Release notes
This will highlight the key items. For more in-depth details, please contact Fortified ID.
Four modules have been consolidated into a single module.
In this version, we have simplified the administration of modules so that the 4 different enrollment modules have now become one module. It simplifies e.g. port and other common configuration is now done in one place. Below is an example of the enrollment module and how it could look like.
Four available submodules
Refer to the configuration example above. The four modules are: oathsw, oathhw, webauthn, and mobileid.
A submodule will only be available if it is added and set to enabled: true. If it is not added or set to enabled: false, it will remain inactive.
Modules have moved and have new names
The modules OathSwEnrollment, OathHwEnrollment, WebAuthnEnrollment and MobileServerEnrollment have become submodules for the new module Enrollment. They also have new names as you can se below.
OathSwEnrollment -> oathsw
OathHwEnrollment -> oathhw
WebAuthnEnrollment -> webauthn
MobileServerEnrollment -> mobileid
Added parameter logout_endpoint_url
See configuration example above. If you like the logout page to support look and feel for your organisation or you like to have a common logout page your can use logout_endpoint_url parameter. If not added logout will be local and fortified id look and feel. This a feature supported in all our products.
Updated configuration best practices regarding authN and SAML SP
To enable login from Enrollment, the authN module must be configured as a SAML SP. With four available modules, the configuration can vary depending on your specific scenario.
Our strong recommendation is to use a single authN module with one SAML SP configured for all four submodules. See example below.