Quarterly Release 24.4 Notes

January 2025

Keyfactor announces Keyfactor Command 24.4, which includes some major new features and updates such as support for container-based installation, post-quantum cryptographyClosed Cryptographic algorithms designed to be secure against the potential capabilities of quantum computers, which could break traditional encryption methods., and local PAM provider secret management.

Note:  With this release, the release schedule and versioning system have been updated to be more aligned. There are two types of releases—quarterly and monthly. Quarterly releases contain new features in addition to bug fixes and security updates as needed. Monthly releases will contain bug fixes and security updates as needed. The combination of quarterly and monthly releases means that each month in a given year will see a release of some type. To reduce confusion and avoid going through major version numbers too quickly, we have moved to a simple [Year].[Quarter].[Build Increment] version scheme.
Tip:  Keyfactor recommends that you check the Keyfactor GitHub Site (https://keyfactor.github.io/integrations-catalog/) with each release that you install to check if you will need to download the updated orchestrators to work with that version of Keyfactor Command.

Please refer to Keyfactor Command Upgrading for important information about the upgrade process. For a complete list of the items included in this release, see Release Note Details v24.4. For gateway and CA Connector Client release notes, see:

Highlights
Changes & Improvements
Fixes
  • The link to the Keyfactor API Reference and Utility (Swagger) will now always use the configured API virtual directory (for the authentication type being used).

  • When editing OCSP revocation monitoring location URL, the CA info now does not erroneously change.

  • On the Orchestrator Job Status page, the target information is consistent between the Scheduled Jobs tab and the Job History tab.

  • When the Default Certificate Owner Role Name is set at the global or template level, it will now appear as the default in the Owner Role Name field during PFX/CSR enrollment.

  • The agent application setting: Number of times a job will retry before reporting failure, now applies to orchestrator Discovery jobs.

  • For orchestrator jobs failing during configuration, the agent application setting: Orchestrator Job History Limit will apply.

  • Users now have the ability to limit visibility of certificate stores to a particular team, and allow them to schedule jobs from a collectionClosed The certificate search function allows you to query the Keyfactor Command database for certificates from any available source based on any criteria of the certificates and save the results as a collection that will be availble in other places in the Management Portal (e.g. expiration alerts and certain reports). based on the container permissions regardless of global permissions.

  • The EKUName query field for certificates now will correctly filter on the -notcontains and -ne operators to show only those certificates that do not have the specified EKU.

  • Certificate renewal permissions now work correctly such that if permissions are granted at the collection and container level and not the global level, as long as the user has Schedule permissions to the container for the certificate store, the user can renew the certificate. If the certificate is not in a container, the user cannot renew it.

  • The Key Usage field in the certificate details now no longer displays as blank.

  • RSA and ECC enrollments now succeed when Allow Public Key Reuse is disabled.

  • One click renewal, expiration alert renewal, workflow certificate renewal, and the Keyfactor API /Enrollment/PFX/Replace method now correctly schedule a certificate store job when Keyfactor Command is configured with an OAuth identity provider rather than producing an error indicating a duplicate or invalid user.

Known Issues
  • CSR generation with an EJBCA template configured with extended key usage (EKU) is generated without the EKU information.

  • EJBCA client authentication certificates with key algorithm ECDSA B-163/B-163/sect163r2 do not work with Keyfactor Command. This will be corrected in a future release.

  • The Include Subject Header option is not available in the Certificate Downloads dialog (see Download) unless the Allow Custom Friendly Name application setting is enabled (see Application Settings: Enrollment Tab). This will be corrected in a future release. As a workaround, either enable the Allow Custom Friendly Name application setting or download certificates using the Keyfactor API (see POST Certificates Download or POST Certificates Recover), which is not affected by this issue.

API Endpoint Change Log

Please review the information in the API Change Log for this release carefully if you have implemented any integration using these endpoints: API Change Log v24.4.