Appearance
ProAuth 2.0.87
This release introduces refined infrastructure abstraction through Connection String Aliasing and enhances deployment reliability with strict configuration validation for the Database Deployment Worker.
ACTION REQUIRED
Mandatory Configuration Setting The Database Deployment Worker now requires a TargetEnvironment setting. The service will fail to start if this value is missing or invalid.
- New Value:
data.dbdeploymentworker.targetEnvironment - Supported Values:
AzureSql,SqlServer
Features
Infrastructure Infrastructure
- Connection String Aliasing: Introduced a unified approach to managing database connections. Service administrators can now define
connectionstringaliasesin the Helm values, allowing Identity Provider (IDP) configurations to reference these aliases rather than embedding sensitive connection strings directly within the user store options. This supports both full alias resolution and database name overrides (#2823). - Strict Configuration Validation: To prevent runtime failures during database operations, the Database Deployment Worker now performs comprehensive configuration validation on startup. Any mismatches or missing requirements (such as the mandatory
TargetEnvironment) are logged as fatal errors, ensuring infrastructure stability from the cold-start (#2822). - Deployment Hardening: Resolved issues where DB option settings were not consistently applied during schema deployment (#2831) and improved support for contained database user creation within UserStore databases (#2827).
- Event Orchestration: Fixed the UserStore DB creation event logic to ensure it is correctly raised when filtering is enabled for active IDPs (#2821).
Core Core
- Authentication Flow Hardening: Fixed a session management issue where "End Session" requests were incorrectly validated when the
id_token_hintwas absent, ensuring smoother OIDC logout compliance (#2820). - Deadlock Mitigation: Resolved a critical database transaction deadlock occurring during the simultaneous initialization of the Audit Trail signing service and Certificate Store updates (#2830).
- Initialization Reliability: Addressed several edge cases in the initial data deployment sequence, including a Null Reference Exception in the Root Data Initializer (#2803, #2814).
AdminApp AdminApp
- Navigation & Labeling Fixes: Corrected redirect logic for User Store action buttons and implemented fallback pathing for custom labels to ensure consistent UI localization and accessibility (#2824, #2818).