Skip to main content

12.5.1

Features and improvements

Bravura Pass

  • Updated Password Change Notification Module installer, so the LONGID installer variable can be used on the command line to configure the setting "Long ID format to send to Password Manager service".

Bravura Privilege

  • Added filter to hide invalid accounts from PAACCESS.

Upgrade / migration

  • Added the upgradetest utility with the shipped installation files to check for potential issues prior to upgrading the database.

Notification

  • Moved PSN "user becomes compliant" message to be displayed in the Front-end (PSF).

  • Modified auto discovery error email to keep the text formatting even when system variable MAIL_CONTENT_TYPE is enabled (Enable HTML mail content).

Resolved issues

Bravura Privilege

  • Fixed inconsistency between authorization of API and UI submitted requests for pam_vault_management.

Bravura Pass

  • Adjusted netvalidatepwpol plugin to be able to directly check against Azure.

Upgrade / Migration

  • Changed migratedata.exe to require administrator permissions.

  • Fixed migratedata installer to recognize instances of the product before rebranding.

  • Removed the symbolic link in the registry between the Hitachi ID and Bravura Security keys when they are no longer needed or in use and installing a new instance.

  • Modified upgrade scripts to properly clean up invalid data from "xgrpmbr_diff" (11.2.0) and "ucpcache" (12.3.0) so upgrade can proceed.

Mobile

  • Fixed an issue preventing the UI from rendering on Android webviews (such as authenticating to the Gmail app).

Workflow

  • Fixed request generation to include seqno's in reqinfo kvg for default attribute values.

  • Ensure ORG authorizer email only sends out to the related managers when request also has non-org operations.

Maintenance / Replication

  • Fixed updinst utility to properly determine the primary node when using the requestsync option.

Components

  • Fixed replacement of variables within environment files.

  • Fixed issue where loaddb components would fail if the stableid of an object changed only by its case.

  • Added hook_patch to Functional.hid_authchain_recaptcha so that authchain.m4 is correctly regenerated on patch skin rebuild.

  • Fixed idtrack Scenarios to account for invalid Profiles.

API

  • Fixed Resource* class of IDAPI functions to be able to modify discovery flags of targets.

  • Fixed an issue where sessionid is not returned back from api call WFRequestCreate if no preqid.

Connectors (agents)

  • Fixed idmconfig-based target administrator onboarding to respect the "isconnpswd" flag.

User interface

  • Modified Requests app search page to load new user's name under Recipient column when the user does not exist yet.

Customization

  • Added default robots.txt to block webcrawlers.

  • Added default X-Robots-Tag response headers.

  • Added configurable response headers by using a setupiis.cfg in the psconfig directory.

Auto discovery

  • Modified "orgchart_stg" table to remove primary key on "profileguid" and add a unique key with IGNORE_DUP_KEY on instead. This will avoid failure to build orgchart during auto discovery when duplicate manager values present.

Events (exit traps)

  • The certification round's initiator is passed as requester to the CERT SIGN OFF exit trap.

Notifications (email, sms)

  • Made the recipient's Profile ID available in the Recipient section of Create new user request emails.