Entrust

Release 5.37

New in this release

Face Biometric Authentication with Entrust Identity Mobile

The IDaaS Face Biometric Authenticator has been enhanced to support Face Biometrics registered and authenticated from the Entrust Identity Mobile application. Face Biometric authenticators managed on the Entrust Identity Mobile application can be configured so that the user's biometric information is stored on the mobile device rather than in the Onfido cloud.

Face Biometric authentication using the Entrust Identity Mobile app has a user experience similar to token push authentication.

Face Biometric authentication has the option to include a mutual authentication challenge to prevent the user from accidentally responding to an attacker's authentication request.

User Certificate Authentication Matching Policy Update

IDaaS has enhanced its User Certificate Authentication matching policy, enabling fine-grained control for user matching.
The new settings allow the configuration of one-to-one mappings between certificate components and user attributes.

The list of supported certificate components has been expanded to include both strong and weak components:

Entrust highly recommends using strong components for user matching. When only weak components are configured, all
matching rules must be satisfied to successfully authenticate a user.

In addition, the settings support specifying mandatory and prohibited certificate policy OIDs, ensuring that only
certificates with the appropriate policies can be used. This applies to both certificates issued by trusted Certificate
Authorities and IDaaS-issued smart credentials.

Support for Entrust Identity Mobile Features

The following changes have been made to IDaaS to support new functionality in Entrust Identity.

User Portal / Admin Portal Enhancements

An end user can select favorite applications in the user portal. Favorite applications are displayed first on the Applications page.

The admin portal has been enhanced to support searching the menu.

Microsoft Entra ID Read-Only Authorization

When adding a Microsoft Entra ID directory to IDaaS for user synchronization, the option to select Read-Only Authorization is provided.

Authentication Notification Enhancements

When enabling User Authenticator Notifications, the administrator can now select which authenticators cause notifications.

FIDO/Passkey Enhancements

FIDO/Passkey authenticators now support subdomains for Relying Party IDs. For example, IDaaS can be configured so that an authenticator registered from register.mydomain.com can be used to authenticate from authenticate.mydomain.com. The Allowed Relying Party ID hostnames policy allows subdomains to be specified.

SAML/OIDC Enhancements

The following enhancements have been made for SAML and OIDC applications

Token Report Enhancements

The token report now includes additional fields, including the platform for Entrust Soft Tokens and an indication of whether the token supports push notification.

Service Provider Role Updates

Permission to delete tenants has been added to the Service Provider On-boarding Administrator role.

New Integrations

The following integrations have been added.

Fixed or changed in this release

  1. The FIDO/Passkey authenticator can now be chosen when configuring resource rules for IDaaS ADFS, IDaaS Apache Filter and IDaaS ISAPI application. (35988)
  2. Add missing descriptions for various Email Template variables. (34070, 34069)
  3. Generate audits for Onfido configuration errors detected when performing Face Biometric operations. (37017)
  4. Improve wording of user/authenticator unlock notification email. (36506)
  5. Audit for user portal settings change should not include settings that have not changed. (36654)
  6. User provisioning using SCIM is now supported for accounts with the PLUS bundle. (36658)
  7. Fix broken links and misleading steps in the Microsoft Entrust ID EAM integration guide. (36805)
  8. Password expiry notification option to mobile should only be available when the user has a token supporting push notification. (34479)
  9. When an option attribute is modified for a user synchronized from AD, the Security ID attribute gets modified to null. (34634)
  10. In the User portal, step-up authentication should not be required to view the details of a Face Biometric authenticator. (36292)
  11. The Dashboard shows the wrong count for expired applications if both OIDC and SAML applications have an expired certificate. (36445)
  12. The SecurityID attribute can be modified using the Admin API when it is mapped from the directory. (34403, 33806)
  13. The Option to add an Entrust Soft Token from the User portal was erroneously disabled when user was locked but lockout was expired. (36692)
  14. IDaaS ESG package registry now includes net-snmp and net-snmp-utils for customers who want to install and configure these packages. (36882)
  15. Offline tokens with Entrust Identity Desktop Credential Provider did not work for the Google Authenticator. (35917)
  16. IDaaS Administration Guide now includes a description of the attributes that can be included in an audit. (36808)
  17. Entrust Soft Token activation audit now includes the platform of the mobile device. (36302)
  18. Add Face Biometric authenticator audit now includes state attribute. (36478)
  19. Option to set Face Biometric authenticator expiry date to Never should not display a date. (36716)
  20. Creating a domain-based Identity Provider is missing the option to select other Identity Providers. (36739)
  21. Identity Provider initiated log in not showing organizations. (36665)
  22. When configuring a Microsoft EAM OIDC application, the JSON configuration is missing the default application ID. (37164)

Changes to Identity as a Service APIs

Authentication API

The following changes have been made to the authentication API to support the enhancements made to Face Biometric authentication.

The following changes have been made to existing models:

In addition to the changes made to support the enhancements to Face Biometric authentication, the following changes have also been made to the authentication API.

The following method deprecated in an earlier release has been removed:

The following model deprecated in an earlier release has been removed:

The following changes to existing models have been made:

Administration API

The following changes have been made to the administration API to support the enhancements made to Face Biometric authentication.

The following method has been added:

The following changes have been made to existing models:

In addition to the changes made to support the enhancements to Face Biometric authentication, the following changes have also been made to the administration API.

The following method has been added:

The following changes to existing models have been made:

Supported TLS Ciphers

IDaaS supports the following TLS Ciphers.

TLSv1.3:

TSv1.2:

Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.

TLSv1.2:

Enterprise Service Gateway Deprecation

Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.37 and the three previous releases 5.34, 5.35 and 5.36). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.

ESG was updated to use a new OS in 5.33. In place upgrade of ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions ESGs older than 5.33 to the new version use the following procedure:

  1. Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.
  2. Add a new Gateway instance to the existing Gateway in IDaaS.
  3. Register the new Gateway instance with IDaaS.
  4. Disable the old Gateway instance.
  5. Repeat these steps to replace all the Gateway instances using older versions of the ESG.

Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can be deleted.

Browser Deprecation

Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.