IAM 8.5 - Changelog
Airlock IAM 8.5.0
The following tables show the changes from Airlock IAM 8.4 to 8.5.
Config automation features | ||
---|---|---|
New | AI-20195 | A new CLI command |
Improvement | AI-20652 | The YAML config format now uses a short representation for the “type” field, replacing fully qualified class names. Configuration files can be migrated automatically using the config upgrade CLI. Scripts must be adapted manually. See IAM 8.5 - Required upgrade actions for more information. |
Improvement | AI-19778 | The To create an XML-based instance, provide the |
Authentication and Loginapp | ||
---|---|---|
New | AI-17547 | New domain events for a password change in public self-service flows and password letter orders (Loginapp self-service and Adminapp). See also Event producers. |
New | AI-16000 AI-16087 | The Airlock 2FA Activation Step now contains the new boolean property Provide Short Activation Code. If enabled, a 16-digit activation code is provided as an additional activation method. The Airlock 2FA 16-digit activation code can also be printed on the activation letters. See Token enrollment. |
New | AI-20738 | New plugin Username Password with FIDO Authentication Step. It allows users to log in using passkeys through a browser-integrated dialog, while offering a username/password fallback on the same page UI. CAPTCHAs are not supported. All other features of the Username Password Authentication Step and the FIDO Passwordless Authentication Step are supported. |
New | AI-21263 | New plugin User Identification with FIDO Authentication Step. It allows users to log in using passkeys through a browser-integrated dialog, while offering a “user identification” fallback. CAPTCHAs are not supported. All other features of the Username Identification Step and the FIDO Passwordless Authentication Step are supported. |
New | AI-19121 AI-19027 AI-20624 | The new Gateway Session Terminator event subscriber allows terminating Airlock Gateway sessions when certain events occur, such as the changing of a user's password. |
Improvement | AI-19061 | The new plugin Phone Numbers from String Value Providers for the SMS Event Subscriber allows you to configure value providers to dynamically supply recipient phone numbers. See SMS Event Subscriber and Phone Numbers from String Value Providers - Use case. |
Improvement | AI-20700 | The INFO log messages include a new field showing the transport mode of Airlock 2FA messages to Futurae. Possible values are |
Improvement | AI-19574 | For security reasons, the display name of an Airlock 2FA device can no longer consist of only whitespace characters. |
Improvement | AI-20599 | The mTAN authentication/approval steps now include the option to always prompt the end-user to select a number, even if only one end-user number is available. |
Improvement | AI-20875 | The Device Token Authentication Step now includes an option to give feedback if the requested device ID does not exist. |
Improvement | AI-20820 | Added an option to the OCSP Certificate Status Checker to disable nonce validation. |
Improvement | AI-20510 | SSI now includes functionality to communicate with the Public Beta of the Swiss E-ID (swiyu). |
Improvement | AI-20701 | Local deployments to the Procivis One core can now be configured as a service in SSI steps. |
Improvement | AI-21211 | Improved the stability of the Loginapp and the Design Kit UI. |
Bugfix | AI-19514 | Fixed a bug in the Remember-Me Identifying Step, where the step was skipped in the case of concurrent access. Now, the step fails. |
Bugfix | AI-20762 | Fixed an access issue that occurred when the state repository used encryption. |
Bugfix | AI-20840 | Fixed a bug where the JWKS endpoint did not return keys for keystores with empty passwords. |
Flows | ||
---|---|---|
New | AI-19451 |
|
New | AI-20539 AI-21066 | Airlock One-Shot authentication is now possible with flows (not all credential types supported yet). |
New | AI-17221 | Added a new condition Login from new Device, which evaluates to |
New | AI-20909 | The User Lock Step is now also available in public self-service and authentication flows. The User Locked events generated by the User Lock Step now contain the configured lock reason instead of a generic one. |
Improvement | AI-20970 | The Password Letter Order Step is now also available for protected self-service and authentication flows. Until now, it was only supported in public self-service flows. See Password letters. |
Bugfix | AI-21278 | Fixed an injection error that occurred when using the Edited Context Data Map in authentication flows. |
Bugfix | AI-21106 | Fixed a bug where entering an invalid date during user self-registration caused an unexpected error. Now date value validation on the user data registration page has been improved. |
OAuth / OIDC / SAML | ||
---|---|---|
New | AI-20267 AI-20271 | The new OAuth2 Access Token String Value Provider plugin now allows retrieving an access token via the Client Credential Grant. The access token is cached and can be used to authenticate IAM calls to external services. Basic Auth, Private Key JWT and mTLS authentication are supported. |
New | AI-20594 AI-20597 |
See Support for OIDC back-channel logout and OAuth AS/OP configuration - Advanced settings. |
New | AI-19879 AI-19675 | During a SAML2 Single Logout (SLO), requests to |
New | AI-6448 |
This new feature is especially useful during key renewal, since it allows both the old and new keys to remain active during the transition. See also Asynchronous renewal of the public key in the signing certificate. |
Improvement | AI-20363 | During OAuth 2.0 dynamic client registration, the client can now specify the client ID. |
Improvement | AI-20519 | In the OAuth 2.0 Token Exchange plugin, subject token validation is now configured per token exchange rule, in the Token Exchange Rules plugin. See also Token Exchange Configuration. |
Improvement | AI-20673 AI-21204 AI-20751 |
|
Improvement | AI-21266 | Added deny rule exceptions for SQL injection to the mapping templates. This change allows Airlock IAM, when acting as OAuth 2.0 Client or OIDC Relying Party, to accept a wider variety of authorization codes. |
Improvement | AI-20895 | The OpenAPI specification of the Loginapp API Security now also contains protection for the OAuth2 endpoints. An update of the Gateway mappings is recommended. |
Bugfix | AI-20870 | Fixed a bug where the Session Context Retention policy did not support OIDC requests using |
Bugfix | AI-21002 AI-21203 | Fixed a bug where OAuth 2.0/OIDC client authentication with |
Adminapp and Config Editor | ||
---|---|---|
New | AI-20736 AI-19447 | The new Adminapp property Admin Cannot Delete User With Same Name prevents admin users from deleting end-users with the same username. It ensures that administrators do not accidently delete their own accounts. |
New | AI-21129 |
|
New | AI-20233 | Usage Analytics now uses a sanitized version of the IAM configuration with all sensitive data removed. |
Improvement | AI-21050 |
|
Improvement | AI-20947 | Subscribers of user-created events can now filter for specific context data values. See Event filtering. |
Improvement | AI-21384 | The
|
Improvement | AI-20940 | The Vasco Cronto Handler plugin now includes a new property: Account Token Usages Threshold. This property ensures that Vasco account tokens assigned to new users have not already been used too often. |
Improvement | AI-18846 | Updated the IAM demo helm chart to support parameterization of additional volumes. |
Bugfix | AI-18056 | All administrators, regardless of their permissions, can now choose how many user activities are shown in the user's Activities tab in the Adminapp. Previously, this setting's radio buttons were disabled. |
Bugfix | AI-19591 | Fixed a bug in the Adminapp SPA where selection values were sent as strings to the backend instead of booleans and numbers. |
Bugfix | AI-19659 | Fixed some UIs issues in the Vasco OTP dialog that lists available tokens in the Adminapp. |
Bugfix | AI-20486 | The Vasco tokens screens in the Adminapp (both for Vasco Cronto and Vasco OTP) now allow importing new licenses while the token statistics are still loading. |
Bugfix | AI-20774 | Fixed a bug in the Adminapp that caused an exception when displaying Airlock 2FA activation letters generated by IAM versions <= 8.3. These letters contained a nullable |
Bugfix | AI-20790 | Fixed an issue where plugin dependencies from Loginapp or Adminapp modules could no longer be used in the Service Container. |
Bugfix | AI-20890 | Fixed a bug that could cause a null pointer exception when rolling back to the last successfully activated configuration after an activation failure. |
Bugfix | AI-21033 | Fixed a bug that caused the XML import to fail on certain input. |
Bugfix | AI-21200 | Fixed a bug that caused user management extensions to occasionally catch outdated user IDs. |
Miscellaneous | ||
---|---|---|
New | AI-20758 | Loginapp/Adminapp: Browser support is now defined by the “widely available” support definition of Baseline (see also Baseline definition). This means that the following browsers are no longer supported:
|
New | AI-17782 | Added the following new value transformers to the User Sync Task plugin (Service Container module):
|
New | AI-19008 | The old REST API documentation (Miredot) was removed from the IAM artifacts and replaced by a more modern version that is based on the OpenAPI specification. |
Improvement | AI-20767 | The HTTP Client Config plugin has been improved:
|
Improvement | AI-12251 |
To implement this change in existing Oracle databases, a database migration is required. If you work with IAM 8.4, you can use the For more information, see the following Techzone article: Performance Optimization for Oracle DB Sequences |
Improvement | AI-20573 | Introduced measures to reduce memory footprint and fragmentation when running Airlock IAM in Docker/Kubernetes:
See also Reducing a large memory footprint. |
Improvement | AI-19321 |
|
Improvement | AI-20705 | Plugin logics (
|
Improvement | AI-20437 | Airlock Gateway supports Brute Force Protection starting with release GW 8.4. In the IAM Mapping Template for Gateway 8.4 and later, this feature is now enabled by default. |
Improvement | AI-20867 |
|
Improvement | AI-20689 AI-20688 | The RADIUS client and server are now protected against Blast-RADIUS attacks. |
Improvement | AI-20495 | Performed various Java dependency updates. |
Improvement | AI-21206 | Performed the following maintenance and security updates:
|
Improvement | AI-19244 | Airlock IAM's Docker image is now based on Red Hat UBI 9 Minimal. |
Improvement | AI-20658 | The minimum supported DB versions are now:
|
Improvement | AI-20866 | Added helm charts for Microgateway 4.6 |
Bugfix | AI-21276 | Fixed an issue with reading domain-wide Active Directory “Fine Grained Password Policies” (FGPP) when the |
Bugfix | AI-21205 AI-20157 | Fixed a bug in the Active Directory Connector that prevented users from resetting expired passwords themselves. |
Bugfix | AI-20918 | Fixed an issue with the role filter in the LDAP Connector. |
Bugfix | AI-21312 | Gateway integration: Fixed an issue where the OpenAPI specification files contained wrong paths. Now, the OpenAPI specification files work out of the box with the mapping templates. |
Bugfix | AI-20914 | Fixed an issue where requests from technical clients were blocked by the “BOT detection in header value” deny rule. The Gateway mapping templates now include new deny rule exceptions to ensure that the respective requests are accepted. |
Bugfix | AI-21224 | Fixed an issue with the Design Kit: In dev mode, even one change in a source file could trigger two reloads. |
Bugfix | AI-18817 | Encrypted password hash now supports GCM and CBC as block cipher mode. |
Bugfix | AI-21003 | Updated Log4J libraries from 2.21.1 to 2.22.1. This removes a spring-test dependency that was unintentionally added to the bundle. |
Bugfix | AI-21133 AI-21134 AI-21042 | Fixed several issues with the Swissphone SMS Gateway plugin:
|