Fortanix Data Security Manager (DSM) SaaS 4.30 comes with some exciting new features, improvements, and resolved issues.
1. New Features
-
Added support to rotate keys in a Google Cloud Key Management Service (KMS) group in Fortanix DSM.
The following scenarios are supported:- Fortanix DSM can now rotate Google Cloud KMS keys to new versions uploaded from DSM by rotating the linked source security object (JIRA: PM-312).
For more details, refer to the User's Guide: Google Cloud KMS.
- Google KMS keys can now be rotated to a value of an existing Fortanix DSM security object by selecting the Rotate to DSM key check box (JIRA: PM-208).
For more details, refer to the User's Guide: Google Cloud KMS.
- Fortanix DSM can now rotate Google Cloud KMS keys to new versions uploaded from DSM by rotating the linked source security object (JIRA: PM-312).
2. Enhancements to Existing Features
- Fortanix DSM can now generate and import Elliptic Curve (EC) keys over curve SecP256K1 in premium Azure Key Vaults through the DSM user interface (UI) (JIRA: ROFR-4873).
For more details, refer to the Fortanix DSM - Azure Key Vault BYOK (Bring Your Own Key) and Fortanix DSM - Azure Key Vault Cloud Native Key Management.
- New AWS Regions have been added as target to upload Customer Managed Keys to AWS KMS: Asia Pacific (Hyderabad), Asia Pacific (Jakarta), Asia Pacific (Melbourne), Canada West (Calgary), Europe (Spain), Europe (Zurich), Israel (Tel Aviv), and Middle East (UAE) (JIRA: EXTREQ-1072).
For more details, refer to the Fortanix DSM - AWS Key Management Service CDC Group Setup.
- The AWS region name is now shown in the detailed view of an AWS KMS group under the HSM/KMS tab in the Fortanix DSM (JIRA: ROFR-3099).
3. Client Improvements
- Added quorum policy approval support for the Fortanix DSM CNG client (JIRA: PM-68).
For more details, refer to the Clients: Microsoft CNG Key Storage Provider. - The Fortanix DSM 32-bit version of the CNG Provider client now supports sign and verify operations (JIRA: PM-332).
- The Fortanix DSM Windows PKCS#11 client now supports configuring the log file location (JIRA: PM-245).
For more details, refer to the Clients: PKCS#11 Library.
4. DSM-Accelerator Improvements and Bug Fixes
-
DSM-Accelerator Webservice:
- Improved the Fortanix DSM-Accelerator Webservice performance for highly transactional applications, by removing the bearer token check in the Fortanix DSM-Accelerator Webservice so that it does not reach out to Fortanix DSM for authentication when processing locally cached key (JIRA: PM-351).
-
DSM-Accelerator JCE Provider:
- Improved the Fortanix DSM-Accelerator JCE Provider performance for highly transactional applications, by removing the bearer token check in the Fortanix DSM-Accelerator JCE Provider so that it does not reach out to Fortanix DSM for authentication when processing locally cached keys (JIRA: PM-351).
- The path to copy the library
libdsmaccelerator.so
in Linux can now be configured using the environment variableFORTANIX_TEMP_DIR
(JIRA: PROD-8500). - The path to copy the library
dsmaccelerator.dll
in Windows can now be configured using the environment variableFORTANIX_TEMP_DIR
(JIRA: PROD-8576).
For more details, refer to the DSM-Accelerator JCE Provider Developer Guide.
5. Integrations and Use Cases
- Added support to use the 32-bit version of Microsoft SignTool with the 32-bit version of Fortanix DSM CNG Provider to sign and verify Microsoft Office macro files (JIRA: PM-332).
For more details, refer to the Using Fortanix Data Security Manager with 32-Bit SignTool for Signing and Verifying Microsoft Office Macro Files.
6. Quality Improvements
- Upgraded the
fluent-bit
package to the latest version (v3.0.6) for Observe’s host agent monitoring (JIRA: DEVOPS-4862).
7. Bug Fixes
- Fixed an issue where the user could not import an RSA key in Fortanix DSM UI (JIRA: ES-353).
8. Known Issues
- Having empty fields for groups, users, or processes in the File Decryption Policy would result in an incorrect policy (JIRA: ROFR-4954).
Workaround: If you want to create a policy where all groups, users, or processes are allowed, then update the policy using the agent instead of the Fortanix DSM user interface (UI). - Unable to copy EC - SecP256K1 keys with export permission from a normal group to an Azure Key Vault group in Fortanix DSM (JIRA: ROFR-4955).
Workaround: Perform the copy operation using the Fortanix DSM REST API. - When you edit the starting time of a Key rotation policy for a security object with the value as single digit time, for example: 01:00 am, it shows an error “Invalid date/time selected. Please make sure you filled in a valid 12-hour time” (JIRA: ROFR-4786).
Workaround: Re-enter the rotate start time by removing the “0” before the single digit time and enter a new time (for example, 01:00 am to 2:00 am). - After downgrading Fortanix DSM to version 4.25, it still shows the Node size field with a null value for LMS keys that were added in DSM version 4.26, even though the Node size is not a supported parameter in the older version (JIRA: PROD-8278).
- Unable to create an LMS key with the following height combinations of 20 (JIRA: PROD-8248).
- 5, 20, and vice versa.
- The hyperlink color for the field “Follow the instructions in” in the “Add Instance” form for Google Workspace Client-Side Encryption (CSE) still reflects the old link color value (JIRA: ROFR-4789).
- The sync key API returns a “400 status code and response error” if its short-term access token expires during the synchronization of a group linked to AWS KMS (JIRA: PROD-3903).
Workaround: Increase the timeout of the temporary session token beyond the expected duration of the sync key operation. -
exclude
does not work in the proxy configuration for operations such as attestation (JIRA: PROD-3311). - If an Azure key is rotated and then soft-deleted, only one version of the key is soft-deleted (JIRA: PROD-6947).
Workaround: Perform a key scan in DSM to synchronize the key state with Azure. - The
create
operation for security object creation does not work for the Azure Managed HSM plugin (JIRA: PROD-7078). - Copying an RSA or EC key from a normal DSM group to an AWS KMS-backed DSM group does not work as expected and results in an error (JIRA: PROD-7787).
Workaround: Export the RSA or EC key from the normal DSM group and import it into the AWS KMS-backed DSM group.
Comments
Please sign in to leave a comment.