Sectigo Certificate Manager 24.5


Sectigo nos envía los próximos cambios en la versión SCM 24.5:

Scheduled Maintenance: Sectigo Certificate Manager (SCM) 24.5 Release will be deployed Saturday May 11th, 2024 at 11:00 UTC until 17:00 UTC

Planned Start: May 11, 2024 11:00AM UTC
Expected End: May 11, 2024 5:00PM UTC

Affected Infrastructure

Components: Certificate Lifecycle Management Platforms
Locations: SCM (cert-manager.com), SCM (hard.cert-manager.com), SCM (eu.cert-manager.com)

Details:

The SCM 24.5 release includes the following enhancements and fixes:

  • A new admin template type called Dynamic IdP Template has been added. The existing IdP template would match an authenticating admin based on configurable SAML attributes to a template that specified the role and privileges. If the role was RAO/DRAO the template explicitly listed the associated organizations/departments. The new dynamic IdP template will look up the organizations/departments by using a SAML attribute matching to the new Alias field of an organization/department. (SCM-8791)
  • Organizations/departments can now have a set of contact emails added that are independent of the admins. These contact emails can be used as additional recipients for scheduled reports or applicable notifications. (SCM-8823)
  • Support for certificate strong mapping SID information from Microsoft Intune via SCEP as documented in https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-implementing-strong-mapping-in-microsoft-intune/ba-p/4053376. (SCM-9324)
  • New REST API method to delete discovered client and device certificates. (SCM-9362)
  • Update to Activity Log Report REST API fields to include unique ID of the audit entry. (SCM-5403)
  • New REST API methods to modify/delete organizations. (SCM-6359)
  • New REST API methods to clear/refresh DCV status. (SCM-7988)
  • Ability to add remote servers to Network Agent using REST API with credential store or non-root SSH private key. (SCM-9629)
  • New REST API resource to enroll for SSL certificate using Azure Key Vault. (SCM-1855/SCM-7482)
  • Downloaded files from Private Key Agent will now include the full certificate chain. (SCM-9545)
  • Domain names with an underscore in the hostname portion are now allowed. The domain will automatically be classified as a private domain. (SCM-9354)
  • The hostname field in discovered certificates will be populated for Network Agent based discovery tasks. (SCM-9352)
  • Key size of requested certificates would appear empty. (SCM-9746/SCM-9716)
  • Domain report was missing domains with no DCV status. (SCM-9719/SCM-9284)
  • Support of very long names for auto installation nodes. Names up to 256 characters are now supported. (SCM-9708)
  • Renewing SSL certificate using Azure Key Vault would always create a non-exportable private key. (SCM-9529)