2025 Second Quarterly Release - 25.2 Notes

June 2025

Keyfactor announces Keyfactor Command 25.2, which includes some major new features and updates such support for perma-deletion of certificates from Keyfactor Command, enhanced support for post-quantum cryptographyClosed Cryptographic algorithms designed to be secure against the potential capabilities of quantum computers, which could break traditional encryption methods. (PQCClosed Cryptographic algorithms designed to be secure against the potential capabilities of quantum computers, which could break traditional encryption methods.) and hybrid certificatesClosed A certificate that uses a non-PQC (Post-Quantum Cryptography) primary key paired with an alternative key algorithm such as ML-DSA-44, ML-DSA-65, or ML-DSA-87 for enhanced security and quantum resistance., and an option to renew certificates through CSRClosed A CSR or certificate signing request is a block of encoded text that is submitted to a CA when enrolling for a certificate. When you generate a CSR within Keyfactor Command, the matching private key for it is stored in Keyfactor Command in encrypted format and will be married with the certificate once returned from the CA. enrollmentClosed Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). has been added to Keyfactor Command.

Tip:  Keyfactor recommends that you check the Keyfactor GitHub Site (https://keyfactor.github.io/integrations-catalog/) with each release that you install to check if you will need to download the updated orchestrators to work with that version of Keyfactor Command.

Please refer to Keyfactor Command Upgrading for important information about the upgrade process. For a complete list of the items included in this release, see Release Note Details v25.2. For gateway and CA Connector Client release notes, see:

Note:  Professional Services and Customer Success will reach out to you to schedule upgrades.
Highlights
Changes & Improvements
  • Application Settings

    • New UI Customization settings have been added to the Application Settings to allow for a custom banner to display across the product. The banner ensures that critical notices are seen by every user, eliminating the risk of important information getting lost or overlooked.

  • Certificate Operations

  • Certificate Stores

    • The certificate store location dialog, accessed when you add/remove certificates from certificate stores, has been updated to support more custom fields organized in a tidier fashion.

    • Certificate store types introduce Validation Options in Custom Fields. The Validation Options are located on a tab of the same name in the Add/Edit Custom Field dialog. The Validation Options—Optional, Required, or Hidden—replace the former Required checkbox.

  • Documentation

    • Select tables now feature additional capabilities to enhance your experience with the information they display. These interactive tables have thicker light-blue column dividers, as opposed to the standard thinner white dividers. Typically, these tables include columns with long parameterClosed A parameter or argument is a value that is passed into a function in an application. names that you may need to copy for product configuration (e.g. -DatabaseManagementAuthCredentials).

      To ensure readability across different screen sizes, long parameter names are truncated with ellipses (...) upon page load. You can view and copy these full values in several ways:

      • Hover over a truncated value: A tooltip will appear, displaying the full value. You can then click the Copy button in the tooltip to copy the value to your clipboard.

      • Resize columns: Click and drag the light-blue column dividers to expand a column, revealing the full value or simply making the contents easier to read.

      • Resize the table: Click and drag the rightmost edge of the table to adjust its width.

      Have you found a table you wish had resizable columns? Let us know by providing feedback.

      Figure 480: Documentation Column Resizing and Tooltip Video

  • Enrollment

  • Post-Quantum Cryptography (PQC)

    • PFX Enrollment and the POST /Enrollment/PFX API endpoint now support enrollment for hybrid certificates. Hybrid certificates support download in PEM or ZIP PEM format and do not support the option to install to certificate stores.

    • PFX Enrollment and the POST /Enrollment/PFX API endpoint now support enrollment for certificates with a primary ML-DSA key.

    • CSR Enrollment and the POST /Enrollment/CSR API endpoint now support enrollment for certificates with a primary ML-DSA key.

    • CSR Generation and the POST /CSRGeneration/Generate API endpoint now support CSR generation with a primary ML-DSA key.

    • Seeded certificate renewal (the configure option) now supports renewal of certificates with a primary ML-DSA key and hybrid certificates.

    • Certificates with a primary ML-DSA key and hybrid certificates can now be downloaded in Certificate Search and Details in all the same formats supported by non-PQC certificates, both with and without certificate chain. Hybrid certificates with private keys can only be downloaded in PEM or ZIP PEM format, but certificates with a primary ML-DSA key and a private key are not limited in download format.

    • Certificates with a primary ML-DSA key and hybrid certificates can now be uploaded with Add Certificate in all the same formats supported by non-PQC certificates.

    • Enrollment patterns now support configuration of ML-DSA keys as both primary and alternative keys at both the system-wide and individual level.

    • ML-DSA keys—as both primary and alternative keys—reported by the CA for a templateClosed A certificate template defines the policies and rules that a CA uses when a request for a certificate is received. are now visible in the certificate template record.

  • Security Roles, Claims, and Permissions

    • A new Certificates > Expanded Change Owner permission has been introduced. A user who holds this permission can change the default certificate owner to any role within the permission sets they are a member of. This differs from the Certificates > Collections > Change Owner permission, which functions as follows:

      • Global Level: A user who holds only the Certificates > Collections > Change Owner permission at the Global level can change the default certificate owner to any role they belong to, for any certificate.
      • Collection Level: A user who holds only the Certificates > Collections > Change Owner permission at the Collection level can change the default certificate owner to any role they belong to, for any certificate in a collection to which they have permissions.

      The Certificates > Expanded Change Owner permission setting overrides the Certificates > Collections > Change Owner permission (both Global and Collection-level) if both are set.

    • Four new permissions have been added for certificate store management, available also at the certificate store container level, to support managing certificates on the Certificate Details page: Change Owner, Edit Metadata, Download with Private Key, and Revoke. When these permissions are set at the certificate store level, they apply only to actions done on the Certificate Details page when accessed from Certificate Stores. Likewise, these permissions set at the certificate collection level apply only to actions done on the Certificate Details page when accessed from Certificate Search.
Fixes
Deprecation & Removals
  • The license for the Logi Analytics Platform, used by the Keyfactor Command dashboard and reports, will expire on November 28, 2027 and will not be renewed. Customers who have not upgraded to Keyfactor Command 25.3 or later by that date will no longer be able to use the dashboard or reports.
Known Issues
  • The Container Permissions on the containers tab of the certificate stores page allows a user to de-select Read or Schedule permissions for a container while retaining Modify permissions. This is contrary to the behavior of container permissions in security roles, which enforces Read and Schedule to if Modify is enabled and Read if Schedule is enabled. If Modify is configured without Read, when a user logs in and tries to view inventory, they will get an error stating that they do not have Read permissions. Read permissions must be set manually for the users and containers if Modify is selected through this interface. Keyfactor recommends managing certificate store container permissions only through security roles to avoid issues. The container permissions dialog on the certificate stores page will be removed in a future release.

  • Searches for workflow instances using the InitiatingUserName query parser fail with an “invalid column name” error. This will be corrected in a future release.

API Endpoint Change Log

Please review the information in the API Change Log for this release carefully if you have implemented any integration using these endpoints: API Change Log v25.2.