IAM 8.4 - Required upgrade actions
This section describes changes in Airlock IAM 8.4 that may require manual changes. Whether changes are necessary depends on the used features and/or custom extensions.
Upgrading an Airlock IAM version may require special actions. Consult the respective upgrade requirements:
Various
IAM Module | Affected Feature(s) | Issue(s) | Required Action | Version |
---|---|---|---|---|
Loginapp | FIDO/Passkeys | AI-16759 | Client failures during FIDO/Passkey registration and verification are reported to the server. This allows for better logs and makes it possible to use the On Failure Gotos flow step feature to continue the flow. If the user's browser does not support WebAuthn during FIDO/Passkey registration or verification, the flow now fails instead of being aborted. Verify the UI settings for “on failure” and “on cancel” targets or use the On Failure Gotos step flow feature. See On-failure Goto (flow concept) and FIDO configuration overview. | 8.4 |
Loginapp | FIDO/Passkeys | AI-16759 | Accidentally, the FIDO Public Self-Service Approval Step could be configured in protected self-service flows. This is no longer the case. Use the FIDO Self-Service Approval Step instead. | 8.4 |
Loginapp | FIDO/Passkeys | AI-19344 | During FIDO/Passkey passkey registration in the Loginapp, the FIDO key's display name can be auto-generated based on the AAGUID of the FIDO key. It can be edited in a subsequent step. During config migration of FIDO steps, the AAGUID mappings are moved from the FIDO registration self-service settings to the global FIDO Settings This may result in an undesirable configuration if AAGUID mappings of multiple FIDO steps are migrated into the same global FIDO settings object. It is recommended to review the AAGUID settings in the global FIDO settings after migration. See also Use case: FIDO passkey registration self-service and Use case: FIDO token migration self-service. | 8.4 |
Loginapp | FIDO/Passkeys | AI-19695 | FIDO/Passkey transports (UBS, NFC, BLE, device-bound, etc.) can now be stored during the registration of a FIDO key or Passkey. If enabled, they will be used by IAM in the authentication challenge reducing the list of offered devices to the end-user. To use this feature, the database schema upgrade is mandatory. It is strongly recommended to upgrade the database schema even if not using this new feature. | 8.4 |
Loginapp | Auth flows | AI-19285 | Access to the auth flow REST endpoint Consider restricting access: Loginapp >> Applications and Authentication >> Authentication Information Accessible Condition. Security Note: If publicly available, this endpoint could be exploited for user enumeration attacks. To prevent these attacks, it is recommended that access to the endpoint is restricted to authenticated users only. | 8.4 |
Loginapp | Auth Flow | AI-19527 | The Set Context Data Step in the authentication flow did not emit a Context Data Event. This has been fixed and an event is now emitted. Configured event subscribers processing the Context Data Event may have to be adapted because the event may now also come from the Set Context Data Step. | 8.4 |
Loginapp, Transaction Approval | All flow types | AI-18353 | Unexpected requests to flow REST endpoints (error code There should be no need to adapt any REST clients since the error code If a (non-spec-compliant) REST client relies on the error code | 8.4 |
Loginapp | UI customization | AI-11311 | Show password option on password input fields in Loginapp UI: The new variable Although the new variable is set to false, its introduction may have an impact on complex UI customizations. It is recommended to check the styling of input fields - especially password input fields. See also Changing the Loginapp UI appearance with the Design Kit. | 8.4 |
IAM CLI | iam reset | AI-20170 | The In case the command was used in a script, and the filename was specified with a different extension, the script needs to be updated. | 8.4 |
All modules | Custom web.xml | AI-20325 | If custom | 8.4 |
All modules | Log levels | AI-20274 | IAM now treats connection failures to connected systems as FATAL errors. Several log messages have been updated with a new log level and new log messages have been created. Systems processing IAM logs and relying on the previously used log level may have to be adapted. See Loglevel FATAL. | 8.4 |
Custom code and custom Loginapp UIs
IAM Module | Affected Feature(s) | Issue(s) | Required Action | Version |
---|---|---|---|---|
Loginapp | Gateway mapping templates | AI-19809 | The Airlock Gateway mapping templates for IAM have been improved: Request Rewrite > Host header translate is now set to Custom code relying on the fact that the | 8.4 |
Loginapp | Custom web UI | AI-20266 | Custom web UIs based on the Loginapp REST API experiencing stability issues when polling (Airlock 2FA, Cronto, SSI features) should consider using the See section Polling endpoints in the Loginapp REST API docs: Loginapp REST API Reference. Existing REST clients will continue working as before (non-breaking). | 8.4 |
Further information and links
- Upgrade Airlock IAM
- Upgrading database schemas: Relational databases for IAM