Incremental Release 11.1 Notes

December 2023

Tip:  Keyfactor recommends that you check the Keyfactor GitHub Site (https://keyfactor.github.io/integrations-catalog/) with each release that you install to check if you will need to download the updated orchestrators to work with that version of Keyfactor Command.
Important:  If you’re using the Keyfactor CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. Policy Module on one or more certificate authorities, you may have been advised in the past to implement a workaround to resolve an error similar to the following:
Could not load file or assembly 'CSS.Common, Version=1.0.0.0, Culture=neutral, PublicKeyToken=0ed89d330114ab09' or one of its dependencies. The system cannot find the file specified. at CSS.PKI.X509.X509Utilities..cctor()
2022-07-25 17:06:06.6851 CSS.CMS.CA.Msft.PolicyModule.Policy [Debug] - Certificate request denied or failed by handler CSSManagedTrustedSubject.PolicyHandler: -2146233088
denied by policy module

The workaround involved creating files CertSrv.exe.config and MMC.exe.config in C:\Windows\System32 on any certificate authorityClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. on which you encountered this issue.

With the release of version 11.0 of Keyfactor Command, this workaround needs to be reversed. If the workaround is not reversed, you will encounter errors such as the following on enrollmentClosed Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). attempts:

Unable to enroll for certificate. The certificate request failed with the reason '0x80131902.'
2023-10-24 15:57:07.8547 Keyfactor.CA.Msft.PolicyModule.Policy [Error] - Failure verifying request: Configuration system failed to initialize
Unrecognized configuration section system.web. (C:\Windows\system32\certsrv.exe.config line 35)

To reverse the workaround, on the affected certificate authority:

  1. Rename C:\Windows\System32\CertSrv.exe.config to an alternate name or remove it from the System32 directory.

  2. Rename C:\Windows\System32\MMC.exe.config to an alternate name or remove it from the System32 directory.

  3. Restart the CA services.

  4. Confirm that certificate enrollment is working as desired and that the policy handler(s) in place are working as desired.

New Features
  • Keyfactor Command now supports any open authorization (OAuth) 2.0 compliant identity provider with a complete implementation of the OpenID Connect (OIDC) protocol. Keyfactor Command has been tested with the following identity providers:
    • Active Directory

      Microsoft’s Active Directory has historically been the only identity provider supported by Keyfactor Command. With Active Directory, you can authenticate users defined in the Active Directory forestClosed An Active Directory forest (AD forest) is the top most logical container in an Active Directory configuration that contains domains, and objects such as users and computers. to which the Keyfactor Command server is joined and users from forests in a trust with this forest using integrated Windows authentication. Users may alternatively be authenticated to Keyfactor Command using Basic authentication when you opt for Active Directory as your identity provider. Active Directory supports user, group and computer accounts.

    • Keyfactor Identity Provider

      Keyfactor Identity Provider is a lightweight application that is easily installed in the same environment as Keyfactor Command to provide standalone authentication separate from Active Directory. It may be used directly to supply authentication or it may be used to federate authentication to another OAuth 2.0 compliant identity provider (e.g. Okta, Ping Identity). Keyfactor Identity Provider runs in a Linux-based Docker container. Keyfactor Identity Provider supports users and groups.

    • Auth0

      Auth0 is a cloud-based OAuth 2.0 compliant identity and access management (IAM) solution owned by Okta.

    A given Keyfactor Command server may be configured with only one identity provider. If desired, you may configure an environment with multiple Keyfactor Command servers and configure a different identity provider for each Keyfactor Command server.

Updates and Fixes
Deprecation
Known Issues
API Endpoint Change Log

Please review the information in the API Change Log for this release carefully if you have implemented any integration using these endpoints: