Releases: okta/okta-mobile-swift
Releases · okta/okta-mobile-swift
1.4.0
What's Changed
This release primarily introduces the OktaDirectAuth library. See the API documentation and integration guide for more details.
- Add README updates referencing DirectAuth by @mikenachbaur-okta in #127
- Add unit test coverage for OktaDirectAuth by @mikenachbaur-okta in #126
- Added DocC API documentation by @mikenachbaur-okta in #129
- Clean up and simplify some Swift usages by @mikenachbaur-okta in #131
- Prepare OktaDirectAuth for an EA release by @mikenachbaur-okta in #132
- Introduce a sample application for the DirectAuth SDK by @mikenachbaur-okta in #128
- Add E2E automated tests for DirectAuth 1FA and 2FA scenarios. by @mikenachbaur-okta in #133
- Debug github docs publish by @mikenachbaur-okta in #134
- Introduce OAuth2 client authentication, with support for optionally supplying a Client Secret by @mikenachbaur-okta in #137
Full Changelog: 1.3.1...1.4.0
1.3.1
What's Changed
- Ensure the JWK Algorithm cases match the spec by @mikenachbaur-okta in #125
Full Changelog: 1.3.0...1.3.1
1.3.0
What's Changed
- Run tests in parallel to speed up CI performance by @mikenachbaur-okta in #103
- Resolve issue where the compiler is confused between Swift Concurrency and Block-based functions by @mikenachbaur-okta in #114
- Revoking an accessToken should not remove the credential from storage by @mikenachbaur-okta in #112
- Add option to test revoke within the sample app, and improve shouldRemove handling by @mikenachbaur-okta in #116
- Expose raw payload portion of the JWT as a
[String: Any]dictionary by @mikenachbaur-okta in #119 - Implement automatic time synchronization from server HTTP request responses by @mikenachbaur-okta in #118
- Introduce the ability to create a Token from just an access_token by @mikenachbaur-okta in #121
- Improve adding additional parameters during sign in / out by @mikenachbaur-okta in #120
Full Changelog: 1.2.0...1.3.0
1.2.0
What's Changed
- Support customizing HTTP status code handling by @mikenachbaur-okta in #110
Full Changelog: 1.1.5...1.2.0
1.1.5
What's Changed
- Fix a race condition that sometimes prevents tokens from being stored after a refresh by @mikenachbaur-okta in #109
Full Changelog: 1.1.4...1.1.5
1.1.4
What's Changed
- Ensure Tokens compare their refresh token when calculating equality by @mikenachbaur-okta in #108
Full Changelog: 1.1.3...1.1.4
1.1.3
What's Changed
- Stop using the refresh token from the clientSettings, since it's no longer stored there by @mikenachbaur-okta in #106
Full Changelog: 1.1.2...1.1.3
1.1.2
What's Changed
- Ensure refresh token is present before trying to refresh. by @mikenachbaur-okta in #102
- Expose the URLSessionConfiguration from the URLSessionProtocol for use in IDX by @mikenachbaur-okta in #104
Full Changelog: 1.1.1...1.1.2
1.1.1
What's Changed
- Resolve issue where
+characters would be improperly encoded in query strings by @mikenachbaur-okta in #99
Full Changelog: 1.1.0...1.1.1
1.1.0
What's Changed
- Improve readability of DefaultIDTokenValidator flow by @emmanuelogunmuyiwa-okta in #80
- Use openIdConfiguration issuer when verifying ID token issuer claim by @emmanuelogunmuyiwa-okta in #86
- Add article on authenticator flows by @mikenachbaur-okta in #67
- Relax the values an OpenIdConfiguration requires, and enable custom claim names by @mikenachbaur-okta in #89
- Introduce
revoke(.all)and associated documentation by @mikenachbaur-okta in #90 - Supply client_id to Introspect request call by @emmanuelogunmuyiwa-okta in #91
- Add support for retrying 429 errors by @emmanuelogunmuyiwa-okta in #93
Full Changelog: 1.0.0...1.1.0