Entrust

Release 5.42

New in this release

Application/Resource Rule Enhancements

The Application and Resource Rule pages in the Administration Portal have been redesigned to improve usability and enhance functionality. Changes include:

Enhanced Registration Configuration

When configuring registration, an administrator can now specify the "Minimum Number of Second-factor Authenticators". This setting specifies the minimum number of authenticators the user must register. As an example, suppose an administrator wants their end users to register at least two of the authenticators, Entrust Soft Token, Passkey/FIDO2 or Face Biometric but wants the end user to decide which authenticators to register. This can be achieved by configuring these three authenticators as Optional during registration and then setting the Minimum Number of Second-factor Authenticators to 2.

Enhanced OTP Delivery Configuration

When OTP authentication is enabled in an authentication flow in a resource rule, the allowed delivery types can be configured overriding the delivery types configured in the policy. This allows an administrator to configure different delivery types for different applications. For example, use Email delivery for one application and SMS delivery for another application.

Configuration to specify which delivery types are enabled and the default order of the delivery types is now set together instead of separate settings. This improves usability. The new UI is used in both the OTP policy and per application authentication flows.

Support Administrator Password Management for Directory Managed Passwords

Administrators can now perform password reset and set passwords to require change on next use for users who have directory-managed passwords.

Allow Users to Specify Authenticator Order

End users now have the option to specify their default authenticator order. This setting allows the end user to have a default authenticator that is different from the default specified in the resource rule. For example, suppose the resource rule lists authenticators in the order TOKENPUSH, TOKEN, FIDO. If the user has an Entrust Soft Token, they will always default to TOKENPUSH and if they want to use FIDO they will need to select an alternative authenticator. Allowing the end user to select their own authenticator order allows the end user to specify FIDO as their default authenticator. Now when the user authenticates, they will default to FIDO authentication.

Only authenticators allowed in the resource rule are used for authentication. The new setting only allows the end user to select a different order of allowed authenticators.

The following Magic Link enhancements have been made:

The user experience of a Magic Link authentication is the following:

As part of these changes, the Magic Link policy page was moved from the Registration menu to the Authenticators menu.

Native Mobile Passkey Support

IDaaS has been enhanced to support Passkey tokens implemented in mobile applications using Android and iOS Passkey SDKs. The Allowed Relying Party ID Hostnames configured in IDaaS Passkey/FIDO2 settings now supports mobile application values.

Improved Web Content Accessibility Guidelines (WCAG) Compliance

Changes have been made to the IDaaS User Portal and the login pages to improve compliance with WCAG 2.2 at the AA level.

Support Import of Passwords from Entrust GetAccess

Enhancements have been made to the IDaaS password APIs to support importing passwords from Entrust GetAccess.

Administration/User Portal Enhancements

The following enhancements have been made to the Administration and User Portal UI:

Fixed or changed in this release

  1. The maximum length of a SCIM API key has been changed from 500 characters to 2000 characters. (39341)
  2. The IDaaS JWT grant type now supports ACR values. (38918)
  3. Updating a RADIUS application fails if the shared secret was not updated. (35469)
  4. Improve error message displayed for an invalid phone number entered when editing delivery contact. (37328)
  5. Include IP location information in push notifications sent for IDaaS authentication API applications including integrations like Entrust Desktop Credential Provider. (37677)
  6. Selecting an External Risk Engine in a resource rule is not saved. (37930)
  7. Deleting a claim value from an OIDC application returns success even though the claim is not deleted. (38430)
  8. Updating Passkey/FIDO2 registration level setting with an invalid value causes HTTP 500 error. (38735)
  9. Updating Passkey/FIDO2 settings with an invalid hostname value should not be allowed. (38736)
  10. Remove semicolon appearing on Entrust Soft Token SDK settings page. (38807)
  11. API to update Organization does not support removing description value. (38857)
  12. Administration role value selected by group policy is displayed with non-English locale. (38895)
  13. Improved documentation of required Entra ID Read/Write permissions. (38995)
  14. The org_id claim is not returned when using the OIDC JWT IDaaS grant type. (39008)
  15. OIDC Regenerate Client Secret dialog shows Shared Secret instead of Client Secret. (37274)
  16. Failed Passkey authentication is not generating an audit. (39164)
  17. OIDC Pre-authorized Code grant type should only be shown for OIDC4VC applications. (39260)
  18. When a managed tenant of a service provider is deleted, the associated Identity Provider application should be removed. (39274)
  19. Device verification fails in some scenarios when the JWT is expired. (39385)
  20. Support deflate encoding for SAML requests. (39501)
  21. The subject of a Service Provider IDP login audit should not be clickable. (39563)
  22. The resource name of a Service Provider IDP login audit should be Admin Portal not User Portal. (39588)
  23. IDaaS now rejects requests with an Origin value of null. (39607, 39614)
  24. The ACS and Logout URL hostnames of a SAML IDP are now added to the SAML CORs list. (39678)
  25. Refresh of tenant list in Service Provider portal generates browser console error. (38869)
  26. Header value returned in API rate limiting error contains value in milliseconds instead of seconds. (39960)

Changes to Identity as a Service (IDaaS) APIs

Authentication API

The following changes have been made to support Magic Link as a new authenticator in the Authentication API.

The following changes have been made to existing models in the Authentication API:

Administration API

The following changes were made to the Administration API to manage Magic Links.

The following changes were made to the Administration API to manage ACR values. An ACR object defines an Authentication Context Resource value that can be defined as an access filter in a resource rule.

The following changes have been made to support changes to how OTP Delivery preferences are defined:

The following changes have been made to support configuration of allowed relying party IDs for the Native Mobile Passkey feature:

The field userAuthenticatorPreference has been added to the model User. This value specifies the authenticator preferences for the user.

The value GETACCESS has been added to the field passwordFormat has been added to the model UserPasswordParms. This allows an application to import GETACCESS passwords using the IDaaS APIs.

Supported TLS Ciphers

IDaaS supports the following TLS Ciphers:

TLSv1.3:

TLSv1.2:

Clients should stop using the following TLS Ciphers. Support for them will be removed in a future release.

TLSv1.2:

Enterprise Service Gateway Deprecation

Entrust will only support the last four releases of the Enterprise Service Gateway (the current version 5.42 and the three previous releases 5.39, 5.40, and 5.41). Entrust recommends that customers always upgrade their Enterprise Service Gateway to the latest release because each release contains security updates to the Enterprise Service Gateway Operating System.

NOTE: In the 5.43 release, changes are planned that will break versions of ESG older than 5.33.

In-place upgrade of the ESG is only supported for versions 5.33 or later. Versions of ESG older than 5.33 are no longer supported. To upgrade versions of ESGs older than 5.33 to the new version, use the following procedure:

  1. Download the latest Gateway OVA or Hyper-V file from IDaaS and install on a new VM instance.
  2. Add a new Gateway instance to the existing Gateway in IDaaS.
  3. Register the new Gateway instance with IDaaS.
  4. Disable the old Gateway instance.
  5. Repeat these steps to replace all the Gateway instances that use older versions of the ESG.

Once the upgrade is complete, the Gateway instances corresponding to the old ESGs can be deleted from IDaaS and the VMs for those ESG instances can also be deleted.

Entrust Identity and Entrust Windows Desktop Soft Token Deprecation

In the IDaaS 5.43 release, changes are planned that will break the following operations:

Browser Deprecation

Microsoft no longer supports Internet Explorer 11. Identity as a Service ceased support for Internet Explorer 11 after May 2023.