What's new
New documentation portal
All Bravura Security Fabric and Connector Pack documentation is now in a unified documentation portal, including:
Faster search capabilities
Easy navigation between publications and topics
In-place version switching (12.7 and newer)
"Copy to clipboard" buttons for code snippets
Built-in feedback form
Release highlights 12.8.0 and Connector Pack 4.7.0
12.8.0 issue count: 64
Rolled up from trains to 12.8.0: 125
4.7.0 issue count: 49
Rolled up from trains to 4.7.0: 29
Connector Pack 4.7.0
Added Bravura Security-Verified connectors :
Ceridian Dayforce (
agtdayforce.con
) - adds support for Python
Added Customer-Verified connectors:
Generic Solaris Server (SSH) (
agtsolaris_ng
) - adds support for PythonTelnet (
agttelnet-openssl.exe
) - alternate Telnet connector that supports OpenSSL 3.0
Connectors moved to Customer-Verified status:
Generic Linux Server (SSH) (Legacy) (
agtlinux
)SSHD Host target system (Script) (
agtssh
)
Deprecated connectors:
The SAP Server Customer-Verified connector (
agtsap.exe
) is deprecated starting with Connector Pack 4.7.0 and will be fully removed for Connector Pack 4.9.0.The SAP Server (Netweaver 7.5+) 64-bit connector (
agtsapnw.exe
) should be used in place of the older agtsap (32bit) connector. Removed connectors Bravura Security Fabric (agtidm)
Bravura Security Fabric 12.8.0 and Connector Pack 4.7.0
OpenSSL 3.0 support :
Support added for OpenSSL 3.0 for psunix (Connector Pack) and idmunix (Bravura Security Fabric)
RedHat Enterprise 9 also makes use of OpenSSL 3.x, so this in turn adds support for the purposes of OpenSSL on RHEL9 as well.
Bravura Security Fabric 12.8.0
RedHat Enterprise 9 support
Added support for Red Hat Enterprise Linux 9 for the idmunix-rhel-el9.x64.tar.gz package.
Note: This support also available for the latest Bravura Security Fabric 12.7.x.
Windows Server 2025 support
.NET 8.0 Support
Updated minimum supported Microsoft SQL Server version to 2016. Replaced SQL Server audit trigger CONTEXT_INFO with SESSION_CONTEXT, which can store more audit data.
Features
Added a health check for user class cache validity that allows product administrators to see if user class caches are valid and resolve if required, improving the performance of end-user filters.
Optimized userclass/userclasspoint cache update triggered by a single user.
Added the loadcvagents utility to install the Customer-Verified connectors. When loading connectors, the post-installation or post-upgrade tasks are also modified to install the Customer-Verified connectors for the configured target systems on the Bravura Security Fabric instance server. Removed the Customer-Verified pre-installation check to no longer run for proxy server upgrades.
Exposed failed host in IDPM_REQUEUE exit trap for listing successful and failed targets.
Added components for interfacing with Bravura Cloud as part of Pass Plus’s Password Change/Resecure feature.
Improved catch-all authorization functionality for when not enough authorizers are configured.
Improved request kvg in workflow plug-in’s input, in the case of a request containing duplicate resources, it always includes the copy from the enacted resource if applicable. This can avoid issues with authmod, implementer, etc. plug-ins due to the duplicate resources.
Added configuration options in config.js to control the Chosen jQuery plugin's activation thresholds for single-select and multi-select elements, improving accessibility for dropdown menus with fewer options.
Improved the styling and structure of radio selection lists in authentication chains.
Performance improvements
Optimized views and queries to calculate nested group memberships which can improve performance of stored procedure UserclassUserList called by
loaduccache
utility.Added a discovery flag to reduce disk space usage for discoveries that are likely to be small (such as pull-mode ones). By default, pull-mode systems will use this flag. The LWS SAVE QUEUE SPACE system variable can return pull-mode systems to their old behavior.
Optimized auto discovery.
Security enhancements
Modified Guacamole in-browser RDP token redemption request to use POST instead of GET to prevent the token from appearing in IIS logs.
Added a new password generation plugin,
advrandpasswd
, to be able to generate stronger passwords .Set Referrer-Policy to no-referrer in HTTP Response Headers.
Disabled the HTTP OPTIONS method.
Compatibility updates
Fixed an issue when using an absolute path for custom connectors that was previously showing an error for "The connector for [] is not installed" on the target configuration pages.
Added the ability to use relative paths for the directories that
loadplatform
uses for the connectors rather than absolute paths so that the connector files such as attribute definition files can be located correctly.Fixed an issue for the trace functionality in order to log the thread id correctly for agent operations in the trace file that is used by the “Trace Logging“ target system address configuration option.
Added support for OpenSSL 3.0 for the
psunix
package for Connector Pack and for theidmunix
package for Bravura Security Fabric. Added theagttelnet-openssl.exe
Telnet connector that adds support for OpenSSL 3.0.
User interface/experience
Cleaned up branding changes
The
psunix
andidmunix
configuration, sample, and other files are rebranded for Bravura Security references.New Windows event logs for Admin and Operational events now appear in Windows Event Viewer under Applications and Services Logs > Bravura Security Fabric instead of Applications and Services Logs > Hitachi > Hitachi ID Systems > Hitachi ID Suite.
refbuild: adjusted the pattern descriptions to match the new naming
Disallow options Changes made will invalidate authorizations and Encrypt this attribute in the database to be checked at the same time when adding/updating an attribute via the UI or
idmconfig
.Updated the Orgchart graph page to load the current user’s manager, even if the manager is in an orphaned Orgchart tree (calculated level is -1).
im_corp_hr_orgchart_manager
: adjust the early termination condition to check the orgchart data in addition to attribute valuesUpdated error message regarding Guacamole container connection issues.
Clarified password conflicts pages.
API changes
Removed REST policy (OPA) dependency on SQL Service Broker.
Fixed REST API endpoint PATCH /targetSystems({key)} to properly save target system option "automaticallyDiscoverResourcesToLoad".
Added OPA policy identity_connect_token to IdentityServer login endpoint to authorize login attempts.
Default policy identity_connect_token set to check for userclass membership to _EXPLICIT_REST_API_USERS_.
Added new Rego custom function GetProfileAttributeValues.
See Release notes for more detailed notes.