Release note Smart ID 20.06.1
Version: 20.06.1
Release Date: 2020-10-16
Component versions
Detailed feature list
Features
Jira ticket no | Description | Digital Access | Identity Manager & Self-Service | Physical Access | Messaging |
---|---|---|---|---|---|
CRED-9564 | Modify attributes in uploaded Pkcs#10 requests A new service task is added that allows to modify attributes of an uploaded Pkcs#10 certificate request when using Nexus Certificate Manager as PKI. Read more here: Standard service tasks in Identity Manager: "Cert: Execute Modified PKCS10 Request" | X | |||
CRED-9697 | More attributes can be extracted from X.509 certificates Extended standard service task for X.509 certificate attribute extraction. Now also keyType, keyUsage, extKeyUsage, hashAlgorithm, cdpUrls and ocspUrls can be extracted from the certificates. Read more here: Standard service tasks in Identity Manager: "Cert: Extract Certificate Attributes". | X | |||
CRED-9802 | Change the secret fields encryption keypair with command line tool Certificate rollover/re-encryption of encrypted fields in the Identity Manager database can now be done with a corresponding command line tool. Read more here: Change Encryption key of secret field store. | X | |||
CRED-9829 | Improved authentication in Smart ID Agent The Smart ID Agent now also supports authentication via client certificate. Read more here:Â Smart ID Agent (DataSyncProxy) in Identity Manager and here:Â Access local services from Identity Manager in the cloud. | X | |||
CRED-9865 | Logging for SAML has been extended Extended logging for SAML authentication process on log level INFO. | X | |||
CRED-9886 | Loading latest encryption certificate from LDAP A new standard service task is added that allows to retrieve the latest encryption certificate for a certain user from an LDAP directory. Read more here: Standard service tasks in Identity Manager: "Process: Search the newest Encryption Certificate". | X | |||
CRED-9961 | Extended logging Extended logging for Certificate REST API (aka Autoenrollment). | X | |||
CRED-9988 | Introduced the Hybrid Profile concept A new "hybrid profile" option was added to the VSC use cases, supporting both TPM (and as fallback) Windows certificate store provisioning. Read more here:Â Read more here: Standard service tasks in Identity Manager: "Personal Messaging: Create key on VSC and Install cert on VSC". | X | |||
CRED-10106 | Improved language selection in Smart ID Self-Service A language selection is added to the Smart ID Self-Service screen, which is available after login as well. So, users can now select the language before authentication but also at any time when they are working in the Smart ID Self-Service. | X | |||
CRED-10118 | Improved user experience for smart card encoding In Smart ID Self-Service, when encoding smart cards via Smart ID Desktop App, the user experience and error handling has been improved. No need to do an additional "Next" click after encoding, and the self-service screen is locked so that you can't accidentally switch the page. | X | |||
HAG-856 | Core dump files are enabled by default Previously, core dump files for the Access Point where not enabled by default. This had the disadvantage that a crash was not recorded at the first occurrence. This setting is now enabled by default. | X | |||
HAG-1827 | Support for Freja Organisation eID With Digital Access you can now use Freja Organisation eID for authentication. This was integrated in the existing Freja authentication method. Furthermore, it is now possible to request user attributes from Freja together with the authentication. For more information, refer to the help pages of the Freja authentication method in Digital Access Admin. See also Freja eID in Digital Access and Set up Freja eID authentication in Digital Access. | X | |||
HAG-2210 | Digital Access complies with changes of Swedish eID framework specifications Digital Access will no longer require a -sigmessage in the authentication context in order to display the signing message to the user. Furthermore, a new attribute signMessageDigest was introduced in the response sent by Digital Access to prove that the signing message has been displayed to the user. Read more here: Use authentication methods in Digital Access for signing over SAML. | X | |||
PMOB-1866 | Added support for UVID command for allowing a collaborating service to update visual data for an existing mobile virtual smartcard (profile) on the device. | X | |||
PMOB-2234 | Added support for HTTP 308 (MOVE) per client, in order to simplify migration of users from one system to another. | X | |||
PMOB-2272 | Added support for Prometheus scrape in order to get metrics. | X | |||
PMOB-2332 | Added support for the option deletereader in the delete command, that can be true or false and controls if the virtual smart card shall be deleted or not when the profile is deleted. | X | |||
PMOB-2385 | Adding metrics for each client call to the command api, to be able to measure how much different clientIds use the system. | X |
Corrected bugs
Jira ticket no | Description | Digital Access | Identity Manager & Self-Service | Physical Access | Messaging |
---|---|---|---|---|---|
CRED-8776 | Fixed an issue around state selection in the search filters when using a multi-level search in the Extended Search view. Wrong states were displayed in that case. | X | |||
CRED-9379 | Fixed a security flaw when concurrent SAML authentication is done on a multi-tenant system. | X | |||
CRED-9528 | Fixed the error handling in SAML configuration: if password for the uploaded certificate key store is wrong, now a correct error message is shown. | X | |||
CRED-9537 | Fix for disabling REST APIs which were still active while Identity Manager was in maintenance mode. | X | |||
CRED-9578 | Fixed rendering of line breaks in translated labels for Self-Service. | X | |||
CRED-9686 | Fixed an issue in Batch Order: when opening an existing order, removing one item of the objects in the order list didn't work. | X | |||
CRED-9724 | Security fix for JUEL expression language. | X | |||
CRED-9761 | Avoids an unwrapping private key error with PKCS#12 files by repackaging. | X | |||
CRED-9763 | Updated "jetty" library to a newer version to fix known vulnerabilities. | X | |||
CRED-9775 | Fixed handling of empty serial number value in standard service task for SCEP registration. Now the empty value is send to Certificate Manager instead of "null". | X | |||
CRED-9792 | Fix for ActionExceptions, showing resource tags instead of translations in the UI. | X | |||
CRED-9839 | Fixed an issue in the cookie handling of Self-Service (failed authentication) when having a lot of data (e.g. via additional fields) in the user record. | X | |||
CRED-9854 | Fixed display of username and IP address in in object history (was not shown anymore). | X | |||
CRED-9874 | Fixed a displaying issue with text fields in Identity Manager, Admin and Tenant. | X | |||
CRED-9876 | Fixed field validation for read-only fields in user forms for Self-Service. | X | |||
CRED-9898 | Fixed starting BPMN process in BatchSync when no target core template is selected. | X | |||
CRED-9905 | Solves an issue with the DB Updater failing on Oracle DBs with multiple Identity Manager schemes. | X | |||
CRED-9947 | Solves a NullpointerException with BatchSync. | X | |||
CRED-9959 | When reloading a form that contains validation rules on a date field, a second time in Smart ID Self-Service it was not displayed correctly. This has been fixed now. | X | |||
CRED-10084 | Fixed error handling for smart card encoding in Smart ID Self-Service when canceling the PIN dialog. The error is now thrown correctly in the extended error mode and can be handled via a corresponding boundary event in the BPMN process. | X | |||
HAG-1787 | No user details are available in Freja over XPI. | X | |||
HAG-2160 | If Distribution Service is down, Administration Service does not come up. | X | |||
HAG-2184 | Template Not Found warning appears in admin system log for Freja authentication method. | X | |||
HAG-2187 | Display Name attribute is not loading correctly when using Freja or OpenID Connect authentication method. | X | |||
HAG-2206 | Upgrade to Digital Access version 6.0 failed caused by Distribution Service. | X |
Contact
Contact Information
For information regarding support, training and other services in your area, please visit our website at www.nexusgroup.com/.Â
Support
Nexus offers maintenance and support services for Digital Access component to customers and partners. For more information, please refer to the Nexus Technical Support at www.nexusgroup.com/support/, or contact your local sales representative.
Copyright 2024 Technology Nexus Secured Business Solutions AB. All rights reserved.
Contact Nexus | https://www.nexusgroup.com | Disclaimer | Terms & Conditions