12.5.1
Features and improvements
Bravura Pass
Updated Password Change Notification Module installer, so the LONGID installer variable can be used on the command line to configure the setting "Long ID format to send to Password Manager service".
Bravura Privilege
Added filter to hide invalid accounts from PAACCESS.
Upgrade / migration
Added the upgradetest utility with the shipped installation files to check for potential issues prior to upgrading the database.
Notification
Moved PSN "user becomes compliant" message to be displayed in the Front-end (PSF).
Modified auto discovery error email to keep the text formatting even when system variable MAIL_CONTENT_TYPE is enabled (Enable HTML mail content).
Resolved issues
Bravura Privilege
Fixed inconsistency between authorization of API and UI submitted requests for pam_vault_management.
Bravura Pass
Adjusted netvalidatepwpol plugin to be able to directly check against Azure.
Upgrade / Migration
Changed migratedata.exe to require administrator permissions.
Fixed migratedata installer to recognize instances of the product before rebranding.
Removed the symbolic link in the registry between the Hitachi ID and Bravura Security keys when they are no longer needed or in use and installing a new instance.
Modified upgrade scripts to properly clean up invalid data from "xgrpmbr_diff" (11.2.0) and "ucpcache" (12.3.0) so upgrade can proceed.
Mobile
Fixed an issue preventing the UI from rendering on Android webviews (such as authenticating to the Gmail app).
Workflow
Fixed request generation to include seqno's in reqinfo kvg for default attribute values.
Ensure ORG authorizer email only sends out to the related managers when request also has non-org operations.
Maintenance / Replication
Fixed
updinst
utility to properly determine the primary node when using the requestsync option.
Components
Fixed replacement of variables within environment files.
Fixed issue where loaddb components would fail if the stableid of an object changed only by its case.
Added hook_patch to Functional.hid_authchain_recaptcha so that authchain.m4 is correctly regenerated on patch skin rebuild.
Fixed
idtrack
Scenarios to account for invalid Profiles.
API
Fixed Resource* class of IDAPI functions to be able to modify discovery flags of targets.
Fixed an issue where sessionid is not returned back from api call WFRequestCreate if no preqid.
Connectors (agents)
Fixed idmconfig-based target administrator onboarding to respect the "isconnpswd" flag.
User interface
Modified Requests app search page to load new user's name under Recipient column when the user does not exist yet.
Customization
Added default robots.txt to block webcrawlers.
Added default X-Robots-Tag response headers.
Added configurable response headers by using a setupiis.cfg in the psconfig directory.
Auto discovery
Modified "orgchart_stg" table to remove primary key on "profileguid" and add a unique key with IGNORE_DUP_KEY on instead. This will avoid failure to build orgchart during auto discovery when duplicate manager values present.
Events (exit traps)
The certification round's initiator is passed as requester to the CERT SIGN OFF exit trap.
Notifications (email, sms)
Made the recipient's Profile ID available in the Recipient section of Create new user request emails.