Fortanix Data Security Manager (DSM) SaaS 4.35 comes with some exciting new features, general improvements, and resolved issues.
1. New Features
- Added support for managing custom roles for new and existing Administrative Apps from the Fortanix DSM user interface (UI) (JIRA: PM-229).
For more details, refer to User's Guide: Authentication. - Added support for new TR-31 plugin in the DSM Plugin Library. This plugin can be used to import and export any key types under the American National Standards Institute (ANSI) Technical Report (TR)-31 format (JIRA: PM-73).
For more details, refer to User's Guide: Plugin Library. - Added the new Fortanix Solutions drop down menu in the DSM UI.
For more details, refer to User's Guide: Getting Started with Fortanix Data Security Manager - UI (JIRA: PM-387).
2. Improvements
- Added Fortanix DSM UI support for scheduled rotation of linked keys in FIPS-backed groups. Users can now assign a Key Rotation Policy (KRP) to keys generated in FIPS-backed groups, including the option to rotate linked keys (JIRA: EXTREQ-1195).
For more details, refer to User's Guide: Fortanix Data Security Manager Key Lifecycle Management. - Implemented groups multi-selector dropdown in COPY KEY feature to improve Fortanix DSM UI performance when group count exceeds 1000 (JIRA: ROFR-5159).
3. Other Improvements
- Added missing Google Key Access Justification error message
“test_wrap_error_message_with_denied_justifications“
(JIRA: PROD-9088).
4. API Updates
- This release does not have any API changes.
5. Client Improvements
- Added support to derive AES key in Fortanix DSM Key Management Interoperability Protocol (KMIP) proxy for HKDF (HMAC-based Key Derivation Function) (JIRA: PROD-9463).
- The Fortanix DSM CNG provider client now supports configuring the log file location (JIRA: PM-412).
For more details, refer to Clients: Microsoft CNG Key Storage Provider.
6. Bug Fixes
- Fixed an issue where the user was unable to update the Retention period for Audit Logs setting in Settings → Log Management without an Account Quorum Policy (JIRA: ES-325).
- Fixed an issue where the user was unable to retrieve the older version of the Azure soft-deleted key (JIRA: PROD-8223).
- Fixed an issue where if a
Pre-Active
key is copied from a normal DSM group to an Azure Key Vault-backed group, the key state changes toActive
on Azure Key Vault even though the activation date was set to a future date (JIRA: PROD-9505).
7. DSM-Accelerator Bug Fixes
-
DSM-Accelerator Webservice:
- Fixed an issue where the DSM-Accelerator Webservice was unable to perform masked detokenization with the app configured with the "Masked Decrypt" permission (JIRA: ES-439).
8. Known Issues
- The sync key API returns a “400 status code and response error” if its short-term access token expires during the synchronization of a group linked to AWS KMS (JIRA: PROD-3903).
Workaround: increase the timeout of the temporary session token beyond the expected duration of the sync key operation. - If an Azure key is rotated and then soft-deleted, only one version of the key is soft-deleted (JIRA: PROD-6947).
Workaround: Perform a key scan in DSM to synchronize the key state with Azure. - The
create
operation for security object creation does not work for the Azure Managed HSM plugin (JIRA: PROD-7078). - Copying an RSA or EC key from a normal DSM group to an AWS KMS-backed DSM group does not work as expected and results in an error (JIRA: PROD-7787).
Workaround: Export the RSA or EC key from the normal DSM group and import it into the AWS KMS-backed DSM group. - The COPY KEY dialog box does not filter the HSM/External KMS groups as expected when Import key to HSM/External KMS check box is selected, if there are more than 1,000 groups in the account (JIRA: ROFR-5167).
- Unable to delete a user who was invited to an account with a "Custom account role" that includes an "All Groups Role" along with group membership assigned explicitly in the invite user workflow if the invited user has not accepted the invitation (JIRA: PROD-9409).
Workaround: To delete the invited user, contact Fortanix Support or perform the following steps:
- If you have already assigned explicit group memberships, perform the following steps to remove them and delete the user:
- Change the user's account role to "Account Member".
- Remove the group memberships one by one using the user interface.
- Delete the user.
- If you have already assigned explicit group memberships, perform the following steps to remove them and delete the user:
- The
sudo get_csrs --rotate
command does not support changing the hostname for the service URL. For example, If your service main URL is dsm.fortanix.net, you cannot change this main URL hostname (JIRA: PROD-9542). - Fortanix Windows CNG/EKM/CSP clients use a common Fortanix KMS client config parameter
--log-file
while specifying the file path for storing logs ((JIRA: PROD-9524).
Comments
Please sign in to leave a comment.