<?xml version="1.0" encoding="utf-8"?><?xml-stylesheet type="text/xsl" href="atom.xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://docs.trustedauth.com/blog/</id>
    <title>IDaaS Documentation Blog</title>
    <updated>2026-04-01T00:00:00.000Z</updated>
    <generator>https://github.com/jpmonette/feed</generator>
    <link rel="alternate" href="https://docs.trustedauth.com/blog/"/>
    <subtitle>IDaaS Documentation Blog</subtitle>
    <icon>https://docs.trustedauth.com/img/favicon.ico</icon>
    <entry>
        <title type="html"><![CDATA[Release 5.46]]></title>
        <id>https://docs.trustedauth.com/blog/2026/idaas-5.46/</id>
        <link href="https://docs.trustedauth.com/blog/2026/idaas-5.46/"/>
        <updated>2026-04-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Release notes for Entrust Identity as a Service release 5.46]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="webhooks">Webhooks<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#webhooks" class="hash-link" aria-label="Direct link to Webhooks" title="Direct link to Webhooks" translate="no">​</a></h3>
<p>Webhooks in this release are expanded and easier to use. IDaaS now supports a broader event catalog across user lifecycle, authentication outcomes, credentials, passkeys, tokens, grids, and magic links, with additional detailed information for each event. Webhook delivery now follows a standard HTTP message signing model (RFC 9421) to simplify verification in downstream services, and webhook administration has been improved with clearer configuration metadata (including required webhook names) and more flexible testing options, such as overriding the callback URL during test calls.</p>
<p><img decoding="async" loading="lazy" alt="Webhook configuration page showing registering a webhook for user registration events" src="https://docs.trustedauth.com/assets/images/webhook-2481fc8858535c91572cba7fa4054f10.png" width="1439" height="775" class="img_ev3q"></p>
<p>For more information, see the <a class="" href="https://docs.trustedauth.com/developer/webhook/common-webhook-use-cases/">Webhook customer use cases guide</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="documentation-portal">Documentation Portal<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#documentation-portal" class="hash-link" aria-label="Direct link to Documentation Portal" title="Direct link to Documentation Portal" translate="no">​</a></h3>
<p>This release of IDaaS introduces a new documentation portal that combines admin guidance, developer resources, and release notes in one place.</p>
<p>The new documentation portal includes the following features:</p>
<ul>
<li class="">Improved searching.</li>
<li class="">LLM-friendly content export support for AI-assisted knowledge workflows.</li>
</ul>
<p>For portal access and navigation, see the <a class="" href="https://docs.trustedauth.com/">IDaaS documentation portal home</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-enterprise-agent-migration-enhancements">Identity Enterprise Agent Migration Enhancements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#identity-enterprise-agent-migration-enhancements" class="hash-link" aria-label="Direct link to Identity Enterprise Agent Migration Enhancements" title="Direct link to Identity Enterprise Agent Migration Enhancements" translate="no">​</a></h3>
<p>The Identity Enterprise (formerly IdentityGuard) Agent in the Enterprise Service Gateway has been enhanced to support progressive migration of customers from Identity Enterprise to IDaaS. When handling authentication requests from an Identity Enterprise client, the agent first tries to forward the request to IDaaS. If the user does not exist in IDaaS, the agent will then forward the request to Identity Enterprise. This allows a customer to migrate their users from Identity Enterprise to IDaaS in stages without forcing immediate client-side changes across all legacy integrations.</p>
<p><img decoding="async" loading="lazy" alt="Identity Enterprise Agent configuration page showing progressive migration routing settings" src="https://docs.trustedauth.com/assets/images/ideagent-33e60ae968de3cca130bb7abfbeb9498.png" width="959" height="693" class="img_ev3q"></p>
<p>For configuration and routing behavior details, see <a class="" href="https://docs.trustedauth.com/docs/migration/ide/ide-agent/">Configuring an Identity Enterprise Agent</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="passkey-attestation">Passkey Attestation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#passkey-attestation" class="hash-link" aria-label="Direct link to Passkey Attestation" title="Direct link to Passkey Attestation" translate="no">​</a></h3>
<p>This release introduces passkey attestation enhancements to improve trust during passkey registration and lifecycle management. IDaaS now captures and evaluates attestation-related registration details so administrators can better validate authenticator provenance and strengthen phishing-resistant authentication policies.</p>
<p>In addition, administrators now have an option to list passkeys, making it easier to review registered passkeys, identify stale or duplicate credentials, and support user troubleshooting and cleanup workflows. Together, these improvements help security teams make stronger authenticator trust decisions while giving operations teams better passkey inventory visibility and lifecycle control.</p>
<p><img decoding="async" loading="lazy" alt="Passkey attestation page showing registered passkeys with attestation details and trust status" src="https://docs.trustedauth.com/assets/images/passkeys-554c5a8260795d2f5e0c5bc790a7429c.png" width="1615" height="750" class="img_ev3q"></p>
<p>For solution overview and platform context, see <a class="" href="https://docs.trustedauth.com/docs/authentication-and-security/passkey/passkey-basics/">Passkey basics</a> and <a class="" href="https://docs.trustedauth.com/docs/authentication-and-security/manage-authenticators/manage-passkey-fido2-authenticators/">IDaaS Passkey/FIDO2 authenticator management</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-external-id-enhancements">User External ID Enhancements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#user-external-id-enhancements" class="hash-link" aria-label="Direct link to User External ID Enhancements" title="Direct link to User External ID Enhancements" translate="no">​</a></h3>
<p>User External ID enhancements make it easier for customers to link external account information to the corresponding IDaaS account by mapping and persisting customer-managed user identifiers in IDaaS. External ID values can be assigned through directory sync, inbound IdP claims, the Administration API, bulk operations, or SCIM provisioning. External IDs can be included in SAML attributes or OIDC claims and be used for API-based lookups.</p>
<p><img decoding="async" loading="lazy" alt="SAML application attribute configuration showing external ID mapping" src="https://docs.trustedauth.com/assets/images/saml-externalid-65127b37cd8426334ef2e9e36a0a9ddd.png" width="1145" height="228" class="img_ev3q"></p>
<p><img decoding="async" loading="lazy" alt="OIDC application claims configuration showing external ID mapping" src="https://docs.trustedauth.com/assets/images/oidc-externalid-29c84adacda69d29e1dcb3f84588b6c6.png" width="1198" height="504" class="img_ev3q"></p>
<p>For configuration details and integration examples, see <a class="" href="https://docs.trustedauth.com/docs/people-and-access/manage-members/add-users-to-identity-as-a-service/configure-external-id-for-users/">Configure external ID for users</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="magic-link-enhancements">Magic Link Enhancements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#magic-link-enhancements" class="hash-link" aria-label="Direct link to Magic Link Enhancements" title="Direct link to Magic Link Enhancements" translate="no">​</a></h3>
<p>This release adds a new setting to automatically send a magic link when a new user is created. The link can take the user directly to IDaaS to complete verification and initial registration, reducing onboarding friction and speeding time to first sign-in.</p>
<p>The Magic Link redirect URL validation is now more flexible but still preserves application safety. Previously, the requested redirect URL had to exactly match an allowed URL. Now, IDaaS validates the base redirect URL and ignores differences in query parameters. This lets clients include route or state parameters so users can return to a specific page in the same application after completing the magic link flow.</p>
<p>For customer scenarios and implementation patterns, see <a class="" href="https://docs.trustedauth.com/docs/authentication-and-security/manage-authenticators/manage-magic-links/magic-links-solution-guide/">Magic links solution guide</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="portal-enhancements">Portal Enhancements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#portal-enhancements" class="hash-link" aria-label="Direct link to Portal Enhancements" title="Direct link to Portal Enhancements" translate="no">​</a></h3>
<p>The following changes have been made to the Administration portal to improve usability, so administrators can complete common setup and governance tasks faster with fewer navigation and context-switching steps:</p>
<ul>
<li class="">
<p>The administrator <strong>Add Role</strong> page has been updated to improve usability. See <a class="" href="https://docs.trustedauth.com/docs/people-and-access/manage-members/create-assign-and-manage-roles/">Create, assign, and manage roles</a>.</p>
<p><img decoding="async" loading="lazy" alt="Updated Add Role page showing improved role configuration layout" src="https://docs.trustedauth.com/assets/images/roles-5320a08f6a16acd805630ba8a8c8172c.png" width="1257" height="756" class="img_ev3q"></p>
</li>
<li class="">
<p>The <strong>Add Application</strong> page has been redesigned. Applications are now categorized by type and it is easier to select which type of application the administrator wants to view. See <a class="" href="https://docs.trustedauth.com/docs/applications-and-sso/manage-applications/">Manage applications</a>.</p>
<p><img decoding="async" loading="lazy" alt="Redesigned Add Application page showing applications organized by category type" src="https://docs.trustedauth.com/assets/images/applications-5cc69029b35c1217017b39864b003c6d.png" width="1404" height="761" class="img_ev3q"></p>
</li>
<li class="">
<p>The <strong>Add Bulk Operations</strong> page has been modified so that the administrator selects the type of entity first and then the action. Previously the action was selected first. See <a class="" href="https://docs.trustedauth.com/docs/perform-bulk-operations/manage-bulk-operations/">Manage bulk operations</a>.</p>
<p><img decoding="async" loading="lazy" alt="Updated Add Bulk Operations page showing entity type selection before action selection" src="https://docs.trustedauth.com/assets/images/bulk-724cccf2eec5a0813f9b6a3dfee091c7.png" width="1644" height="410" class="img_ev3q"></p>
</li>
<li class="">
<p>The allowed resolution for custom logos has been increased from 450x150 to 900x300. See <a class="" href="https://docs.trustedauth.com/docs/customization/customize-account-appearance-and-language/">Customize account appearance and language</a>.</p>
</li>
<li class="">
<p>Editing Links in the <strong>Message of the Day</strong> has been fixed. See <a class="" href="https://docs.trustedauth.com/docs/customization/customize-account-appearance-and-language/">Customize account appearance and language</a>.</p>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="content-security-policy-csp-changes">Content Security Policy (CSP) Changes<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#content-security-policy-csp-changes" class="hash-link" aria-label="Direct link to Content Security Policy (CSP) Changes" title="Direct link to Content Security Policy (CSP) Changes" translate="no">​</a></h3>
<p>The Content Security Policy used by IDaaS has been made stricter in this release. The following changes have been made:</p>
<ul>
<li class="">Remove Google Analytics and font endpoints.</li>
<li class="">Use specific S3 bucket endpoints instead of broader AWS endpoints.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">The Verify User action required the Add permission for the authenticator being used. This is no longer required. (42124)</li>
<li class="">Change to how Google Authenticators in the activating state are treated during registration. (42067)</li>
<li class="">Named password UI fixes: reset-password named password not saved until refresh; named password cleanup; and small-window layout fix for named password group policy. (42025, 41810, 41714)</li>
<li class="">Risk Factor source IP address in resource rules causing Create OTP Auth API failure. (42030)</li>
<li class="">For OIDC applications, initiate Login URL should not be mandatory. (41991)</li>
<li class="">SIEM customization tab logo not saving. (41983)</li>
<li class="">Directory configuration Group Filter not honored in AD LDS. (41974)</li>
<li class="">Changing tabs in the application UI can overwrite changes. (41936)</li>
<li class="">Audit searches with empty subjectName should ignore the search attribute. (41917)</li>
<li class="">Admin portal error after user password authentication. (41888)</li>
<li class="">Generic 500 error on password reset URL. (41873)</li>
<li class="">Bulk import sample CSV had duplicate security ID in audit. (41856)</li>
<li class="">Validate search parameters for assigning preferred OTP provider to tenants/accounts. (41798)</li>
<li class="">Named password flow and audit validation updates: disable named passwords for system-defined auth flows; enforce namedPasswordId check in Admin API password reset; and use named password UUID in group policy audit updates. (41797, 41640, 41163)</li>
<li class="">Password reset email from admin portal showed “default” in email body. (41763)</li>
<li class="">Alternative OTP delivery methods not working at portal login when non-default method selected in user profile. (41769)</li>
<li class="">Magic link login invalid_token error. (41755)</li>
<li class="">SCIM: add user as provisioned user if user already exists. (41734)</li>
<li class="">Named password audit/log consistency updates for bulk password reset and SAML forgot password, plus password-only group policy reset audit behavior. (41730, 41729, 41722, 41719)</li>
<li class="">Trimmed challenge response through ESG IdentityGuard Agent. (41689)</li>
<li class="">Default group policy category on password when present. (41620)</li>
<li class="">Service Provider tenant management role not working if no site role assigned. (41514)</li>
<li class="">Null Pointer Exception (NPE) during TransactionDetails check. (41452)</li>
<li class="">Email notification did not specify which password was changed. (41333)</li>
<li class="">SCIM provisioning failure when token expired. (41305)</li>
<li class="">Application description could not be set to blank. (41218)</li>
<li class="">SAML application max age disable behavior for -1 updated with day-based time handling. (41072)</li>
<li class="">SP auditor role should be able to view tenant usage details dialog. (41065)</li>
<li class="">Allow upload of WeChat service account QR code. (41049)</li>
<li class="">Token push verify user cancel audit permission update. (40818)</li>
<li class="">Verify user grid for specified-one missing userId in audit. (40562)</li>
<li class="">Previous passwords cannot be reused: inconsistent behavior when resetting password with current password. (30638)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-idaas-apis">Changes to Identity as a Service (IDaaS) APIs<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#changes-to-identity-as-a-service-idaas-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service (IDaaS) APIs" title="Direct link to Changes to Identity as a Service (IDaaS) APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-operations">New operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#new-operations" class="hash-link" aria-label="Direct link to New operations" title="Direct link to New operations" translate="no">​</a></h4>
<ul>
<li class="">None.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="removed-operations">Removed operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#removed-operations" class="hash-link" aria-label="Direct link to Removed operations" title="Direct link to Removed operations" translate="no">​</a></h4>
<ul>
<li class="">None.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-operations">Changed operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#changed-operations" class="hash-link" aria-label="Direct link to Changed operations" title="Direct link to Changed operations" translate="no">​</a></h4>
<ul>
<li class="">None.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-models">Changed models<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#changed-models" class="hash-link" aria-label="Direct link to Changed models" title="Direct link to Changed models" translate="no">​</a></h4>
<ul>
<li class=""><code>FIDORegisterChallenge</code>
<ul>
<li class="">Added: <code>attestation</code> (string) - Attestation preference for passkey/FIDO2 registration. Determines how much information about the authenticator (security key/passkey) is shared during registration. NONE: No authenticator details shared (recommended for privacy). INDIRECT: Basic information shared in a privacy-preserving way (balanced approach). DIRECT: Full authenticator details shared (use when you need to verify specific device models).</li>
</ul>
</li>
<li class=""><code>FIDORegisterResponse</code>
<ul>
<li class="">Added: <code>transports</code> (<code>array&lt;string&gt;</code>) - The transport methods used during registration (for example, 'usb', 'nfc', 'ble', 'internal'). Used to determine authenticator capabilities.</li>
</ul>
</li>
<li class=""><code>FIDOToken</code>
<ul>
<li class="">Added: <code>aaguid</code> (string) - The AAGUID of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>aaguidVerified</code> (boolean) - Indicates whether the AAGUID reported by the authenticator was cryptographically verified via a full certificate chain against the FIDO MDS trust anchors. True only for DIRECT attestation; false for INDIRECT (cert chain not verified); null for NONE (no attestation collected).</li>
<li class="">Added: <code>algorithm</code> (string) - The signature algorithm of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>attestationFormat</code> (string) - Attestation format of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>attestedData</code> (boolean) - Indicates if this FIDO token contains attested data.</li>
<li class="">Added: <code>authenticatorModel</code> (string) - The authenticator model of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>backupEligible</code> (boolean) - Indicates if this FIDO token is eligible for backup.</li>
<li class="">Added: <code>backupStatus</code> (boolean) - Indicates if this FIDO token is currently backed up.</li>
<li class="">Added: <code>icon</code> (string) - The icon of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>userPresent</code> (boolean) - Indicates if the user was present during the registration or authentication ceremony that created or last used this FIDO token.</li>
<li class="">Added: <code>userVerified</code> (boolean) - Indicates if the user was verified during the registration or authentication ceremony that created or last used this FIDO token.</li>
</ul>
</li>
<li class=""><code>GridChallenge</code>
<ul>
<li class="">Added: <code>cellAlphabets</code> (string) - The cellAlphabets value specifies the characters that are valid for the cells in the grid challenge.</li>
<li class="">Required added: <code>cellAlphabets</code>.</li>
</ul>
</li>
<li class=""><code>UserAuthenticatorLockoutStatus</code>
<ul>
<li class="">Added: <code>locked</code> (boolean) - Determines if this authenticator is currently locked out.</li>
</ul>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-operations-1">New operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#new-operations-1" class="hash-link" aria-label="Direct link to New operations" title="Direct link to New operations" translate="no">​</a></h4>
<ul>
<li class=""><code>GET /api/web/v1/async/tokenspaged/{id}/assigned/result (assignedTokenPageAsyncResultUsingGET)</code> - Get the result of an asynchronous list assigned tokens operation.</li>
<li class=""><code>GET /api/web/v1/async/tokenspaged/{id}/assigned/status (assignedTokenPageAsyncStatusUsingGET)</code> - Get the status of an asynchronous list assigned tokens operation.</li>
<li class=""><code>GET /api/web/v1/async/tokenspaged/{id}/unassigned/result (unassignedTokenPageAsyncResultUsingGET)</code> - Get the result of an asynchronous list unassigned tokens operation.</li>
<li class=""><code>GET /api/web/v1/async/tokenspaged/{id}/unassigned/status (unassignedTokenPageAsyncStatusUsingGET)</code> - Get the status of an asynchronous list unassigned tokens operation.</li>
<li class=""><code>GET /api/web/v2/async/gridspaged/{id}/assigned/result (assignedGridsPageAsyncResultUsingGET)</code> - Get the result of an asynchronous list assigned grids operation.</li>
<li class=""><code>GET /api/web/v2/async/gridspaged/{id}/assigned/status (assignedGridsPageAsyncStatusUsingGET)</code> - Get the status of an asynchronous list assigned grids operation.</li>
<li class=""><code>GET /api/web/v2/async/gridspaged/{id}/unassigned/result (unassignedGridsPageAsyncResultUsingGET)</code> - Get the result of an asynchronous list unassigned grids operation.</li>
<li class=""><code>GET /api/web/v2/async/gridspaged/{id}/unassigned/status (unassignedGridsPageAsyncStatusUsingGET)</code> - Get the status of an asynchronous list unassigned grids operation.</li>
<li class=""><code>GET /api/web/v4/async/userspaged/{id}/result (usersPagedAsyncResultUsingGET)</code> - Get the result of an asynchronous list users operation.</li>
<li class=""><code>GET /api/web/v4/async/userspaged/{id}/status (usersPagedAsyncStatusUsingGET)</code> - Get the status of an asynchronous list users operation.</li>
<li class=""><code>POST /api/web/v1/async/tokenspaged/assigned (assignedTokenPageAsyncUsingPOST)</code> - Lists a page of assigned tokens asynchronously.</li>
<li class=""><code>POST /api/web/v1/async/tokenspaged/unassigned (unassignedTokenPageAsyncUsingPOST)</code> - Lists a page of unassigned hardware tokens asynchronously.</li>
<li class=""><code>POST /api/web/v1/fidotokenspaged (getFIDOTokensPagedUsingPOST)</code> - Get FIDO tokens (paginated).</li>
<li class=""><code>POST /api/web/v2/async/gridspaged/assigned (assignedGridsPageAsyncUsingPOST)</code> - Lists a page of assigned grids asynchronously.</li>
<li class=""><code>POST /api/web/v2/async/gridspaged/unassigned (unassignedGridsPageAsyncUsingPOST)</code> - Lists a page of unassigned grids asynchronously.</li>
<li class=""><code>POST /api/web/v4/async/userspaged (usersPagedAsyncUsingPOST)</code> - Lists a page of users asynchronously.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="removed-operations-1">Removed operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#removed-operations-1" class="hash-link" aria-label="Direct link to Removed operations" title="Direct link to Removed operations" translate="no">​</a></h4>
<ul>
<li class=""><code>POST /api/web/v4/tenants (createTenantUsingPOST)</code></li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-operations-1">Changed operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#changed-operations-1" class="hash-link" aria-label="Direct link to Changed operations" title="Direct link to Changed operations" translate="no">​</a></h4>
<ul>
<li class=""><code>POST /api/web/v1/webhooks/test/{id} (testWebhookUsingPOST)</code>
<ul>
<li class="">Request body: A request body was added.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-models-1">Changed models<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#changed-models-1" class="hash-link" aria-label="Direct link to Changed models" title="Direct link to Changed models" translate="no">​</a></h4>
<ul>
<li class=""><code>FIDOAuthenticatorSettings</code>
<ul>
<li class="">Added: <code>attestation</code> (string) - Attestation preference for passkey/FIDO2 registration. Determines how much information about the authenticator (security key/passkey) is shared during registration. NONE: No authenticator details shared (recommended for privacy). INDIRECT: Basic information shared in a privacy-preserving way (balanced approach). DIRECT: Full authenticator details shared (use when you need to verify specific device models).</li>
</ul>
</li>
<li class=""><code>FIDOAuthenticatorSettingsParms</code>
<ul>
<li class="">Added: <code>attestation</code> (string) - Attestation preference for passkey/FIDO2 registration. Determines how much information about the authenticator (security key/passkey) is shared during registration. NONE: No authenticator details shared (recommended for privacy). INDIRECT: Basic information shared in a privacy-preserving way (balanced approach). DIRECT: Full authenticator details shared (use when you need to verify specific device models).</li>
</ul>
</li>
<li class=""><code>FIDORegisterChallenge</code>
<ul>
<li class="">Added: <code>attestation</code> (string) - Attestation preference for passkey/FIDO2 registration. Determines how much information about the authenticator (security key/passkey) is shared during registration. NONE: No authenticator details shared (recommended for privacy). INDIRECT: Basic information shared in a privacy-preserving way (balanced approach). DIRECT: Full authenticator details shared (use when you need to verify specific device models).</li>
</ul>
</li>
<li class=""><code>FIDORegisterResponse</code>
<ul>
<li class="">Added: <code>transports</code> (array&lt;string&gt;) - The transport methods used during registration (e.g., 'usb', 'nfc', 'ble', 'internal'). Used to determine authenticator capabilities.</li>
</ul>
</li>
<li class=""><code>FIDOToken</code>
<ul>
<li class="">Added: <code>aaguid</code> (string) - The AAGUID of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>aaguidVerified</code> (boolean) - Indicates whether the AAGUID reported by the authenticator was cryptographically verified via a full certificate chain against the FIDO MDS trust anchors. True only for DIRECT attestation; false for INDIRECT (cert chain not verified); null for NONE (no attestation collected).</li>
<li class="">Added: <code>algorithm</code> (string) - The signature algorithm of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>attestationFormat</code> (string) - Attestation format of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>attestedData</code> (boolean) - Indicates if this FIDO token contains attested data.</li>
<li class="">Added: <code>authenticatorModel</code> (string) - The authenticator model of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>backupEligible</code> (boolean) - Indicates if this FIDO token is eligible for backup.</li>
<li class="">Added: <code>backupStatus</code> (boolean) - Indicates if this FIDO token is currently backed up.</li>
<li class="">Added: <code>icon</code> (string) - The icon of the authenticator that created this FIDO token.</li>
<li class="">Added: <code>userPresent</code> (boolean) - Indicates if the user was present during the registration or authentication ceremony that created or last used this FIDO token.</li>
<li class="">Added: <code>userVerified</code> (boolean) - Indicates if the user was verified during the registration or authentication ceremony that created or last used this FIDO token.</li>
</ul>
</li>
<li class=""><code>OTPAuthenticatorSettings</code>
<ul>
<li class="">Added: <code>otpWeChatDefaultDeliveryAttribute</code> (string) - Id of the default WeChat OTP delivery attribute.</li>
<li class="">Removed: <code>otpWechatDefaultDeliveryAttribute</code> (string) - Id of the default Wechat OTP delivery attribute.</li>
</ul>
</li>
<li class=""><code>PasswordResetSettings</code>
<ul>
<li class="">Added: <code>namedPasswordName</code> (string) - The name of the password.</li>
</ul>
</li>
<li class=""><code>User</code>
<ul>
<li class="">Added: <code>userPasswordDetails</code> (<code>array&lt;UserPasswordDetails&gt;</code>) - A list of the user password details.</li>
<li class="">Flag changed: <code>passwordCompromised</code> deprecated: false -&gt; true.</li>
<li class="">Flag changed: <code>passwordExpirationTime</code> deprecated: false -&gt; true.</li>
</ul>
</li>
<li class=""><code>UserAuthenticatorLockoutStatus</code>
<ul>
<li class="">Added: <code>locked</code> (boolean) - Determines if this authenticator is currently locked out.</li>
</ul>
</li>
<li class=""><code>Webhook</code>
<ul>
<li class="">Added: <code>name</code> (string) - Descriptive name for the webhook to help identify its purpose.</li>
</ul>
</li>
<li class=""><code>WebhookEvent</code>
<ul>
<li class="">Enum changed on <code>type</code>: added <code>user.created</code>, <code>user.updated</code>, <code>user.deleted</code>, <code>user.registration.completed</code>, <code>authentication.succeeded</code>, <code>authentication.failed</code>, <code>password.updated</code>, <code>magiclink.email.sent</code>, <code>grid.created</code>, <code>grid.email.sent</code>, <code>grid.password.email.sent</code>, <code>passkey.created</code>, <code>passkey.updated</code>, <code>passkey.deleted</code>, <code>kba.question.created</code>, <code>token.created</code>, <code>token.activated</code>, <code>token.activated.online</code>, <code>token.seed.rotated</code>, <code>hardware.token.assigned</code>, <code>face.biometric.created</code>, <code>credential.create</code>, <code>credential.update</code>, <code>credential.delete</code>, <code>credential.print</code>.</li>
</ul>
</li>
<li class=""><code>WebhookParms</code>
<ul>
<li class="">Added: <code>name</code> (string) - Descriptive name for the webhook to help identify its purpose.</li>
<li class="">Changed: <code>enabled</code> - Improved description. Indicates whether the webhook is active and will receive event notifications. Disabled webhooks will not receive any events.</li>
<li class="">Required added: <code>name</code>.</li>
</ul>
</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AES_128_GCM_SHA256</li>
<li class="">TLS_AES_256_GCM_SHA384</li>
<li class="">TLS_CHACHA20_POLY1305_SHA256</li>
</ul>
<p>TLSv1.2:</p>
<ul>
<li class="">ECDHE-RSA-AES128-GCM-SHA256</li>
<li class="">ECDHE-RSA-AES256-GCM-SHA384</li>
<li class="">ECDHE-RSA-CHACHA20-POLY1305</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-esg-deprecation">Enterprise Service Gateway (ESG) Deprecation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#enterprise-service-gateway-esg-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway (ESG) Deprecation" title="Direct link to Enterprise Service Gateway (ESG) Deprecation" translate="no">​</a></h2>
<p>Entrust supports only the last four releases of the Enterprise Service Gateway (the current version 5.46 and the three previous releases 5.43, 5.44, and 5.45). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p><strong>NOTE: In an upcoming release, changes are planned that will break versions of ESG older than 5.33.</strong></p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.46/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports the Internet Explorer 11 and Microsoft Edge Legacy browsers. Identity as a Service no longer supports these browsers.</p>]]></content>
        <author>
            <name>Entrust Identity as a Service Team</name>
            <email>support@entrust.com</email>
            <uri>https://www.entrust.com/products/iam/identity-as-a-service</uri>
        </author>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.45]]></title>
        <id>https://docs.trustedauth.com/blog/2026/idaas-5.45/</id>
        <link href="https://docs.trustedauth.com/blog/2026/idaas-5.45/"/>
        <updated>2026-02-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Release notes for Entrust Identity as a Service release 5.45]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-multiple-passwords">Support Multiple Passwords<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#support-multiple-passwords" class="hash-link" aria-label="Direct link to Support Multiple Passwords" title="Direct link to Support Multiple Passwords" translate="no">​</a></h3>
<p>IDaaS users can now have multiple passwords associated with their account. This allows users to have different passwords for different authentication flows or applications. Administrators can configure multiple passwords for users and assign each with a unique password policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="scim-enhancements">SCIM Enhancements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#scim-enhancements" class="hash-link" aria-label="Direct link to SCIM Enhancements" title="Direct link to SCIM Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to SCIM support in this release:</p>
<ul>
<li class="">Support for custom schemas.</li>
<li class="">Mapping additional IDaaS attributes to SCIM attributes, including RegistrationStatus to indicate whether the user is registered.</li>
<li class="">Support for setting values into multivalued complex type SCIM attributes like email.</li>
<li class="">Improved logging.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="ui-improvements">UI Improvements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#ui-improvements" class="hash-link" aria-label="Direct link to UI Improvements" title="Direct link to UI Improvements" translate="no">​</a></h3>
<p>In the IDaaS Administration portal, all the "Policy" pages and bulk operation pages have been redesigned to improve usability.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="oauth-improvements">OAuth Improvements<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#oauth-improvements" class="hash-link" aria-label="Direct link to OAuth Improvements" title="Direct link to OAuth Improvements" translate="no">​</a></h3>
<p>A new document "OAuth and OIDC Basics" has been added to the IDaaS Developer Hub. This document provides an overview of OAuth 2.0 and OpenID Connect (OIDC) concepts.</p>
<p>A new OIDC application template, “Generic Embedded Application,” is now available in IDaaS. This template enables administrators to implement a custom, self‑hosted login experience that keeps users within your application during authentication, while still relying on an OpenID Connect provider to issue standards‑compliant tokens.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="cors-changes">CORS Changes<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#cors-changes" class="hash-link" aria-label="Direct link to CORS Changes" title="Direct link to CORS Changes" translate="no">​</a></h3>
<p>For new IDaaS accounts, CORS is now enabled by default. Existing accounts are not affected by this change but Entrust recommends that customers enable CORS for their existing accounts.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class=""><strong>Generic Native application client ID copy to clipboard fails</strong> - The copy to clipboard function for client ID was not working for Generic Native applications, though it worked for other OIDC apps. (41215)</li>
<li class=""><strong>Authentication API calls for OIDC IDaaS JWT grant type need to be added to CORS Allow list</strong> - Authentication API calls for IDaaS JWT grant types are now automatically allowed for CORS.(41203)</li>
<li class=""><strong>Group policy Face Biometric Mutual Challenge alphabet error handling</strong> - Setting Face Biometric mutual challenge alphabet to a single character and saving resulted in an error without an error message. (41316)</li>
<li class=""><strong>IDaaS Doc ER: SAML SLO configuration and expected behavior</strong> - Documentation needs to specify the resulting behaviors expected from IDP or SP initiated logout and whether it results in global logout. (39797)</li>
<li class=""><strong>Magic link auth email changing to blank when the defined custom email contact changed to SMS</strong> - When adding a custom email contact, changing group policy magic link default email to the custom contact, then changing the custom email contact type to SMS, the default email becomes blank. (40636)</li>
<li class=""><strong>SCIM Provisioner User Attribute Mappings filter for the Required field is a text field</strong> - The filter field should be restricted to yes/no options rather than free text. (40462)</li>
<li class=""><strong>Test Directory Configurations result dialog contains a typo</strong> - "All group filter" should be "All group filters". (40827)</li>
<li class=""><strong>Unsaved changes warning does not retain user on the same Authenticator edit page when "Cancel" is clicked</strong> - When navigating to Policy → Authenticators, editing an Authenticator without saving, then clicking another Authenticator, an unsaved changes pop-up appears. However, clicking "Cancel" navigates to the previously selected Authenticator instead of staying on the current page with unsaved changes. (41281)</li>
<li class=""><strong>OIDC Authentication Unexpected server error, authentication request invalid</strong> - After redirecting to IDaaS from the customer service provider using an OIDC integration, allowing five minutes to elapse before proceeding results in "server error: Unexpected server error, authentication request invalid" error. (40883)</li>
<li class=""><strong>IDaaS SAML user creation not recognizing role</strong> - When a user is created after IDP authentication, role assignment during user creation is not working. Role claims that include underscores and role claims returned as lists are not properly processed. (41319)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-idaas-apis">Changes to Identity as a Service (IDaaS) APIs<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#changes-to-identity-as-a-service-idaas-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service (IDaaS) APIs" title="Direct link to Changes to Identity as a Service (IDaaS) APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-models">New models<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#new-models" class="hash-link" aria-label="Direct link to New models" title="Direct link to New models" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="passwordchallenge"><code>PasswordChallenge</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#passwordchallenge" class="hash-link" aria-label="Direct link to passwordchallenge" title="Direct link to passwordchallenge" translate="no">​</a></h5>
<p>New model introduced to support password challenge scenarios.</p>
<ul>
<li class=""><code>name</code> (string) - The name of the password challenge</li>
<li class=""><code>namedPasswordId</code> (string) - The Named Password Id associated with the challenge</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-models">Changed models<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#changed-models" class="hash-link" aria-label="Direct link to Changed models" title="Direct link to Changed models" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="authenticatedresponse"><code>AuthenticatedResponse</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#authenticatedresponse" class="hash-link" aria-label="Direct link to authenticatedresponse" title="Direct link to authenticatedresponse" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>passwordChallenge</code> (PasswordChallenge) - Password challenge information returned when password authentication requires additional challenge</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userauthenticatequeryresponse"><code>UserAuthenticateQueryResponse</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userauthenticatequeryresponse" class="hash-link" aria-label="Direct link to userauthenticatequeryresponse" title="Direct link to userauthenticatequeryresponse" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>passwordChallenge</code> (PasswordChallenge) - Password challenge information for user authentication queries</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userauthenticatorlockoutstatus"><code>UserAuthenticatorLockoutStatus</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userauthenticatorlockoutstatus" class="hash-link" aria-label="Direct link to userauthenticatorlockoutstatus" title="Direct link to userauthenticatorlockoutstatus" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>name</code> (string) - The users named password authentication that is locked out.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="notes--migration-guidance">Notes &amp; migration guidance<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#notes--migration-guidance" class="hash-link" aria-label="Direct link to Notes &amp; migration guidance" title="Direct link to Notes &amp; migration guidance" translate="no">​</a></h4>
<ul>
<li class=""><strong>Password Challenge Support</strong>: A new <code>PasswordChallenge</code> model has been introduced to support scenarios where password authentication requires additional challenge information. This is part of the named password feature that allows users to have multiple distinct password authenticators.</li>
<li class=""><strong>Enhanced Authentication Responses</strong>: Both <code>AuthenticatedResponse</code> and <code>UserAuthenticateQueryResponse</code> now include an optional <code>passwordChallenge</code> field. Clients should handle this field to support multi-password authentication flows where a specific named password may be required.</li>
<li class=""><strong>Lockout Status Enhancement</strong>: The <code>UserAuthenticatorLockoutStatus</code> model now includes a <code>name</code> field to identify which specific named password authenticator is locked out, providing better visibility for troubleshooting and user support.</li>
<li class=""><strong>Non-Breaking Changes</strong>: All changes are additive (new optional fields and a new model). Existing client implementations will continue to work without modification, though they won't benefit from the enhanced password challenge capabilities until updated.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-operations">New operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#new-operations" class="hash-link" aria-label="Direct link to New operations" title="Direct link to New operations" translate="no">​</a></h4>
<ul>
<li class=""><code>DELETE /api/web/v1/users/{userid}/passwords/{namedpasswordid} (deleteUserNamedPasswordUsingDELETE)</code> — Delete a user password using the password ID</li>
<li class=""><code>GET /api/web/v1/users/{userid}/list/passwords (getUserNamedPasswordsUsingGET)</code> — Gets a list of user passwords</li>
<li class=""><code>GET /api/web/v1/users/{userid}/settings/password/{namedpasswordid} (getUserNamedPasswordSettingsUsingGET)</code> — Get user password authenticator settings by named password ID</li>
<li class=""><code>PUT /api/web/v1/users/{userid}/password/{namedpasswordid}/notify (sendUserNamedPasswordExpiryNotificationUsingPUT)</code> — Update and send a password expiry notification using password ID</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="removed-operations">Removed operations<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#removed-operations" class="hash-link" aria-label="Direct link to Removed operations" title="Direct link to Removed operations" translate="no">​</a></h4>
<ul>
<li class=""><code>DELETE /api/web/v1/users/{userid}/activesyncdevices/{deviceid} (removeActiveSyncDeviceUsingDELETE)</code> — Delete ActiveSync device</li>
<li class=""><code>GET /api/web/v1/serviceipaddresses (getServiceIPAddressesUsingGET)</code> — Get service IP addresses</li>
<li class=""><code>GET /api/web/v1/users/{userid}/activesyncdevices (getCachedActiveSyncDevicesUsingGET)</code> — Get ActiveSync devices</li>
<li class=""><code>POST /api/web/v1/users/{userid}/activesyncdevices (getActiveSyncDevicesUsingPOST)</code> — Manage ActiveSync device</li>
<li class=""><code>PUT /api/web/v1/users/{userid}/activesyncdevices (updateActiveSyncDevicesUsingPUT)</code> — Update ActiveSync device</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="changed-models-1">Changed models<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#changed-models-1" class="hash-link" aria-label="Direct link to Changed models" title="Direct link to Changed models" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="authenticationflow"><code>AuthenticationFlow</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#authenticationflow" class="hash-link" aria-label="Direct link to authenticationflow" title="Direct link to authenticationflow" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>namedPasswordId</code> (string) - The Named Password Id used for password authentication.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="authenticationflowparms"><code>AuthenticationFlowParms</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#authenticationflowparms" class="hash-link" aria-label="Direct link to authenticationflowparms" title="Direct link to authenticationflowparms" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>namedPasswordId</code> (string) - The Named Password Id used for password authentication.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="corsorigin"><code>CorsOrigin</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#corsorigin" class="hash-link" aria-label="Direct link to corsorigin" title="Direct link to corsorigin" translate="no">​</a></h5>
<ul>
<li class="">Required added: <code>id</code></li>
<li class="">Required added: <code>origin</code></li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="entitlement"><code>Entitlement</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#entitlement" class="hash-link" aria-label="Direct link to entitlement" title="Direct link to entitlement" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>gracePeriodEndDate</code> (string, date-time) - The USERS grace period end date of this entitlement in UTC time.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="passwordresetsettings"><code>PasswordResetSettings</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#passwordresetsettings" class="hash-link" aria-label="Direct link to passwordresetsettings" title="Direct link to passwordresetsettings" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>id</code> (string) - ID of the password reset settings.</li>
<li class="">Added: <code>namedPasswordId</code> (string) - The ID of the named password.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="smsvoice"><code>SmsVoice</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#smsvoice" class="hash-link" aria-label="Direct link to smsvoice" title="Direct link to smsvoice" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>gracePeriodEndDate</code> (string, date-time) - The date when the grace period for the entitlement will end.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="tenant"><code>Tenant</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#tenant" class="hash-link" aria-label="Direct link to tenant" title="Direct link to tenant" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>otpProviderId</code> (string) - The ID of the preferred OTP provider associated with this tenant, if any. Only visible to root tenant.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userauthenticatorlockoutstatus-1"><code>UserAuthenticatorLockoutStatus</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userauthenticatorlockoutstatus-1" class="hash-link" aria-label="Direct link to userauthenticatorlockoutstatus-1" title="Direct link to userauthenticatorlockoutstatus-1" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>name</code> (string) - The users named password authentication that is locked out.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userentitlement"><code>UserEntitlement</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userentitlement" class="hash-link" aria-label="Direct link to userentitlement" title="Direct link to userentitlement" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>gracePeriodEndDate</code> (string, date-time) - The date when the grace period for the entitlement will end.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="userpassword"><code>UserPassword</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userpassword" class="hash-link" aria-label="Direct link to userpassword" title="Direct link to userpassword" translate="no">​</a></h4>
<ul>
<li class="">Added: <code>id</code> (string) - The ID of the user password.</li>
<li class="">Added: <code>namedPasswordId</code> (string) - The named password associated to the user.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userpasswordparms"><code>UserPasswordParms</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userpasswordparms" class="hash-link" aria-label="Direct link to userpasswordparms" title="Direct link to userpasswordparms" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>namedPasswordId</code> (string) - The ID of the named password.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userpasswordsettings"><code>UserPasswordSettings</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userpasswordsettings" class="hash-link" aria-label="Direct link to userpasswordsettings" title="Direct link to userpasswordsettings" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>namedPasswordEnabled</code> (boolean) - Indicates whether the named password policy is enabled for the user.</li>
<li class="">Added: <code>namedPasswordId</code> (string) - The ID of the named password.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="userpasswordvalidationparms"><code>UserPasswordValidationParms</code><a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#userpasswordvalidationparms" class="hash-link" aria-label="Direct link to userpasswordvalidationparms" title="Direct link to userpasswordvalidationparms" translate="no">​</a></h5>
<ul>
<li class="">Added: <code>namedPasswordId</code> (string) - The ID of the named password.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="notes--migration-guidance-1">Notes &amp; migration guidance<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#notes--migration-guidance-1" class="hash-link" aria-label="Direct link to Notes &amp; migration guidance" title="Direct link to Notes &amp; migration guidance" translate="no">​</a></h4>
<ul>
<li class=""><strong>Named Password Support</strong>: The major theme of this release is support for named passwords. Multiple new properties (<code>namedPasswordId</code>) have been added across authentication flows, password settings, and user password models to enable multi-password scenarios per user. This allows users to have multiple distinct password authenticators with different policies.</li>
<li class=""><strong>New Password Management APIs</strong>: Four new endpoints provide granular password management by password ID, including listing all passwords for a user, deleting specific passwords, managing password expiry notifications, and retrieving password settings per named password.</li>
<li class=""><strong>ActiveSync Deprecation (Breaking)</strong>: All ActiveSync device management endpoints have been removed. Clients using these endpoints must migrate to alternative device management solutions before upgrading.</li>
<li class=""><strong>Service IP Addresses Removal (Breaking)</strong>: The <code>/api/web/v1/serviceipaddresses</code> endpoint has been removed. Clients relying on this endpoint should contact support for alternative approaches to obtaining service IP information.</li>
<li class=""><strong>Grace Period Tracking</strong>: Added <code>gracePeriodEndDate</code> to entitlement-related models (<code>Entitlement</code>, <code>SmsVoice</code>, <code>UserEntitlement</code>) to support grace period functionality for expired entitlements. This allows tenants to continue operating for a limited time after entitlement expiration.</li>
<li class=""><strong>CORS Origin Validation (Breaking)</strong>: The <code>CorsOrigin</code> model now requires both <code>id</code> and <code>origin</code> fields. Ensure all CORS origin configurations include these required fields when creating or updating CORS origins.</li>
<li class=""><strong>OTP Provider Configuration</strong>: Tenants can now specify a preferred OTP provider via the <code>otpProviderId</code> property, providing flexibility in OTP delivery mechanisms.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>On March 15, 2026, support for the following ciphers will be removed.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-esg-deprecation">Enterprise Service Gateway (ESG) Deprecation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#enterprise-service-gateway-esg-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway (ESG) Deprecation" title="Direct link to Enterprise Service Gateway (ESG) Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.45 and the three previous releases 5.42, 5.43, and 5.44). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p><strong>NOTE: In an upcoming release, changes are planned that will break versions of ESG older than 5.33.</strong></p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports the Internet Explorer 11 and Microsoft Edge Legacy browsers. Identity as a Service no longer supports these browsers.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="feature-deprecation">Feature Deprecation<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#feature-deprecation" class="hash-link" aria-label="Direct link to Feature Deprecation" title="Direct link to Feature Deprecation" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="activesync-device-management">ActiveSync Device Management<a href="https://docs.trustedauth.com/blog/2026/idaas-5.45/#activesync-device-management" class="hash-link" aria-label="Direct link to ActiveSync Device Management" title="Direct link to ActiveSync Device Management" translate="no">​</a></h3>
<p>IDaaS provided a feature that allowed IDaaS users to perform secure, multi-factor authentication and manage their Microsoft Office 365 ActiveSync devices. The Office 365 capabilities that IDaaS used to implement these capabilities are no longer supported by Microsoft. This feature was removed from IDaaS in the 5.45 release.</p>]]></content>
        <author>
            <name>Entrust Identity as a Service Team</name>
            <email>support@entrust.com</email>
            <uri>https://www.entrust.com/products/iam/identity-as-a-service</uri>
        </author>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.44.1]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.44.1/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.44.1/"/>
        <updated>2025-12-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Release notes for Entrust Identity as a Service 5.44.1 Patch]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="security-bulletin-e25-012">Security Bulletin E25-012<a href="https://docs.trustedauth.com/blog/2025/5.44.1/#security-bulletin-e25-012" class="hash-link" aria-label="Direct link to Security Bulletin E25-012" title="Direct link to Security Bulletin E25-012" translate="no">​</a></h2>
<p>The documentation for configuring a Microsoft Certificate Authority (CA) with IDaaS has been updated to address issues described in <strong>Security Bulletin E25-012</strong>. Customers who have configured a Microsoft CA should review the security bulletin and apply the recommended actions.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.44.1/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">User Verify fails when token push is used. (41181)</li>
</ol>]]></content>
        <author>
            <name>Entrust Identity as a Service Team</name>
            <email>support@entrust.com</email>
            <uri>https://www.entrust.com/products/iam/identity-as-a-service</uri>
        </author>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.44]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.44/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.44/"/>
        <updated>2025-11-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Release notes for Entrust Identity as a Service release 5.44]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.44/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="idaas-authentication-javascript-sdk">IDaaS Authentication JavaScript SDK<a href="https://docs.trustedauth.com/blog/2025/5.44/#idaas-authentication-javascript-sdk" class="hash-link" aria-label="Direct link to IDaaS Authentication JavaScript SDK" title="Direct link to IDaaS Authentication JavaScript SDK" translate="no">​</a></h3>
<p>A new authentication javascript SDK has been released to facilitate integration of IDaaS authentication into web applications. It wraps hosted OIDC flows, risk-based authentication (RBA) challenges, and “convenience” methods (password, OTP, passkey, soft token, etc.) in a client.</p>
<p>The SDK can be found at <a href="https://github.com/EntrustCorporation/idaas-auth-js" target="_blank" rel="noopener noreferrer" class="">https://github.com/EntrustCorporation/idaas-auth-js</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="sms-otp-message-format">SMS OTP Message Format<a href="https://docs.trustedauth.com/blog/2025/5.44/#sms-otp-message-format" class="hash-link" aria-label="Direct link to SMS OTP Message Format" title="Direct link to SMS OTP Message Format" translate="no">​</a></h3>
<p>IDaaS now includes a new OTP policy setting <code>OTP SMS Format</code>. Administrators can select between two formats for SMS OTP messages:</p>
<ul>
<li class=""><code>Ends with OTP</code> (existing format): OTP appears at the end of the message (for example, Your Entrust Identity as a Service OTP is 01234567).</li>
<li class=""><code>Starts with OTP</code> (new format): OTP appears at the start of the message (for example, 01234567 is your OTP for Entrust Identity as a Service).</li>
</ul>
<p>Users may find having the OTP at the beginning of the message easier to retrieve.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="dashboard-enhancements">Dashboard Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.44/#dashboard-enhancements" class="hash-link" aria-label="Direct link to Dashboard Enhancements" title="Direct link to Dashboard Enhancements" translate="no">​</a></h3>
<p>The Dashboard in the IDaaS Administration Portal has been enhanced. Counts in the Authenticators and Authentication statistics panels are now interactive and allow the administrator to navigate to additional information:</p>
<ul>
<li class=""><code>Authenticators</code>: clicking an entry opens the Members &gt; Users list filtered to users who have that authenticator.</li>
<li class=""><code>Authentications per Application</code>: clicking an application opens the Audit Logs filtered to authentication events for that application.</li>
<li class=""><code>Authentications per Authenticator</code>: clicking an authenticator opens the Audit Logs filtered to authentication events performed with that authenticator.</li>
</ul>
<p>A new <code>Authenticator</code> filter has also been added to the Audit Logs list, enabling administrators to view only authentication events for a specific authenticator.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="face-biometric-enhancements">Face Biometric Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.44/#face-biometric-enhancements" class="hash-link" aria-label="Direct link to Face Biometric Enhancements" title="Direct link to Face Biometric Enhancements" translate="no">​</a></h3>
<p>The following improvements have been made to the IDaaS Face Biometric authenticator:</p>
<ul>
<li class="">The Onfido applicant created during registration is no longer required for authentication. Permanent Onfido profile data is therefore no longer retained.</li>
<li class="">Biometric data collected during registration can now optionally be stored in IDaaS instead of only in the Entrust Identity mobile application. This enables use cases such as account recovery when a user has a new device.</li>
<li class="">A new Face Biometric authenticator (including associated biometric data) can be provisioned through the Administration API. This allows results from an external Onfido verification workflow to be used directly to create an IDaaS Face Biometric authenticator.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="directory-synchronization-enhancements">Directory Synchronization Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.44/#directory-synchronization-enhancements" class="hash-link" aria-label="Direct link to Directory Synchronization Enhancements" title="Direct link to Directory Synchronization Enhancements" translate="no">​</a></h3>
<p>A new option has been added to directory sync configuration allowing a synchronized group to be converted to an "unsynchronized" (local) group instead of being removed from IDaaS. Removing a group also deletes associated policy and resource rules. Converting the group instead preserves those configurations.</p>
<p>When a directory user becomes a local user, all directory groups will be disassociated from the user.</p>
<p>Previously, when the user ID of a user was updated in the directory, the existing IDaaS user ID was stored as an alias of the user. Now, the existing IDaaS user ID is no longer stored as an alias. The following behavior has not changed: if the new user ID was already defined as an alias, it is removed as an alias.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-provider-enhancements">Identity Provider Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.44/#identity-provider-enhancements" class="hash-link" aria-label="Direct link to Identity Provider Enhancements" title="Direct link to Identity Provider Enhancements" translate="no">​</a></h3>
<p>The following improvements have been made to SAML and OIDC identity providers:</p>
<ul>
<li class="">SAML IDPs now support metadata import and export to support easier configuration with third-party systems.</li>
<li class="">A new system authentication flow "Domain-based IDP or User Login" has been added.</li>
<li class="">When configuring IDP authentication in authentication flows, a default IDP can be specified. A single IDP can be defined as the default IDP.</li>
<li class="">IDPs now allow external group names/IDs returned from the IDP to be mapped to IDaaS group names. Previously, values returned from the IDP had to exactly match IDaaS group names. This was an issue for Microsoft Entra ID SAML where only the group object ID was returned to IDaaS.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.44/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Resource rule Save button is enabled when group filter validation fails. (40485)</li>
<li class="">Admin Guide compromised password detection/response missing from documentation. (40482)</li>
<li class="">Admin Guide end user timeout should be max 8 hours rather than 6 as documented. (40481)</li>
<li class="">Admin Guide verify user option - Grid Card and Token Authentication should allow selecting multiple options. (40472)</li>
<li class="">IP list should not allow duplicate IP addresses. (40121)</li>
<li class="">Compromised status filter is missing for the User and the Admin portal authenticators page. (40332)</li>
<li class="">Default for authentication provisioning settings has been changed so that by default a password and soft token are not created for a new user. (40427)</li>
<li class="">Duplicate audits for verify user using Email OTP. Audits created in both Authentication and Management categories. (40720)</li>
<li class="">Improved audit message for OIDC error. Replaced message that included JsonSyntaxException. (40552)</li>
<li class="">Face Biometric expiry date update audit missing seconds in timestamp format. (37755)</li>
<li class="">Field validation error for Entrust Soft Token Settings 'Activation Lifetime' has no upper limit. (25884)</li>
<li class="">Remove the application customization tab for OIDC server application types. (40696)</li>
<li class="">Helpdesk role should have magic link content view permission. (40091)</li>
<li class="">MagicLink authenticator does not set ACR or AMR values. (40398)</li>
<li class="">OIDC re-authentication triggers a loop if user becomes disabled. (40329)</li>
<li class="">Pass-through authenticator should be present as an option for user login second-factor but not IDP second-factor. (40459)</li>
<li class="">Push notification not delivered to iOS devices when Production Mode is enabled in IDaaS Soft Token SDK Credentials. (40403)</li>
<li class="">Resource rule risk condition date/time update makes the value and label overlap. (40537)</li>
<li class="">Remove all access restrictions on Syria. (40726)</li>
<li class="">SCIM Server Endpoint field should be editable on the Configuration page. (40504)</li>
<li class="">Communication with a SCIM server now has a timeout of 10 seconds. Previously the timeout was 30 seconds. (40792)</li>
<li class="">SCIM provisioning failed for SCIM servers that returned externalId values larger than a 32 character UUID. (40723)</li>
<li class="">Verify user missing authenticator dialog. (40531)<!-- -->
<!-- -->
</li>
<li class="">Spelling errors in IDaaS. "On-premise" should be "On-premises", "Dekstop" should be "Desktop", "Strengh" should be "Strength". (40608)</li>
<li class="">Update SAML application audit should not show encryptionCertificate attribute if it did not change. (36694)</li>
<li class="">User Guide Magic link authentication step missing update for confirmation requirement. (40019)</li>
<li class="">Improved error message if Entrust Soft Token activation fails because the user requires a mobile Face Biometric. (40228, 40229)</li>
<li class="">Improved text for Verify user audit message. (40521)</li>
<li class="">Copy button next to Application ID not properly labeled for screen readers in Edit Administration API screen. (39734)</li>
<li class="">Improved descriptions for IDaaS ISAPI, AD FS, and Desktop applications. (40766)</li>
<li class="">Verify user using OTP voice audit message incorrectly says SMS. (40569)</li>
<li class="">User verify result should be "successfully verified" instead of "successfully authenticated". (40492)</li>
<li class="">Several issues with importing SAML metadata have been fixed. (40624)</li>
<li class="">Documentation describing how to configure IDaaS SCIM Provisioning for GitHub has been added. (40486)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-idaas-apis">Changes to Identity as a Service (IDaaS) APIs<a href="https://docs.trustedauth.com/blog/2025/5.44/#changes-to-identity-as-a-service-idaas-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service (IDaaS) APIs" title="Direct link to Changes to Identity as a Service (IDaaS) APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.44/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to models in the Authentication API:</p>
<ul>
<li class="">The attribute <code>rpId</code> has been added to <code>UserAuthenticateParameters</code> and <code>UserAuthenticateQueryParameters</code>. This attribute specifies the Relying Party ID of Passkey/FIDO2 tokens to be considered for authentication. If a value is not provided, Passkey/FIDO2 tokens with the Relying Party ID of the IDaaS account hostname are considered. This attribute replaces the existing attribute <code>origin</code> which has been marked as deprecated. A similar change was made to the model <code>UserChallengeParameters</code> in a previous release.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.44/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following methods have been added to the Administration API:</p>
<ul>
<li class=""><code>POST /api/web/v1/identityproviders/saml/configuration (fetchSamlConfigurationUsingPOST)</code>. Fetch configuration from a third-party SAML identity provider that can be imported into IDaaS.</li>
<li class=""><code>GET /api/web/v1/identityproviders/saml/{id}/configuration (getSamlConfigurationUsingGET)</code>. Get SAML configuration from IDaaS that can be exported to a third-party SAML identity provider.</li>
</ul>
<p>The following changes have been made to existing methods in the Administration API:</p>
<ul>
<li class=""><code>POST /api/web/v2/reports/auditeventspaged (auditEventPageUsingPOST)</code> - A new search attribute <code>authenticator</code> is supported in the <code>searchByAttributes</code> parameter. This search attribute filters authentication audits by authenticator type (for example, PASSWORD, OTP, TOKEN, FIDO, SMARTCREDENTIALPUSH, TOKENPUSH, IDP, PASSKEY, etc.). The only allowed operator is <code>EQUALS</code>.</li>
</ul>
<p>The following models have been added to the Administration API:</p>
<ul>
<li class=""><code>FaceEncryptedToken</code> - Represents an encrypted biometric token that can be specified when creating a Face Biometric authenticator.</li>
<li class=""><code>IdentityProviderExternalGroupMapping</code> - Represents a mapping between an external group name/ID returned from the IDP and an IDaaS group name. This model can be provided as input when creating or modifying an OIDC or SAML identity provider and is returned when fetching identity provider details.</li>
<li class=""><code>SamlConfigurationParms</code> - The parameters passed to <code>fetchSamlConfigurationUsingPOST</code> specifying the metadata URL of the third-party IDP from which to fetch configuration.</li>
<li class=""><code>SamlConfigurationResponse</code> - The response returned from <code>fetchSamlConfigurationUsingPOST</code> containing the SAML configuration details.</li>
<li class=""><code>SamlInfoClaim</code> - Represents a SAML claim included in <code>SamlConfigurationResponse</code>.</li>
</ul>
<p>The following changes have been made to existing models in the Administration API:</p>
<ul>
<li class="">The attribute <code>otpSMSFormat</code> has been added to <code>OTPAuthenticatorSettings</code>. This setting specifies the format used for OTP SMS messages.</li>
<li class="">The attribute <code>idpDefault</code> has been added to <code>AuthenticationFlow</code> and <code>AuthenticationFlowParms</code>. This attribute indicates if the Authentication Flow uses the default IDP for IDP authentication.</li>
<li class="">The attribute <code>defaultProvider</code> has been added to <code>IdentityProvider</code>, <code>OidcIdentityProvider</code>, <code>OidcIdentityProviderParms</code>, <code>SamlIdentityProvider</code> and <code>SamlIdentityProviderParms</code>. This attribute indicates if the Identity Provider is the default provider for IDP authentication.</li>
<li class="">The attribute <code>externalGroupMappings</code> has been added to <code>OidcIdentityProvider</code>, <code>OidcIdentityProviderParms</code>, <code>SamlIdentityProvider</code>, and <code>SamlIdentityProviderParms</code>. This attribute contains mappings between external group names/IDs returned from the IDP and IDaaS group names.</li>
<li class="">The attribute <code>groupDesyncPolicy</code> has been added to <code>DirectorySync</code>. This setting indicates whether groups should be removed or converted to local groups when desynchronized.</li>
<li class="">The attribute <code>directoryDesynced</code> has been added to <code>Group</code>. This attribute indicates if this group was converted from a synchronized group to a local group.</li>
<li class="">The attribute <code>encryptedBiometricToken</code> has been added to <code>FaceCreateParms</code>. This attribute allows an encrypted biometric token created externally to be associated with a Face Biometric authenticator.</li>
<li class="">The default value for the setting <code>authenticatorActivationType</code> in <code>GeneralSettings</code> has been changed from <code>ENTRUST_SOFT_TOKEN</code> to <code>NONE</code>. This means that by default tokens are not created for new users.</li>
<li class="">The default value for the setting <code>defaultPassword</code> in <code>GeneralSettings</code> has been changed from <code>true</code> to <code>false</code>. This means that by default a password is not created for new users.</li>
<li class="">The deprecated attribute <code>registrationPeriod</code> has been removed from <code>GeneralSettings</code>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.44/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.44/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.44 and the three previous releases 5.41, 5.42, and 5.43). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p><strong>NOTE: In an upcoming release, changes are planned that will break versions of ESG older than 5.33.</strong></p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.44/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports the Internet Explorer 11 and Microsoft Edge Legacy browsers. Identity as a Service no longer supports these browsers.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="feature-deprecation">Feature Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.44/#feature-deprecation" class="hash-link" aria-label="Direct link to Feature Deprecation" title="Direct link to Feature Deprecation" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="activesync-device-management">ActiveSync Device Management<a href="https://docs.trustedauth.com/blog/2025/5.44/#activesync-device-management" class="hash-link" aria-label="Direct link to ActiveSync Device Management" title="Direct link to ActiveSync Device Management" translate="no">​</a></h3>
<p>IDaaS provided a feature that allowed IDaaS users to perform secure, multi-factor authentication and manage their Microsoft Office 365 ActiveSync devices. The Office 365 capabilities that IDaaS used to implement these capabilities are no longer supported by Microsoft. This feature will be removed from IDaaS in the 5.45 release.</p>]]></content>
        <author>
            <name>Entrust Identity as a Service Team</name>
            <email>support@entrust.com</email>
            <uri>https://www.entrust.com/products/iam/identity-as-a-service</uri>
        </author>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.43]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.43/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.43/"/>
        <updated>2025-09-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Release notes for Entrust Identity as a Service release 5.43]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.43/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="compromised-password-detection-enhancements">Compromised Password Detection Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#compromised-password-detection-enhancements" class="hash-link" aria-label="Direct link to Compromised Password Detection Enhancements" title="Direct link to Compromised Password Detection Enhancements" translate="no">​</a></h3>
<p>In a previous release, IDaaS added the ability to block new passwords found in a list of known compromised passwords during password change and reset. In this release, IDaaS has been enhanced to support checking existing passwords when they are used to authenticate. If a compromised password is detected during authentication, an audit event is generated, and the password is flagged as compromised. Options exist to force the user to change their password or to deny them access. IDaaS administrators can query users that have a compromised password. Checking existing passwords during authentication reduces the time newly compromised passwords can be attacked.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-user-verify-action-in-administration-portal">New User Verify Action in Administration Portal<a href="https://docs.trustedauth.com/blog/2025/5.43/#new-user-verify-action-in-administration-portal" class="hash-link" aria-label="Direct link to New User Verify Action in Administration Portal" title="Direct link to New User Verify Action in Administration Portal" translate="no">​</a></h3>
<p>A new User Verify action has been added to Users in the User List in the Administration Portal. This action allows a help desk administrator to verify users calling a help desk by challenging them to provide a response to TOKEN PUSH, TOKEN, GRID, or OTP challenges. This feature assists help desk administrators to prevent a common account takeover attack where the attacker tries to get the help desk to give them access to an account.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="push-notification-actionable-notifications">Push Notification Actionable Notifications<a href="https://docs.trustedauth.com/blog/2025/5.43/#push-notification-actionable-notifications" class="hash-link" aria-label="Direct link to Push Notification Actionable Notifications" title="Direct link to Push Notification Actionable Notifications" translate="no">​</a></h3>
<p>The upcoming 5.25.0 release of the Entrust Identity Mobile Application will support completing push authentication transactions from the notification without needing to open the application.</p>
<p>This release of IDaaS includes the changes to support this feature, including a new Soft Token policy setting to enable the feature. This feature is only available when Soft Tokens are configured to not require a PIN.</p>
<p>When this feature is enabled, end users using an older version of the Entrust Identity Mobile Application will continue to have to open the application to complete the transaction. There is a known issue with older versions of the iOS application where the application will not launch in this situation. To resolve this issue, either have end users upgrade to the new version of the mobile application or disable the actionable notifications feature.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="resource-server-enhancements">Resource Server Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#resource-server-enhancements" class="hash-link" aria-label="Direct link to Resource Server Enhancements" title="Direct link to Resource Server Enhancements" translate="no">​</a></h3>
<p>In IDaaS, a Resource Server defines how access and refresh tokens are issued by IDaaS for authorization purposes after authenticating to specified OIDC applications. The Resource Server also defines the contents and processing of these tokens.</p>
<p>A new Resource Server tab has been added to OIDC Applications in the Administration Portal. This tab allows administrators to manage the Resource Servers associated with the application in the same place the application is defined.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="system-for-cross-domain-identity-management-scim-enhancements">System for Cross-Domain Identity Management (SCIM) Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#system-for-cross-domain-identity-management-scim-enhancements" class="hash-link" aria-label="Direct link to System for Cross-Domain Identity Management (SCIM) Enhancements" title="Direct link to System for Cross-Domain Identity Management (SCIM) Enhancements" translate="no">​</a></h3>
<p>IDaaS supports using SCIM to allow clients to provision groups and users to IDaaS (inbound provisioning) and to provision users from IDaaS to other services (outbound provisioning). The following changes have been made to enhance existing SCIM capabilities provided by IDaaS:</p>
<ul>
<li class="">Improved how the configuration for outbound provisioning is tested to improve interoperability with 3rd-party SCIM services.</li>
<li class="">Added support for the SCIM endpoints <code>/Schemas</code> and <code>/ResourceTypes</code> for inbound provisioning requests received from clients.</li>
<li class="">Improved logging for SCIM outbound provisioning for better traceability and debugging.</li>
<li class="">Added additional SCIM attributes to support a wider range of SCIM services.</li>
<li class="">Outbound provisioning from IDaaS has been tested with GitHub and AWS.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="login-session-enhancements">Login Session Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#login-session-enhancements" class="hash-link" aria-label="Direct link to Login Session Enhancements" title="Direct link to Login Session Enhancements" translate="no">​</a></h3>
<p>When a user logs in to authenticate to the portal, SAML or OIDC applications, a login session is maintained to track when the user authenticated and what authenticators they used. The user will not need to re-authenticate when accessing an application if the following conditions are true:</p>
<ul>
<li class="">The login session has not expired.</li>
<li class="">The reauthentication time specified for the application has not been exceeded.</li>
<li class="">The application has single sign-on (SSO) enabled.</li>
<li class="">The user has previously authenticated with the authenticators required by the application's resource rule.</li>
</ul>
<p>The following enhancements have been made to login sessions:</p>
<ul>
<li class="">The maximum login session lifetime defined by the General Policy "Standard User Authentication Session Idle Timeout" has been increased from 1 hour to 8 hours. This setting was previously named "Authentication Session Lifetime".</li>
<li class="">A separate maximum login session lifetime for Administrators defined by the General Policy "Admin User Authentication Session Idle Timeout" has been added. It allows a customer to define a different login session lifetime for IDaaS administrators. It has a maximum lifetime of 1 hour.</li>
<li class="">The maximum age setting for SAML and OIDC applications has been relabeled to "Reauthentication Time (Max Authentication Age)".</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="resource-rule-enhancements">Resource Rule Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#resource-rule-enhancements" class="hash-link" aria-label="Direct link to Resource Rule Enhancements" title="Direct link to Resource Rule Enhancements" translate="no">​</a></h3>
<p>The following changes have been made to the Resource Rule UI in the Administration Portal:</p>
<ul>
<li class="">The Cancel and Save buttons for the resource rule have been moved to the top of the page and are always visible.</li>
<li class="">The option to revert to the old UI has been removed.</li>
<li class="">Leaving the page with unsaved changes requires confirmation.</li>
<li class="">The Access and Deny tasks now have descriptions describing their purpose.</li>
<li class="">Improvements to connecting nodes by clicking on the connection points.</li>
<li class="">When selecting the Add button on a link, multiple access filters are added in parallel instead of sequentially.</li>
<li class="">The Date/Time risk context is created with a default value of the next day.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="allow-idaas-groups-to-be-assigned-to-users-synchronized-from-a-directory">Allow IDaaS Groups to be Assigned to Users Synchronized from a Directory<a href="https://docs.trustedauth.com/blog/2025/5.43/#allow-idaas-groups-to-be-assigned-to-users-synchronized-from-a-directory" class="hash-link" aria-label="Direct link to Allow IDaaS Groups to be Assigned to Users Synchronized from a Directory" title="Direct link to Allow IDaaS Groups to be Assigned to Users Synchronized from a Directory" translate="no">​</a></h3>
<p>Previously, users synchronized from a directory could only be assigned to groups synchronized from a directory. Now, users synchronized from a directory can also be assigned to groups defined in IDaaS. This gives IDaaS administrators the flexibility to assign all users to IDaaS groups without needing to change group membership in the directory. In IDaaS, group membership can be used to allow access to applications and to specify the policy that is used for users.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="passkey-developer-documentation">Passkey Developer Documentation<a href="https://docs.trustedauth.com/blog/2025/5.43/#passkey-developer-documentation" class="hash-link" aria-label="Direct link to Passkey Developer Documentation" title="Direct link to Passkey Developer Documentation" translate="no">​</a></h3>
<p>The Passkey Developer Documentation available in the IDaaS Developer Portal has been enhanced.</p>
<ul>
<li class="">A new document describing how to add IDaaS Passkey authentication to web applications has been added.</li>
<li class="">The existing document describing how to add IDaaS Passkey authentication to mobile applications has been updated.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-identityguard-agent-enhancements">Enterprise Service Gateway IdentityGuard Agent Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.43/#enterprise-service-gateway-identityguard-agent-enhancements" class="hash-link" aria-label="Direct link to Enterprise Service Gateway IdentityGuard Agent Enhancements" title="Direct link to Enterprise Service Gateway IdentityGuard Agent Enhancements" translate="no">​</a></h3>
<p>The IdentityGuard Agent has been enhanced to support the V12 version of Identity Enterprise Authentication API. This means clients using the latest version of the Identity Enterprise API can now migrate to IDaaS using the IdentityGuard agent.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.43/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Operations in the IDaaS Administration Portal may fail due to rate limiting for accounts (including trial accounts) that have small rate limits. The portal will now delay and retry the requests when it is rate limited. (40223)</li>
<li class="">Certificate expiry dates for SAML Identity Providers not formatted consistently. (38095)</li>
<li class="">In the Administration Portal, an administrator with only the view group permission should be able to view the details of a group. (38827)</li>
<li class="">Resetting a user's AD password from the Administration Portal was audited as an unlock operation. (39769)</li>
<li class="">A successful password reset performed from the User Portal did not display a success message. Additionally, error messages are now displayed consistently under the New Password entry field. (38778)</li>
<li class="">Improved error message "The mutual challenge size is greater than the number of possible challenge strings" when Entrust Soft Token mutual challenge policy is invalid. (38402)</li>
<li class="">Some documentation links in the Administration Portal were referencing the Entrust Soft Token documentation instead of general token documentation that includes Google Authenticator and other tokens. (38856)</li>
<li class="">The state attribute configuration for LDAP directories was not being processed correctly resulting in all users being synchronized as ACTIVE. (40072)</li>
<li class="">The Magic Link entry in a user's authenticator list shown in the Administration Portal is now not shown if the user does not have the MAGICLINK view permission. (40283)</li>
<li class="">The entry "Entrust Legacy Token" appearing in the policy, token and user profile pages, has been renamed to "Legacy Token". (40119)</li>
<li class="">The resource rule page no longer shows the Device Verification risk context for accounts with the Plus bundle, which does not support Device Verification. (40068)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-idaas-apis">Changes to Identity as a Service (IDaaS) APIs<a href="https://docs.trustedauth.com/blog/2025/5.43/#changes-to-identity-as-a-service-idaas-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service (IDaaS) APIs" title="Direct link to Changes to Identity as a Service (IDaaS) APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.43/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to models in the Authentication API:</p>
<ul>
<li class="">The attribute <code>serialNumbers</code> has been removed from <code>GridChallenge</code>. The same information is available in the attribute <code>gridInfo</code>.</li>
<li class="">The attribute <code>timeoutMillis</code> has been added to <code>FIDOChallenge</code> and <code>FIDORegisterChallenge</code>. This setting specifies the FIDO timeout in milliseconds. It replaces the attribute <code>timeout</code> which has been deprecated.</li>
<li class="">The attribute <code>userIdStored</code> in <code>FIDORegisterResponse</code> has been deprecated.</li>
<li class="">The attribute <code>rpId</code> has been added to<code>UserChallengeParameters</code>. This setting specifies the Relying Party ID of FIDO tokens that should be considered when requesting a FIDO challenge. This setting replaces the attribute <code>origin</code> which has been deprecated.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.43/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following changes have been made to models in the Administration API:</p>
<ul>
<li class="">The attribute <code>allowActionableNotifications</code> has been added to <code>EntrustSTAuthenticatorSettings</code>. This setting indicates whether the new push authentication actionable notifications feature is enabled.</li>
<li class="">The attribute <code>timeoutMillis</code> has been added to <code>FIDORegisterChallenge</code>. This setting specifies the FIDO registration timeout in milliseconds. It replaces the attribute <code>timeout</code> which has been deprecated.</li>
<li class="">The attribute <code>userIdStored</code> in <code>FIDORegisterResponse</code> has been deprecated.</li>
<li class="">The attribute <code>adminUserAuthenticationSessionLifetime</code> has been added to <code>GeneralSettings</code>. This setting specifies the login session lifetime when an IDaaS administrator authenticates.</li>
<li class="">The attribute <code>compromised</code> has been added to <code>UserPassword</code>. This setting indicates whether the user's password has been detected as compromised.</li>
<li class="">The attribute <code>lastCompromisedCheckTime</code> has been added to <code>UserPassword</code>. This setting indicates the last time the user's password was checked against a list of known compromised passwords.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.43/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.43/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.43 and the three previous releases 5.40, 5.41, and 5.42). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p><strong>NOTE: In an upcoming release, changes are planned that will break versions of ESG older than 5.33.</strong></p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="entrust-identity-and-entrust-windows-desktop-soft-token-deprecation">Entrust Identity and Entrust Windows Desktop Soft Token Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.43/#entrust-identity-and-entrust-windows-desktop-soft-token-deprecation" class="hash-link" aria-label="Direct link to Entrust Identity and Entrust Windows Desktop Soft Token Deprecation" title="Direct link to Entrust Identity and Entrust Windows Desktop Soft Token Deprecation" translate="no">​</a></h2>
<p><strong>In the IDaaS 5.43 release, changes have been made that break the following operations:</strong></p>
<ul>
<li class="">Password reset in versions of Entrust Identity prior to 25.1.1. Customers using the SDKs are not impacted.</li>
<li class="">Soft Token online activation in versions of Entrust Windows Desktop Soft Token prior to 3.1.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.43/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <author>
            <name>Entrust Identity as a Service Team</name>
            <email>support@entrust.com</email>
            <uri>https://www.entrust.com/products/iam/identity-as-a-service</uri>
        </author>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.42]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.42/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.42/"/>
        <updated>2025-07-31T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.42/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="applicationresource-rule-enhancements">Application/Resource Rule Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.42/#applicationresource-rule-enhancements" class="hash-link" aria-label="Direct link to Application/Resource Rule Enhancements" title="Direct link to Application/Resource Rule Enhancements" translate="no">​</a></h3>
<p>The Application and Resource Rule pages in the Administration Portal have been redesigned to improve usability and enhance functionality. Changes include:</p>
<ul>
<li class="">The Application pages have been redesigned to include both the application configuration and resource rules. This means that the application and associated resource rules can be managed from the same page.</li>
<li class="">The Resource Rules page has been redesigned to use a new easy-to-use graphical editor. In this release, an option to switch to the old UI is provided but this will be removed in an upcoming release.</li>
<li class="">The graphical resource rule editor includes a test option to simulate the resource rule for different risk results.</li>
<li class="">When editing a resource rule, settings like Authentication Flows and Transaction Details can be managed from the resource rule page. For example, Authentication Flows can be created or modified from the Resource Rule UI.</li>
<li class="">A resource rule now has Access Filters that determine if a user can authenticate to an application using this resource rule. Supported Access Filters include: - Groups – a user can authenticate using this resource rule if they are a member of specified groups. - Authentication Context Reference – a user can authenticate using this resource rule if the authentication request from the client contains a specified authentication context reference value. This feature allows the client to influence how the user is authenticated. This is a new capability in this release. - Domain-based IDP – a user can authenticate using this resource rule if they belong to a specified Domain-based IDP. This is a new capability in this release.</li>
<li class="">The Application List page now includes search and filter capabilities to target which applications are shown.</li>
<li class="">The Application Create page has been redesigned to show all application templates. Search and filter capabilities are available to target which application templates are shown.</li>
<li class="">The Authorization Server page and corresponding menu have been renamed to Resource Server.</li>
<li class="">Many improvements have been made to the Application configuration pages, including: - The settings have been ordered to improve usability. - The settings now include more detailed descriptions. - Settings like the SAML Signing Certificate for SAML applications and the Gateway for RADIUS applications include an option to create a new Signing Certificate or Gateway. - Less frequently used settings have been moved to an advanced section of the page.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enhanced-registration-configuration">Enhanced Registration Configuration<a href="https://docs.trustedauth.com/blog/2025/5.42/#enhanced-registration-configuration" class="hash-link" aria-label="Direct link to Enhanced Registration Configuration" title="Direct link to Enhanced Registration Configuration" translate="no">​</a></h3>
<p>When configuring registration, an administrator can now specify the "Minimum Number of Second-factor Authenticators". This setting specifies the minimum number of authenticators the user must register. As an example, suppose an administrator wants their end users to register at least two of the authenticators, Entrust Soft Token, Passkey/FIDO2 or Face Biometric but wants the end user to decide which authenticators to register. This can be achieved by configuring these three authenticators as Optional during registration and then setting the Minimum Number of Second-factor Authenticators to 2.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enhanced-otp-delivery-configuration">Enhanced OTP Delivery Configuration<a href="https://docs.trustedauth.com/blog/2025/5.42/#enhanced-otp-delivery-configuration" class="hash-link" aria-label="Direct link to Enhanced OTP Delivery Configuration" title="Direct link to Enhanced OTP Delivery Configuration" translate="no">​</a></h3>
<p>When OTP authentication is enabled in an authentication flow in a resource rule, the allowed delivery types can be configured overriding the delivery types configured in the policy. This allows an administrator to configure different delivery types for different applications. For example, use Email delivery for one application and SMS delivery for another application.</p>
<p>Configuration to specify which delivery types are enabled and the default order of the delivery types is now set together instead of separate settings. This improves usability. The new UI is used in both the OTP policy and per application authentication flows.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-administrator-password-management-for-directory-managed-passwords">Support Administrator Password Management for Directory Managed Passwords<a href="https://docs.trustedauth.com/blog/2025/5.42/#support-administrator-password-management-for-directory-managed-passwords" class="hash-link" aria-label="Direct link to Support Administrator Password Management for Directory Managed Passwords" title="Direct link to Support Administrator Password Management for Directory Managed Passwords" translate="no">​</a></h3>
<p>Administrators can now perform password reset and set passwords to require change on next use for users who have directory-managed passwords.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="allow-users-to-specify-authenticator-order">Allow Users to Specify Authenticator Order<a href="https://docs.trustedauth.com/blog/2025/5.42/#allow-users-to-specify-authenticator-order" class="hash-link" aria-label="Direct link to Allow Users to Specify Authenticator Order" title="Direct link to Allow Users to Specify Authenticator Order" translate="no">​</a></h3>
<p>End users now have the option to specify their default authenticator order. This setting allows the end user to have a default authenticator that is different from the default specified in the resource rule. For example, suppose the resource rule lists authenticators in the order TOKENPUSH, TOKEN, FIDO. If the user has an Entrust Soft Token, they will always default to TOKENPUSH and if they want to use FIDO they will need to select an alternative authenticator. Allowing the end user to select their own authenticator order allows the end user to specify FIDO as their default authenticator. Now when the user authenticates, they will default to FIDO authentication.</p>
<p>Only authenticators allowed in the resource rule are used for authentication. The new setting only allows the end user to select a different order of allowed authenticators.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="magic-link-enhancements">Magic Link Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.42/#magic-link-enhancements" class="hash-link" aria-label="Direct link to Magic Link Enhancements" title="Direct link to Magic Link Enhancements" translate="no">​</a></h3>
<p>The following Magic Link enhancements have been made:</p>
<ul>
<li class="">Magic Link is now supported as an authenticator for Portal, OIDC, SAML, and Authentication API applications.</li>
<li class="">Magic Link now supports Password Reset in addition to Registration.</li>
</ul>
<p>The user experience of a Magic Link authentication is the following:</p>
<ul>
<li class="">The user begins authentication from their client. The client waits for authentication to complete.</li>
<li class="">An email containing a Magic Link is sent to the end user.</li>
<li class="">The end user clicks on the Magic Link in their email.</li>
<li class="">The client completes authentication.</li>
</ul>
<p>As part of these changes, the Magic Link policy page was moved from the Registration menu to the Authenticators menu.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="native-mobile-passkey-support">Native Mobile Passkey Support<a href="https://docs.trustedauth.com/blog/2025/5.42/#native-mobile-passkey-support" class="hash-link" aria-label="Direct link to Native Mobile Passkey Support" title="Direct link to Native Mobile Passkey Support" translate="no">​</a></h3>
<p>IDaaS has been enhanced to support Passkey tokens implemented in mobile applications using Android and iOS Passkey SDKs. The Allowed Relying Party ID Hostnames configured in IDaaS Passkey/FIDO2 settings now supports mobile application values.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="improved-web-content-accessibility-guidelines-wcag-compliance">Improved Web Content Accessibility Guidelines (WCAG) Compliance<a href="https://docs.trustedauth.com/blog/2025/5.42/#improved-web-content-accessibility-guidelines-wcag-compliance" class="hash-link" aria-label="Direct link to Improved Web Content Accessibility Guidelines (WCAG) Compliance" title="Direct link to Improved Web Content Accessibility Guidelines (WCAG) Compliance" translate="no">​</a></h3>
<p>Changes have been made to the IDaaS User Portal and the login pages to improve compliance with WCAG 2.2 at the AA level.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-import-of-passwords-from-entrust-getaccess">Support Import of Passwords from Entrust GetAccess<a href="https://docs.trustedauth.com/blog/2025/5.42/#support-import-of-passwords-from-entrust-getaccess" class="hash-link" aria-label="Direct link to Support Import of Passwords from Entrust GetAccess" title="Direct link to Support Import of Passwords from Entrust GetAccess" translate="no">​</a></h3>
<p>Enhancements have been made to the IDaaS password APIs to support importing passwords from Entrust GetAccess.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administrationuser-portal-enhancements">Administration/User Portal Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.42/#administrationuser-portal-enhancements" class="hash-link" aria-label="Direct link to Administration/User Portal Enhancements" title="Direct link to Administration/User Portal Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to the Administration and User Portal UI:</p>
<ul>
<li class="">An option to Show/Hide the authentication response has been added to the Login UI response fields for all the authenticators.</li>
<li class="">Leading and trailing whitespace is now trimmed from OTP responses in the Login UI. This addresses issues encountered when copying and pasting values from Emails or SMS messages.</li>
<li class="">Vertical tabs in pages in the administration portal are now left justified and sorted alphabetically. The following pages were changed: - Security -&gt; Resource Servers - Resources -&gt; Certificate Authorities - Configuration -&gt; Knowledge-based Authentications - Policies -&gt; Registration - Policies -&gt; Authenticators - Policies -&gt; Risk-based Authentications - Policies -&gt; Soft Token SDK - Policies -&gt; User Portal Portal</li>
<li class="">The administration portal menu search now supports keywords. For example, both otp and one time password will find the OTP settings page.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.42/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">The maximum length of a SCIM API key has been changed from 500 characters to 2000 characters. (39341)</li>
<li class="">The IDaaS JWT grant type now supports ACR values. (38918)</li>
<li class="">Updating a RADIUS application fails if the shared secret was not updated. (35469)</li>
<li class="">Improve error message displayed for an invalid phone number entered when editing delivery contact. (37328)</li>
<li class="">Include IP location information in push notifications sent for IDaaS authentication API applications including integrations like Entrust Desktop Credential Provider. (37677)</li>
<li class="">Selecting an External Risk Engine in a resource rule is not saved. (37930)</li>
<li class="">Deleting a claim value from an OIDC application returns success even though the claim is not deleted. (38430)</li>
<li class="">Updating Passkey/FIDO2 registration level setting with an invalid value causes HTTP 500 error. (38735)</li>
<li class="">Updating Passkey/FIDO2 settings with an invalid hostname value should not be allowed. (38736)</li>
<li class="">Remove semicolon appearing on Entrust Soft Token SDK settings page. (38807)</li>
<li class="">API to update Organization does not support removing description value. (38857)</li>
<li class="">Administration role value selected by group policy is displayed with non-English locale. (38895)</li>
<li class="">Improved documentation of required Entra ID Read/Write permissions. (38995)</li>
<li class="">The org_id claim is not returned when using the OIDC JWT IDaaS grant type. (39008)</li>
<li class="">OIDC Regenerate Client Secret dialog shows Shared Secret instead of Client Secret. (37274)</li>
<li class="">Failed Passkey authentication is not generating an audit. (39164)</li>
<li class="">OIDC Pre-authorized Code grant type should only be shown for OIDC4VC applications. (39260)</li>
<li class="">When a managed tenant of a service provider is deleted, the associated Identity Provider application should be removed. (39274)</li>
<li class="">Device verification fails in some scenarios when the JWT is expired. (39385)</li>
<li class="">Support deflate encoding for SAML requests. (39501)</li>
<li class="">The subject of a Service Provider IDP login audit should not be clickable. (39563)</li>
<li class="">The resource name of a Service Provider IDP login audit should be Admin Portal not User Portal. (39588)</li>
<li class="">IDaaS now rejects requests with an Origin value of null. (39607, 39614)</li>
<li class="">The ACS and Logout URL hostnames of a SAML IDP are now added to the SAML CORs list. (39678)</li>
<li class="">Refresh of tenant list in Service Provider portal generates browser console error. (38869)</li>
<li class="">Header value returned in API rate limiting error contains value in milliseconds instead of seconds. (39960)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-idaas-apis">Changes to Identity as a Service (IDaaS) APIs<a href="https://docs.trustedauth.com/blog/2025/5.42/#changes-to-identity-as-a-service-idaas-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service (IDaaS) APIs" title="Direct link to Changes to Identity as a Service (IDaaS) APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.42/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to support Magic Link as a new authenticator in the Authentication API.</p>
<ul>
<li class="">The value <code>MAGICLINK</code> can be specified where ever an authenticator type is specified.</li>
<li class="">The field <code>magicLinkType</code> has been added to the model <code>AuthenticatedResponse</code> returned from the challenge and authenticate APIs. It specifies the type of Magic Link being used for authentication.</li>
</ul>
<p>The following changes have been made to existing models in the Authentication API:</p>
<ul>
<li class="">The field <code>requestAcrs</code> has been added to <code>UserAuthenticateParameters</code>, <code>UserAuthenticateQueryParameters</code>, and <code>UserChallengeParameters</code>. This field allows an application to pass an ACR value to IDaaS that will be used when evaluating the ACR access filter of a resource rule.</li>
<li class="">The field <code>authRequestKey</code> has been added to <code>UserChallengeParameters</code>. This field allows the request key of an authentication request using the IDaaS JWT grant type. This allows authorization request parameters, such as the requested ACR, to be used when processing authentication challenge.</li>
<li class="">The field <code>origin</code> has been added to <code>UserAuthenticateParameters</code>. This value allows the client to specify the origin when performing Passkey/FIDO2 authentication which allows IDaaS to select the appropriate Passkey/FIDO2 tokens for authentication.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.42/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following changes were made to the Administration API to manage Magic Links.</p>
<ul>
<li class="">The method <code>GET  /api/web/v1/users/{userid}/magiclink (getMagicLinkUsingGET)</code> has been added. This method returns the Magic Link for the specified user if one has been created.</li>
<li class="">The model <code>MagicLink</code> has been added. It contains information about an outstanding Magic Link.</li>
<li class="">the field <code>type</code> has been added to the model <code>MagicLinkCreateParms</code>. Since different types of Magic Links can be created, this field specifies the type of Magic Link being created.</li>
<li class="">The value <code>MAGICLINK</code> has been added to the list of second-factor authenticators and is included where ever it is specified such as the list of second-factor authenticators specified in an Authentication Flow.</li>
</ul>
<p>The following changes were made to the Administration API to manage ACR values. An ACR object defines an Authentication Context Resource value that can be defined as an access filter in a resource rule.</p>
<ul>
<li class="">The method <code>GET /api/web/v1/acrs (getAcrsUsingGET)</code> was added. This method returns all defined ACRs.</li>
<li class="">The method <code>POST /api/web/v1/acrs (createAcrUsingPOST)</code> was added. This method creates an ACR.</li>
<li class="">The method <code>GET /api/web/v1/acrs/{id} (getAcrUsingGET)</code> was added. This method returns a specific ACR.</li>
<li class="">The method <code>DELETE /api/web/v1/acrs/{id} (removeAcrUsingDELETE)</code> was added. This method removes a specific ACR.</li>
<li class="">The model <code>Acr</code> was added. This model includes information about an ACR returned from IDaaS.</li>
<li class="">The model <code>AcrParms</code> was added. This model includes information about an ACR passed to IDaaS when creating one.</li>
<li class="">The field <code>acrFilter</code> was added to the models <code>ResourceRule</code> and <code>ResourceRuleParms</code>. It specifies if the ACR filter is enabled and if so which ACRs it matches.</li>
<li class="">The field <code>acrs</code> was added to the models <code>ResourceRule</code> and <code>ResourceRuleParms</code>. If applicable it specifies the list of ACRs the ACR filter matches.</li>
<li class="">The field <code>domainIdpFilter</code> was added to the models <code>ResourceRule</code> and <code>ResourceRuleParms</code>. It specifies the Domain-based IDP filter is enabled and if so which IDPs it matches.</li>
<li class="">the field <code>domainIdps</code> was added to the models <code>ResourceRule</code> and <code>ResourceRuleParms</code>. If applicable, it specifies the list of IDPs the Domain-based IDP filter matches.</li>
</ul>
<p>The following changes have been made to support changes to how OTP Delivery preferences are defined:</p>
<ul>
<li class="">The model <code>OTPPreferenceDetails</code> has been added. The model defines information about an OTP Delivery type.</li>
<li class="">The field <code>otpDeliveryPreference</code> has been added to the models <code>AuthenticationFlow</code>, <code>AuthenticationFlowParms</code>, and <code>OTPAuthenticatorSettings</code>. This attribute defines an array of OTPPreferenceDetails that lists the type of OTP delivery types that can be used. The order of these values defines the preferred order of the delivery types.</li>
<li class="">The field <code>overrideOtpContacts</code> has been added to the models <code>AuthenticationFlow</code> and <code>AuthenticationFlowParms</code>. This attribute defines whether the OTP delivery configuration is defined in policy is used for this authentication flow or whether it is defined for this authentication flow.</li>
<li class="">The fields <code>deliveryMethods</code>, <code>otpEmailDefaultDeliveryAttribute</code>, <code>otpSmsDefaultDeliveryAttribute</code>, <code>otpVoiceDefaultDeliveryAttribute</code>, <code>otpWechatDefaultDeliveryAttribute</code>, and <code>otpWhatsappDefaultDeliveryAttribute</code> in the model <code>OTPAuthenticatorSettings</code> have been deprecated. They have been replaced by the field <code>otpDeliveryPreference</code>.</li>
</ul>
<p>The following changes have been made to support configuration of allowed relying party IDs for the Native Mobile Passkey feature:</p>
<ul>
<li class="">The method <code>POST /api/web/v1/settings/fido/configuration/android (fetchAndroidAssociationFileUsingPOST)</code> has been added. This method fetches the Android association file from a location specified by the relying party ID.</li>
<li class="">The method <code>POST /api/web/v1/settings/fido/configuration/ios (fetchAppleAssociationFileUsingPOST)</code> has been added. This method fetches the Apple association file from a location specified by the relying party ID.</li>
<li class="">The field <code>androidOrigins</code> has been added to <code>FIDOAllowedRpId</code>. This field specifies a list of <code>FIDOAndroidOriginSettings</code> defining a list of Android Relying Party IDs.</li>
<li class="">The field <code>iosOrigins</code> has been added to <code>FIDOAllowedRpId</code>. This field specifies a list of <code>FIDOIosOriginSettings</code> defining a list of iOS Relying Party IDs.</li>
<li class="">The models <code>FIDOAndroidAssetLinks</code>, <code>FIDOAndroidAssetLinksTargets</code>, <code>FIDOAppleAppSiteAssociation</code>, <code>FIDOAppleAppSiteAssociationWebcredentials</code>, and <code>FIDOAssociationFileRequest</code> have been added. These models defined arguments and return values for the methods described above.</li>
<li class="">The models <code>FIDOAndroidOriginSettings</code> and <code>FIDOIosOriginSettings</code> have been added. These models define fields in <code>FIDOAllowedRpId</code> described above.</li>
</ul>
<p>The field <code>userAuthenticatorPreference</code> has been added to the model <code>User</code>. This value specifies the authenticator preferences for the user.</p>
<p>The value <code>GETACCESS</code> has been added to the field <code>passwordFormat</code> has been added to the model <code>UserPasswordParms</code>. This allows an application to import GETACCESS passwords using the IDaaS APIs.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.42/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.42/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.42 and the three previous releases 5.39, 5.40, and 5.41). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p><strong>NOTE: In the 5.43 release, changes are planned that will break versions of ESG older than 5.33.</strong></p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="entrust-identity-and-entrust-windows-desktop-soft-token-deprecation">Entrust Identity and Entrust Windows Desktop Soft Token Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.42/#entrust-identity-and-entrust-windows-desktop-soft-token-deprecation" class="hash-link" aria-label="Direct link to Entrust Identity and Entrust Windows Desktop Soft Token Deprecation" title="Direct link to Entrust Identity and Entrust Windows Desktop Soft Token Deprecation" translate="no">​</a></h2>
<p>In the IDaaS 5.43 release, changes are planned that will break the following operations:</p>
<ul>
<li class="">Password reset in versions of Entrust Identity prior to 25.1.1. Customers using the SDKs are not impacted.</li>
<li class="">Soft Token online activation in versions of Entrust Windows Desktop Soft Token prior to 3.1</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.42/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.41]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.41/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.41/"/>
        <updated>2025-06-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.41/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="verifiable-credentials">Verifiable Credentials<a href="https://docs.trustedauth.com/blog/2025/5.41/#verifiable-credentials" class="hash-link" aria-label="Direct link to Verifiable Credentials" title="Direct link to Verifiable Credentials" translate="no">​</a></h3>
<p>This release of IDaaS includes preliminary support for the issuance and presentation (or verification) of verifiable credentials. IDaaS supports verifiable credentials using the W3C VC format. IDaaS also supports OpenID for Verifiable Credential Issuance (OID4VCI) and OpenID for Verifiable Presentations (OID4VP) for integrating VC issuance and presentation with wallets. IDaaS supports the following standards:</p>
<ul>
<li class=""><a href="https://www.w3.org/TR/vc-data-model/" target="_blank" rel="noopener noreferrer" class="">W3C Verifiable Credential Data Model v1.1</a></li>
<li class=""><a href="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-15.html" target="_blank" rel="noopener noreferrer" class="">OpenID for Verifiable Credential Issuance - draft 15</a></li>
<li class=""><a href="https://openid.net/specs/openid-4-verifiable-presentations-1_0-28.html" target="_blank" rel="noopener noreferrer" class="">OpenID for Verifiable Presentations - draft 28</a></li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="face-biometric-registration-improvements">Face Biometric Registration Improvements<a href="https://docs.trustedauth.com/blog/2025/5.41/#face-biometric-registration-improvements" class="hash-link" aria-label="Direct link to Face Biometric Registration Improvements" title="Direct link to Face Biometric Registration Improvements" translate="no">​</a></h3>
<p>When registering a Face Biometric authenticator, the IDaaS user's first and last name are provided to the Onfido registration workflow to compare the user's name in IDaaS to the user's name as it appears on their government ID. Previously, the user's default firstName and lastName attributes were used. The IDaaS user attributes used to provide first name and last name values can now be configured in the Face Biometric policy. This feature allows IDaaS to store both a user's legal name and their preferred name. When configured, the user's preferred name is used in most cases and the user's legal name is used for Face Biometric registration.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="certificate-expiry-notification-email-improvements">Certificate Expiry Notification Email Improvements<a href="https://docs.trustedauth.com/blog/2025/5.41/#certificate-expiry-notification-email-improvements" class="hash-link" aria-label="Direct link to Certificate Expiry Notification Email Improvements" title="Direct link to Certificate Expiry Notification Email Improvements" translate="no">​</a></h3>
<p>The certificate expiry notification email now includes the hostname of the IDaaS account. This provides useful information for administrators who are managing multiple IDaaS accounts.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="portal-ui-error-reporting">Portal UI Error Reporting<a href="https://docs.trustedauth.com/blog/2025/5.41/#portal-ui-error-reporting" class="hash-link" aria-label="Direct link to Portal UI Error Reporting" title="Direct link to Portal UI Error Reporting" translate="no">​</a></h3>
<p>Errors that cause the IDaaS Portal and Authentication UI to crash are now logged to the IDaaS service to facilitate debugging.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.41/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Audits for failed device verification are missing. (39166)</li>
<li class="">Allow Enterprise Service Gateway and Microsoft CA proxy to be downloaded from accounts with a vanity URL. (37855)</li>
<li class="">Token activation with Identity Verification option should include the Face Biometric serial number in its audit. (38779)</li>
<li class="">The Identity as a Service Integration ForgeRock application has been removed from the list of applications that can be created. The integration was no longer supported by ForgeRock. The ForgeRock OIDC application template is still available. (38633)</li>
<li class="">For Service Provider accounts, the default Customer Support Agent role now includes the Edit Tenants permission. This allows support agents to unlock tenants. (38472)</li>
<li class="">Editing the Message of the Day in the Administration portal generates a stack trace in the browser console. (38903)</li>
<li class="">Editing the User Verification Message in the Administration portal generates a stack trace in the browser console. (38757)</li>
<li class="">On the Group List page of the Administration portal, selecting the checkbox for all groups no longer selects the "All Users" group. The "All Users" group is a virtual group for which actions like delete groups do not apply. (38804)</li>
<li class="">When activating an Entrust Soft Token, do not display the Identity Verified option if it is not available. (38777)</li>
<li class="">Authenticate API user query can fail if the user password last changed time is not set. (39181)</li>
<li class="">Updating a user from any page other than the first page of the list results in a page not found error. (38454)</li>
<li class="">For OTP voice delivery, English was used for the Thai and Turkish locales. (38874)</li>
<li class="">Push notifications not sent for an Entrust Soft Token activated offline. (39218)</li>
<li class="">Activation of a Face Biometric on the Entrust Identity application is not working if registration started from the mobile web browser. An activation QR code was displayed instead of an activation link. (37756)</li>
<li class="">The error message displayed when a compromised password is used has been changed to "This password has been found in a compromised password list from a 3rd-party website. To ensure security, its use is restricted." (39147)</li>
<li class="">A password cannot be assigned to a user if they do not have an email address. Now the option to send the new password by email is disabled. (38483)</li>
<li class="">Broken hyperlinks in the documentation have been fixed. (38482)</li>
<li class="">Fix errors in the Administration Guide "Integrate Microsoft Entra ID with Identity as a Service" section. (38913)</li>
<li class="">For accounts that do not have WeChat/WhatsApp OTP delivery enabled, some WeChat/WhatsApp options are visible including the admin portal menu search. (38810)</li>
<li class="">Improve audits when WhatsApp credentials are updated. (38837)</li>
<li class="">User certificate authentication was only shown for users that had smart credentials supporting push authentication. This did not include users who have YubiKey smart credentials. (38750)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2025/5.41/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.41/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>There are no changes in the Authentication API in this release.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.41/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>There are no changes in the Administration API in this release.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.41/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers:</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.41/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.41 and the three previous releases 5.38, 5.39, and 5.40). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.41/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.40]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.40/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.40/"/>
        <updated>2025-04-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.40/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="device-verified-entrust-soft-token-activation">Device Verified Entrust Soft Token Activation<a href="https://docs.trustedauth.com/blog/2025/5.40/#device-verified-entrust-soft-token-activation" class="hash-link" aria-label="Direct link to Device Verified Entrust Soft Token Activation" title="Direct link to Device Verified Entrust Soft Token Activation" translate="no">​</a></h3>
<p>Entrust Soft Token now supports device verification during activation. When enabled, the user's device must have a device certificate issued from a trusted Certificate Authority. This feature ensures token activation occurs only on authorized devices.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="application-verified-entrust-soft-token-activation">Application Verified Entrust Soft Token Activation<a href="https://docs.trustedauth.com/blog/2025/5.40/#application-verified-entrust-soft-token-activation" class="hash-link" aria-label="Direct link to Application Verified Entrust Soft Token Activation" title="Direct link to Application Verified Entrust Soft Token Activation" translate="no">​</a></h3>
<p>Entrust Soft Token now supports application verification during activation. When enabled, an attestation from Apple or Google is provided that validates the mobile application performing the activation. This feature ensures token activation occurs only from trusted mobile applications.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="disallow-previously-compromised-passwords">Disallow Previously Compromised Passwords<a href="https://docs.trustedauth.com/blog/2025/5.40/#disallow-previously-compromised-passwords" class="hash-link" aria-label="Direct link to Disallow Previously Compromised Passwords" title="Direct link to Disallow Previously Compromised Passwords" translate="no">​</a></h3>
<p>When setting a new password, IDaaS now blocks previously compromised passwords reported by HaveIBeenPwned. This addresses a NIST recommendation for password security documented in SP 800-63B.</p>
<p>IDaaS provides an option in the password settings to "Allow Compromised Passwords" but Entrust recommends that customers do not use this option unless necessary. As an example, customers who have very short passwords or passwords consisting of just digits may find all possible password values are compromised.</p>
<p>Previously compromised passwords are disallowed by default for existing customers. This means existing end users may encounter this new behavior after IDaaS 5.40 is deployed.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="otp-delivery-using-whatsapp-and-wechat">OTP Delivery using WhatsApp and WeChat<a href="https://docs.trustedauth.com/blog/2025/5.40/#otp-delivery-using-whatsapp-and-wechat" class="hash-link" aria-label="Direct link to OTP Delivery using WhatsApp and WeChat" title="Direct link to OTP Delivery using WhatsApp and WeChat" translate="no">​</a></h3>
<p>IDaaS now supports OTP delivery using WhatsApp and WeChat. Customers that want to use these capabilities must provide their own WhatsApp or WeChat business account.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="token-challengeresponse-authenticator">Token Challenge/Response Authenticator<a href="https://docs.trustedauth.com/blog/2025/5.40/#token-challengeresponse-authenticator" class="hash-link" aria-label="Direct link to Token Challenge/Response Authenticator" title="Direct link to Token Challenge/Response Authenticator" translate="no">​</a></h3>
<p>A new Token Challenge/Response authenticator has been added to IDaaS. In Token Challenge/Response authentication, IDaaS generates a challenge that is provided to the end user. The user enters the challenge into the token, and then the token uses the challenge to generate the OTP.</p>
<p>Only users who have been assigned hardware tokens that support Token Challenge/Response (like Entrust CR300 tokens) will have access to the Token Challenge/Response authenticator.</p>
<p>Token Challenge/Response authentication is supported by all IDaaS authentication applications, including the User portal, SAML applications, OIDC and OAuth applications, RADIUS applications, and Auth API applications. For RADIUS applications, the customer must update to the 5.40 Enterprise Service Gateway. For Auth API applications, the client application must be updated to support TOKENCR.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="override-certificate-lifetime-for-pkiaas">Override Certificate Lifetime for PKIaaS<a href="https://docs.trustedauth.com/blog/2025/5.40/#override-certificate-lifetime-for-pkiaas" class="hash-link" aria-label="Direct link to Override Certificate Lifetime for PKIaaS" title="Direct link to Override Certificate Lifetime for PKIaaS" translate="no">​</a></h3>
<p>When configuring smart credential digital IDs when using a PKIaaS CA, the customer can now configure the certificate lifetime in IDaaS if they want to override the lifetime configured by their CA.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="improvements-for-desktop-credential-provider-offline-token">Improvements for Desktop Credential Provider Offline Token<a href="https://docs.trustedauth.com/blog/2025/5.40/#improvements-for-desktop-credential-provider-offline-token" class="hash-link" aria-label="Direct link to Improvements for Desktop Credential Provider Offline Token" title="Direct link to Improvements for Desktop Credential Provider Offline Token" translate="no">​</a></h3>
<p>IDaaS provides the ability for the Entrust Desktop Credential Provider to download future token responses that can be used by DCP to allow offline login. This feature has been enhanced to support download of offline token responses when token authentication was not required by the resource rule. For example, if the resource rule requires password-only for low risk and password+token for high risk, offline token responses can now be downloaded in the low risk scenario.</p>
<p>This feature needs the upcoming release of Entrust Desktop Credential Provider before it can be used.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="mobile-oidc-developer-guide">Mobile OIDC Developer Guide<a href="https://docs.trustedauth.com/blog/2025/5.40/#mobile-oidc-developer-guide" class="hash-link" aria-label="Direct link to Mobile OIDC Developer Guide" title="Direct link to Mobile OIDC Developer Guide" translate="no">​</a></h3>
<p>A new document <code>Integrating IDaaS OIDC with a mobile app using AppAuth</code> has been added to the IDaaS Developer Portal. This document describes how OIDC authentication using IDaaS can be added to a customer's mobile application.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="increase-size-of-ip-list">Increase size of IP List<a href="https://docs.trustedauth.com/blog/2025/5.40/#increase-size-of-ip-list" class="hash-link" aria-label="Direct link to Increase size of IP List" title="Direct link to Increase size of IP List" translate="no">​</a></h3>
<p>An IP List can now include up to 2000 IP addresses. Previously the limit was 500.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-passkeyfido2-algorithms">New Passkey/FIDO2 Algorithms<a href="https://docs.trustedauth.com/blog/2025/5.40/#new-passkeyfido2-algorithms" class="hash-link" aria-label="Direct link to New Passkey/FIDO2 Algorithms" title="Direct link to New Passkey/FIDO2 Algorithms" translate="no">​</a></h3>
<p>IDaaS PassKey/FIDO2 now supports the Ed25519 &amp; RS256 algorithms. These algorithms are used by Windows Hello and some newer hardware.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="certificate-expiry-notification-improvements">Certificate Expiry Notification Improvements<a href="https://docs.trustedauth.com/blog/2025/5.40/#certificate-expiry-notification-improvements" class="hash-link" aria-label="Direct link to Certificate Expiry Notification Improvements" title="Direct link to Certificate Expiry Notification Improvements" translate="no">​</a></h3>
<p>The Certificate Expiry Notification email now includes more instructions including a link to the documentation describing how to update the certificates.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="radius-unknown-user-cache-audit-changes">RADIUS Unknown User Cache Audit Changes<a href="https://docs.trustedauth.com/blog/2025/5.40/#radius-unknown-user-cache-audit-changes" class="hash-link" aria-label="Direct link to RADIUS Unknown User Cache Audit Changes" title="Direct link to RADIUS Unknown User Cache Audit Changes" translate="no">​</a></h3>
<p>The audits generated by the RADIUS Unknown User Cache (introduced in 5.39) have been changed. Previously, an audit was generated for each unknown user that tried to authenticate in a given period of time. Now a single audit including a count of the number of unknown users who tried to authenticate in that period of time is generated instead.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="entrust-identity-security-whitepaper-updates">Entrust Identity Security Whitepaper Updates<a href="https://docs.trustedauth.com/blog/2025/5.40/#entrust-identity-security-whitepaper-updates" class="hash-link" aria-label="Direct link to Entrust Identity Security Whitepaper Updates" title="Direct link to Entrust Identity Security Whitepaper Updates" translate="no">​</a></h3>
<p>The Entrust Identity Security Whitepaper has been updated. This document can be accessed from the IDaaS Admin Portal Documentation Menu at Whitepapers &gt; Identity as a Service Platform Security.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.40/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Bulk import of unassigned grids failed. (35516, 37401)</li>
<li class="">Gateway status in Dashboard shows warning instead of error icon when the SSL certificate has expired. (37669)</li>
<li class="">User portal session timeout dialog shows negative timeout after session has expired. (34100, 38392)</li>
<li class="">RADIUS Push authentication fallback to grid not working. (37233)</li>
<li class="">Audit for change to FIDO Settings fidoRelyingPartyAllowlist showing wrong value when subdomainsAllowed is not checked. (37101)</li>
<li class="">User Portal Authenticators List Filter for Types should not include authenticators not allowed in User Portal policy. (37561)</li>
<li class="">User created by Azure synchronization is not getting provisioned by SCIM. (37769)</li>
<li class="">Clicking on the QR Code in the Google Authenticator activation email will now launch the Google Authenticator app on mobile. (37386)</li>
<li class="">Email value format is not validated in the UI if the email attribute is optional. (29804)</li>
<li class="">For SAML IDP authentication, the redirect message is not translated. (39359)</li>
<li class="">The Passkey/FIDO2 category in the Group Policy categories list is not sorted correctly. (34800)</li>
<li class="">Certificate validation added to the Directory SSL Certificate import rejects certificates with RSA-1024 and EC2 keys. These keys are now allowed. (38755)</li>
<li class="">During SAML authentication, if a user gets locked they are redirected to the IDaaS login page instead of back to the SAML service provider. (38285)</li>
<li class="">User certificate authentication failing on Mac Safari. (38761)</li>
<li class="">Test for external risk engine now returns error http_connector_execution_failed if it is unable to connect to the external risk service. Previously a general error was returned. (37965, 38495)</li>
<li class="">Password reset performed from Entrust Identity mobile app fails for passwords synchronized by AD Connector. (38081)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2025/5.40/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.40/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to support TOKENCR authentication.</p>
<ul>
<li class="">The value <code>TOKENCR</code> has been added to the list of available authenticators. This value can be passed as an argument to <code>userChallengeUsingPOST</code> and <code>userAuthenticateUsingPOST</code> indicating which authentication type to use. It can be returned in the attributes <code>authenticationTypes</code> and <code>availableSecondFactor</code> in <code>UserAuthenticateQueryResponse</code> returned from <code>userAuthenticatorQueryUsingPOST</code> indicating which authentication types are available. The resource rules of authentication API applications that don't support TOKENCR authentication should not be configured to include TOKENCR.</li>
<li class="">The attribute <code>challenge</code> has been added to the model <code>TokenChallenge</code>. For TOKENCR authentication, this attribute includes the challenge to be entered into the token.</li>
</ul>
<p>The following changes have been made to support OTP delivery using WeChat or WhatsApp.</p>
<ul>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>otpdeliveryType</code> in the model <code>AuthenticatedResponse</code>.</li>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>type</code> in the model <code>OTPContactValue</code>.</li>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attributes <code>otpDefaultDelivery</code> and <code>availableOTPDelivery</code> in the model <code>OTPDetails</code>.</li>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>otpDefaultDelivery</code> in the model <code>UserAuthenticateQueryResponse</code>.</li>
</ul>
<p>These attributes specify when WeChat/WhatsApp are available to be used to deliver OTPs and to request that they be used to delivery OTPs.</p>
<p>The following changes have been made to support download of offline token responses.</p>
<ul>
<li class="">New method <code>POST /api/web/v1/self/tokens/offline (getOfflineTokenResponsesUsingPOST)</code> - Given the auth token returned from a previous authentication request for an application that allows offline token download, download offline token responses for the specified token.</li>
<li class="">New model <code>GetOfflineTokenAuthenticateParms</code> - contains the parameters passed to the method <code>getOfflineTokenResponsesUsingPOST</code>.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.40/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following changes have been made to support managing FIDO Settings.</p>
<ul>
<li class="">The method <code>GET /api/web/v1/settings/fido (getFIDOSettingsUsingGET)</code> has been added. This method gets the requested FIDO Settings.</li>
<li class="">The method <code>PUT /api/web/v1/settings/fido (updateFIDOSettingsUsingPUT)</code> has been added. This method updates the specified FIDO Settings.</li>
<li class="">New model <code>FIDOAuthenticatorSettings</code>. This model contains the values returned from the method <code>getFIDOSettingsUsingGET</code>.</li>
<li class="">New model <code>FIDOAuthenticatorSettingsParms</code>. This model contains the parameters passed to the method <code>updateFIDOSettingsUsingPUT</code>.</li>
<li class="">New model <code>FIDOAllowedRpid</code>. This model defines one of the attributes included in <code>FIDOAuthenticatorSettings</code> and <code>FIDOAuthenticatorSettingsParms</code>.</li>
</ul>
<p>The following changes have been made related to Device Verification.</p>
<ul>
<li class="">The attribute <code>requireDeviceVerificationOnActivation</code> has been added to <code>EntrustSTAuthenticatorSettings</code>. This setting indicates whether device verification must be performed when an Entrust Soft Token is activated.</li>
<li class="">The attribute <code>deviceVerified</code> has been added to <code>Token</code>. This setting indicates if the token was device verified during activation.</li>
</ul>
<p>The following changes have been made related to Application Verification.</p>
<ul>
<li class="">The attribute <code>appVerificationRequired</code> has been added to <code>EntrustSTAuthenticatorSettings</code>. This setting indicates whether application verification must be performed when an Entrust Soft Token is activated.</li>
<li class="">The attribute <code>appVerificationIOSBundleId</code> and <code>appVerificationIOSTeamId</code> have been added to <code>EntrustSTAuthenticatorSettings</code>. These settings identify the trusted Apple mobile application.</li>
<li class="">The attribute <code>appVerificationAndroidPackageName</code> has been added to <code>EntrustSTAuthenticatorSettings</code>. This setting identifies the trusted Android mobile application.</li>
<li class="">The attribute <code>appVerified</code> has been added to <code>Token</code>. This setting indicates if the token was application verified during activation.</li>
</ul>
<p>The following changes have been made related to the Smart credential certificate lifetime feature.</p>
<ul>
<li class="">The attribute <code>lifetime</code> has been added to <code>DigitalIdConfigCertTemplate</code>. This setting indicates the lifetime (in months) to use when requesting certificates from the CA if the default lifetime is not used.</li>
<li class="">The attribute <code>useCaDefaultCertLifetime</code> has been added to <code>DigitalIdConfigCertTemplate</code>. This setting indicates if the CA default certificate lifetime should be used.</li>
</ul>
<p>The following changes have been made related to Face Biometric authenticators.</p>
<ul>
<li class="">The method <code>POST /api/web/v1/users/{userid}/face (createFaceUsingPOST)</code> has been deprecated.</li>
<li class="">The method <code>POST /api/web/v2/users/{userid}/face (createFaceAuthenticatorUsingPOST)</code> has been added. This method is used to create a new Face Biometric authenticator and replaces <code>createFaceUsingPOST</code>.</li>
<li class="">New model <code>FaceCreateResponse</code>. This model contains the response from <code>createFaceAuthenticatorUsingPOST</code>.</li>
<li class="">The attribute <code>returnQRCode</code> has been added to <code>FaceCreateParms</code>. This setting indicates if a QR code used to launch Face Biometric authenticator registration should be returned.</li>
</ul>
<p>The following changes have been made related to TOKENCR authentications.</p>
<ul>
<li class="">The value <code>TOKENCR</code> has been added to the attributes <code>idpLoginSecondStep</code> and <code>userLoginSecondStep</code> in the models <code>AuthenticationFlow</code> and <code>AuthenticationFlowParms</code>. These attributes specify when the authenticator TOKENCR is allowed in an authentication flow.</li>
<li class="">The value <code>TOKENCR</code> has been added to the attributes <code>highRiskSecondStep</code>, <code>mediumRiskSecondStep</code>, and <code>lowRiskSecondStep</code> in the models <code>ResourceRule</code> and <code>ResourceRuleParms</code>.</li>
<li class="">The value <code>TOKENCR</code> has been added to the attribute <code>authenticators</code> in the model <code>PasswordResetSettings</code>. This model lists authenticators that can be used for password reset.</li>
<li class="">The value <code>TOKENCR</code> has been added to the attribute <code>lockedAuthenticatorTypes</code> in the model <code>User</code>. This attribute lists locked out authenticators for a User.</li>
<li class="">The value <code>TOKENCR</code> has been added to the attribute <code>type</code> in the model <code>UserAuthenticatorLockoutStatus</code>. This model provides details about authenticator lockout status for a User.</li>
</ul>
<p>The following changes have been made related to supporting WeChat/WhatsApp for OTP delivery.</p>
<ul>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>otpDefaultDelivery</code> in the model <code>OTPAuthenticatorSettings</code>. This attribute specifies the default OTP delivery type.</li>
<li class="">The attributes <code>otpWechatDefaultDeliveryAttribute</code> and <code>otpWhatsappDefaultDeliveryAttribute</code> have been added to the model <code>OTPAuthenticatorSettings</code>. These attributes specify the user attribute to use by default for OTP delivery using WeChat or WhatsApp.</li>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>otpDeliveryType</code> in the model <code>OTPCreateParms</code>. This attribute specifies how an OTP is delivered when an OTP is created if delivery is enabled.</li>
<li class="">The values <code>WECHAT</code> and <code>WHATSAPP</code> have been added to the attribute <code>name</code> in the model <code>OTPDeliveryMethod</code>. This model is used to define the allowed delivery methods in <code>OTPAuthenticatorSettings</code>.</li>
<li class="">The values <code>OTP_WECHAT</code> and <code>OTP_WHATSAPP</code> have been added to the attribute <code>type</code> in the model <code>OTPVerificationChallengeValue</code>. This model is passed as an argument to the method <code>contactVerificationChallengeUsingPOST</code> to validate the value for a user contact attribute.</li>
<li class="">The values <code>OTP_WECHAT</code> and <code>OTP_WHATSAPP</code> have been added to the attribute <code>type</code> in the models <code>UserAttribute</code>, <code>UserAttributeParms</code>, and <code>UserExtraAttribute</code>. These values specify the type of user attribute used to store a WeChat or WhatsApp contact value.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.40/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.40/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.40 and the three previous releases 5.37, 5.38, and 5.39). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.40/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.39]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.39/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.39/"/>
        <updated>2025-02-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.39/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="locking-and-removal-of-production-accounts-with-expired-entitlements">Locking and Removal of Production Accounts with Expired Entitlements<a href="https://docs.trustedauth.com/blog/2025/5.39/#locking-and-removal-of-production-accounts-with-expired-entitlements" class="hash-link" aria-label="Direct link to Locking and Removal of Production Accounts with Expired Entitlements" title="Direct link to Locking and Removal of Production Accounts with Expired Entitlements" translate="no">​</a></h3>
<p>Starting in this release, production accounts will be locked when their entitlements expire and removed after 6 months if the entitlement has not been renewed. IDaaS will send notification emails to account owners when entitlements approach the expiry date and then when they expire.</p>
<p>Customers can view the status of their account entitlements by clicking on the Entitlements icon on the Administration Portal Dashboard.</p>
<p>The default Customer Support Agent service provider administrator role has been modified to include permission to modify entitlements. This allows a support agent to address customer entitlement issues if their entitlement has expired.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="smsvoice-entitlements-are-required">SMS/Voice Entitlements Are Required<a href="https://docs.trustedauth.com/blog/2025/5.39/#smsvoice-entitlements-are-required" class="hash-link" aria-label="Direct link to SMS/Voice Entitlements Are Required" title="Direct link to SMS/Voice Entitlements Are Required" translate="no">​</a></h3>
<p>Starting in this release, entitlements are required to use SMS/Voice delivery for OTPs. Previously, accounts without an entitlement were allowed to use SMS/Voice delivery. Email delivery of OTPs does not require an entitlement.</p>
<p>Customers can view the status of their account entitlements by clicking on the Entitlements icon on the Administration Portal Dashboard.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="saml-identity-providers">SAML Identity Providers<a href="https://docs.trustedauth.com/blog/2025/5.39/#saml-identity-providers" class="hash-link" aria-label="Direct link to SAML Identity Providers" title="Direct link to SAML Identity Providers" translate="no">​</a></h3>
<p>IDaaS can be configured to support SAML Identity Providers in addition to the currently supported OIDC Identity Providers. The following are included as part of this new feature:</p>
<ul>
<li class="">An Authentication Flow that enables identity providers to select either OIDC or SAML identity providers, or both.</li>
<li class="">Global and Group-Based User Verification Policies that configure identity providers can select either OIDC or SAML identity providers, or both.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="flexible-external-risk-engines">Flexible External Risk Engines<a href="https://docs.trustedauth.com/blog/2025/5.39/#flexible-external-risk-engines" class="hash-link" aria-label="Direct link to Flexible External Risk Engines" title="Direct link to Flexible External Risk Engines" translate="no">​</a></h3>
<p>A new external risk engine type has been added to IDaaS. The new risk engine type allows the customer to integrate 3rd-party external risk engines into IDaaS with a no-code solution. IDaaS supports third-party risk engines that accept HTTPS requests and returns the risk results as a JSON formatted response.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="pass-through-authenticator">Pass-through Authenticator<a href="https://docs.trustedauth.com/blog/2025/5.39/#pass-through-authenticator" class="hash-link" aria-label="Direct link to Pass-through Authenticator" title="Direct link to Pass-through Authenticator" translate="no">​</a></h3>
<p>A new pass-through authenticator type has been added to IDaaS allowing the customer to integrate third-party authenticators into IDaaS with a no-code solution. The pass-through authenticator forwards the authentication requests from IDaaS to a customer-operated authentication service. This feature allows a customer to integrate an application using the IDaaS authentication API with existing authentication services.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="group-attribute-support">Group Attribute Support<a href="https://docs.trustedauth.com/blog/2025/5.39/#group-attribute-support" class="hash-link" aria-label="Direct link to Group Attribute Support" title="Direct link to Group Attribute Support" translate="no">​</a></h3>
<p>An attribute can be defined for IDaaS groups. This attribute can be mapped into SAML assertion attributes and OIDC claims depending on the group membership of the authenticating user.</p>
<p>These new capabilities include support for the Danish OIOSAML Web SSO Profile 3.0 for interoperation with Kombit Context Handler 2. Information defining privilege and constraint information can be defined in the IDaaS group attribute. This information can be encoded and returned in a SAML assertion as defined in OIOSAML and returned to Kombit Context Handler 2.</p>
<p>When defining a SAML attribute, the NameFormat can now be specified. Previously it was left undefined. This is required for OIOSAML but is applicable to any SAML attribute.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="maximum-password-length-policy">Maximum Password Length Policy<a href="https://docs.trustedauth.com/blog/2025/5.39/#maximum-password-length-policy" class="hash-link" aria-label="Direct link to Maximum Password Length Policy" title="Direct link to Maximum Password Length Policy" translate="no">​</a></h3>
<p>A new maximum password length policy has been added to Password settings. When set, this policy enforces the maximum length of the user's password when a new password is set. By default, IDaaS does not enforce a maximum password length.</p>
<p>A customer may want to enforce a maximum password length if they have clients that cannot accept longer passwords.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="outbound-scim-provisioning-enhancements">Outbound SCIM Provisioning Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.39/#outbound-scim-provisioning-enhancements" class="hash-link" aria-label="Direct link to Outbound SCIM Provisioning Enhancements" title="Direct link to Outbound SCIM Provisioning Enhancements" translate="no">​</a></h3>
<p>Previously, IDaaS outbound SCIM provisioning only supported OAuth to authenticate to the service to which users were provisioned. Now, IDaaS also supports authentication using API keys.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="improved-useraudit-searching-for-large-customers">Improved User/Audit Searching for Large Customers<a href="https://docs.trustedauth.com/blog/2025/5.39/#improved-useraudit-searching-for-large-customers" class="hash-link" aria-label="Direct link to Improved User/Audit Searching for Large Customers" title="Direct link to Improved User/Audit Searching for Large Customers" translate="no">​</a></h3>
<p>For large customers, the list/search operations in the Administration portal have been redesigned to avoid timeouts that may be encountered. These issues are more likely when complicated search criteria are specified. The user experience of the administrator using the Administrator portal is unchanged.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="webhooks-for-user-creation">Webhooks for User Creation<a href="https://docs.trustedauth.com/blog/2025/5.39/#webhooks-for-user-creation" class="hash-link" aria-label="Direct link to Webhooks for User Creation" title="Direct link to Webhooks for User Creation" translate="no">​</a></h3>
<p>IDaaS now supports webhooks where IDaaS will send a signal to an external service when an event happens. In this release, webhooks are supported for user create events.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="idaas-jwt-oidc-grant-type">IDaaS JWT OIDC Grant Type<a href="https://docs.trustedauth.com/blog/2025/5.39/#idaas-jwt-oidc-grant-type" class="hash-link" aria-label="Direct link to IDaaS JWT OIDC Grant Type" title="Direct link to IDaaS JWT OIDC Grant Type" translate="no">​</a></h3>
<p>A new IDaaS JWT grant type has been added to OIDC and OAuth applications. This grant type allows a customer application to use the IDaaS authentication API to authenticate a user. When using this grant type, the client application does the following:</p>
<ul>
<li class="">Calls the OIDC/OAuth authorize endpoint to begin authentication specifying the new grant type. This will return an authRequestKey value.</li>
<li class="">Calls the IDaaS authentication APIs to authenticate the user. The authRequestKey is passed as an argument. The authentication API will return an IDaaS JWT when the user is authenticated.</li>
<li class="">Calls the OIDC/OAuth token endpoint to get an OAuth access token. The IDaaS JWT and authRequestKey are passed as arguments. This call returns an OAuth access token that can be used to interact with the customer's backend service.</li>
</ul>
<p>This new grant type provides the following capabilities not available with standard OIDC:</p>
<ul>
<li class="">The customer can implement their own authentication UI allowing them to customize the UI to meet their requirements.</li>
<li class="">The customer can access IDaaS risk authentication capabilities, such as transaction verification that require customer transaction values to be provided. When transaction values are provided, the returned OAuth access token can be configured to include these transaction values as a claim.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="radius-agent-caching">RADIUS Agent Caching<a href="https://docs.trustedauth.com/blog/2025/5.39/#radius-agent-caching" class="hash-link" aria-label="Direct link to RADIUS Agent Caching" title="Direct link to RADIUS Agent Caching" translate="no">​</a></h3>
<p>Recently some IDaaS customers have experienced attacks on their VPN servers where bad actors perform large numbers of authentication attempts using the same userid and different passwords in an attempt to find a valid userid and password. The error returned from IDaaS does not indicate if the error is because the user does not exist or if the password was invalid. This means that these attacks generate large numbers of IDaaS requests resulting in unknown user errors.</p>
<p>For customers whose VPN server or network infrastructure does not provide capabilities to filter out these kinds of requests before they reach the IDaaS RADIUS agent and then IDaaS, the IDaaS RADIUS agent now provides the following caches to block this traffic before it reaches IDaaS:</p>
<ul>
<li class="">An unknown user cache that blocks RADIUS authentication requests with a userid that previously generated a user not found error.</li>
<li class="">A client IP rate limiter that restricts the number of RADIUS authentication requests that will be accepted from a client IP address.</li>
</ul>
<p>For customers that allow this traffic to reach IDaaS, Entrust may be forced to rate limit the authentication traffic for that account. This rate limiting would block both valid and invalid authentication requests.</p>
<p>Customers will need to upgrade to the 5.39 version of the Enterprise Service Gateway to have these features available.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="token-delete-bulk-operation">Token Delete Bulk Operation<a href="https://docs.trustedauth.com/blog/2025/5.39/#token-delete-bulk-operation" class="hash-link" aria-label="Direct link to Token Delete Bulk Operation" title="Direct link to Token Delete Bulk Operation" translate="no">​</a></h3>
<p>A new bulk operation to delete tokens has been added.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administrator-portal-menu-search-improvements">Administrator Portal Menu Search Improvements<a href="https://docs.trustedauth.com/blog/2025/5.39/#administrator-portal-menu-search-improvements" class="hash-link" aria-label="Direct link to Administrator Portal Menu Search Improvements" title="Direct link to Administrator Portal Menu Search Improvements" translate="no">​</a></h3>
<p>The menu search capability now supports all levels of the Administrator portal menu instead of just the top level menus. The menu search field has been moved to the menu.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="idaas-logo-change">IDaaS Logo Change<a href="https://docs.trustedauth.com/blog/2025/5.39/#idaas-logo-change" class="hash-link" aria-label="Direct link to IDaaS Logo Change" title="Direct link to IDaaS Logo Change" translate="no">​</a></h3>
<p>The IDaaS logo displayed by default on the login page has changed.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="service-provider-tenant-management-improvements">Service Provider Tenant Management Improvements<a href="https://docs.trustedauth.com/blog/2025/5.39/#service-provider-tenant-management-improvements" class="hash-link" aria-label="Direct link to Service Provider Tenant Management Improvements" title="Direct link to Service Provider Tenant Management Improvements" translate="no">​</a></h3>
<p>When a service provider configures a tenant for tenant management, there is now an option to select the OIDC key/certificate to be used.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="improved-oidc-error-information">Improved OIDC Error Information<a href="https://docs.trustedauth.com/blog/2025/5.39/#improved-oidc-error-information" class="hash-link" aria-label="Direct link to Improved OIDC Error Information" title="Direct link to Improved OIDC Error Information" translate="no">​</a></h3>
<p>OIDC requests that fail due to configuration issues or due to unsupported requests now return additional information to the client in the error description indicating the cause of the error.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2025/5.39/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.bonusly.com/" target="_blank" rel="noopener noreferrer" class="">Bonusly</a>.</li>
<li class="">A new SAML application template for <a href="https://www.prodpad.com/" target="_blank" rel="noopener noreferrer" class="">ProdPad</a>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.39/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">The Save button should be disabled in the password change UI if the New Password matches the Current Password. Submitting the request results in a server error as expected. (10826, 36622)</li>
<li class="">User search criteria in the Administrator portal should not display the Organization filter for administrators who do not have permission to view Organizations. (37314)</li>
<li class="">Changes to the Geolocation allow list in resource rules were not saved. (37856)</li>
<li class="">User Certificate was missing from the User Authenticator Notifications settings. (37159)</li>
<li class="">Allow the default OIDC certificate to be deleted if it is not used, and it is not the only OIDC key. (37728)</li>
<li class="">Edit the Tenant Management configuration for a tenant from a service provider fails. (37982)</li>
<li class="">The User Attributes VIEW permission has been added to the default SCIM Provisioning role. (37596)</li>
<li class="">Remove sample values of API keys from IDaaS OpenAPI files. These sample values trigger customer vulnerability scanners. (38107)</li>
<li class="">If Face Biometric registration is cancelled during User Registration it is marked complete. (37747)</li>
<li class="">OIDC Server Application should not have the Show Login Redirect URL in My Profile option. (37646)</li>
<li class="">Administrator in Helpdesk role was not allowed to remove groups from a user. (37459)</li>
<li class="">Japanese version of Reset Password email is missing text. (10566)</li>
<li class="">Localized versions of User State Change email contains English text. (33749)</li>
<li class="">User created in IDaaS after authentication from an Identity Provider is ignored by SCIM outbound provisioning. (37635, 38082)</li>
<li class="">If creation of a user in IDaaS after authentication from an Identity Provider fails, authenticators created for that user are left behind. (37636)</li>
<li class="">Delete users bulk operation fails with "Bulk operation already started" error. (37353)</li>
<li class="">When entering the name of an Organization, the UI does not validate if the name is a duplicate. This results in an error being returned from the server. (36439)</li>
<li class="">Encoding smart credentials on YubiKey tokens with firmware version 5.7.1 or greater fails. (37412)</li>
<li class="">In the Administrator Portal, the list of groups to add to a user were not sorted. (37408)</li>
<li class="">When the Directory configuration has a list of SSL certificates, it now indicates which SSL certificate is being used. (37619)</li>
<li class="">Unlocking a user fails if the user was locked out due to User Certificate authentication failure. (37153)</li>
<li class="">Audits without an Error Description display a value of undefined. (37315)</li>
<li class="">Smart credential encoding fails for PKIaaS CAs when the smart credential definition only specifies one digitalId Config. (38121)</li>
<li class="">Magiclink fails when case of provided email address differs from user's email address. (38391)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2025/5.39/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<p>The CSharp SDK dropped support for .NET 6.0 in this release.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2025/5.39/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to support the Pass-through Authenticator.</p>
<p>The following models have been added:</p>
<ul>
<li class=""><code>PassthroughAuthenticationResponse</code>. This model defines information returned to the client application from a pass-through authenticator. It consists of a list of <code>PassthroughAuthenticationResultItems</code>. The list of items returned is defined in the Pass-through Authenticator configuration in IDaaS.</li>
<li class=""><code>PassthroughAuthenticatorParms</code>. This model defines information passed from the client application to the pass-through authenticator. The model consists of a list of <code>PassthroughAuthenticatorPlaceholder</code>. The Pass-through Authenticator configuration in IDaaS specifies how these values are mapped into the requests sent to the Pass-through Authenticator.</li>
</ul>
<p>The following models have been updated:</p>
<ul>
<li class="">The attribute <code>passthroughAuthenticationResponse</code> has been added to <code>AuthenticatedResponse</code>. This attribute contains the information returned to the client application from a pass-through authenticator.</li>
<li class="">The attribute <code>passthroughAuthenticatorParms</code> has been added to <code>UserChallengeParameters</code> and <code>UserAuthenticateParameters</code>. This attribute contains the information passed from the client application for a pass-through authenticator.</li>
</ul>
<p>The following changes have been made to support the IDaaS JWT OIDC Grant Type.</p>
<p>The following models have been updated:</p>
<ul>
<li class="">The attribute <code>authRequestKey</code> has been added to <code>UserAuthenticateQueryParameters</code>. This attribute is provided by the OIDC/OAuth authorize endpoint when using the IDaaS JWT grant type and is required to use the IDaaS authentication APIs for that grant type.</li>
<li class="">The attribute <code>maxAge</code> has been added to <code>UserAuthenticateQueryParameters</code>. If an existing authToken is provided, the maxAge parameter can be used to indicate if re-authentication is required for an authentication. If the specified requestTime (or current system time if requestTime is not specified) is more than maxAge seconds after the time which the authToken was issued then re-authentication will be required.</li>
<li class="">The attribute <code>requestTime</code> has been added to <code>UserAuthenticateQueryParameters</code>. Used when comparing maxAge to the authToken issue time to determine if re-authentication is required. If not specified, the system current time is used.</li>
<li class="">The attribute <code>authRequestKey</code> has been added to <code>UserAuthenticateParameters</code>. This attribute is provided by the OIDC/OAuth authorize endpoint when using the IDaaS JWT grant type and is required to use the IDaaS authentication APIs for that grant type.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.39/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following models related to authentication flows have been updated:</p>
<ul>
<li class="">An attribute <code>identityProviderIds</code> has been added to <code>AuthenticationFlowParms</code>. This value specifies the identity providers associated with the authentication flow. The attribute <code>oidcIdentityProviderIds</code> has been deprecated.</li>
<li class="">An attribute <code>identityProviders</code> has been added to <code>AuthenticationFlow</code>. This value specifies the identity providers associated with the authentication flow. The attribute <code>oidcIdentityProviders</code> has been deprecated.</li>
</ul>
<p>The following APIs have been added to manage identity providers:</p>
<ul>
<li class=""><code>GET /api/web/v1/identityproviders (listIdentityProvidersUsingGET)</code> - List identity providers.</li>
</ul>
<p>The following models related to identity providers have been added:</p>
<ul>
<li class=""><code>IdentityProvider</code> - The results returned from the list API.</li>
</ul>
<p>The following APIs have been added to manage SAML identity providers:</p>
<ul>
<li class=""><code>GET /api/web/v1/identityproviders/saml (listSamlIdentityProvidersUsingGET)</code> - List identity providers.</li>
<li class=""><code>POST /api/web/v1/identityproviders/saml (createSamlIdentityProviderUsingPOST)</code> - Create an identity provider.</li>
<li class=""><code>DELETE /api/web/v1/identityproviders/saml/{id} (deleteSamlIdentityProviderUsingDELETE)</code> - Delete an identity provider.</li>
<li class=""><code>GET /api/web/v1/identityproviders/saml/{id} (getSamlIdentityProviderUsingGET)</code> - Get an identity provider.</li>
<li class=""><code>PUT /api/web/v1/identityproviders/saml/{id} (updateSamlIdentityProviderUsingPUT)</code> - Modify an identity provider.</li>
</ul>
<p>The following models related to SAML identity providers have been added:</p>
<ul>
<li class=""><code>SamlIdentityProviderParms</code> - The parameters passed to the create and update APIs.</li>
<li class=""><code>SamlIdentityProvider</code> - The results returned from the create, get, list, and update APIs.</li>
</ul>
<p>The following models related to webhooks have been added:</p>
<ul>
<li class=""><code>WebhookParms</code> - The parameters passed when creating or updating a webhook.</li>
<li class=""><code>Webhook</code> - The parameters returned when listing or getting a webhook.</li>
<li class=""><code>WebhookEvent</code> - Specifies the event types supported by the webhook. Currently for IDaaS, this will always be user.create.</li>
</ul>
<p>The following APIs have been added to manage Webhooks:</p>
<ul>
<li class=""><code>GET /api/web/v1/webhooks (getWebhooksUsingGET)</code> - List all webhooks.</li>
<li class=""><code>POST /api/web/v1/webhooks (createWebhookUsingPOST)</code> - Create a webhook.</li>
<li class=""><code>POST /api/web/v1/webhooks/test/{id} (testWebhookUsingPOST)</code> - Test a webhook by trying to deliver a dummy payload.</li>
<li class=""><code>GET /api/web/v1/webhooks/{id} (readWebhookUsingGET)</code> - Get the specified webhook.</li>
<li class=""><code>PUT /api/web/v1/webhooks/{id} (updateWebhookUsingPUT)</code> - Update the specified webhook.</li>
<li class=""><code>DELETE /api/web/v1/webhooks/{id} (deleteWebhookUsingDELETE)</code> - Delete the specified webhook.</li>
</ul>
<p>The following change has been made to other models:</p>
<ul>
<li class="">The attribute 'maximumLength' has been added to <code>UserPasswordSettings</code> which defines the maximum length of the password.</li>
<li class="">The attribute <code>attribute</code> has been added to <code>Group</code> and <code>GroupParms</code> which provides access to the attribute value associated with a group.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.39/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.39/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.39 and the three previous releases 5.36, 5.37, and 5.38). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.39/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.38]]></title>
        <id>https://docs.trustedauth.com/blog/2025/5.38/</id>
        <link href="https://docs.trustedauth.com/blog/2025/5.38/"/>
        <updated>2025-01-29T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2025/5.38/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-verified-activation-of-entrust-soft-tokens">Identity Verified Activation of Entrust Soft Tokens<a href="https://docs.trustedauth.com/blog/2025/5.38/#identity-verified-activation-of-entrust-soft-tokens" class="hash-link" aria-label="Direct link to Identity Verified Activation of Entrust Soft Tokens" title="Direct link to Identity Verified Activation of Entrust Soft Tokens" translate="no">​</a></h3>
<p>IDaaS can be configured to require users to perform Face Biometric authentication when activating an Entrust Soft Token. Identity verification ensures that the expected user is activating the soft token.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="passkeyfido2-enhancement-to-block-synced-passkeys">Passkey/FIDO2 Enhancement to Block Synced Passkeys<a href="https://docs.trustedauth.com/blog/2025/5.38/#passkeyfido2-enhancement-to-block-synced-passkeys" class="hash-link" aria-label="Direct link to Passkey/FIDO2 Enhancement to Block Synced Passkeys" title="Direct link to Passkey/FIDO2 Enhancement to Block Synced Passkeys" translate="no">​</a></h3>
<p>Passkey/FIDO2 policy can now be configured to block synced passkeys from being registered. Customers may want to only allow their users to use passkeys, such as physical FIDO2 tokens, whose keys are not backed up to the cloud.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="locking-and-removal-of-production-accounts-with-expired-entitlements">Locking and Removal of Production Accounts With Expired Entitlements<a href="https://docs.trustedauth.com/blog/2025/5.38/#locking-and-removal-of-production-accounts-with-expired-entitlements" class="hash-link" aria-label="Direct link to Locking and Removal of Production Accounts With Expired Entitlements" title="Direct link to Locking and Removal of Production Accounts With Expired Entitlements" translate="no">​</a></h3>
<p>Starting in 5.39 release, production accounts will be locked when their entitlements expire and removed after 6 months. Accounts with entitlements that have already expired will be immediately locked and then removed after 6 months. IDaaS will send notification emails to account owners when entitlements approach the expiry date and then when they expire.</p>
<p>In 5.38, the expiry notifications will be sent to account owners, but the accounts will not be locked.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-proofing-management-removed">Identity Proofing Management Removed<a href="https://docs.trustedauth.com/blog/2025/5.38/#identity-proofing-management-removed" class="hash-link" aria-label="Direct link to Identity Proofing Management Removed" title="Direct link to Identity Proofing Management Removed" translate="no">​</a></h3>
<p>The identity proofing management capabilities have been removed.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="directory-and-gateway-ssl-certificate-enhancements">Directory and Gateway SSL Certificate Enhancements<a href="https://docs.trustedauth.com/blog/2025/5.38/#directory-and-gateway-ssl-certificate-enhancements" class="hash-link" aria-label="Direct link to Directory and Gateway SSL Certificate Enhancements" title="Direct link to Directory and Gateway SSL Certificate Enhancements" translate="no">​</a></h3>
<p>The following enhancements related to SSL Certificate configuration have been made for Directories and Gateways that have SSL configured:</p>
<ul>
<li class="">The Directories and Gateways tiles on the dashboard indicate if any SSL certificates are expired.</li>
<li class="">The status of the SSL certificate is shown in the Directory list.</li>
<li class="">A new <code>View SSL Certificates</code> action is available that shows a list of all SSL certificates configured for the directory.</li>
<li class="">A new <code>View SSL Certificate</code> action is available for each Gateway instance.</li>
<li class="">Certificate expiry notification emails sent by IDaaS now include notifications for Directory and Gateway SSL Certificates.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2025/5.38/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.keepersecurity.com/" target="_blank" rel="noopener noreferrer" class="">Keeper Security</a>.</li>
<li class="">A new SAML application template for <a href="https://www.leavewizard.com/" target="_blank" rel="noopener noreferrer" class="">LeaveWizard</a>.</li>
<li class="">A new SAML application template for <a href="https://www.sharefile.com/" target="_blank" rel="noopener noreferrer" class="">ShareFile</a>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2025/5.38/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">ESG log not rolling over causing disk to fill. (37181, 37320)</li>
<li class="">ESG disks partition for /opt too small. Customers will need to reinstall ESG for this fix to apply. (37239)</li>
<li class="">When OTP Voice delivery is used, the wrong type displays on the user's login page. (37330, 37406)</li>
<li class="">The X-Xss-Protection header is no longer included in IDaaS API responses. (37455)</li>
<li class="">The sample value for the machine fingerprint value in the API was incorrect. (37329)</li>
<li class="">Validation of device certificate fails if it contains a ExtendedKeyUsage value marked critical. (36968)</li>
<li class="">Address issues with SCIM user provisioning. Some errors were not properly handled resulting in the operation not completing and preventing future operations from starting. (37187, 37228, 37240, 37262, 37305)</li>
<li class="">Enhance the User Authenticator Update email notification so that it can distinguish between an authenticator being locked and a user being locked. (37481)</li>
<li class="">Customized name for Google Authenticator is HTML encoded. (37531)</li>
<li class="">Face Biometric activation audit is missing mobile platform. (37261)</li>
<li class="">Group policy category list in Admin portal not sorted. (37238)</li>
<li class="">Face Biometric push transaction details are not translated. (37236)</li>
<li class="">Microsoft Azure AD has been renamed to Microsoft Entra ID. (37529)</li>
<li class="">Missing error message if Face Biometric authentication times out. (36456)</li>
<li class="">Save user profile with alias generates blank error message. (37302)</li>
<li class="">Password reset dialog has two scrollbars for some locales. (37223)</li>
<li class="">Pressing User Certificate login button twice generates an error. (37100)</li>
<li class="">Group names not sorted in Group Policies list. (36963)</li>
<li class="">Add extra contact info entry in Admin portal is too short. (36679)</li>
<li class="">When editing an application, the Next button should not be enabled if all authentication flows are disabled. (35322)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2025/5.38/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2025/5.38/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>ID Proofing capabilities have been removed from IDaaS. The following methods have been removed from the Administration API.</p>
<ul>
<li class=""><code>idProofingInitUsingPOST</code> (<code>POST /api/web/v1/idproofing/init</code>).</li>
<li class=""><code>idProofingImageUsingPUT</code> (<code>PUT /api/web/v1/idproofing/{requestId}/image/{side}</code>).</li>
<li class=""><code>idProofingCompleteSelfieUsingPUT</code> (<code>PUT /api/web/v1/idproofing/{requestId}/completeselfie</code>).</li>
<li class=""><code>idProofingCompleteUsingPUT</code> (<code>PUT /api/web/v1/idproofing/{requestId}/complete</code>).</li>
<li class=""><code>idProofingRequestUsingGET</code> (<code>GET /api/web/v1/idproofing/{requestId}</code>).</li>
<li class=""><code>idProofingRequestsPagedUsingPOST</code> (<code>POST /api/web/v1/idproofing</code>).</li>
</ul>
<p>Token activation for Google Authenticator has been enhanced to support activation of a token with a specified token secret. This allows a customer to import existing Google Authenticator tokens into IDaaS. The following model has been changed.</p>
<ul>
<li class="">The attribute <code>secret</code> has been added to <code>ActivateParms</code>. If specified when activating a token, this attribute specifies the seed of a token.</li>
</ul>
<p>Methods used to configure the Onfido account used for Face Biometric authenticator have been added to the Administration API. The following changes have been made.</p>
<ul>
<li class="">The method <code>getFaceAccountSettingsUsingGET</code> (<code>GET /api/web/v1/settings/face/account</code>) has been added. This method fetches the current Onfido account settings.</li>
<li class="">The method <code>setFaceAccountSettingsUsingPUT</code> (<code>PUT /api/web/v1/settings/face/account</code>) has been added. This method updates the Onfido account settings.</li>
<li class="">The model <code>FaceAccountSettings</code> has been added. This model contains the Onfido account settings.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2025/5.38/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.38/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.38 and the three previous releases 5.35, 5.36, and 5.37). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances that use older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2025/5.38/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.37]]></title>
        <id>https://docs.trustedauth.com/blog/2024/5.37/</id>
        <link href="https://docs.trustedauth.com/blog/2024/5.37/"/>
        <updated>2024-10-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2024/5.37/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="face-biometric-authentication-with-entrust-identity-mobile">Face Biometric Authentication with Entrust Identity Mobile<a href="https://docs.trustedauth.com/blog/2024/5.37/#face-biometric-authentication-with-entrust-identity-mobile" class="hash-link" aria-label="Direct link to Face Biometric Authentication with Entrust Identity Mobile" title="Direct link to Face Biometric Authentication with Entrust Identity Mobile" translate="no">​</a></h3>
<p>The IDaaS Face Biometric Authenticator has been enhanced to support Face Biometrics registered and authenticated from the Entrust Identity Mobile application. Face Biometric authenticators managed on the Entrust Identity Mobile application can be configured so that the user's biometric information is stored on the mobile device rather than in the Onfido cloud.</p>
<p>Face Biometric authentication using the Entrust Identity Mobile app has a user experience similar to token push authentication.</p>
<ul>
<li class="">The user gets a notification on the mobile device.</li>
<li class="">The mobile app is launched.</li>
<li class="">From the mobile app, the user performs a workflow that does a motion capture of the user's face.</li>
<li class="">The user is authenticated if the motion capture matches their previously registered biometric.</li>
</ul>
<p>Face Biometric authentication has the option to include a mutual authentication challenge to prevent the user from accidentally responding to an attacker's authentication request.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-certificate-authentication-matching-policy-update">User Certificate Authentication Matching Policy Update<a href="https://docs.trustedauth.com/blog/2024/5.37/#user-certificate-authentication-matching-policy-update" class="hash-link" aria-label="Direct link to User Certificate Authentication Matching Policy Update" title="Direct link to User Certificate Authentication Matching Policy Update" translate="no">​</a></h3>
<p>IDaaS has enhanced its User Certificate Authentication matching policy, enabling fine-grained control for user matching. The new settings allow the configuration of one-to-one mappings between certificate components and user attributes.</p>
<p>The list of supported certificate components has been expanded to include both strong and weak components:</p>
<ul>
<li class="">Strong components: securityId, sha256PublicKey, subjectKeyIdentifier, serialNumber</li>
<li class="">Weak components: commonName, rfc822Name, userPrincipalName, directoryName, subjectDN</li>
</ul>
<p>Entrust highly recommends using strong components for user matching. When only weak components are configured, all matching rules must be satisfied to successfully authenticate a user.</p>
<p>In addition, the settings support specifying mandatory and prohibited certificate policy OIDs, ensuring that only certificates with the appropriate policies can be used. This applies to both certificates issued by trusted Certificate Authorities and IDaaS-issued smart credentials.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-for-entrust-identity-mobile-features">Support for Entrust Identity Mobile Features<a href="https://docs.trustedauth.com/blog/2024/5.37/#support-for-entrust-identity-mobile-features" class="hash-link" aria-label="Direct link to Support for Entrust Identity Mobile Features" title="Direct link to Support for Entrust Identity Mobile Features" translate="no">​</a></h3>
<p>The following changes have been made to IDaaS to support new functionality in Entrust Identity.</p>
<ul>
<li class="">The latitude and longitude of push notification transactions are included in the information sent to the mobile app so that it can display the location from which the transaction was launched.</li>
<li class="">A new policy "Allow Device Biometric Authentication" has been added for Entrust Soft Tokens. This allows an administrator to disable the use of the device biometric for unlocking the mobile app.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-portal--admin-portal-enhancements">User Portal / Admin Portal Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.37/#user-portal--admin-portal-enhancements" class="hash-link" aria-label="Direct link to User Portal / Admin Portal Enhancements" title="Direct link to User Portal / Admin Portal Enhancements" translate="no">​</a></h3>
<p>An end user can select favorite applications in the user portal. Favorite applications are displayed first on the Applications page.</p>
<p>The admin portal has been enhanced to support searching the menu.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-entra-id-read-only-authorization">Microsoft Entra ID Read-Only Authorization<a href="https://docs.trustedauth.com/blog/2024/5.37/#microsoft-entra-id-read-only-authorization" class="hash-link" aria-label="Direct link to Microsoft Entra ID Read-Only Authorization" title="Direct link to Microsoft Entra ID Read-Only Authorization" translate="no">​</a></h3>
<p>When adding a Microsoft Entra ID directory to IDaaS for user synchronization, the option to select Read-Only Authorization is provided.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-notification-enhancements">Authentication Notification Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.37/#authentication-notification-enhancements" class="hash-link" aria-label="Direct link to Authentication Notification Enhancements" title="Direct link to Authentication Notification Enhancements" translate="no">​</a></h3>
<p>When enabling User Authenticator Notifications, the administrator can now select which authenticators cause notifications.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="fidopasskey-enhancements">FIDO/Passkey Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.37/#fidopasskey-enhancements" class="hash-link" aria-label="Direct link to FIDO/Passkey Enhancements" title="Direct link to FIDO/Passkey Enhancements" translate="no">​</a></h3>
<p>FIDO/Passkey authenticators now support subdomains for Relying Party IDs. For example, IDaaS can be configured so that an authenticator registered from register.mydomain.com can be used to authenticate from authenticate.mydomain.com. The Allowed Relying Party ID hostnames policy allows subdomains to be specified.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="samloidc-enhancements">SAML/OIDC Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.37/#samloidc-enhancements" class="hash-link" aria-label="Direct link to SAML/OIDC Enhancements" title="Direct link to SAML/OIDC Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made for SAML and OIDC applications</p>
<ul>
<li class="">When configuring a SAML application, a new setting, SAML Max Authentication Age, can be specified. If configured, this setting specifies the maximum time before a user needs to reauthenticate.</li>
<li class="">The ForceAuthn parameter in SAML authentication requests is now supported. If set to true, reauthentication by the user will be required.</li>
<li class="">SAML ForceAuthn or OIDC max_age in a request that force a re-authentication will now preserve an existing IDaaS session.</li>
<li class="">Resource rules that disable SSO no longer apply to reauthenticating the same SAML or OIDC application. Setting the application max authentication age to 0 will disable SSO for the application.</li>
<li class="">If the IDP max authentication age is configured, then a SAML ForceAuthn or OIDC max _age request is propagated to third-party IDPs. The smaller value is used.</li>
<li class="">A new option "Include Authentication Claims" has been added to the OAuth Resource Server configuration. If enabled The acr, amr, and auth_time claims are included in the OAuth access token.</li>
<li class="">A new option "Show Login Redirect URL in My Profile" has been added to OIDC applications. This setting controls whether the OIDC application with the redirect URL displays in the User portal.</li>
<li class="">OIDC applications with an expired or expiring certificate are now flagged with an icon in the Application List page.</li>
<li class="">When SAML attribute encryption is enabled for a SAML application, the default algorithm is now RSA-OAEP instead of RSA version 1.5.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="token-report-enhancements">Token Report Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.37/#token-report-enhancements" class="hash-link" aria-label="Direct link to Token Report Enhancements" title="Direct link to Token Report Enhancements" translate="no">​</a></h3>
<p>The token report now includes additional fields, including the platform for Entrust Soft Tokens and an indication of whether the token supports push notification.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="service-provider-role-updates">Service Provider Role Updates<a href="https://docs.trustedauth.com/blog/2024/5.37/#service-provider-role-updates" class="hash-link" aria-label="Direct link to Service Provider Role Updates" title="Direct link to Service Provider Role Updates" translate="no">​</a></h3>
<p>Permission to delete tenants has been added to the Service Provider On-boarding Administrator role.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2024/5.37/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.air.inc/" target="_blank" rel="noopener noreferrer" class="">Air</a>.</li>
<li class="">A new SAML application template for <a href="https://www.druva.com/" target="_blank" rel="noopener noreferrer" class="">Druva</a>.</li>
<li class="">A new SAML application template for <a href="https://www.freshworks.com/" target="_blank" rel="noopener noreferrer" class="">Freshworks</a>.</li>
<li class="">A new OIDC application template for <a href="https://www.freshworks.com/" target="_blank" rel="noopener noreferrer" class="">Freshworks</a>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2024/5.37/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">The FIDO/Passkey authenticator can now be chosen when configuring resource rules for IDaaS ADFS, IDaaS Apache Filter and IDaaS ISAPI application. (35988)</li>
<li class="">Add missing descriptions for various Email Template variables. (34070, 34069)</li>
<li class="">Generate audits for Onfido configuration errors detected when performing Face Biometric operations. (37017)</li>
<li class="">Improve wording of user/authenticator unlock notification email. (36506)</li>
<li class="">Audit for user portal settings change should not include settings that have not changed. (36654)</li>
<li class="">User provisioning using SCIM is now supported for accounts with the PLUS bundle. (36658)</li>
<li class="">Fix broken links and misleading steps in the Microsoft Entrust ID EAM integration guide. (36805)</li>
<li class="">Password expiry notification option to mobile should only be available when the user has a token supporting push notification. (34479)</li>
<li class="">When an option attribute is modified for a user synchronized from AD, the Security ID attribute gets modified to null. (34634)</li>
<li class="">In the User portal, step-up authentication should not be required to view the details of a Face Biometric authenticator. (36292)</li>
<li class="">The Dashboard shows the wrong count for expired applications if both OIDC and SAML applications have an expired certificate. (36445)</li>
<li class="">The SecurityID attribute can be modified using the Admin API when it is mapped from the directory. (34403, 33806)</li>
<li class="">The Option to add an Entrust Soft Token from the User portal was erroneously disabled when user was locked but lockout was expired. (36692)</li>
<li class="">IDaaS ESG package registry now includes net-snmp and net-snmp-utils for customers who want to install and configure these packages. (36882)</li>
<li class="">Offline tokens with Entrust Identity Desktop Credential Provider did not work for the Google Authenticator. (35917)</li>
<li class="">IDaaS Administration Guide now includes a description of the attributes that can be included in an audit. (36808)</li>
<li class="">Entrust Soft Token activation audit now includes the platform of the mobile device. (36302)</li>
<li class="">Add Face Biometric authenticator audit now includes state attribute. (36478)</li>
<li class="">Option to set Face Biometric authenticator expiry date to Never should not display a date. (36716)</li>
<li class="">Creating a domain-based Identity Provider is missing the option to select other Identity Providers. (36739)</li>
<li class="">Identity Provider initiated log in not showing organizations. (36665)</li>
<li class="">When configuring a Microsoft EAM OIDC application, the JSON configuration is missing the default application ID. (37164)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2024/5.37/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2024/5.37/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to the authentication API to support the enhancements made to Face Biometric authentication.</p>
<p>The following changes have been made to existing models:</p>
<ul>
<li class="">the attribute <code>pushMutualChallenge</code> has been added to the models <code>AuthenticatedResponse</code> and <code>UserAuthenticateQueryResponse</code>. This value contains the mutual authentication challenge that should be displayed to the user. This attribute applies to both token and face biometric authentication. This attribute replaces the existing attribute <code>tokenPushMutualChallenge</code> which still exists in both models but has been deprecated.</li>
<li class="">the attribute <code>pushMutualChallengeEnabled</code> has been added to the models <code>UserAuthenticateQueryParameters</code> and <code>UserChallengeParameters</code>. This value indicates if the client supports mutual authentication challenges. This attribute applies to both token and face biometric authentication. This attribute replaces the existing attribute <code>tokenPushMutualChallengeEnabled</code> which still exists in both models but has been deprecated.</li>
<li class="">the following changes have been made to <code>FaceChallenge</code>: - the attribute <code>applicantId</code> has been removed. It was not used in previous releases. - the attribute <code>device</code> has been added. This attribute indicates if the Face Biometric was registered on WEB or MOBILE. - the attributes <code>id</code> and <code>qrCode</code> have been added. These attributes are not used for authentication. - the attributes <code>sdkToken</code> and <code>workflowRunId</code> remain. When authenticating for a mobile Face Biometric authenticator, the sdkToken will be null and the workflowRunId will be the transactionId used to call the authenticate complete method to get the authentication response.</li>
</ul>
<p>In addition to the changes made to support the enhancements to Face Biometric authentication, the following changes have also been made to the authentication API.</p>
<p>The following method deprecated in an earlier release has been removed:</p>
<ul>
<li class=""><code>requestPasskeyChallengeUsingPOST</code> (<code>POST /api/web/v1/authentication/passkey</code>)</li>
</ul>
<p>The following model deprecated in an earlier release has been removed:</p>
<ul>
<li class=""><code>PasskeyChallengeParameters</code></li>
</ul>
<p>The following changes to existing models have been made:</p>
<ul>
<li class="">the attribute <code>registeredCredentialsNames</code>has been added to <code>FIDORegisterChallenge</code>. This attribute specifies the names of FIDO tokens already registered to the user.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2024/5.37/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following changes have been made to the administration API to support the enhancements made to Face Biometric authentication.</p>
<p>The following method has been added:</p>
<ul>
<li class=""><code>sendFaceActivationEmailUsingPUT</code> (<code>PUT /api/web/v1/face/{faceid}/activation</code>). This method sends an email containing a QR code or link used to launch Face Biometric authenticator activation in the mobile app.</li>
</ul>
<p>The following changes have been made to existing models:</p>
<ul>
<li class="">the following attributes have been added to <code>FaceAuthenticator</code> - <code>created</code> - the date the authenticator was created. - <code>lastUsed</code> - the date the authenticator was last used for authentication. - <code>mobile</code> - a flag indicating if the authenticator was registered in the mobile app. - <code>serialNumber</code> - an external identifier for the Face Authenticator.</li>
<li class="">the attribute <code>deliverActivationEmail</code> has been added to <code>FaceCreateParms</code>. This flag indicates if an activation email will be sent when a Face Authenticator is created.</li>
<li class="">the attribute <code>id</code> has been added to <code>FaceUpdateParms</code>. This attribute specifies which Face Biometric authenticator is to be updated. If not specified and the user has a single Face Biometric, that authenticator will be updated. If the user has multiple authenticators, an error will be returned.</li>
<li class="">the attribute <code>maxFacesPerUser</code> has been added to <code>GeneralSettings</code>. This policy specifies the maximum number of Face Biometric authenticators a user can have.</li>
</ul>
<p>In addition to the changes made to support the enhancements to Face Biometric authentication, the following changes have also been made to the administration API.</p>
<p>The following method has been added:</p>
<ul>
<li class=""><code>deleteTenantEntitlementUsingDELETE</code> (<code>DELETE /api/web/v4/tenants/{tenantid}/entitlements/{type}</code>). This method deletes the specified entitlement from the specified tenant of a service provider.</li>
</ul>
<p>The following changes to existing models have been made:</p>
<ul>
<li class="">The attribute <code>subscriptionLineId</code> has been added to <code>Entitlement</code>. This setting is used internally for configuring entitlements of an account.</li>
<li class="">The attribute <code>allowDeviceBiometric</code> has been added to <code>EntrustSTAuthenticatorSettings</code>. This setting specifies if an end user is allowed to use the device biometric to unlock the Entrust Soft Token in the Entrust Identity mobile app.</li>
<li class="">The attribute <code>registeredCredentialsNames</code>has been added to <code>FIDORegisterChallenge</code>. This attribute specifies the names of Passkey/FIDO2 tokens already registered to the user.</li>
<li class="">The attribute <code>overageType</code> has been added to <code>SmsVoice</code>. This setting is used internally for configuring SMS/Voice entitlements of an account.</li>
<li class="">The attribute <code>deleteEntitlement</code> has been added to <code>SmsVoiceParms</code>. This setting is used internally for configuring SMS/Voice entitlements of an account.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2024/5.37/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.37/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.37 and the three previous releases 5.34, 5.35 and 5.36). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>ESG was updated to use a new OS in 5.33. In place upgrade of ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions ESGs older than 5.33 to the new version use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances using older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.37/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.36]]></title>
        <id>https://docs.trustedauth.com/blog/2024/5.36/</id>
        <link href="https://docs.trustedauth.com/blog/2024/5.36/"/>
        <updated>2024-08-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2024/5.36/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="organizations">Organizations<a href="https://docs.trustedauth.com/blog/2024/5.36/#organizations" class="hash-link" aria-label="Direct link to Organizations" title="Direct link to Organizations" translate="no">​</a></h3>
<p>IDaaS has been enhanced to support organizations. An IDaaS user can belong to one or more organizations. When the user authenticates using a SAML or OIDC application, the authentication response indicates the organizations to which the user belongs. When a user belongs to multiple organizations, they are also asked to select the organization they are accessing.</p>
<p>Customer applications that support multiple tenants can map their tenants to IDaaS organizations and use this information to determine which tenant the authenticating user is accessing.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="domain-based-identity-provider-selection">Domain-based Identity Provider Selection<a href="https://docs.trustedauth.com/blog/2024/5.36/#domain-based-identity-provider-selection" class="hash-link" aria-label="Direct link to Domain-based Identity Provider Selection" title="Direct link to Domain-based Identity Provider Selection" translate="no">​</a></h3>
<p>Third-party Identity Providers can be configured to be associated with domains.</p>
<p>When an IDaaS authentication flow is configured to support external Identity Providers, they can be configured to use the external Identity Providers associated with a user's domain.</p>
<p>This allows a customer to define a single authentication flow that applies to users using different Identity Providers based on the user's domain.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="face-biometric-authenticator-using-onfido">Face Biometric Authenticator using Onfido<a href="https://docs.trustedauth.com/blog/2024/5.36/#face-biometric-authenticator-using-onfido" class="hash-link" aria-label="Direct link to Face Biometric Authenticator using Onfido" title="Direct link to Face Biometric Authenticator using Onfido" translate="no">​</a></h3>
<p>A new authenticator "Face Biometric" has been added to IDaaS. This authenticator uses Onfido technology to perform strong biometric authentication of a user. The Face Biometric authenticator is available when authenticating to SAML and OIDC applications, and to the IDaaS portal.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="step-up-authentication-for-user-portal-update-operations">Step-up authentication for User Portal Update Operations<a href="https://docs.trustedauth.com/blog/2024/5.36/#step-up-authentication-for-user-portal-update-operations" class="hash-link" aria-label="Direct link to Step-up authentication for User Portal Update Operations" title="Direct link to Step-up authentication for User Portal Update Operations" translate="no">​</a></h3>
<p>When configuring the resource rules for the User portal, a separate resource rule can now be specified for User portal update operations. This allows the customer to require separate authentication before a user is allowed to modify their user profile or manage their own authenticators.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-portal-configuration-enhancements">User Portal Configuration Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.36/#user-portal-configuration-enhancements" class="hash-link" aria-label="Direct link to User Portal Configuration Enhancements" title="Direct link to User Portal Configuration Enhancements" translate="no">​</a></h3>
<p>The User portal can now be configured to restrict the actions are available to the end users. Additionally, the User portal configuration has been reorganized so that all the settings are accessed from the new Policies &gt; User Portal menu.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="saml-enhancements">SAML Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.36/#saml-enhancements" class="hash-link" aria-label="Direct link to SAML Enhancements" title="Direct link to SAML Enhancements" translate="no">​</a></h3>
<p>SAML IDP initiated authentication has been enhanced so that the request can specify the Service Provider the user is authenticated to using the Service Provider Entity ID and the Relay State (if required) by Relay State value. The URL would have the following format.</p>
<p><code>https://&lt;tenant&gt;/api/saml/SAML2/SSO?spentityid=&lt;spentityid&gt;&amp;RelayState=&lt;RelayState&gt;</code></p>
<p>This feature allows a customer to generate IDP URLs that can be bookmarked.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="bulk-enhancements">Bulk Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.36/#bulk-enhancements" class="hash-link" aria-label="Direct link to Bulk Enhancements" title="Direct link to Bulk Enhancements" translate="no">​</a></h3>
<p>A new bulk operation to delete grids has been added to IDaaS. This bulk operation can delete either assigned or unassigned grids.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="upcoming-cross-origin-requests-cors-handling-changes">Upcoming Cross-Origin Requests (CORS) Handling Changes<a href="https://docs.trustedauth.com/blog/2024/5.36/#upcoming-cross-origin-requests-cors-handling-changes" class="hash-link" aria-label="Direct link to Upcoming Cross-Origin Requests (CORS) Handling Changes" title="Direct link to Upcoming Cross-Origin Requests (CORS) Handling Changes" translate="no">​</a></h3>
<p>IDaaS will be making the following changes to how CORS is handled in IDaaS in a future release. In 5.36, IDaaS will track invalid requests and Entrust will notify customers that will be impacted by these changes.</p>
<ul>
<li class="">IDaaS will reject requests that contain an Origin header with a value of null.</li>
<li class="">The IDaaS Configuration setting "Enable CORS" will be enabled by default meaning that applications that are making cross-origin requests to IDaaS APIs will need to define the list of allowed origins in IDaaS CORS configuration.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="service-provider-management-removed">Service Provider Management Removed<a href="https://docs.trustedauth.com/blog/2024/5.36/#service-provider-management-removed" class="hash-link" aria-label="Direct link to Service Provider Management Removed" title="Direct link to Service Provider Management Removed" translate="no">​</a></h3>
<p>The service provider management capabilities supported for Google and Box have been removed. User provisioning is now supported using SCIM.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2024/5.36/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.alibabacloud.com/" target="_blank" rel="noopener noreferrer" class="">Alibaba Cloud</a>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2024/5.36/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="5361-patch">5.36.1 Patch<a href="https://docs.trustedauth.com/blog/2024/5.36/#5361-patch" class="hash-link" aria-label="Direct link to 5.36.1 Patch" title="Direct link to 5.36.1 Patch" translate="no">​</a></h3>
<ol>
<li class="">OTP authentication for step-up authentication fails under some conditions. (36822)</li>
<li class="">Default value of IDaaS Face Biometric Authentication Input Name policy does not match new Onfido value for default workflows. (36770)</li>
<li class="">IDaaS does not accept some valid values for Onfido API key when configuring Onfido. (36883)</li>
<li class="">When changing Onfido API key or Web Hook token configuration in IDaaS the wrong value is saved unless both values are changed. (36721)</li>
<li class="">Access to the User Portal Entrust Soft Token activate/reactivate operation now requires the Entrust Soft Token Edit permission instead of the Add permission. This means the user portal can be configured to allow end users to activate or reactivate existing tokens without allowing them to create new tokens. (36908)</li>
</ol>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="536">5.36<a href="https://docs.trustedauth.com/blog/2024/5.36/#536" class="hash-link" aria-label="Direct link to 5.36" title="Direct link to 5.36" translate="no">​</a></h3>
<ol>
<li class="">When configuring the network proxy for ESG the Save button should be disabled when the proxy test fails. (36143)</li>
<li class="">Enterprise Service Gateway heartbeats might not be tracked correctly due to clock skew between ESG and IDaaS. (36066)</li>
<li class="">Mobile SmartCredential activation dialog updated to reference the Entrust Identity mobile app and not the old Entrust SmartCredential app. (35607)</li>
<li class="">User report fails for users that have not completed activation. (36626)</li>
<li class="">User verification fails with error service_authentication.email_template_not_found. (35956)</li>
<li class="">Authentication flow not displayed correctly in user portal when using Safari. (36058)</li>
<li class="">The attributes SecurityID and User Principal Name are no longer shown in the User Portal &gt; User Profile. (35321)</li>
<li class="">Offline token download not working for Desktop Credential Provider. (36049)</li>
<li class="">Improved audits when a SAML or OIDC application is modified. (35662)</li>
<li class="">Rename Microsoft Azure AD to Microsoft Entra ID in the IDaaS documentation. (35518)</li>
<li class="">Administrator should be blocked from upgrading Managed Service Provider from Trial to Production if there are not entitlements available. (34708)</li>
<li class="">Fix log rotation configuration for Enterprise Service Gateway. (35661)</li>
<li class="">Directory Test action is now disabled for Gateways with versions prior to 5.35. (35900)</li>
<li class="">Authentication Flow graphics should not have connection dots for IDPs without second factor. (34972)</li>
<li class="">Fix sorting in User Certificate Settings page. (36630)</li>
<li class="">When password is changed from Entrust Identity mobile app, the IDaaS audit is missing the resource name. (34178)</li>
<li class="">IDaaS Developer Portal includes an extra newline in the section linking to the license. (35960)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2024/5.36/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2024/5.36/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following models have been added to support Face Biometric authentication.</p>
<ul>
<li class=""><code>FaceChallenge</code> specifies the attributes needed to launch a Face Biometric authentication.</li>
</ul>
<p>The following attributes have been added to existing models to support Face Biometric authentication.</p>
<ul>
<li class="">the attribute <code>faceChallenge</code> has been added to <code>AuthenticatedResponse</code>.</li>
<li class="">the attribute <code>faceResponse</code> has been added to <code>UserAuthenticateParameters</code>.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2024/5.36/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following methods have been added to support management of Face Biometric authenticators.</p>
<ul>
<li class=""><code>DELETE /api/web/v1/face/{faceid} (deleteFaceUsingDELETE)</code> - Delete the specified Face Biometric authenticator.</li>
<li class=""><code>POST /api/web/v1/users/{userid}/face (createFaceUsingPOST)</code> - Create a Face Biometric for the given user.</li>
<li class=""><code>PUT /api/web/v1/users/{userid}/face (updateFaceUsingPUT)</code> - Update the Face Biometric for the given user.</li>
<li class=""><code>GET /api/web/v1/users/{userid}/faces (getFacesUsingGET)</code> - Get the Face Biometrics for the given user.</li>
<li class=""><code>GET /api/web/v1/users/{userid}/settings/face (getUserFaceSettingsUsingGET)</code> - Get the Face Biometric settings for the given user.</li>
</ul>
<p>The following models have been added for Face Biometric Authenticators.</p>
<ul>
<li class=""><code>FaceAuthenticator</code> specifies the attributes for a Face Biometric.</li>
<li class=""><code>FaceCreateParms</code> specifies the attributes passed when creating a Face Biometric.</li>
<li class=""><code>FaceUpdateParms</code> specifies the attributes passed when modifying an existing Face Biometric.</li>
<li class=""><code>UserFaceSettings</code> specifies the settings for the Face Biometric authenticator.</li>
</ul>
<p>The following methods have been added to support management of Organizations.</p>
<ul>
<li class=""><code>POST /api/web/v1/organizations (createOrganizationUsingPOST)</code> - Create an organization.</li>
<li class=""><code>GET /api/web/v1/organizations/{id} (getOrganizationUsingGET)</code> - Get the specified organization.</li>
<li class=""><code>PUT /api/web/v1/organizations/{id} (putOrganizationUsingPUT)</code> - Update the specified organization.</li>
<li class=""><code>DELETE /api/web/v1/organizations/{id} (deleteOrganizationUsingDELETE)</code> - Delete the specified organization.</li>
<li class=""><code>POST /api/web/v1/organizations/{orgid}/users/{userid} (createUserOrganizationAssociationUsingPOST)</code> - Add the specified user to the specified organization.</li>
<li class=""><code>DELETE /api/web/v1/organizations/{orgid}/users/{userid} (deleteUserOrganizationAssociationUsingDELETE)</code> - Remove the specified user from the specified organization.</li>
<li class=""><code>POST /api/web/v1/organizationspaged (organizationsPagedUsingPOST)</code> - List organizations matching the given search criteria.</li>
<li class=""><code>PUT /api/web/v1/users/{userid}/organizations (modifyUserAOrganizationAssociationsUsingPUT)</code> - Modify the organizations for the specified user.</li>
</ul>
<p>The following models have been added for Organizations.</p>
<ul>
<li class=""><code>Organization</code> specifies the attributes of an organization.</li>
<li class=""><code>OrganizationPage</code> specifies a page of organizations returned from the list operation.</li>
<li class=""><code>OrganizationParms</code> specifies the parameters passed when creating or modifying an organization.</li>
<li class=""><code>UserOrganizationParms</code> specifies the parameters passed when modifying the organizations to which a user belongs.</li>
</ul>
<p>The following changes to existing models have been made to support Organizations.</p>
<ul>
<li class="">the attribute <code>organizationIds</code>has been added to <code>OidcIdentityProvider</code> and <code>OidcIdentityProviderParms</code>. This attribute specifies a list of organizations to which a user created after authenticating to an external IDP will be assigned.</li>
<li class="">the attribute <code>organizations</code> has been added to <code>User</code> and <code>UserParms</code>. This attribute specifies a list of organizations to which the user belongs.</li>
</ul>
<p>The following changes to existing models have been made to support Domain-based IDPs.</p>
<ul>
<li class="">the boolean attribute <code>idpDomainBased</code> has been added to <code>AuthenticationFlow</code> and <code>AuthenticationFlowParms</code>. This attribute indicates if the AuthenticationFlow will only use domain-based IDPs.</li>
<li class="">the attribute <code>domains</code> has been added to <code>OidcIdentityProvider</code> and <code>OidcIdentityProviderParms</code>. This attribute specifies a space separated list of domains associated with the IDP.</li>
</ul>
<p>When specifying a password value for a user the provided value can now be passed as cleartext (the existing behavior) or provided as a bcrypt protected value (new behavior). This allows a customer to import existing bcrypt protected passwords into IDaaS using the IDaaS administration API. To support this functionality the following changes have been made existing models.</p>
<ul>
<li class="">the attribute <code>passwordFormat</code> has been added to <code>UserPasswordParms</code>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2024/5.36/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.36/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.36 and the three previous releases 5.33, 5.34 and 5.35). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>ESG was updated to use a new OS in 5.33. In place upgrade of ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions ESGs older than 5.33 to the new version use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances using older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.36/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.35]]></title>
        <id>https://docs.trustedauth.com/blog/2024/5.35/</id>
        <link href="https://docs.trustedauth.com/blog/2024/5.35/"/>
        <updated>2024-06-20T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2024/5.35/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-certificate-authentication">User Certificate Authentication<a href="https://docs.trustedauth.com/blog/2024/5.35/#user-certificate-authentication" class="hash-link" aria-label="Direct link to User Certificate Authentication" title="Direct link to User Certificate Authentication" translate="no">​</a></h3>
<p>A new user certificate authenticator has been added to IDaaS. This authenticator can be used in a passwordless login flow or as a second-factor in User Login flow or IDP login flow.</p>
<p>User certificates can be either certificates issued by third-party CAs or certificates in IDaaS-issued smart credentials. The third-party CAs need to be added to the IDaaS Trusted CA list and marked as a user certificate CA. Additionally, to align with the new user certificate authenticator, issuing CAs will no longer be automatically used in device verification. A new option was added to allow specifying issuing CAs to be used in device verification.</p>
<p>User certificates issued by 3rd party CAs are matched against the user's attributes to locate the user in IDaaS. Supported certificate components for this matching process include subject DN, subject alternative Name, and serial number. For user attributes, user ID, user principal name, security ID, and custom attributes are supported. User certificates from IDaaS-issued smart credentials do not use the certificate matching process.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="device-verification-enhancements">Device Verification Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.35/#device-verification-enhancements" class="hash-link" aria-label="Direct link to Device Verification Enhancements" title="Direct link to Device Verification Enhancements" translate="no">​</a></h3>
<p>IDaaS device verification has been enhanced to support verification performed using the forthcoming release of the Entrust Device Agent (formerly Identity Bluetooth Reader).</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-microsoft-entra-id-external-authentication-method-eam">Support Microsoft Entra ID External Authentication Method (EAM)<a href="https://docs.trustedauth.com/blog/2024/5.35/#support-microsoft-entra-id-external-authentication-method-eam" class="hash-link" aria-label="Direct link to Support Microsoft Entra ID External Authentication Method (EAM)" title="Direct link to Support Microsoft Entra ID External Authentication Method (EAM)" translate="no">​</a></h3>
<p>IDaaS has added support for Microsoft Entra ID EAM where IDaaS can provide second-factor authentication for customers authenticating to Microsoft Entrust ID.</p>
<p>IDaaS Password, KBA and IDP authenticators are classified as knowledge type authenticators by IDaaS and so are not accepted by Microsoft Entra ID EAM as acceptable second-factor authenticators.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="directory-configuration-validation">Directory Configuration Validation<a href="https://docs.trustedauth.com/blog/2024/5.35/#directory-configuration-validation" class="hash-link" aria-label="Direct link to Directory Configuration Validation" title="Direct link to Directory Configuration Validation" translate="no">​</a></h3>
<p>A new Test action has been added for Directories. The Test action tests the directory configuration against the directory and reports on any errors found in the configuration.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="certificate-expiry-notification">Certificate Expiry Notification<a href="https://docs.trustedauth.com/blog/2024/5.35/#certificate-expiry-notification" class="hash-link" aria-label="Direct link to Certificate Expiry Notification" title="Direct link to Certificate Expiry Notification" translate="no">​</a></h3>
<p>When Notifications are enabled in IDaaS (Configuration &gt; Notification) notifications are sent indicating when SAML and OIDC certificates are nearing expiry or have expired.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="oidcsaml-enhancements">OIDC/SAML Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.35/#oidcsaml-enhancements" class="hash-link" aria-label="Direct link to OIDC/SAML Enhancements" title="Direct link to OIDC/SAML Enhancements" translate="no">​</a></h3>
<p>OIDC and SAML now support external authentication as a first-factor optionally without any second-factor authentication. SAML and OIDC applications can be configured to return to the client without user intervention when an error occurs during authentication. These capabilities allow a customer to configure their Service Provider to only use IDaaS risk capabilities to decide whether a user is allowed or denied access.</p>
<p>Customers should only use external authentication when they know that the client is performing first-factor authentication. Additionally, single sign-on should be disabled for a resource rule using external authentication.</p>
<p>When an OIDC authentication fails due to access denied, more error information can be included in the response returned to the client. This is controlled by the existing General setting "Enabled Enhanced Authentication Details."</p>
<p>IDaaS now supports the OAuth 2.0 Web Message Response Mode.</p>
<p>OIDC Authentication Context Class Reference (ACR) and Authentication Methods References (AMR) claims are now populated based on the authenticators used in IDaaS to authenticate the user.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="external-risk-enhancements">External Risk Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.35/#external-risk-enhancements" class="hash-link" aria-label="Direct link to External Risk Enhancements" title="Direct link to External Risk Enhancements" translate="no">​</a></h3>
<p>Support for Generic External Risk Engines has been added to IDaaS. This allows customers to integrate their own risk engines with IDaaS.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="developer-portal-enhancements">Developer Portal Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.35/#developer-portal-enhancements" class="hash-link" aria-label="Direct link to Developer Portal Enhancements" title="Direct link to Developer Portal Enhancements" translate="no">​</a></h3>
<p>The IDaaS Developer Portal has been enhanced with a new Docs section that includes documents describing how to integrate IDaaS with various services. New in this release is <a class="" href="https://docs.trustedauth.com/docs/applications-and-sso/oidc/secure-aws-api/">Protecting AWS API Gateway</a>.</p>
<p>The IDaaS administration and authentication SDKs are now available by way of a private registry, facilitating easier integration into customer projects. Initially, Java, CSharp, and Python SDKs are available in the registry. Support for the Php SDK has been discontinued. The Python SDK now requires Python 3.7 or higher. The CSharp SDK has been updated to support .NET 8.0. For instructions on adding the private registry into your project, see the IDaaS <a class="" href="https://docs.trustedauth.com/developer/">Developer Portal</a>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="bulk-enhancements">Bulk Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.35/#bulk-enhancements" class="hash-link" aria-label="Direct link to Bulk Enhancements" title="Direct link to Bulk Enhancements" translate="no">​</a></h3>
<p>The locale of the user can now be specified when creating or updating users.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="configure-allowed-smart-credential-definitions">Configure Allowed Smart Credential Definitions<a href="https://docs.trustedauth.com/blog/2024/5.35/#configure-allowed-smart-credential-definitions" class="hash-link" aria-label="Direct link to Configure Allowed Smart Credential Definitions" title="Direct link to Configure Allowed Smart Credential Definitions" translate="no">​</a></h3>
<p>When configuring smart credentials, an administrator can specify a list of allowed smart credential definitions. This allows an administrator to restrict which smart credential definitions can be selected when activating a smart credential.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enhanced-configuration-for-idaas-desktop-application">Enhanced Configuration for IDaaS Desktop Application<a href="https://docs.trustedauth.com/blog/2024/5.35/#enhanced-configuration-for-idaas-desktop-application" class="hash-link" aria-label="Direct link to Enhanced Configuration for IDaaS Desktop Application" title="Direct link to Enhanced Configuration for IDaaS Desktop Application" translate="no">​</a></h3>
<p>When configuring an IDaaS Desktop Application, the administrator can now configure if the client application can determine whether the client IP address is used for Audits but not Resource Rule Conditions.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2024/5.35/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.aboutamazon.com/news/company-news/what-is-amazon-business" target="_blank" rel="noopener noreferrer" class="">Amazon Business</a>.</li>
<li class="">A new SAML application template for <a href="https://www.confluent.io/" target="_blank" rel="noopener noreferrer" class="">Confluent Cloud</a>.</li>
<li class="">A new SAML application template for <a href="https://www.broadcom.com/products/identity/siteminder" target="_blank" rel="noopener noreferrer" class="">SiteMinder</a>.</li>
<li class="">A new RADIUS application template for <a href="https://www.openvpn.net/" target="_blank" rel="noopener noreferrer" class="">OpenVPN</a>.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2024/5.35/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Return a specific error grid_max_num_per_user when assigning a grid to a user who already has the maximum number of grids allowed. (33750)</li>
<li class="">Improvements to OIDC and IDP audits. (26886, 34533, 34538, 34907, 35123, 35180, 35353)</li>
<li class="">RADIUS push authentication does not properly handle repeated requests from VPN causing the authentication to be rejected. (35811)</li>
<li class="">Changes to the user authenticator page in 5.34 added a requirement for the SETTINGS<!-- -->:VIEW<!-- --> permission causing the page to fail to load for administrators without that permission. This permission is no longer required. (35424)</li>
<li class="">When a user selects a different locale during login they are given an option to set that locale as their default locale. If the user chose not to save that value in some scenarios, it would be saved regardless. (32335)</li>
<li class="">User list operation filtering for disabled users failed with error that the requested operation could not be performed. (34302)</li>
<li class="">Custom mail server error still present in UI after OAuth re-authentication. (35139)</li>
<li class="">URLs in message of the day may be truncated. (34523)</li>
<li class="">Updates to OTP default delivery settings not displayed in UI after save. (35179)</li>
<li class="">Alternate OTP delivery options ignored when authenticating for password. (35609)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2024/5.35/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2024/5.35/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following changes have been made to support user certificate authentication:</p>
<ul>
<li class="">The model <code>UserCertificateChallenge</code> has been added.</li>
<li class="">The attribute <code>userCertificateChallenge</code> of type <code>UserCertificateChallenge</code> has been added to <code>AuthenticatedResponse</code>.</li>
<li class="">The model <code>UserCertificateResponse</code> has been added.</li>
<li class="">The attribute <code>userCertificateResponse</code> of type <code>UserCertificateResponse</code> has been added to <code>UserAuthenticateParameters</code>.</li>
<li class="">The type <code>USER_CERTIFICATE</code> has been added as an allowed value where ever authentication types are specified.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2024/5.35/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The type <code>USER_CERTIFICATE</code> has been added as an allowed value where ever authentication types are specified.</p>
<p>The type <code>USER_CERTIFICATE_LOGIN</code> has been added to the list of allowed Login Flow types.</p>
<p>New v2 versions of the following authentication APIs have been created to support the new <code>USER_CERTIFICATE</code> authentication type and the <code>USER_CERTIFICATE_LOGIN</code> login flow.</p>
<ul>
<li class=""><code>GET /api/web/v2/authenticationflows (getAuthenticationFlowsUsingGET)</code> - List authentication flows.</li>
<li class=""><code>POST /api/web/v2/authenticationflows (createAuthenticationFlowUsingPOST)</code> - Create an authentication flow.</li>
<li class=""><code>DELETE /api/web/v2/authenticationflows/{id} (removeAuthenticationFlowUsingDELETE)</code> - Delete an authentication flow.</li>
<li class=""><code>GET /api/web/v2/authenticationflows/{id} (getAuthenticationFlowUsingGET)</code> - Get an authentication flow.</li>
<li class=""><code>PUT /api/web/v2/authenticationflows/{id} (updateAuthenticationFlowUsingPUT)</code> - Modify an authentication flow.</li>
</ul>
<p>The attribute <code>allowIgnoreIpAddressForRba</code> has been added to <code>AuthApiApplication</code> and <code>AuthApiApplicationParms</code>. This value specifies whether the client can specify that the client IP address is used for audits but not for resource rule conditions. This attribute only applies to IDaaS Desktop applications.</p>
<p>The following APIs have been added:</p>
<ul>
<li class=""><code>GET /api/web/v1/scdefns/users/{userId} (listAllowedSCDefnsUsingGET)</code> - List smart credential definitions that are allowed for the specified user.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2024/5.35/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Support for the following TLS Ciphers were removed in IDaaS 5.32.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.35/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.35 and the three previous releases 5.32, 5.33 and 5.34). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>ESG was updated to use a new OS in 5.33. In place upgrade of ESG is only supported for versions 5.33 or later. To upgrade versions ESGs older than 5.33 to the new version use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances using older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.35/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.34]]></title>
        <id>https://docs.trustedauth.com/blog/2024/5.34/</id>
        <link href="https://docs.trustedauth.com/blog/2024/5.34/"/>
        <updated>2024-03-28T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2024/5.34/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="idp-plus-second-factor-authentication">IDP plus Second-Factor Authentication<a href="https://docs.trustedauth.com/blog/2024/5.34/#idp-plus-second-factor-authentication" class="hash-link" aria-label="Direct link to IDP plus Second-Factor Authentication" title="Direct link to IDP plus Second-Factor Authentication" translate="no">​</a></h3>
<p>When using a third-party identity provider for authentication, IDaaS second-factor authentication can now be included in the authentication flow.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="step-up-authentication-to-edit-user-profile">Step-Up Authentication to Edit User Profile<a href="https://docs.trustedauth.com/blog/2024/5.34/#step-up-authentication-to-edit-user-profile" class="hash-link" aria-label="Direct link to Step-Up Authentication to Edit User Profile" title="Direct link to Step-Up Authentication to Edit User Profile" translate="no">​</a></h3>
<p>The User portal can be configured to require step-up OTP authentication before a user is allowed to edit their user profile. The user attributes that receive the OTP can be configured in the policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="oidc-certificate-management">OIDC Certificate Management<a href="https://docs.trustedauth.com/blog/2024/5.34/#oidc-certificate-management" class="hash-link" aria-label="Direct link to OIDC Certificate Management" title="Direct link to OIDC Certificate Management" translate="no">​</a></h3>
<p>The certificates used for OIDC applications can now be managed, including having them certified by a Certificate Authority.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="grid-delivery-address-selection">Grid Delivery Address Selection<a href="https://docs.trustedauth.com/blog/2024/5.34/#grid-delivery-address-selection" class="hash-link" aria-label="Direct link to Grid Delivery Address Selection" title="Direct link to Grid Delivery Address Selection" translate="no">​</a></h3>
<p>When the end user or an administrator chooses to deliver a grid, the email address to use can now be selected. The allowed addresses can be configured in the policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="restrict-otp-delivery-types">Restrict OTP Delivery Types<a href="https://docs.trustedauth.com/blog/2024/5.34/#restrict-otp-delivery-types" class="hash-link" aria-label="Direct link to Restrict OTP Delivery Types" title="Direct link to Restrict OTP Delivery Types" translate="no">​</a></h3>
<p>The OTP delivery types that are available for OTP authentication can now be specified in the policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administrator-support-for-entrust-soft-token-manual-activation">Administrator Support for Entrust Soft Token Manual Activation<a href="https://docs.trustedauth.com/blog/2024/5.34/#administrator-support-for-entrust-soft-token-manual-activation" class="hash-link" aria-label="Direct link to Administrator Support for Entrust Soft Token Manual Activation" title="Direct link to Administrator Support for Entrust Soft Token Manual Activation" translate="no">​</a></h3>
<p>When an administrator activates an Entrust Soft Token from the Administration portal, they now have the option to view the manual activation parameters.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="automatically-send-registration-magic-link">Automatically Send Registration Magic Link<a href="https://docs.trustedauth.com/blog/2024/5.34/#automatically-send-registration-magic-link" class="hash-link" aria-label="Direct link to Automatically Send Registration Magic Link" title="Direct link to Automatically Send Registration Magic Link" translate="no">​</a></h3>
<p>The Registration Magic Link can now be configured so that it is automatically delivered when a user is created.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-id-quick-search">User ID Quick Search<a href="https://docs.trustedauth.com/blog/2024/5.34/#user-id-quick-search" class="hash-link" aria-label="Direct link to User ID Quick Search" title="Direct link to User ID Quick Search" translate="no">​</a></h3>
<p>The user list in the admin portal now has a "Search for User ID" quick search option.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2024/5.34/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new RADIUS application template for PAM RADIUS Plug-in.</li>
<li class="">A new SAML application template for <a href="https://www.fastly.com/" target="_blank" rel="noopener noreferrer" class="">Fastly</a></li>
<li class="">A new SAML application template for <a href="https://www.lucidchart.com/" target="_blank" rel="noopener noreferrer" class="">Lucidchart</a></li>
<li class="">A new SAML application template for <a href="https://www.soloinsight.com/" target="_blank" rel="noopener noreferrer" class="">Soloinsight</a></li>
</ul>
<p>The following Identity as a Service integrations have been renamed from IntelliTrust to IDaaS:</p>
<ul>
<li class="">IDaaS AD FS Adapter</li>
<li class="">IDaaS Apache Filter</li>
<li class="">IDaaS Desktop</li>
<li class="">IDaaS ISAPI Filter</li>
</ul>
<p>The Identity as a Service integration IntelliTrust ForgeRock has been removed. The OIDC ForgeRock application is still available.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2024/5.34/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">When creating a tenant from a managed service provider, the country of the tenant and the mobile phone number of the first administrator are now optional. (34504)</li>
<li class="">When creating a tenant from a managed service provider, tenant creation fails if the service provider's entitlements are expired. The entitlement is now verified before trying to create the tenant. (34224)</li>
<li class="">Improved the performance of token queries and reports when the tenant has a large number of tokens. (34584, 34916)</li>
<li class="">Improved the performance of user export for tenants with a large number of users. (33632)</li>
<li class="">Device verification is now fully supported for Passkey, IDP, and Smart Login authentication. (34273, 34274, 34275)</li>
<li class="">Device verification caused unexpected errors if the user entered an invalid password during password change. (34528)</li>
<li class="">The tab titles in the User portal and Administration portal have been changed to use black instead of the primary account color. (34284)</li>
<li class="">Fixed the ESG setup_static_ip.sh script. (35025)</li>
<li class="">Previously an imported PKIaaS CA only supported OCSP for certificate revocation. Now CRLs are also supported. (34672)</li>
<li class="">Smart login now supports single sign-on. (33162)</li>
<li class="">The User portal operations to verify ownership of a phone number now consume SMS/Voice entitlements. (26751)</li>
<li class="">SAML metadata download fails when "All Certificates" is selected. (35034)</li>
<li class="">Addressed issues where travel velocity was performed for IP addresses without a location. (34364)</li>
<li class="">Improved the display of the Message of the Day in the login page on mobile devices. (34005)</li>
<li class="">Smart Login is now available for managed service provider tenants. (34581)</li>
<li class="">Fixed an issue with directory sync where errors could result in the user entitlement counts to be incorrect until the daily entitlement verification task was performed. (29178, 31441)</li>
<li class="">Addressed some issues in how authentication flows display in the Administration portal. (34807)</li>
<li class="">The subject name for a SYNCADD user audit should be clickable. (34478)</li>
<li class="">The IDP remove audit should not include all the details of the removed IDP. (34688)</li>
<li class="">Return a better error message when a duplicated trusted CA certificate is added. (33108)</li>
<li class="">Improve the formatting of authentication audits containing device certificate risk factor evaluation results so that the device certificate DN displays properly. (32896)</li>
<li class="">Improve the formatting of the Passkey button text on Safari. (34058)</li>
<li class="">Optional custom user attributes synchronized from the directory could be modified using the Administration API. (34402, 34405)</li>
<li class="">OTP authentication settings modify audit contained attributes whose values did not change. (34685, 34698)</li>
<li class="">The audit generated when a user is created or a soft token is created as part of user creation after an IDP authentication has the wrong subject name. (34524, 34534)</li>
<li class="">The audit generated when an inactive user authenticates with Passkey/FIDO2 was missing the Authenticator value. (31770)</li>
<li class="">PKIaaS CA actions on Issuing CA list page should be disabled for administrators that do not have permission to perform the action. Performing the action caused a permission denied error. (32930)</li>
<li class="">When configuring an Identity Provider, the JWKS Endpoint is now required for all IDPs except for Twitter. (34585)</li>
<li class="">The wrong error was displayed in the Administration portal if the administrator tried to remove a synchronized group from the user. (34379)</li>
<li class="">Passkey authentication did not work for managed service providers authenticating to a child account. (34277)</li>
<li class="">Some strings in the user portal were not translated for all locales. (34362, 34532)</li>
<li class="">Make the mobile application name consistent between the Activate Smart Credential and Activate Soft Token dialogs. (34648)</li>
<li class="">The "Add Client Credential Grant" option should be disabled for administrators that do not have permission to perform the operation. Performing the action results in a no permission error. (34509)</li>
<li class="">Improve the audit generated when a custom mail server is updated with a new password to indicate that the password was changed. (32904)</li>
<li class="">Fix password reset for AD passwords for users whose DN contains values that need to be escaped. (34285)</li>
<li class="">Only audits that have a subject name that are user IDs should be clickable. (34521)</li>
<li class="">The reset password audit shows the forceUpdate attribute even though it has not changed. (33042)</li>
<li class="">Changing the state of the ESG password agent could fail. (34641)</li>
<li class="">Creating a Generic Server OIDC Application is now only available in an account with the premium bundle. (34540)</li>
<li class="">Identity Provider configuration now supports acr values request. Supply a space separated list of acr values. If supplied then at least one of specified ones must be returned from the IDP to be successful. (34620)</li>
<li class="">If an OIDC request specifies a claims request for acr or amr as essential with specified values, then if at least one of the specified values cannot be achieved, the request wil fail. (34673)</li>
<li class="">Fixed an issue where the name and description of a resource rule containing groups synchronized from AD could not be updated. (34594)</li>
<li class="">Fixed an issue where the FIDOTOKEN add permission could not be set when creating or editing a role in the admin portal. (35259)</li>
<li class="">Updated phone number validation that was rejected phone numbers with new area codes for some countries. (35223)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2024/5.34/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2024/5.34/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The attribute <code>ignoreIPAddressForRBA</code> has been added to <code>UserAuthenticateQueryParameters</code>, <code>UserChallengeParameters</code>, and <code>UserAuthenticateParameters</code>. When this attribute is set to true, the IP address provided to an authentication request is included in authentication audits but is not used for risk-based authentication. By default, the IP address is used for both audits and risk-based authentication.</p>
<p>The attribute <code>expires</code> has been added to <code>UserAuthenticateQueryResponse</code>. It specifies the expiry time of the authentication token.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2024/5.34/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following changes have been made to support selecting which email attribute is used when delivering a grid to a user.</p>
<ul>
<li class="">The model <code>EmailParms</code> has been added.</li>
<li class="">The API <code>deliverAssignedGridByEmailUsingPOST</code> now takes <code>EmailParms</code> as a parameter.</li>
<li class="">The attribute <code>emailParms</code> of type <code>EmailParms</code> has been added to the model <code>GridAssignParms</code>. This attribute is used when calling the API <code>assignGridByIdUsingPUT</code> and <code>assignGridBySerialNumberUsingPUT</code>.</li>
<li class="">The attribute <code>emailParms</code> of type <code>EmailParms</code> has been added to the model <code>GridCreateParms</code>. This attribute is used when calling the API <code>createGridUsingPOST</code>.</li>
</ul>
<p>The following changes have been made to define the OTP Settings policy used to define which delivery types can be used to deliver OTPs.</p>
<ul>
<li class="">The model <code>OTPDeliveryMethod</code> has been added. It defines an OTP delivery method and indicates if that method can be used for delivering OTPs.</li>
<li class="">The attribute <code>deliveryMethods</code>has been added to the model <code>OTPAuthenticatorSettings</code>. It defines an ordered list of OTP delivery methods that can be used for delivery OTPs. The first entry in the list is the default delivery method.</li>
<li class="">The attribute <code>otpDefaultDelivery</code> in the model <code>OTPAuthenticatorSettings</code> has been deprecated and is replaced by <code>deliveryMethods</code>.</li>
</ul>
<p>The following changes have been made to support defining IDP plus second-factor authentication and other improvements to Identity Providers.</p>
<ul>
<li class="">The attribute <code>idpLoginSecondStep</code> has been added to <code>AuthenticationFlow</code> and <code>AuthenticationFlowParms</code>. This attribute defines the list of authenticators that are required for IDP second-factor authentication.</li>
<li class="">The attribute <code>acrValues</code> has been added to <code>OidcIdentityProvider</code> and <code>OidcIdentityProviderParms</code>. This attribute defines a list of authentication context request values to include in the authentication request to the 3rd-party IDP.</li>
<li class="">The attribute descriptions for <code>OidcIdentityProvider</code> and <code>OidcIdentityProviderParms</code> have been improved.</li>
</ul>
<p>Other changes made to the Administration API:</p>
<ul>
<li class="">The attribute <code>companyCountry</code> in the model <code>TenantParms</code> is no longer required when creating a new tenant.</li>
<li class="">The attribute <code>mobile</code> in the model <code>UserParms</code> used to create the first administrator of the tenant is no longer required when creating a new tenant.</li>
<li class="">The version of the method <code>createTenantAsyncUsingPOST</code> has been updated from v4 to v5. The non-compatible changes requiring this change are not related to authentication clients and will not impact IDaaS customers.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2024/5.34/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Support for the following TLS Ciphers were removed in IDaaS 5.32.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.34/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.34 and the three previous releases 5.31, 5.32 and 5.33). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<p>ESG was updated to use a new OS in 5.33. In place upgrade of ESG is only supported for versions 5.33 or later. To upgrade versions ESGs older than 5.33 to the new version use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances using older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.34/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.33]]></title>
        <id>https://docs.trustedauth.com/blog/2024/5.33/</id>
        <link href="https://docs.trustedauth.com/blog/2024/5.33/"/>
        <updated>2024-02-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2024/5.33/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-flows">Authentication Flows<a href="https://docs.trustedauth.com/blog/2024/5.33/#authentication-flows" class="hash-link" aria-label="Direct link to Authentication Flows" title="Direct link to Authentication Flows" translate="no">​</a></h3>
<p>IDaaS supports several authentication flows:</p>
<ul>
<li class="">The standard userID authentication flow where the user enters their userID and is then prompted for an optional first-factor password followed by a selection of second-factor authenticators.</li>
<li class="">The Passkey authentication flow where the user uses their Passkey token to authenticate. Their userID is provided by the Passkey token.</li>
<li class="">The Smart Login authentication flow where the user uses their Entrust Identity Smart Credential to authenticate to IDaaS. Their userID is provided by the smart credential.</li>
<li class="">The Identity Provider (IDP) authentication flow where the user uses a third-party Identity Provider to authenticate. Their userID is provided by the IDP.</li>
</ul>
<p>Prior to 5.33, some authentication flows (userID and Smart Login) were configured in the resource rules and some authentication flows (Passkey and IDP) were defined outside the resource rules in the applications. In 5.33, the authentication flows are now defined as a separate entity and linked to the resource rules. These changes provide the following benefits:</p>
<ul>
<li class="">Configuration of all authentication flows is the same.</li>
<li class="">All authentication flows now support single-sign on and user registration and verification.</li>
<li class="">Resource rule contexts, which can be used to deny access to an application apply to all the authentication flows. Prior to 5.33, Passkey and IDP authentication were not restricted by the context rules in the resource rule.</li>
<li class="">Authentication flows can be shared with multiple resource rules.</li>
</ul>
<p>The IDaaS portal authentication UI has been updated as part of this feature. Only the authentication flows defined for the application are shown. For example, the User portal can be configured so that only IDP authentication is shown.</p>
<p>The IDaaS user portal and administration portal can have different authentication flows. A user browsing to the account URL (ex: <code>https://mycompany.us.trustedauth.com</code>) will see the authentication flow for the user portal which may not be an authentication flow that allows access to the administration portal. In this scenario, a user wishing to access the administration portal can do so by adding ?action=admin to their URL. For example <code>https://mycompany.us.trustedauth.com/#/?action=admin</code>.</p>
<p>As part of these changes, the existing Resources menu has been split into two top-level menus. A new Security menu includes items related to authenticating to applications, including a new Authentication Flows menu item for managing authentication flows. The existing Resources menu includes items related to managing resources such as Grids, Tokens, and Smart Credentials.</p>
<p>When IDaaS 5.33 is deployed, existing resource rules will be converted. Where necessary, new authentication flows will be created and linked to resource rules.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-entrust-identity-mobile-hardware-storage-for-smart-credentials">Support Entrust Identity Mobile Hardware Storage for Smart Credentials<a href="https://docs.trustedauth.com/blog/2024/5.33/#support-entrust-identity-mobile-hardware-storage-for-smart-credentials" class="hash-link" aria-label="Direct link to Support Entrust Identity Mobile Hardware Storage for Smart Credentials" title="Direct link to Support Entrust Identity Mobile Hardware Storage for Smart Credentials" translate="no">​</a></h3>
<p>An upcoming version of Entrust Identity Mobile will support storing smart credential private keys in hardware. Hardware storage on iOS only supports Elliptic Curve (EC) keys. When configuring smart credentials in IDaaS, there is now an option to select EC as the key type in addition to RSA. Additionally, there is new policy for smart credentials to indicate to Entrust Identity Mobile that smart credential private keys must be stored in hardware storage or will be stored in hardware storage if available. Existing versions of Entrust Identity Mobile will fail to encode the smart credential if EC keys are specified and will not store private keys in hardware even if required by IDaaS policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="fido2passkey-authenticator-improvements">FIDO2/Passkey Authenticator Improvements<a href="https://docs.trustedauth.com/blog/2024/5.33/#fido2passkey-authenticator-improvements" class="hash-link" aria-label="Direct link to FIDO2/Passkey Authenticator Improvements" title="Direct link to FIDO2/Passkey Authenticator Improvements" translate="no">​</a></h3>
<p>An "Allowed Relying Party ID Hostnames" list has been added to FIDO2/Passkey policy. This list restricts the hostnames that can register FIDO2/Passkey tokens.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="strict-access-option-for-resource-rules">Strict Access Option for Resource Rules<a href="https://docs.trustedauth.com/blog/2024/5.33/#strict-access-option-for-resource-rules" class="hash-link" aria-label="Direct link to Strict Access Option for Resource Rules" title="Direct link to Strict Access Option for Resource Rules" translate="no">​</a></h3>
<p>In IDaaS if a user matches multiple resource rules, if one or more resource rules allows access then the user is allowed access using those resource rules. A new "Enable Strict Access for Application" option has been added to resource rules. If enabled and the resource rule denies access and the user is denied access even if other resource rules allow access.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="magic-link-redirect">Magic Link Redirect<a href="https://docs.trustedauth.com/blog/2024/5.33/#magic-link-redirect" class="hash-link" aria-label="Direct link to Magic Link Redirect" title="Direct link to Magic Link Redirect" translate="no">​</a></h3>
<p>An application creating an IDaaS Registration Magic Link can now include a redirect URL. After registration completes, the user's browser is redirected to that URL. The Magic Link policy now includes a policy to enable Redirect and to list URLs that are allowed for redirect.</p>
<p>Redirect URLs are only supported with Magic Links created using the administration API. They cannot be specified for Magic Links created from the administration portal.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-existing-entrust-pkiaas-cas">Support Existing Entrust PKIaaS CAs<a href="https://docs.trustedauth.com/blog/2024/5.33/#support-existing-entrust-pkiaas-cas" class="hash-link" aria-label="Direct link to Support Existing Entrust PKIaaS CAs" title="Direct link to Support Existing Entrust PKIaaS CAs" translate="no">​</a></h3>
<p>IDaaS has been supporting Entrust PKIaaS CAs created by IDaaS. Now customers can use Entrust PKIaaS CAs created from Entrust Certificate Services.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="customize-google-authenticator-name">Customize Google Authenticator Name<a href="https://docs.trustedauth.com/blog/2024/5.33/#customize-google-authenticator-name" class="hash-link" aria-label="Direct link to Customize Google Authenticator Name" title="Direct link to Customize Google Authenticator Name" translate="no">​</a></h3>
<p>Most 3rd-party soft tokens are compatible with Google Authenticator for activation and authentication. This means that customers using 3rd-party soft tokens with IDaaS can use the IDaaS Google Authenticator with those tokens. IDaaS now allows a customer to customize the name of the authenticator to match the token that the customer is using.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-registration-enhancements">User Registration Enhancements<a href="https://docs.trustedauth.com/blog/2024/5.33/#user-registration-enhancements" class="hash-link" aria-label="Direct link to User Registration Enhancements" title="Direct link to User Registration Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to user registration:</p>
<ul>
<li class="">User registration can now include an option to create a new grid for the user.</li>
<li class="">User registration can now include an option to perform password management for the user. If the user does not have a password, they can create a password. If the user has a password that is expired or set for forced update, the user can change it. Currently, password creation is only supported for IDaaS-managed passwords and not for AD passwords.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-multiple-smart-credential-definitions-in-user-portal">Support Multiple Smart Credential Definitions in User Portal<a href="https://docs.trustedauth.com/blog/2024/5.33/#support-multiple-smart-credential-definitions-in-user-portal" class="hash-link" aria-label="Direct link to Support Multiple Smart Credential Definitions in User Portal" title="Direct link to Support Multiple Smart Credential Definitions in User Portal" translate="no">​</a></h3>
<p>When activating a smart credential in the IDaaS User portal, if multiple smart credential definitions are configured, the user is now asked to choose which smart credential to use. The user no longer needs to choose between activating for mobile or physical smart credentials. That information is provided by the selected smart credential definition.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enhance-password-expiry-notification">Enhance Password Expiry Notification<a href="https://docs.trustedauth.com/blog/2024/5.33/#enhance-password-expiry-notification" class="hash-link" aria-label="Direct link to Enhance Password Expiry Notification" title="Direct link to Enhance Password Expiry Notification" translate="no">​</a></h3>
<p>An upcoming version of Entrust Identity Mobile will support handling password expiry notifications. In IDaaS, support for delivering password expiry notifications to mobile has been added. This includes a new Mobile option for the Password Expiry Notifications policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="azure-ad-directory-permission-changes">Azure AD Directory Permission Changes<a href="https://docs.trustedauth.com/blog/2024/5.33/#azure-ad-directory-permission-changes" class="hash-link" aria-label="Direct link to Azure AD Directory Permission Changes" title="Direct link to Azure AD Directory Permission Changes" translate="no">​</a></h3>
<p>When authenticating to Azure AD, IDaaS no longer requests all the permissions required to perform all directory-related operations (synchronizing users and groups, changing or resetting user passwords). Instead, IDaaS requests minimal permissions and is given the permissions allowed for the authenticating directory credentials. If IDaaS does not have permission to perform an operation, the operation fails. This allows, for example, a customer to configure their directory to only provide read permissions supporting user synchronization without having write permission to support password change.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-esg-platform-update">Enterprise Service Gateway (ESG) Platform Update<a href="https://docs.trustedauth.com/blog/2024/5.33/#enterprise-service-gateway-esg-platform-update" class="hash-link" aria-label="Direct link to Enterprise Service Gateway (ESG) Platform Update" title="Direct link to Enterprise Service Gateway (ESG) Platform Update" translate="no">​</a></h3>
<p>ESG has been updated to use a new OS. Versions of ESG prior to 5.33 are still supported for 3 versions after release, but they can not be upgraded in place. To upgrade existing ESGs to the new version use the following procedure:</p>
<ol>
<li class="">Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.</li>
<li class="">Add a new Gateway instance to the existing Gateway in IDaaS.</li>
<li class="">Register the new Gateway instance with IDaaS.</li>
<li class="">Disable the old Gateway instance.</li>
<li class="">Repeat these steps to replace all the Gateway instances using older versions of the ESG.</li>
</ol>
<p>Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2024/5.33/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.fortinet.com/products/siem" target="_blank" rel="noopener noreferrer" class="">FortiSIEM</a></li>
<li class="">A new SAML application template for <a href="https://www.gong.io/" target="_blank" rel="noopener noreferrer" class="">Gong</a></li>
<li class="">A new SAML application template for <a href="https://my.huddle.net/" target="_blank" rel="noopener noreferrer" class="">Huddle</a></li>
<li class="">A new SAML application template for <a href="https://www.mimecast.com/" target="_blank" rel="noopener noreferrer" class="">Mimecast</a></li>
<li class="">A new SAML application template for <a href="https://www.netskope.com/" target="_blank" rel="noopener noreferrer" class="">Netskope</a></li>
<li class="">A new SAML application template for <a href="https://www.ziflow.com/" target="_blank" rel="noopener noreferrer" class="">Ziflow</a></li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2024/5.33/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Push authentication in RADIUS did not fall back to token authentication when the push transaction expired. (34332, 34308, 34196)</li>
<li class="">Administrators logging into the IDaaS portal using device certificate authentication were only given access to the User portal. (34190, 33919)</li>
<li class="">User attributes synchronized from AD should be read-only when editing the user profile in the Administrator or User portal. (34300, 34291)</li>
<li class="">Magic Link email not using user locale for email subject and expiry date. (33924, 33556)</li>
<li class="">Audits for IDP initiated SAML/OIDC logins now include the application name in the audit. (34099)</li>
<li class="">The IntelliTrust Desktop application can now be configured to support FIDO2/Passkey authentication. (33783)</li>
<li class="">The activation email for mobile smart credential now includes a link to the Entrust Identity mobile application instead of the old Entrust Smart Credential mobile application. (33676, 33621, 33512)</li>
<li class="">IDaaS did not correctly handle incoming SAML requests if the RelayState parameter was not URL encoded. (33673)</li>
<li class="">Hardware tokens were not unassigned as expected when a synchronized user is deleted because they were removed from the directory. (33627)</li>
<li class="">The Administrator portal removed spaces from user aliases that contained multiple spaces. (33209)</li>
<li class="">Smart login authentication not saved in location history or counted in the authentications per application statistics. (33166, 33169)</li>
<li class="">Passkey login authentication not saved in location history or counted in the authentications per application statistics. (33168, 33167)</li>
<li class="">Check that the same Trusted Certificate Authority is not added twice. (32614)</li>
<li class="">When directory synchronization was configured to synchronize "Group Matching Group Filter" and the group filter was empty, all groups were synchronized. It should not synchronize any groups. (33201)</li>
<li class="">Improvements to policy caching to ensure policy changes are applied immediately. (33773)</li>
<li class="">IDaaS allows groups in a directory group filter that differ only with leading or trailing whitespace. (22843)</li>
<li class="">Improve message in failure audit if authentication fails because there are no active resource rules. (34134)</li>
<li class="">IDaaS accounts with Standard bundle were unable to add SAML applications. (33852)</li>
<li class="">The basic authentication option has been removed from Secure Device Provisioning. (30691)</li>
<li class="">The refresh option on the managed service provider tenant list page now displays all tenants being created rather than just tenants created in the current session. (33652)</li>
<li class="">Improved error message of synchronization from Azure AD fails because authentication token has expired. (32283)</li>
<li class="">Improved error in change password indicating that the password has matched an alias. (31644)</li>
<li class="">OIDC Authorization should only be accessible in accounts with the PREMIUM bundle. (34481)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2024/5.33/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2024/5.33/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The authentication type <code>PASSKEY</code> has been added to the <code>AuthenticatorType</code> enumerated type. Previously when performing PASSKEY authentication, the API <code>POST /api/web/v1/authentication/passkey (requestPasskeyChallengeUsingPOST)</code> was used. This API has been deprecated. Instead, call <code>POST /api/web/v2/authentication/users/authenticate/{authenticator} (userChallengeUsingPOST)</code> with authenticator set to PASSKEY. The parameter <code>userId</code> in <code>UserChallengeParameters</code> is now optional. It is required when calling non-passwordless authenticators but is not required for PASSKEY.</p>
<p>The attribute <code>relyingParyId</code> has been added to <code>FIDOToken</code> which is returned from the APIs <code>completeFIDORegisterUsingPOST</code> and <code>getSelfFIDOTokenUsingGET</code>.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2024/5.33/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following APIs have been added to manage authentication flows:</p>
<ul>
<li class=""><code>GET /api/web/v1/authenticationflows (getAuthenticationFlowsUsingGET)</code> - List authentication flows.</li>
<li class=""><code>POST /api/web/v1/authenticationflows (createAuthenticationFlowUsingPOST)</code> - Create an authentication flow.</li>
<li class=""><code>DELETE /api/web/v1/authenticationflows/{id} (removeAuthenticationFlowUsingDELETE)</code> - Delete an authentication flow.</li>
<li class=""><code>GET /api/web/v1/authenticationflows/{id} (getAuthenticationFlowUsingGET)</code> - Get an authentication flow.</li>
<li class=""><code>PUT /api/web/v1/authenticationflows/{id} (updateAuthenticationFlowUsingPUT)</code> - Modify an authentication flow.</li>
</ul>
<p>The following models related to authentication flows have been added:</p>
<ul>
<li class=""><code>AuthenticationFlowParms</code> - The parameters passed to the create and update APIs.</li>
<li class=""><code>AuthenticationFlow</code>- The results returned from the create, get, list, and update APIs.</li>
</ul>
<p>The following APIs have been added to manage OIDC identity providers:</p>
<ul>
<li class=""><code>GET /api/web/v1/identityproviders/oidc (listOidcIdentityProvidersUsingGET)</code> - List identity providers.</li>
<li class=""><code>POST /api/web/v1/identityproviders/oidc (createOidcIdentityProviderUsingPOST)</code> - Create an identity provider.</li>
<li class=""><code>POST /api/web/v1/identityproviders/oidc/configuration (fetchOidcConfigurationUsingPOST)</code> - Get configuration information for an identity provider.</li>
<li class=""><code>DELETE /api/web/v1/identityproviders/oidc/{id} (deleteOidcIdentityProviderUsingDELETE)</code> - Delete an identity provider.</li>
<li class=""><code>GET /api/web/v1/identityproviders/oidc/{id} (getOidcIdentityProviderUsingGET)</code> - Get an identity provider.</li>
<li class=""><code>PUT /api/web/v1/identityproviders/oidc/{id} (updateOidcIdentityProviderUsingPUT)</code> - Modify an identity provider.</li>
</ul>
<p>The following models related to OIDC identity providers have been added:</p>
<ul>
<li class=""><code>OidcIdentityProviderParms</code> - The parameters passed to the create and update APIs.</li>
<li class=""><code>OidcIdentityProvider</code> - The results returned from the create, get, list, and update APIs.</li>
<li class=""><code>OidcConfigurationParms</code> - The parameters passed to the configuration API.</li>
<li class=""><code>OidcConfigurationResponse</code> - The results returned from the configuration API.</li>
</ul>
<p>A new version of the following APIs to manage resource rules have been created. The new v2 version of the APIs manage resource rules linked to authentication flows. The old v1 version of the APIs have been deprecated and will be removed in a future release.</p>
<ul>
<li class=""><code>GET /api/web/v2/resourcerules (getResourceRulesUsingGET)</code> - List all resource rules.</li>
<li class=""><code>POST /api/web/v2/resourcerules (createResourceRuleUsingPOST)</code> - Create a resource rule.</li>
<li class=""><code>GET /api/web/v2/resourcerules/resource/{id} (getResourceRulesForResourceUsingGET)</code> - List all resource rules for the specified resource.</li>
<li class=""><code>DELETE /api/web/v2/resourcerules/{id} (removeResourceRuleUsingDELETE)</code> - Delete a resource rule.</li>
<li class=""><code>GET /api/web/v2/resourcerules/{id} (getResourceRuleUsingGET)</code> - Get a resource rule.</li>
<li class=""><code>PUT /api/web/v2/resourcerules/{id} (updateResourceRuleUsingPUT)</code> - Update a resource rule.</li>
</ul>
<p>The models <code>ResourceRule</code> and <code>ResourceRuleParms</code> related to resource rules have been modified.</p>
<ul>
<li class="">The attributes <code>highRiskAuthenticationFlow</code>, <code>mediumRiskAuthenticationFlow</code>, and <code>lowRiskAuthenticationFlow</code> have been added. These attributes specified the authentication flows associated with this resource rule for the different risk levels. These attributes are managed by the v2 version of the resource rule APIs.</li>
<li class="">The attributes <code>highRiskEnableSmartLogin</code>, <code>highRiskFirstStep</code>, <code>highRiskSecondStep</code>, <code>mediumRiskEnableSmartLogin</code>, <code>mediumRiskFirstStep</code>, <code>mediumRiskSecondStep</code>, <code>lowRiskEnableSmartLogin</code>, <code>lowRiskFirstStep</code>and <code>lowRiskSecondStep</code> have been deprecated. These attributes have been replaced by the corresponding authentication flow attributes and will be removed in a future release. These attributes are managed by the v1 version of the resource rule APIs.</li>
</ul>
<p>Once a resource rule has been updated by the v2 version of the resource rule APIs (including the IDaaS Administrator portal), it can no longer be accessed by the v1 version of the APIs.</p>
<p>The following models have been changed:</p>
<ul>
<li class="">An attribute <code>relyingPartyId</code> has been added to <code>FIDOToken</code>. This value specifies the relying party from which the token was registered.</li>
<li class="">The attribute <code>passkeyEnabled</code> in <code>AuthApiApplication</code> and <code>AuthApiApplicationParms</code> has been deprecated. It is no longer used.</li>
<li class="">The attribute <code>keyType</code> has been added to <code>DigitalIdConfigCertTemplate</code>. This value specifies whether the key type RSA or ECC should be used.</li>
<li class="">The attribute <code>redirectUrl</code> has been added to <code>MagicLinkCreateParms</code>. This value specifies the optional redirect URL that can be included in a Magic Link.</li>
<li class="">The attributes <code>lockedAuthenticatorTypes</code> in <code>User</code> and <code>type</code> in <code>UserAuthenticatorLockoutStatus</code> have been updated to include the new authenticator types IDP, PASSKEY, and SMART_LOGIN.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2024/5.33/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Support for the following TLS Ciphers were removed in IDaaS 5.32.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.33/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.33 and the three previous releases 5.30, 5.31 and 5.32). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2024/5.33/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.32]]></title>
        <id>https://docs.trustedauth.com/blog/2023/5.32/</id>
        <link href="https://docs.trustedauth.com/blog/2023/5.32/"/>
        <updated>2023-11-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2023/5.32/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administrator-role-defined-by-group-membership">Administrator Role Defined by Group Membership<a href="https://docs.trustedauth.com/blog/2023/5.32/#administrator-role-defined-by-group-membership" class="hash-link" aria-label="Direct link to Administrator Role Defined by Group Membership" title="Direct link to Administrator Role Defined by Group Membership" translate="no">​</a></h3>
<p>IDaaS has a new group-based policy category that defines an Administrative role. This allows a customer to assign all members of a group an administrative role.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="registration-settings-ui-restructured">Registration Settings UI Restructured<a href="https://docs.trustedauth.com/blog/2023/5.32/#registration-settings-ui-restructured" class="hash-link" aria-label="Direct link to Registration Settings UI Restructured" title="Direct link to Registration Settings UI Restructured" translate="no">​</a></h3>
<p>The Registration Settings page has been restructured so that each category has its own page.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="magic-link-for-registration">Magic Link for Registration<a href="https://docs.trustedauth.com/blog/2023/5.32/#magic-link-for-registration" class="hash-link" aria-label="Direct link to Magic Link for Registration" title="Direct link to Magic Link for Registration" translate="no">​</a></h3>
<p>IDaaS now provides Magic Links that allow a user to register authenticators without requiring a password to authenticate. Magic Links can be delivered by email from IDaaS to the user or returned to customer applications using the Administration API.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="account-rename">Account Rename<a href="https://docs.trustedauth.com/blog/2023/5.32/#account-rename" class="hash-link" aria-label="Direct link to Account Rename" title="Direct link to Account Rename" translate="no">​</a></h3>
<p>The hostname for an account can now be modified by the Service Provider of that account. To support migration between hostnames, there is an option to keep the old hostname available.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="group-provisioning-using-scim">Group Provisioning using SCIM<a href="https://docs.trustedauth.com/blog/2023/5.32/#group-provisioning-using-scim" class="hash-link" aria-label="Direct link to Group Provisioning using SCIM" title="Direct link to Group Provisioning using SCIM" translate="no">​</a></h3>
<p>SCIM can now be used to provision groups and to provision group membership of users in IDaaS.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-default-scim-provisioning-role">New Default SCIM Provisioning Role<a href="https://docs.trustedauth.com/blog/2023/5.32/#new-default-scim-provisioning-role" class="hash-link" aria-label="Direct link to New Default SCIM Provisioning Role" title="Direct link to New Default SCIM Provisioning Role" translate="no">​</a></h3>
<p>There is now a new default role "SCIM Provisioning." This role contains the permissions required to perform provisioning to IDaaS using SCIM.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="asynchronous-account-creation">Asynchronous Account Creation<a href="https://docs.trustedauth.com/blog/2023/5.32/#asynchronous-account-creation" class="hash-link" aria-label="Direct link to Asynchronous Account Creation" title="Direct link to Asynchronous Account Creation" translate="no">​</a></h3>
<p>New account creation is now performed asynchronously. To support this, the account creation UI in the Service Provider portal has been extensively changed.</p>
<p>New APIs to support asynchronous account creation have been added to the Administration API. The existing APIs have been deprecated and will be removed in a future release.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="directory-synchronization-improvements">Directory Synchronization Improvements<a href="https://docs.trustedauth.com/blog/2023/5.32/#directory-synchronization-improvements" class="hash-link" aria-label="Direct link to Directory Synchronization Improvements" title="Direct link to Directory Synchronization Improvements" translate="no">​</a></h3>
<p>The following improvements have been made to directory synchronization.</p>
<ul>
<li class="">User aliases can now be populated from a list of one or more directory attributes.</li>
<li class="">IDaaS attributes can now be defined as a composite of multiple directory attributes (for example, '&lt;givenName&gt; &lt;sn&gt;' to specify the user's full name) or a combination of directory attributes and static values (for example, 'ENTRUST\&lt;samAccountName&gt;' to specify the user's domain qualified userID).</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="replace-deleted-applications">Replace Deleted Applications<a href="https://docs.trustedauth.com/blog/2023/5.32/#replace-deleted-applications" class="hash-link" aria-label="Direct link to Replace Deleted Applications" title="Direct link to Replace Deleted Applications" translate="no">​</a></h3>
<p>When creating an Authentication API application, the administrator can now specify the unique ID of the application. This allows an administrator to recreate an application that was deleted with the same unique ID so that existing clients do not need to be reconfigured.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2023/5.32/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new SAML application template for <a href="https://www.15five.com/" target="_blank" rel="noopener noreferrer" class="">15Five</a></li>
<li class="">A new SAML application template for <a href="https://www.forestadmin.com/" target="_blank" rel="noopener noreferrer" class="">Forest Admin</a></li>
<li class="">A new SAML application template for <a href="https://www.freshworks.com/" target="_blank" rel="noopener noreferrer" class="">Freshservice</a></li>
<li class="">A new SAML application template for <a href="https://www.hubspot.com/" target="_blank" rel="noopener noreferrer" class="">HubSpot</a></li>
<li class="">A new SAML application template for <a href="https://www.jenkins.io/" target="_blank" rel="noopener noreferrer" class="">Jenkins</a></li>
<li class="">A new SAML application template for <a href="https://www.miro.com/" target="_blank" rel="noopener noreferrer" class="">Miro</a></li>
<li class="">A new SAML application template for <a href="https://onfido.com/" target="_blank" rel="noopener noreferrer" class="">Onfido</a></li>
<li class="">A new SAML application template for <a href="https://reviewinc.com/" target="_blank" rel="noopener noreferrer" class="">ReviewInc</a></li>
<li class="">A new SAML application template for <a href="https://www.splunk.com/en_us/products/splunk-security-orchestration-and-automation.html" target="_blank" rel="noopener noreferrer" class="">Splunk SOAR</a></li>
</ul>
<p>Additionally, an integration guide is now available for the <a href="https://www.epic.com/" target="_blank" rel="noopener noreferrer" class="">Epic Hyperdrive</a> integration that was added in 5.31.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2023/5.32/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Fixed an issue where Java clients using the IDaaS APIs could not deserialize null arrays. (33036)</li>
<li class="">Addressed issues in the Google Workspace integration guide. (32947, 33082)</li>
<li class="">Updated the bulk import user sample to include securityId. (32872)</li>
<li class="">Disabled the refresh operation for PKIaaS CAs for administrators that do not have permission to perform the operation. (32931)</li>
<li class="">Removed the Referrer-Policy header that was added in 5.31. It caused issues with some IDaaS clients. (33110)</li>
<li class="">Renamed the "SCIM Provisioning Management" role permission to "Outbound Provisioning Management". (32862)</li>
<li class="">The audit generated when directory attributes are modified now includes the old and new values. (32859)</li>
<li class="">When updating a SAML application when Override SAML Audience is checked, the Audience value is now required. (33034)</li>
<li class="">Addressed issues in the "Integrate Microsoft Azure AD" Technical Guide. (32738, 33137)</li>
<li class="">Improvements to SCIM User Provisioning documentation. (32933)</li>
<li class="">Fixed broken link in "Integrate Nets E-Ident IDP Broker" section of Technical Guide. (33144)</li>
<li class="">Addressed FIDO token registration issues using Safari on Mac. (32702, 32700)</li>
<li class="">In the Service Provider portal, disable the Tenant report option for administrators that do not have permission. (33233)</li>
<li class="">Users added to IDaaS by directory synchronization did not receive their new grid. (32811)</li>
<li class="">Userid search options were disabled for accounts with more than 1 million users. The limit is now 3 million users. (33484)</li>
<li class="">When creating a new SAML application, the Signature Type now defaults to the expected value. (33187)</li>
<li class="">When creating a new SAML application, if only one SAML signing certificate is defined, it is automatically selected. (33188)</li>
<li class="">IDaaS now allows the Authorization Bearer token passed to authenticated endpoints to contain more than one space. The standard specifies a single space but some clients include multiple spaces. (33107)</li>
<li class="">Fixed language selection issue where a user was asked to confirm a change when the default language selected. (33286)</li>
<li class="">Fixed an issue where changing the default account locale can result in the Admin portal displaying that locale instead of English. (32915)</li>
<li class="">Improved text in Gateway download dialog to make it clear that the OVA can be installed onto more than just VMWare vSphere. (32069)</li>
<li class="">When a FIDO token is registered, its origin is now audited. (31237)</li>
<li class="">Changed the Registration page so that the authenticators are sorted. (30794)</li>
<li class="">Improved validation of input on My Authenticator page. (15217)</li>
<li class="">Fixed the issue on Password Reset policies page that prevented an administrator from unchecking Allow Email OTP Delivery. (33109)</li>
<li class="">Enabling/updating tenant management configuration failed in some cases. (33200)</li>
<li class="">When configuring an IDP, Security ID should not be allowed as an attribute used to identify the user. (33146)</li>
<li class="">Improved the formatting of the Risk Factor Evaluation Results in authentication audits. (32497)</li>
<li class="">The authenticator filter in the user list search criteria should only show authenticators that the administrator has permission to access. (31887)</li>
<li class="">Fixed an issue that prevents the custom email server configuration from being saved when the OAuth is reauthorized. (32536)</li>
<li class="">In the User list, when the Last Authenticated before criteria is used it includes users who have never authenticated. The UI now includes a note to indicate this. (32266)</li>
<li class="">Users are unable to use the OTP authenticator because they do not have contact information were not getting the expected error response when Enable Enhanced Authentication Details was checked. (32628)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2023/5.32/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2023/5.32/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following models have been changed in this release.</p>
<ul>
<li class=""><code>serialNumbers</code> in <code>GridChallenge</code> has been deprecated. Use gridInfo instead.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2023/5.32/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following APIs to support asynchronous account creation have been added in this release.</p>
<ul>
<li class=""><code>POST /api/web/v4/async/tenants</code> (createTenantAsyncUsingPOST)</li>
<li class=""><code>GET /api/web/v4/async/tenants/{id}/createstatus</code> (getCreateTenantAsyncStatusUsingGET)</li>
<li class=""><code>GET /api/web/v4/async/tenants/{id}/createresult</code> (getCreateTenantAsyncResultUsingGET)</li>
</ul>
<p>To create a new tenant from a Service Provider:</p>
<ul>
<li class="">call createTenantAsyncUsingPOST to start the tenant creation.</li>
<li class="">call getCreateTenantAsyncStatusUsingGET repeatedly until the returned status indicates that the tenant creation is complete.</li>
<li class="">call getCreateTenantAsyncResultUsingGet to get the tenant creation result.</li>
</ul>
<p>The following APIs to support registration of FIDO tokens using the administration API have been added in this release.</p>
<ul>
<li class=""><code>GET /api/web/v1/fidotokens/challenge/{id}</code> (startCreateFIDOTokenUsingGET)</li>
<li class=""><code>POST /api/web/v1/fidotokens/complete/{id}</code> (completeCreateFIDOTokenUsingPOST)</li>
</ul>
<p>The following APIs to support the management of Magic Links for registration have been added in this release.</p>
<ul>
<li class=""><code>PUT /api/web/v1/users/{userid}/magiclink</code> (createMagicLinkUsingPUT)</li>
<li class=""><code>DELETE /api/web/v1/users/{userid}/magiclink</code> (deleteMagicLinkUsingDELETE)</li>
</ul>
<p>The following APIs have been deprecated in this release.</p>
<ul>
<li class=""><code>POST /api/web/v4/tenants</code> (createTenantUsingPOST). Tenants should be created using the new asynchronous methods described above.</li>
<li class=""><code>GET /api/web/v1/serviceipaddresses</code> (getServiceIPAddressesUsingGET). IDaaS accounts now have fixed IP addresses.</li>
</ul>
<p>The following models have been added in this release.</p>
<ul>
<li class=""><code>CreateTenantSyncStatus</code> contains the information returned from <code>getCreateTenantAsyncStatusUsingGET</code>.</li>
<li class=""><code>FIDORegisterChallenge</code> contains the information returned from <code>startCreateFIDOTokenUsingGET</code>.</li>
<li class=""><code>FIDORegisterResponse</code> contains the information passed to <code>completeCreateFIDOTokenUsingPOST</code>.</li>
<li class=""><code>MagicLinkCreateParms</code> contains the parameters passed to <code>createMagicLinkUsingPUT</code>.</li>
<li class=""><code>MagicLinkResponse</code> contains the information returned from <code>createMagicLinkUsingPUT</code>.</li>
<li class=""><code>UserAlternateEmails</code> contains information about alternative email addresses available to a user.</li>
</ul>
<p>The following models have been modified in this release.</p>
<ul>
<li class=""><code>id</code> has been added to <code>AuthApiApplicationParms</code>. When creating an authentication API application, the unique UUID of the application can be specified. If an ID is not specified, a random unique ID is generated for the new application.</li>
<li class=""><code>created</code> and <code>lastModified</code> have been added to <code>Group</code>. These values specify the date when the Group was created and last modified.</li>
<li class=""><code>lockedAuthenticators</code> in <code>User</code> has been deprecated. Use <code>lockedAuthenticatorTypes</code> instead.</li>
<li class=""><code>alternateEmails</code> has been added to <code>User</code>. This value lists all the alternate email addresses defined for the user.</li>
<li class=""><code>magicLinkEnabled</code> has been added to <code>User</code>. This flag indicates whether magic links are enabled for the user.</li>
<li class=""><code>aliasMappingName</code> has been added to <code>Directory</code>. This value specifies the list of directory attributes whose values will be mapped to user aliases.</li>
<li class=""><code>previousHostname</code> has been added to <code>Tenant</code>. If set, this value specifies the previous hostname of an account after it has been renamed.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-sdks">Changes to Identity as a Service SDKs<a href="https://docs.trustedauth.com/blog/2023/5.32/#changes-to-identity-as-a-service-sdks" class="hash-link" aria-label="Direct link to Changes to Identity as a Service SDKs" title="Direct link to Changes to Identity as a Service SDKs" translate="no">​</a></h3>
<ol>
<li class="">The order of parameters in the API functions may change. Refer to the clients' documentation for the correct order.</li>
<li class="">The python SDK no longer supports accessing properties using dictionary keys. Access properties using object attributes.</li>
<li class="">IDaaS no longer accepts paths that end in /. For example, previously both /api/web/v4/async/tenants and /api/web/v4/async/tenants/ would have been accepted. Now only /api/web/v4/async/tenants will work.</li>
<li class="">The 5.30 and 5.31 Java SDKs did not support models from newer versions of IDaaS that contain new attributes. This issue has been fixed in the 5.32 SDKs.</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="supported-tls-ciphers">Supported TLS Ciphers<a href="https://docs.trustedauth.com/blog/2023/5.32/#supported-tls-ciphers" class="hash-link" aria-label="Direct link to Supported TLS Ciphers" title="Direct link to Supported TLS Ciphers" translate="no">​</a></h2>
<p>IDaaS supports the following TLS Ciphers.</p>
<p>TLSv1.3:</p>
<ul>
<li class="">TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
</ul>
<p>TSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
</ul>
<p>Support for the following TLS Ciphers were removed in IDaaS 5.32.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048)</li>
<li class="">TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048)</li>
</ul>
<p>Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.</p>
<p>TLSv1.2:</p>
<ul>
<li class="">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)</li>
<li class="">TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.32/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.32 and the three previous releases 5.29, 5.30 and 5.31). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.32/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.31]]></title>
        <id>https://docs.trustedauth.com/blog/2023/5.31/</id>
        <link href="https://docs.trustedauth.com/blog/2023/5.31/"/>
        <updated>2023-08-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2023/5.31/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="device-verification-using-certificates">Device Verification using Certificates<a href="https://docs.trustedauth.com/blog/2023/5.31/#device-verification-using-certificates" class="hash-link" aria-label="Direct link to Device Verification using Certificates" title="Direct link to Device Verification using Certificates" translate="no">​</a></h3>
<p>A new Device Certificates risk factor has been added to Resource Rules. When configured, this risk factor requires that the client be able to perform client-authenticated SSL with a certificate issued from a trusted CA to pass.</p>
<p>When configuring Certificate Authorities, the customer can now configure Issuing CAs which is the existing capability of configuring CAs to issue smart credentials and Trusted CAs which is a new capability for configuring CAs that have issued the certificates on the user's devices.</p>
<p>Device certificates are supported for SAML and OIDC applications as well as the IDaaS portals.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="certificate-details-for-mpki-ca-smart-credentials">Certificate Details for mPKI CA Smart Credentials<a href="https://docs.trustedauth.com/blog/2023/5.31/#certificate-details-for-mpki-ca-smart-credentials" class="hash-link" aria-label="Direct link to Certificate Details for mPKI CA Smart Credentials" title="Direct link to Certificate Details for mPKI CA Smart Credentials" translate="no">​</a></h3>
<p>A new Certificate action is available for Smart Credentials using a mPKI CA. The Certificate action lists the certificates issued to the selected Smart Credential and allows an administrator to manage those certificates. Previously this action was only available for Smart Credentials using a PKIaaS CA.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="resource-rule-risk-factor-enhancements">Resource Rule Risk-factor Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.31/#resource-rule-risk-factor-enhancements" class="hash-link" aria-label="Direct link to Resource Rule Risk-factor Enhancements" title="Direct link to Resource Rule Risk-factor Enhancements" translate="no">​</a></h3>
<p>The Risk-factors in resource rules have been enhanced to include a Deny Access option. When the Deny Access option is enabled for a risk factor, access to the application is denied if that risk factor fails regardless of the results of the other risk factors.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="oidc-claim-enhancements">OIDC Claim Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.31/#oidc-claim-enhancements" class="hash-link" aria-label="Direct link to OIDC Claim Enhancements" title="Direct link to OIDC Claim Enhancements" translate="no">​</a></h3>
<p>Custom OIDC Claims can be defined and associated to any OIDC application. Claims can be defined to always be returned with User Info or with the ID Token. The way attributes are mapped to OIDC claims has been improved.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-ad-strong-authentication">Microsoft AD Strong Authentication<a href="https://docs.trustedauth.com/blog/2023/5.31/#microsoft-ad-strong-authentication" class="hash-link" aria-label="Direct link to Microsoft AD Strong Authentication" title="Direct link to Microsoft AD Strong Authentication" translate="no">​</a></h3>
<p>Microsoft Windows is changing to require that certificates used for smart-card login include the user's security identifier as an extension. IDaaS has been enhanced to include a new user attribute to store the user's security identifier and to encode this value into smart credentials. Additionally, AD and Azure directory sync have been enhanced to retrieve this value from the customer's directory and store it for IDaaS users.</p>
<p>If you have a CA that was created before this release you will need to update the CA configuration to support Security Identifiers.</p>
<ul>
<li class="">For an Entrust PKIaaS CA, there is a new Refresh action available from the IDaaS Issuing Certificate Authority list. This will update the necessary CA configuration.</li>
<li class="">For Entrust mPKI or Microsoft CA the certificate profiles managed from the CA will need to be updated.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-provider-enhancements">Identity Provider Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.31/#identity-provider-enhancements" class="hash-link" aria-label="Direct link to Identity Provider Enhancements" title="Direct link to Identity Provider Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to identity providers:</p>
<ul>
<li class="">A new identity provider IDVaaS has been added supporting integration with Entrust's Identity Verification as a Service.</li>
<li class="">When configuring an identity provider, additional checks can be configured that ensure IDP claim values match existing IDaaS user attributes to successfully complete IDP authentication.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api-long-lived-token">Administration API Long-Lived Token<a href="https://docs.trustedauth.com/blog/2023/5.31/#administration-api-long-lived-token" class="hash-link" aria-label="Direct link to Administration API Long-Lived Token" title="Direct link to Administration API Long-Lived Token" translate="no">​</a></h3>
<p>An administration API can be configured to support long-lived tokens. When creating an administration API or refreshing its shared secret, a long-lived token is available if enabled for the application. When invoking an administration endpoint, instead of passing the authentication token returned from the administration API authentication endpoint, the long-lived token can be passed instead. The long-lived token does not expire, meaning that client applications do not need to refresh the authentication token periodically.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-provisioning-using-system-for-cross-domain-identity-management-scim">User Provisioning using System for Cross-Domain Identity Management (SCIM)<a href="https://docs.trustedauth.com/blog/2023/5.31/#user-provisioning-using-system-for-cross-domain-identity-management-scim" class="hash-link" aria-label="Direct link to User Provisioning using System for Cross-Domain Identity Management (SCIM)" title="Direct link to User Provisioning using System for Cross-Domain Identity Management (SCIM)" translate="no">​</a></h3>
<p>IDaaS users can now be managed by 3rd-party clients using SCIM.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="saml-enhancements">SAML Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.31/#saml-enhancements" class="hash-link" aria-label="Direct link to SAML Enhancements" title="Direct link to SAML Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to SAML applications:</p>
<ul>
<li class="">A SAML application can now define multiple Assertion Consumer Service (ACS) URLs.</li>
<li class="">Each SAML application now has a public endpoint that returns the SAML metadata for the application. This endpoint can be used by SAML service providers that automatically fetch the SAML metadata.</li>
<li class="">SAML applications can now be configured to specify the audience returned in SAML assertions. The audience can either be specified in IDaaS or requested from the SAML SP as a parameter.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="manage-inactive-users">Manage Inactive Users<a href="https://docs.trustedauth.com/blog/2023/5.31/#manage-inactive-users" class="hash-link" aria-label="Direct link to Manage Inactive Users" title="Direct link to Manage Inactive Users" translate="no">​</a></h3>
<p>IDaaS now allows a customer to have users be blocked from authenticating if the user has not authenticated in a period of time.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-searchreport-enhancements">User Search/Report Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.31/#user-searchreport-enhancements" class="hash-link" aria-label="Direct link to User Search/Report Enhancements" title="Direct link to User Search/Report Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to user search/export capabilities:</p>
<ul>
<li class="">The user search criteria have been enhanced to allow an administrator to search for users who have not authenticated in a period of time. Previously, only searching for users who had authenticated in a period of time was supported.</li>
<li class="">The user export operation has been enhanced to allow an administrator to export customer defined attributes.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="phoneemail-verification-apis">Phone/Email Verification APIs<a href="https://docs.trustedauth.com/blog/2023/5.31/#phoneemail-verification-apis" class="hash-link" aria-label="Direct link to Phone/Email Verification APIs" title="Direct link to Phone/Email Verification APIs" translate="no">​</a></h3>
<p>New administration APIs have been added that allow a customer application to verify that a user owns a given phone number or email address.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-portal-improvements">User Portal Improvements<a href="https://docs.trustedauth.com/blog/2023/5.31/#user-portal-improvements" class="hash-link" aria-label="Direct link to User Portal Improvements" title="Direct link to User Portal Improvements" translate="no">​</a></h3>
<p>The following enhancements have been made to the user portal:</p>
<ul>
<li class="">Users synchronized from AD were unable to modify any contact values. Now they are only blocked from modifying contact values synchronized from AD. Other contact values can be modified.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-passkeyfido2-registration-policies">New Passkey/FIDO2 Registration Policies<a href="https://docs.trustedauth.com/blog/2023/5.31/#new-passkeyfido2-registration-policies" class="hash-link" aria-label="Direct link to New Passkey/FIDO2 Registration Policies" title="Direct link to New Passkey/FIDO2 Registration Policies" translate="no">​</a></h3>
<p>The following new policies have been added to the Passkey/FIDO2 Authenticator policies to control registration.</p>
<ul>
<li class="">User Verification - controls if the user must be verified or not.</li>
<li class="">Resident Key (User ID stored) - controls if the user ID is stored on the token during registration. This is required if the token is to be used for passwordless Passkey authentication where the user does not need to enter their user ID.</li>
<li class="">Authenticator Attachment (platform or cross-platform) - controls whether a platform type, cross-platform type or either type of token can be registered.</li>
</ul>
<p>Additionally, the option to select whether the User ID is stored during registration has been removed from the token registration dialog. The behavior is now controlled by policy.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rate-limiting">Rate Limiting<a href="https://docs.trustedauth.com/blog/2023/5.31/#rate-limiting" class="hash-link" aria-label="Direct link to Rate Limiting" title="Direct link to Rate Limiting" translate="no">​</a></h3>
<p>Rate limiting is now enforced for trial accounts. The current limits are:</p>
<ul>
<li class="">Authentication requests: 5 requests per second (50 requests in a 10-second time window)</li>
<li class="">Request to retrieve audits: 1 requests per second (10 requests in a 10-second time window)</li>
<li class="">Administration requests: 3 requests per second (30 requests in a 10-second time window)</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-integrations">New Integrations<a href="https://docs.trustedauth.com/blog/2023/5.31/#new-integrations" class="hash-link" aria-label="Direct link to New Integrations" title="Direct link to New Integrations" translate="no">​</a></h3>
<p>The following integrations have been added.</p>
<ul>
<li class="">A new OIDC application template for <a href="https://www.connectwise.com/" target="_blank" rel="noopener noreferrer" class="">ConnectWise</a></li>
<li class="">A new SAML application template for <a href="https://www.connectwise.com/" target="_blank" rel="noopener noreferrer" class="">ConnectWise ScreenConnect</a></li>
<li class="">A new SAML application template for <a href="https://www.epic.com/" target="_blank" rel="noopener noreferrer" class="">Epic Hyperdrive</a>. This template is designed to be used with the Entrust Epic Hyperdrive plugin.</li>
<li class="">A new SAML application template for <a href="https://www.fivetran.com/" target="_blank" rel="noopener noreferrer" class="">Fivetran</a></li>
<li class="">A new SAML application template for <a href="https://www.pingdom.com/" target="_blank" rel="noopener noreferrer" class="">Pingdom</a></li>
<li class="">A new RADIUS application template for <a href="https://www.sophos.com/" target="_blank" rel="noopener noreferrer" class="">Sophos XG Firewall</a></li>
</ul>
<p>Additionally, the existing RADIUS integration Fortinet has been renamed to Fortinet-FortiGate.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2023/5.31/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">Some dates in IDaaS API responses included milliseconds and some did not. Now all date values are consistent and do not include milliseconds. (31481)</li>
<li class="">Refreshing the page after changing the user locale in the User portal prompts the user to change the locale back to the original value. (31955)</li>
<li class="">Changing the locale on the login page is not always correctly applied. (31962, 32025, 32107)</li>
<li class="">The TLS configuration of the IdentityGuard Agent on the Enterprise Service Gateway (ESG) has been updated. It now supports TLSv1.2 and TLSv1.3 and the ciphers TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384. (16301, 31970)</li>
<li class="">When importing Mobile SDK push notification credentials into IDaaS, the credentials were rejected if they contained extra fields not used by IDaaS. Now those fields are ignored and the credentials are imported. (32040)</li>
<li class="">When configuring the Knowledge-Based Authenticators Minimum Challenge Size and Default Challenge Size a value of 1 should be allowed. (32523)</li>
<li class="">The error message displayed when trying to delete a group assigned to an unassigned grid card was incorrect. (31475)</li>
<li class="">The messages displayed in the Service Provider portal for the delete tenant dialog and the reset resource rule dialogs were incorrect. (31950)</li>
<li class="">The smart credential activation dialog was not formatted correctly for some locales. (31590)</li>
<li class="">When creating a CA the UI now prevents the administrator from entering a duplicate name. (32507)</li>
<li class="">When creating a custom role the UI crashes when trying to add a group. (32061)</li>
<li class="">When a locale is selected during authentication it is not used if the user needs to register. (32015)</li>
<li class="">When a service provider unlocks administrators of a tenant it should not make service provider administrators in that tenant active. (32382)</li>
<li class="">The audit generated when removing a RADIUS application should not list all the attributes of the application. (31133)</li>
<li class="">Improve the formatting of the Registration Settings page. (31974)</li>
<li class="">When a user has a FIDO/Passkey token registration for another application, the user portal registration should require that the user register a FIDO/Passkey token for the user portal. (31606)</li>
<li class="">The audit displayed when a user used a temporary access code as a replacement for a token erroneously stated Grid authentication instead of Token authentication. (32018)</li>
<li class="">The UI now trims leading and trailing whitespace for the Password Expiry Notification Days setting. (31983)</li>
<li class="">Improved handling if the user currently logged into the user portal does not match the userid specified in the password expiry link. (31927)</li>
<li class="">Improved how the number of days until your password expires shown in the password expiry notification email is calculated. (31976)</li>
<li class="">The smart credential unblock dialog has been refreshed. (31363)</li>
<li class="">If a duplicate expected location is added to the RBA settings an error is now returned. Previously duplicates were removed without error. (29346)</li>
<li class="">Improvements made to the OIDC application audits to remove some UUID values that were audited. (24876)</li>
<li class="">When change the password in the portal for user's in a group with group specific policy for the password expiry the password expiry date from the global policy was used. (32341)</li>
<li class="">Client Credentials Grant for OAuth2 resources are now sorted. (31520)</li>
<li class="">Change Password dialog displayed wrong password rules for Include Lowercase set to Not Allowed. (32383)</li>
<li class="">The User Portal session expiry warning dialog can display negative values until expiry. (32019)</li>
<li class="">Users with alternative email addresses for OTP may not see the Alternative Authentication option during login. (32647)</li>
<li class="">The default Group Name Attribute for AD directory synchronization has been changed from sAMAccountName to cn. This change only applies when creating new directories and not to existing directories. (31090)</li>
<li class="">Access to the user location history page in the Administration portal required the settings View permission which should not be required. (31545)</li>
<li class="">The Export Audits dialog in the Administration portal does not display the Filters value if it is set to 1 Hour. (31944)</li>
<li class="">AD Connector page may crash in the UI the if administrator does not have the necessary permission to view it. (32633, 32656)</li>
<li class="">Dates included in Emails are in English and do not use the user's locale. (15278, 31769)</li>
<li class="">ActiveSync Device authentication issues have been addressed. Only OAuth authentication is supported now. (32199, 32730)</li>
<li class="">Prepare Identity as a Service for Salesforce link in Technical Integration Guide is broken. (32060)</li>
<li class="">Email template preview triggers browser console error. (31899)</li>
<li class="">Unable to set the attribute mapping for an Azure directory configuration. (32512)</li>
<li class="">For APIs that do not return a result, the API guides in the developer portal now show the response as "Successful" instead of "No Response". (31024)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2023/5.31/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2023/5.31/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following models have been updated in this release:</p>
<ul>
<li class=""><code>authToken</code> has been added to <code>UserAuthenticateQueryParameters</code>. If passed to the authentication query, the query will determine if authentication is allowed with the given auth token.</li>
<li class=""><code>authenticationCompleted</code> has been added to <code>UserAuthenticateQueryResponse</code>. It indicates if further authentication is required when the auth token was passed as a parameter.</li>
<li class=""><code>deviceCertAuthDesired</code> has been added to <code>UserAuthenticateQueryResponse</code>. This attribute is currently not used by the public authentication API.</li>
<li class=""><code>deviceCertAuthDesired</code> has been added to <code>AuthenticatedResponse</code>. This attribute is currently not used by the public authentication API.</li>
<li class=""><code>registrationAuthenticatorAttachment</code>, <code>registrationRequireResidentKey</code> and <code>registrationUserVerification</code> have been added to <code>FIDORegisterChallenge</code>. These attributes are arguments that describe how the FIDO token should be registered.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2023/5.31/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following APIs have been added in this release:</p>
<ul>
<li class="">
<p>POST /api/web/v1/contact/verification/challenge (contactVerificationChallengeUsingPOST)</p>
<p>Given a phone or email contact value this method sends an OTP challenge to the contact using email or SMS.</p>
</li>
<li class="">
<p>POST /api/web/v1/contact/verification/authenticate (contactVerificationAuthenticateUsingPOST)</p>
<p>Validate the challenge generated by a previous call to contactVerificationChallengeUsingPOST.</p>
</li>
</ul>
<p>The following models have been added in this release:</p>
<ul>
<li class=""><code>OTPVerificationChallengeValue</code> contains the parameters passed to contactVerificationChallengeUsingPOST.</li>
<li class=""><code>OTPVerificationChallengeResponse</code> contains the response returned from contactVerificationChallengeUsingPOST.</li>
<li class=""><code>OTPVerificationAuthenticateValue</code> contains the parameters passed to contactVerificationAuthenticateUsingPOST.</li>
<li class=""><code>OTPVerificationAuthenticateResponse</code> contains the response returned from contactVerificationAuthenticateUsingPOST.</li>
<li class=""><code>DeviceCertificateContext</code> defines the device certificate context for a resource rule.</li>
</ul>
<p>The following models have been updated in this release:</p>
<ul>
<li class=""><code>inactivityGracePeriod</code> has been added to <code>GeneralSettings</code>. This attribute specifies the amount of time an administrator can grant to a user who has been deactivated due to inactivity to authenticate.</li>
<li class=""><code>manageInactiveUsers</code> has been added to <code>GeneralSettings</code>. This attribute specifies if inactive users are blocked from authenticating.</li>
<li class=""><code>userInactivityThreshold</code> has been added to <code>GeneralSettings</code>. This attribute specifies the amount of time a user has to be inactive before they are blocked from authenticating.</li>
<li class=""><code>frozen</code> has been added to <code>User</code>. This attribute specifies if a user has been frozen (blocked from authenticating) due to inactivity.</li>
<li class=""><code>frozenGracePeriod</code> has been added to <code>User</code>. If a user blocked from authenticating due to inactivity has been granted a grace period for the administrator this attribute specifies when that grace period expires.</li>
<li class=""><code>securityId</code> has been added to <code>User</code> and <code>UserParms</code>. This attribute specifies the users security identifier and is used to encode the value into the certificates of their smart credentials which will become a requirement to support Microsoft Windows smart-card login.</li>
<li class=""><code>userCreationTime</code> and <code>lastModified</code>have been added to <code>User</code>. These attributes specify the date the user was created and last modified.</li>
<li class=""><code>applyGracePeriod</code> has been added to <code>UserParms</code>. This attribute is used to specify a grace period to users who have been blocked from authenticating due to inactivity.</li>
<li class=""><code>allowLongLivedToken</code> has been added to <code>AdminApiApplication</code> and <code>AdminApiApplicationParms</code>. This attribute specifies if a long-lived token can be used to authenticate to this admin API application.</li>
<li class=""><code>denyAccess</code> has been added to <code>DateTimeContext</code>, <code>DeviceCertificateContext</code>, <code>IpContext</code>, <code>KbaContext</code>, <code>LocationContext</code>, <code>LocationHistoryContext</code>, <code>MachineContext</code>, <code>TransactionContext</code> and <code>TravelVelocityContext</code>. This attribute specifies if access to the application associated with the resource rule is denied if this context does not pass evaluation.</li>
<li class=""><code>deviceCertificateContext</code> has been added to <code>ResourceRule</code>. This attribute returns the device certificate context of a resource rule.</li>
<li class=""><code>deviceCertificateContext</code> and <code>removeDeviceCertificateContext</code> have been added to <code>ResourceRuleParms</code>. These attributes allow the device certificate context of a resource rule to be set or deleted.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.31/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.31 and the three previous releases 5.28, 5.29 and 5.30). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-windows-2012-deprecation">Microsoft Windows 2012 Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.31/#microsoft-windows-2012-deprecation" class="hash-link" aria-label="Direct link to Microsoft Windows 2012 Deprecation" title="Direct link to Microsoft Windows 2012 Deprecation" translate="no">​</a></h2>
<p>Microsoft will stop supporting Windows Server 2012 and Windows Server 2012 R2 in October 2023. At that time, Identity as a Service will no longer support clients running on these platforms where they do not support up-to-date TLS ciphers.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.31/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.30]]></title>
        <id>https://docs.trustedauth.com/blog/2023/5.30/</id>
        <link href="https://docs.trustedauth.com/blog/2023/5.30/"/>
        <updated>2023-05-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2023/5.30/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="saml-signing-certificate-enhancements">SAML Signing Certificate Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.30/#saml-signing-certificate-enhancements" class="hash-link" aria-label="Direct link to SAML Signing Certificate Enhancements" title="Direct link to SAML Signing Certificate Enhancements" translate="no">​</a></h3>
<p>SAML Signing Certificates have been enhanced to support a signing key and certificate issued by a CA (for example, using a P12 file). Additionally, the option to generate a PKCS#10 certificate-signing request (CSR) has been enhanced to offer stronger key size options, signing algorithm options, and an optional challenge password.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="saml-metadata-enhancements">SAML Metadata Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.30/#saml-metadata-enhancements" class="hash-link" aria-label="Direct link to SAML Metadata Enhancements" title="Direct link to SAML Metadata Enhancements" translate="no">​</a></h3>
<p>Exported SAML Metadata now also contains the set of configured SAML Attributes.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-locale-enhancements">Authentication Locale Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.30/#authentication-locale-enhancements" class="hash-link" aria-label="Direct link to Authentication Locale Enhancements" title="Direct link to Authentication Locale Enhancements" translate="no">​</a></h3>
<p>When a user chooses a different locale when authenticating to the IDaaS User Portal, the user is given the option to store the new locale as their default. The locale is used to localize any messages (such as an OTP Email or SMS) sent during authentication.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="password-expiry-notification">Password Expiry Notification<a href="https://docs.trustedauth.com/blog/2023/5.30/#password-expiry-notification" class="hash-link" aria-label="Direct link to Password Expiry Notification" title="Direct link to Password Expiry Notification" translate="no">​</a></h3>
<p>IDaaS now includes the ability to deliver password expiry notifications to users when their password approaches or reaches expiry. The expiry notification can be sent using EMail or SMS. EMail notifications can include a link to take the user to the password change dialog in the IDaaS user portal.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="fido2passkey-authentication-api-support">FIDO2/Passkey Authentication API Support<a href="https://docs.trustedauth.com/blog/2023/5.30/#fido2passkey-authentication-api-support" class="hash-link" aria-label="Direct link to FIDO2/Passkey Authentication API Support" title="Direct link to FIDO2/Passkey Authentication API Support" translate="no">​</a></h3>
<p>The IDaaS authentication API now includes FIDO2 and Passkey authentication options. APIs for a user to register FIDO2 tokens are also available.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="idaas-portal-improvements">IDaaS Portal Improvements<a href="https://docs.trustedauth.com/blog/2023/5.30/#idaas-portal-improvements" class="hash-link" aria-label="Direct link to IDaaS Portal Improvements" title="Direct link to IDaaS Portal Improvements" translate="no">​</a></h3>
<p>The password entry field on the login and password change pages now include an option to view the password.</p>
<p>The change user password dialog has been refactored. Additionally the URL <code>https://&lt;hostname&gt;/#/?redirect=password&amp;userid=&lt;userid&gt;</code> (for example, <code>https://myaccount.us.trustedauth.com/#/?redirect=password&amp;userid=myuserid</code>) takes the user directly to the password change dialog in the User Portal after authentication.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-updates">Enterprise Service Gateway Updates<a href="https://docs.trustedauth.com/blog/2023/5.30/#enterprise-service-gateway-updates" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Updates" title="Direct link to Enterprise Service Gateway Updates" translate="no">​</a></h3>
<p>The version of MS CA Proxy used with IDaaS has been updated. Customers that are using IDaaS with Microsoft CAs should update the version of MS CA Proxy they have installed when they upgrade their ESG.</p>
<p>The ESG install documentation now includes a procedure that describes how to configure the ESG UI to use a public CA issued SSL certificate.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-oidc-integrations">New OIDC Integrations<a href="https://docs.trustedauth.com/blog/2023/5.30/#new-oidc-integrations" class="hash-link" aria-label="Direct link to New OIDC Integrations" title="Direct link to New OIDC Integrations" translate="no">​</a></h3>
<p>A new OIDC/OAuth application template has been added for OAuth2 Native Apps (RFC 6749 section 4.3)</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-radius-integrations">New RADIUS Integrations<a href="https://docs.trustedauth.com/blog/2023/5.30/#new-radius-integrations" class="hash-link" aria-label="Direct link to New RADIUS Integrations" title="Direct link to New RADIUS Integrations" translate="no">​</a></h3>
<p>A new RADIUS application template has been added for <a href="https://www.fortinet.com/" target="_blank" rel="noopener noreferrer" class="">Fortinet</a>.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-or-changed-in-this-release">Fixed or changed in this release<a href="https://docs.trustedauth.com/blog/2023/5.30/#fixed-or-changed-in-this-release" class="hash-link" aria-label="Direct link to Fixed or changed in this release" title="Direct link to Fixed or changed in this release" translate="no">​</a></h2>
<ol>
<li class="">In past releases some customers encountered issues with their ESG when the underlying VM was modified. This required the ESG be re-initialized to recover. This issue has been addressed. (30855)</li>
<li class="">User Provisioning has been optimized to not perform provisioning for some user changes that do not require reprovisioning. (31311, 31323)</li>
<li class="">Address issues in User Provisioning where users were not provisioned or deprovisioned for some group changes. (31317, 31434)</li>
<li class="">User Provisioning related audits have been improved. (31312, 31294)</li>
<li class="">User Provisioning should not be enabled for Service Providers that are not Premium accounts. (31396)</li>
<li class="">Improvements to User Provisioning where attributes, including locale and some custom attributes, were not provisioned as expected. (31278, 31314, 31341)</li>
<li class="">Improvements to User Provisioning configuration to prevent invalid values from being configured and other UI improvements. (31326, 31461, 31492, 31496)</li>
<li class="">The notification sent to users when an authenticator is locked specified the wrong action. (31376)</li>
<li class="">Improved the label for the Smart Credential &gt; Activation Lifetime setting in the UI. (31411)</li>
<li class="">Differentiate audits for FIDO2 authentication to differentiate when the userId is entered and where it comes from the FIDO2 token. (30284)</li>
<li class="">Improvements to Identity Provider configuration for Microsoft Identity Providers. (29118)</li>
<li class="">Improve audit details when the attribute filters for a SAML application are updated. (29222)</li>
<li class="">Fix a problem with Entrust soft token activation when the maximum time steps policy was set to 1. (31397)</li>
<li class="">Improved error message returned when invalid values were provided for Google Max. Time Steps and Max. Reset Time Steps settings. (29721)</li>
<li class="">Some links to documentation in IDaaS admin portal were broken. (30976)</li>
<li class="">RADIUS applications with External first-factor can now be configured to skip second-factor authentication. (31052)</li>
<li class="">Password blocklist did not allow the last value to be deleted. (31402)</li>
<li class="">Admin API authentication now ignores leading or trailing whitespace in the applicationId. (29297)</li>
<li class="">Improve errors logged when attempting to delete external users using the bulk delete user operation. (29530)</li>
<li class="">Fixed issues with date filters for authentication counts in the Admin Portal dashboard. (31519, 31522)</li>
<li class="">The UI in the Admin Portal for adding custom OIDC attributes has been updated. (31674)</li>
<li class="">Improve the audit for modifying OIDC applications to not include attributes that have not been changed. (31399)</li>
<li class="">The audit for delete grid card showed the action in lowercase. (31423)</li>
<li class="">The Admin Portal did not allow email addresses with leading or trailing whitespace. The whitespace is now automatically trimmed. (28895)</li>
<li class="">When creating a new site role, the option to delete groups was missing. (31189)</li>
<li class="">Log file for IdentityGuard bulk import operation now includes more information about errors. (30645)</li>
<li class="">The Azure AD reauthenticate audit used a non-standard date format for the authorizationDate value. (31443)</li>
<li class="">Generic Device OIDC applications should not be clickable in the User Portal. (30456)</li>
<li class="">When configuring a Microsoft CA in the Admin Portal, fix some formatting issues when the configuration is displayed. (31254)</li>
<li class="">When configuring Authorization, OIDC applications created to support Service Provider administration should not be allowed for Client Credentials Grants. (31419)</li>
<li class="">The list of OIDC applications listed for Add Client Credentials Grant for Authorization should be sorted. (31418)</li>
<li class="">OIDC applications without an Initial Login URI configured should not be clickable in the User Portal. (30458)</li>
<li class="">The IDaaS portal has been improved to support authentication in browsers that do not support local storage which is common for browsers running in protected mode or on mobile devices. (31641, 29604, 27564, 30924, 30224)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2023/5.30/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2023/5.30/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following APIs have been added in this release:</p>
<ul>
<li class="">
<p>POST /api/web/v1/authentication/passkey (requestPasskeyChallengeUsingPOST)</p>
<p>Create a Passkey authentication challenge to begin Passkey authentication.</p>
</li>
<li class="">
<p>GET /api/web/v1/self/fidotokens (startFIDORegisterUsingGET)</p>
<p>Get a FIDO token registration challenge for the authenticated user.</p>
</li>
<li class="">
<p>POST /api/web/v1/self/fidotokens (completeFIDORegisterUsingPOST)</p>
<p>Complete registration of a FIDO token for the authenticated user.</p>
</li>
</ul>
<p>The following models have been updated in this release:</p>
<ul>
<li class=""><code>FIDORegisterChallenge</code>. This model contains the attributes returned from <code>startFIDORegisterUsingGet</code>.</li>
<li class=""><code>FIDORegisterResponse</code>. This model contains the attributes passed to <code>completeFIDORegisterUsingPOST</code>.</li>
<li class=""><code>PasskeyChallengeParameters</code>. This model contains the attributes passed to <code>requestPasskeyChallengeUsingPOST</code>.</li>
<li class=""><code>PasskeyChallengeResponse</code>. This model contains the attributes returned from <code>requestPasskeyChallengeUsingPOST</code>.</li>
</ul>
<p>The following models have been updated in this release:</p>
<ul>
<li class=""><code>locale</code> has been added to <code>UserChallengeParameters</code> and <code>UserAuthenticateParameters</code>. If specified, this value specifies the locale to be used when generating messages sent for the authentication challenge or the authentication complete operation. If not specified, the user's default locale is used.</li>
<li class=""><code>origin</code> has been added to <code>UserChallengeParameters</code> and <code>UserAuthenticateParameters</code>. If specified, this value specifies the origin of FIDO tokens. Only FIDO tokens registered with this origin are used for authentication.</li>
<li class="">In previous releases, the <code>response</code> and <code>newPassword</code> attributes of <code>UserAuthenticateParameters</code> were erroneously labelled as required attributes. These attributes are optional.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2023/5.30/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following APIs have been added in this release:</p>
<ul>
<li class="">
<p><code>PUT /api/web/v1/users/{userid}/password/notify</code> (sendPasswordExpiryNotificationUsingPUT)</p>
<p>This API sends a password expiry notification to the specified user.</p>
</li>
</ul>
<p>The following models have been updated in this release:</p>
<ul>
<li class=""><code>expiryNotificationDate</code> has been added to <code>UserPassword</code>. This attribute specifies the next time that a password expiry notification will be delivered.</li>
<li class=""><code>passkeyEnabled</code> has been added to <code>AuthApiApplication</code>. This attribute indicates if the application supports Passkey authentication.</li>
<li class=""><code>origin</code> has been added to <code>FIDOToken</code>. This attribute indicates the origin from which this token was registered.</li>
<li class=""><code>showNotification</code> has been added to <code>User</code>. This attribute is currently not used.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.30/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.30 and the three previous releases 5.27, 5.28 and 5.29). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-windows-2012-deprecation">Microsoft Windows 2012 Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.30/#microsoft-windows-2012-deprecation" class="hash-link" aria-label="Direct link to Microsoft Windows 2012 Deprecation" title="Direct link to Microsoft Windows 2012 Deprecation" translate="no">​</a></h2>
<p>Microsoft will stop supporting Windows Server 2012 and Windows Server 2012 R2 in October 2023. At that time, Identity as a Service will no longer support clients running on these platforms where they do not support up-to-date TLS ciphers.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.30/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h2>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service will cease support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.29]]></title>
        <id>https://docs.trustedauth.com/blog/2023/5.29/</id>
        <link href="https://docs.trustedauth.com/blog/2023/5.29/"/>
        <updated>2023-03-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2023/5.29/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="user-provisioning">User Provisioning<a href="https://docs.trustedauth.com/blog/2023/5.29/#user-provisioning" class="hash-link" aria-label="Direct link to User Provisioning" title="Direct link to User Provisioning" translate="no">​</a></h3>
<p>IDaaS now supports provisioning of users to 3rd-party services using the System for Cross-domain Identity Management (SCIM) protocol. The first release of this feature has been tested against Salesforce.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="identity-provider-enhancements">Identity Provider Enhancements<a href="https://docs.trustedauth.com/blog/2023/5.29/#identity-provider-enhancements" class="hash-link" aria-label="Direct link to Identity Provider Enhancements" title="Direct link to Identity Provider Enhancements" translate="no">​</a></h3>
<p>The following enhancements have been made to Identity Providers:</p>
<ul>
<li class="">
<p>A new user verification policy has been added to require a user to approve a user verification message. When configured, users must approve the message in order to complete verification. Administrators configure the user verification messages on the IDaaS Theme page.</p>
</li>
<li class="">
<p>An Administrator can configure IDaaS to find users using the User Principal Name attribute or an IDaaS custom attribute during Identity Provider authentication. This is in addition to finding users using the Userid/Alias attribute.</p>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="token-reset-bulk-operation">Token Reset Bulk Operation<a href="https://docs.trustedauth.com/blog/2023/5.29/#token-reset-bulk-operation" class="hash-link" aria-label="Direct link to Token Reset Bulk Operation" title="Direct link to Token Reset Bulk Operation" translate="no">​</a></h3>
<p>A new bulk operation to perform token reset for a list of tokens has been added.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-option-on-samloidc-applications-to-disable-go-back-button">New Option on SAML/OIDC Applications to Disable Go Back Button<a href="https://docs.trustedauth.com/blog/2023/5.29/#new-option-on-samloidc-applications-to-disable-go-back-button" class="hash-link" aria-label="Direct link to New Option on SAML/OIDC Applications to Disable Go Back Button" title="Direct link to New Option on SAML/OIDC Applications to Disable Go Back Button" translate="no">​</a></h3>
<p>A new option has been added to SAML and OIDC applications that allows an administrator to disable the Go Back button that is present during authentication.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="options-to-configure-the-user-portal">Options to configure the User Portal<a href="https://docs.trustedauth.com/blog/2023/5.29/#options-to-configure-the-user-portal" class="hash-link" aria-label="Direct link to Options to configure the User Portal" title="Direct link to Options to configure the User Portal" translate="no">​</a></h3>
<p>The following options have been added to allow an administrator to configure the IDaaS User Portal</p>
<ul>
<li class="">Options to select a default tab and additional tabs that appear on the User Portal. The default tab is the landing page tab when a user logs in.</li>
<li class="">A setting to specify the URL of the User Guide User Portal help. If set, the User Guide Help option displays this document instead of the default IDaaS documentation. This allows a customer to provide custom documentation.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="create-grid-action-in-user-portal">Create Grid Action in User Portal<a href="https://docs.trustedauth.com/blog/2023/5.29/#create-grid-action-in-user-portal" class="hash-link" aria-label="Direct link to Create Grid Action in User Portal" title="Direct link to Create Grid Action in User Portal" translate="no">​</a></h3>
<p>Users can now create their own grids in the User Portal. Previously, only administrators could create grids for users.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-in-this-release">Fixed in this release<a href="https://docs.trustedauth.com/blog/2023/5.29/#fixed-in-this-release" class="hash-link" aria-label="Direct link to Fixed in this release" title="Direct link to Fixed in this release" translate="no">​</a></h2>
<ol>
<li class="">When deleting, enabling, or disabling a smart credential from the User portal, the audit specified the Admin portal. (28966, 29007)</li>
<li class="">When changing the variable values of a smart credential, the audit does not indicate which values were changed. (29009)</li>
<li class="">Sync add user audit specified edit permission instead of add permission. (29673)</li>
<li class="">User registration dialog and registration emails for Mobile smart credential contained outdated links for both Android and iOS apps. (30906, 30908)</li>
<li class="">User portal smart credential activation dialog is missing option to download Android and iOS apps. (30877)</li>
<li class="">Updated the encryption of PDF eGrids to use AES-256. (30949)</li>
<li class="">Unable to delete KBA word maps. (30960)</li>
<li class="">Errors updating KBA word maps. (30793)</li>
<li class="">KBA word maps defined in a per group policy were not correctly applied. (30947)</li>
<li class="">Improve the logs generated for the IdentityGuard (Identity Enterprise) import. (30941)</li>
<li class="">When importing tokens using the IdentityGuard (Identity Enterprise) import, the token set name from IDE is imported into the IDaaS token label. (31038)</li>
<li class="">When importing tokens using the IdentityGuard (Identity Enterprise) import, if the token has push authentication enabled, the push authentication is now enabled in IDaaS during import rather than after the first time the user uses the Entrust Identity application after migration. (30899)</li>
<li class="">Creating a smart credential in the User portal sends multiple activate requests. (30248)</li>
<li class="">When adding a contact in the User portal, the generated audit specifies user add. It should be user edit. (29556)</li>
<li class="">When a resource rule is cloned, the UI displays Edit Resource Rule. It should be Add Resource Rule. (31130)</li>
<li class="">When checking user aliases for uniqueness, white space was ignored. White space is significant. (31059)</li>
<li class="">When a resource rule Date/Time context was set without a time zone, it displayed as an unknown value the next time the resource rule was viewed. (30898)</li>
<li class="">When a resource rule Date/Time context was set, the start time may not be set correctly resulting in situations where it was rejected. (30669, 30900)</li>
<li class="">When a second-factor authenticator is checked in the resource rule it should automatically sort above all unselected authenticators. (31015)</li>
<li class="">Display a proper error message if a cloned resource rule is created with an existing name. (31012)</li>
<li class="">When viewing a resource rule as an administrator that does not have write access the External Risk Engine settings should be read-only in the UI. Note that IDaaS correctly rejects the edit request if submitted. (30792)</li>
<li class="">The performance of LDAP queries performed by the directory sync agent on the Enterprise Service Gateway have been improved. (27563)</li>
<li class="">The RADIUS agent option to perform first-factor AD password authentication directly to AD was broken. (30041)</li>
<li class="">The SIEM agent on the Enterprise Service Gateway could stop sending logs to syslog for some network connectivity issues. (30701)</li>
<li class="">The layout of PDF eGrids has been improved. (30657)</li>
<li class="">The authentication types and actions included in the authenticator change notification email are not localized. (30436)</li>
<li class="">Unable to remove the email value from a schedule report. (30655)</li>
<li class="">In the Admin UI, fix the tab order between fields for the EMail Server OAuth Settings page. (30472)</li>
<li class="">When configuring an EMail server to use OAuth, the defined scope may be removed if the OAuth server returns a null scope. (30471)</li>
<li class="">When configuring an EMail server to use OAuth, require the OAuth server to be reauthorized if the OAuth data changes. (30795)</li>
<li class="">When testing EMail server configuration for a server configured to use OAuth, only try the test a single time if the OAuth refresh token is expired. (30785)</li>
<li class="">Improve the audit for Email server configuration changes to show which attributes changed. (30814)</li>
<li class="">When accessing the Email server settings, the OAuth Authorize action should be disabled if the administrator does not have edit permission. (30557)</li>
<li class="">Improve the error messages displayed in the User portal when using FIDO/Passkey authentication. (30384)</li>
<li class="">Reports can get stuck in the schedule state preventing new reports from being started. These reports are now automatically cancelled. (29761, 31164)</li>
<li class="">Accounts with the standard bundle should have access to use IP lists. (30568)</li>
<li class="">The audit generating when modifying User RBA Settings is missing the admin permission. (29717)</li>
<li class="">Fix how the User Portal Change Password dialog is loaded on a slow network so that is does not display until fully rendered. (22039)</li>
<li class="">When modifying Active Sync settings, the Save button should not be enabled until the Test operation completes. (27969)</li>
<li class="">OAuth scopes during authentication are not sorted in the display. (30850)</li>
<li class="">Add gateway audit included information about DB proxy that is not applicable and is now removed. (29472)</li>
<li class="">Audit for unassigning a grid from a user should include the userId of the user. (29339)</li>
<li class="">When all user entitlements have been consumed, synchronizing an inactive user fails. Inactive users do not consume an entitlement. (29135)</li>
<li class="">Warning message displayed when editing a resource rule that has Identity Providers associated with it should only be displayed for resource rules associated with OIDC and SAML applications. (30823)</li>
<li class="">The default Date Range for audit and authentication searches performed on the Admin portal dashboard has been changed from 24 hours to 1 hour.</li>
<li class="">All new Facebook Identity Providers must use openid scope. (31350)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2023/5.29/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<ol>
<li class="">IDaaS API documentation has been refactored and moved to the <a class="" href="https://docs.trustedauth.com/developer/">Developer Portal</a></li>
<li class="">Dropped support for .NET Core 3.1 for CSharp clients and added support for .NET Framework 4.8.</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-in-this-release">Changes in this release<a href="https://docs.trustedauth.com/blog/2023/5.29/#changes-in-this-release" class="hash-link" aria-label="Direct link to Changes in this release" title="Direct link to Changes in this release" translate="no">​</a></h2>
<p>The following changes have been made to address issues or enhance existing functionality.</p>
<ol>
<li class="">All existing Facebook Identity Providers that do not use openid will require an update to use openid.</li>
</ol>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2023/5.29/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The following APIs have been updated in this release:</p>
<ul>
<li class="">
<p>POST /api/web/v2/authentication/users (userAuthenticatorQueryUsingPOST)</p>
</li>
<li class="">
<p>POST /api/web/v1/authentication/users (userAuthenticatorQueryUsingPOST)</p>
</li>
<li class="">
<p>POST /api/web/api/v1/authentication/users (userAuthenticatorQueryUsingPOST) - <code>returnDefaultChallenge</code> has been added to <code>UserAuthenticateQueryParameters</code>. This attribute is used to indicate whether a challenge should be returned for the default authenticator. - The following attributes are also added to <code>UserAuthenticateQueryParameters</code> to support returning the default challenge--see <code>UserChallengeParameters</code> for details: <code>summary</code>, <code>priority</code>, <code>requestDetail</code>, <code>pushMessageIdentifier</code>, <code>tokenPushMutualChallengeEnabled</code>, <code>offlineTVS</code> - <code>UserAuthenticateQueryResponse</code> has been updated to include the following attributes with the default challenge information--see <code>AuthenticatedResponse</code> for details: <code>otpDeliveryType</code>, <code>kbaChallenge</code>, <code>gridChallenge</code>, <code>tokenDetails</code>, <code>fidoChallenge</code>, <code>tokenChallenge</code>, <code>tempAccessCodeChallenge</code>, <code>tokenPushMutualChallenge</code> - <code>authenticatorLockoutStatus</code> has been added to <code>UserAuthenticateQueryResponse</code>. This attribute contains detailed user authenticator lockout information. This behavior is controlled by the General policy <code>enableEnhancedAuthenticationDetails</code>.</p>
</li>
<li class="">
<p><code>POST /api/web/v1/authentication/users/authenticate/{authenticator}/complete</code> (userAuthenticateUsingPOST)</p>
</li>
<li class="">
<p><code>POST /api/web/api/v1/authentication/users/authenticate/{authenticator}/complete</code> (userAuthenticateUsingPOST) - Providing a JWT in the Authorization header is now optional. This change allows to authenticate a user with a single API call for authenticators that do not require a challenge.</p>
</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.29/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.29 and the three previous releases 5.26, 5.27 and 5.28). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway O/S.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-windows-2012-deprecation">Microsoft Windows 2012 Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.29/#microsoft-windows-2012-deprecation" class="hash-link" aria-label="Direct link to Microsoft Windows 2012 Deprecation" title="Direct link to Microsoft Windows 2012 Deprecation" translate="no">​</a></h2>
<p>Microsoft will stop supporting Windows Server 2012 and Windows Server 2012 R2 in October 2023. At that time, Identity as a Service may no longer support clients running on these platforms where they do not support up-to-date TLS ciphers.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.29/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h3>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service will cease support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
    <entry>
        <title type="html"><![CDATA[Release 5.28]]></title>
        <id>https://docs.trustedauth.com/blog/2023/5.28/</id>
        <link href="https://docs.trustedauth.com/blog/2023/5.28/"/>
        <updated>2023-02-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New in this release]]></summary>
        <content type="html"><![CDATA[<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-in-this-release">New in this release<a href="https://docs.trustedauth.com/blog/2023/5.28/#new-in-this-release" class="hash-link" aria-label="Direct link to New in this release" title="Direct link to New in this release" translate="no">​</a></h2>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="external-risk-engine-support">External Risk Engine Support<a href="https://docs.trustedauth.com/blog/2023/5.28/#external-risk-engine-support" class="hash-link" aria-label="Direct link to External Risk Engine Support" title="Direct link to External Risk Engine Support" translate="no">​</a></h3>
<p>IDaaS has extended risk-based authentication to include risk factors from external providers. These external providers can track additional information about a user session to determine whether this is likely the user. Only authentications using the Authentication API support External Risk Engines.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="pdf-egrid-automatic-delivery">PDF eGrid Automatic Delivery<a href="https://docs.trustedauth.com/blog/2023/5.28/#pdf-egrid-automatic-delivery" class="hash-link" aria-label="Direct link to PDF eGrid Automatic Delivery" title="Direct link to PDF eGrid Automatic Delivery" translate="no">​</a></h3>
<p>Grid delivery can be configured so that a PDF eGrid is automatically delivered to the user when a new grid is created. Additionally, a new option has been added to registration so that a grid is automatically created when a user is created.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="resource-rule-improvements">Resource Rule Improvements<a href="https://docs.trustedauth.com/blog/2023/5.28/#resource-rule-improvements" class="hash-link" aria-label="Direct link to Resource Rule Improvements" title="Direct link to Resource Rule Improvements" translate="no">​</a></h3>
<p>The following enhancements have been made to resource rules:</p>
<ul>
<li class="">For customers that are not using resource rule contexts to choose between different risk levels, a new simplified resource rule is shown that hides all of the unused configurations.</li>
<li class="">When creating an additional resource rule for an application, the existing resource rule can be cloned.</li>
<li class="">The information included in an authentication audit has been enhanced to show how the authentication decision was reached.</li>
</ul>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="fixed-in-this-release">Fixed in this release<a href="https://docs.trustedauth.com/blog/2023/5.28/#fixed-in-this-release" class="hash-link" aria-label="Direct link to Fixed in this release" title="Direct link to Fixed in this release" translate="no">​</a></h2>
<p>The following issues have been fixed in this release.</p>
<ol>
<li class="">A bash script has been added to the Enterprise Gateway to allow administrators to easily configure the static IP address of the Enterprise Gateway. The script can be found at <code>/home/entrust/tools/setup_static_ip.sh</code> and requires sudo privileges to run. The script prompts for the interface name, IP address, netmask, network gateway, and DNS server. After the script runs, users must then use the cockpit to register the Enterprise Gateway with Identity as a Service. (30106)</li>
<li class="">IDaaS features that use OAuth to authenticate to 3rd-party services have been refactored to use common OAuth functionality. These services include External Email, secure device provisioning, and Azure AD directories. Improvements include better handling of expired auth tokens. (30467)</li>
<li class="">A customer can now create multiple bulk operations of the same type. The bulk operations will be queued and run one at a time. Previously a second bulk operation could not be created until the first operation had completed. (29735)</li>
<li class="">FIDO2/Passkey token registration error handling in the User portal has been improved to better handle the error caused when the user has registered the maximum allowed number of FIDO2/Passkey tokens. (30403)</li>
<li class="">The password state icon shown in the User portal authenticator list could be truncated. (30451)</li>
<li class="">The subject of Emails sent to deliver eGrids to users were not translated for non-English locales. (30431)</li>
<li class="">Improved the bulk operation create dialog display when a long description is entered. (30506)</li>
<li class="">Audits generated when a user was updated as part of a directory sync operation indicated the audit was for the Gateway Agent instead of the user. Also, all user attributes were listed instead of just the attributes that changed. (28154)</li>
<li class="">Enhanced the user list password expiry filter to differentiate between a password that has expired and a password that never expires. (28311)</li>
<li class="">The AD Connector Delete Group operation has been renamed from "Delete Group" to "Delete AD Connector Group" so that it does not get confused with deleting IDaaS groups. (29769)</li>
<li class="">Importing a grid export file generated by Identity Enterprise was broken. (30493)</li>
<li class="">Password could not be reused even after password history was cleared. (30083)</li>
<li class="">An OIDC Generic Server Application should not show the "Authentication Flow" option because this type of OIDC application does not support the standard authentication flows. (30376)</li>
<li class="">Disable input fields when displaying a resource rule for administrators that do not have write access. The Save button was correctly disabled. (30569)</li>
</ol>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="changes-to-identity-as-a-service-apis">Changes to Identity as a Service APIs<a href="https://docs.trustedauth.com/blog/2023/5.28/#changes-to-identity-as-a-service-apis" class="hash-link" aria-label="Direct link to Changes to Identity as a Service APIs" title="Direct link to Changes to Identity as a Service APIs" translate="no">​</a></h2>
<p>The swagger files provided for the IDaaS APIs have been updated from Swagger (OpenAPI 2.0) to OpenAPI 3.0.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="authentication-api">Authentication API<a href="https://docs.trustedauth.com/blog/2023/5.28/#authentication-api" class="hash-link" aria-label="Direct link to Authentication API" title="Direct link to Authentication API" translate="no">​</a></h3>
<p>The concept of self-management APIs has been introduced and are included in the IDaaS authentication APIs. To use a self-management API, the customer application must do the following:</p>
<ul>
<li class="">Use the authentication API to authenticate the end user which generates an authToken.</li>
<li class="">Call a self-management API providing the authToken as an authentication token. The self-management API will act on the user associated with the authToken.</li>
</ul>
<p>The following self-management APIs have been added in this release:</p>
<ul>
<li class="">POST /api/web/v1/self/values (selfSetUserClientValuesUsingPOST) - store the specified list of name/value pairs for the user.</li>
<li class="">GET /api/web/v1/self/values (selfGetUserClientValuesUsingGET) - return the stored name/value pairs from the user.</li>
<li class="">PUT /opt/web/v1/self/values (selfDeleteUserClientValuesUsingPUT) - delete the named name/value pairs from the user.</li>
</ul>
<p>The following models have been added in this release:</p>
<ul>
<li class=""><code>UserClientValue</code> defines a name/value pair that is passed to <code>selfSetUserClientValuesUsingPOST</code> and returned from <code>selfGetUserClientValuesUsingGET</code>.</li>
</ul>
<p>User client values can be used by any application using an IDaaS authentication API application to manage user client values used by client applications.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="administration-api">Administration API<a href="https://docs.trustedauth.com/blog/2023/5.28/#administration-api" class="hash-link" aria-label="Direct link to Administration API" title="Direct link to Administration API" translate="no">​</a></h3>
<p>The following attributes have been added to existing models:</p>
<ul>
<li class=""><code>userValuesEnabled</code> has been added to <code>AuthApiApplication</code> and <code>AuthApiApplicationParms</code>. This boolean value indicates whether user client values can be managed for this application.</li>
<li class=""><code>defaultGrid</code> has been added to <code>GeneralSettings</code>. This boolean value indicates if a grid should be automatically created for a new user.</li>
<li class=""><code>riskEngineContext</code> has been added to <code>ResourceRule</code> and <code>ResourceRuleParms</code>. This attribute is a list of <code>TransactonContext</code> and specifies external risk engines to apply to the risk authentication.</li>
</ul>
<p>In previous versions of the Administration API swagger file, the method unblockSmartCredentialUsingPUT was incorrectly defined to return the type <code>SmartCredentialUnblockParms</code>. It should have been <code>SmartCredentialUnblockResponse</code>.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="enterprise-service-gateway-deprecation">Enterprise Service Gateway Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.28/#enterprise-service-gateway-deprecation" class="hash-link" aria-label="Direct link to Enterprise Service Gateway Deprecation" title="Direct link to Enterprise Service Gateway Deprecation" translate="no">​</a></h2>
<p>Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.28 and the three previous releases 5.25, 5.26 and 5.27). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway O/S.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="microsoft-windows-2012-deprecation">Microsoft Windows 2012 Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.28/#microsoft-windows-2012-deprecation" class="hash-link" aria-label="Direct link to Microsoft Windows 2012 Deprecation" title="Direct link to Microsoft Windows 2012 Deprecation" translate="no">​</a></h2>
<p>Microsoft will stop supporting Windows Server 2012 and Windows Server 2012 R2 in October 2023. At that time, Identity as a Service may no longer support clients running on these platforms where they do not support up-to-date TLS ciphers.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="browser-deprecation">Browser Deprecation<a href="https://docs.trustedauth.com/blog/2023/5.28/#browser-deprecation" class="hash-link" aria-label="Direct link to Browser Deprecation" title="Direct link to Browser Deprecation" translate="no">​</a></h3>
<p>Microsoft no longer supports Internet Explorer 11. Identity as a Service will cease support for Internet Explorer 11 after May 2023.</p>]]></content>
        <category label="Release" term="Release"/>
    </entry>
</feed>