Functionality listed under this section has been deprecated and will be removed in a future release of AM.
Deprecated Elasticsearch and Splunk Audit Handlers
Using the Elasticsearch and Splunk audit handlers is deprecated.
AM 7.1 supports both file-based audit handlers and logging to standard output, which Elasticsearch and Splunk can consume.
For more details, see "Configuring Audit Event Handlers".
Deprecated isAlive JSP Page
isAlive.jspto determine if an instance is alive is deprecated.
AM 7.1 includes new endpoints to determine if an instance is alive, and ready to process requests.
For more details, see Monitoring Instances.
The existing signature for the
getIDPAuthnContextInfomethod of the
IDPAuthnContextMapperinterface is deprecated.
AM 7.1 includes a new signature for the getIDPAuthnContextInfo method, which includes an additional parameter for the entity ID of the service provider (SP).
Note that the deprecated method still works in AM 7.1, but you should update any code that uses it to the new four-parameter signature. The deprecated three-parameter signature will be removed in a future version of AM.
Deprecated Social Authentication Nodes
The following authentication nodes have been deprecated in favor of the "Social Provider Handler Node":
As part of this change, the Social Authentication Implementations Service is also deprecated.
The ssoadm, ampassword, configurator.jar and upgrade.jar Tools Remain Deprecated
The ssoadm command and the
ampasswordtools remain deprecated. They will be removed in a future release of AM.
Deprecated Direct Access to the Transient, Secure, and Shared State of Authentication Trees
Direct access to authentication trees' transient, secure, and shared states using the TreeContext class has been deprecated.
As part of this change:
Use of the
transientStatebindings for reading and updating state with the "Scripted Decision Node API Functionality" are deprecated.
Use of the
getStatemethod from the TreeContext class, used to read state in authentication nodes, is deprecated.
For more information, see "Storing Secret Values in Transient Tree State and the Secure State" and "Accessing Shared State Data".