`, enabling login without defining an Azure app scope.
141+
2. As a result, all users will need to log in via the UI once to have their records updated in the database.
142+
138143
### Metadata validity facet
139144

140145
A new default facet has been added to filter Studies by **valid** or **invalid** metadata, validated against the applied template. Metadata is considered **invalid** if at least one field is invalid in any Study entity.
@@ -143,6 +148,10 @@ A new default facet has been added to filter Studies by **valid** or **invalid**
143148

144149
### Key security improvements
145150

151+
1. Removing the email-based token delivery flow to eliminate a potential attack vector.
152+
2. Spring Boot upgrade to v4 with updated transitive dependencies resolved plenty of security vulnerabilities.
153+
3. Three vulnerabilities (SQL injection, path traversal, log injection) identified and fixed by code analysis tools.
154+
146155
## 1.61
147156

148157
Release 1.61 introduces powerful enhancements focused on improving data governance and preventing common user errors.

0 commit comments

Comments
 (0)