2025 First Quarterly Release - 25.1 Notes

March 2025

Keyfactor announces Keyfactor Command 25.1, which includes some major new features and updates such as enrollmentClosed Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). patterns, which provide flexibility for enrollment, clarification of the reenrollment function with a rename to on-device key generation and expanded availability, and a new certificate cleanup task.

Note:  With this release, the release schedule and versioning system will continue from the changes of the previous release. There are two types of releases—quarterly and monthly. Quarterly releases contain new features in addition to bug fixes and security updates as needed. Monthly releases will contain bug fixes and security updates as needed. The combination of quarterly and monthly releases means that each month in a given year will see a release of some type. To reduce confusion and avoid going through major version numbers too quickly, we have moved to a simple [Year].[Quarter].[Build Increment] version scheme.
Tip:  Keyfactor recommends that you check the Keyfactor GitHub Site (https://keyfactor.github.io/integrations-catalog/) with each release that you install to check if you will need to download the updated orchestrators to work with that version of Keyfactor Command.

Please refer to Keyfactor Command Upgrading for important information about the upgrade process. For a complete list of the items included in this release, see Release Note Details v25.1. For gateway and CA Connector Client release notes, see:

Highlights
Changes & Improvements
  • Application Settings

    • A new Certificate Cleanup section has been added to the Console tab containing these settings:

      • Certificate Cleanup Enabled: Enable the periodic cleanup job to remove expired certificates from the database. The default is disabled.

      • Time After Expiration: The amount of time after expiration to wait until the certificate is eligible for removal. The default is 24.

      • Time After Expiration Units: The time unit to apply to the expiration time. Options are days, weeks, or months. The default is months.

      • Delete Certificates with Archived Keys: Determines whether certificates with a private key stored in the system are eligible for removal. The default is disabled.

  • Certificate Authorities

    • On the CA configuration Advanced tab, the following changes have been made:

      • The Enable PFX Enrollment and Enable CSR Enrollment toggles have been removed.

      • The Restrict Allowed Requesters toggle and associated Allowed Requester Security Roles section have been removed.

      • A new Use for Enrollment toggle has been added.

        On upgrades, the Use for Enrollment toggle will automatically be enabled for any CAs that previously had either Enable PFX Enrollment or Enable CSR Enrollment enabled.

    • On the CA configuration Standalone tab, the following fields have been added:

      • Enable PFX Enrollment

      • Enable CSR Enrollment

      • Restrict Allowed Requesters

      These are configured here because standalone CAs do not use enrollment patterns.

  • Certificate Metadata

    • Now metadata type - email accepts multiple emails at a time via a new text area for data entry. Email address may be separated by commas or semicolons on the same line. This eliminates the need to open, save and close the email recipient dialog multiple times.

  • Certificate Search and Collections

  • Certificate Stores and Certificate Store Types

    • Alias Field Search Select: The Alias field is a search-select entry type. The dropdown lists all aliases associated with the selected certificate store.If an alias appears in multiple certificate stores, the number of locations is shown in parentheses next to the alias name. This indicator does not appear if the alias exists in only one selected store.Users can enter a new alias as long as Custom Aliases are not forbidden on the certificate store type Certificate Store Types.If you select an existing alias without checking Overwrite, the Save will fail and the certificate store(s) in which that alias already exists will be listed.
  • Certificate Templates and Enrollment Patterns

    • The system-wide setting configurations have been removed from the templates page and added on the enrollment patterns page.

    • On the certificate template Details tab, the following changes have been made:

      • The CSR Enrollment, PFX Enrollment, and CSR Generation toggles have been removed. These have moved to enrollment patterns.

      • Settings for certificate cleanup have been added (see Certificate Templates - Details Tab).

    • The Enrollment Fields, Authorization Methods, Enrollment RegExes, Enrollment Defaults, and Polices tab have been removed. These have moved to enrollment patterns.

  • Dashboard and Reports

  • Enrollment

    • Throughout the product and documentation, the term re-enrollment has been renamed to ODKG (on-device key generation).

  • Helm

    • Volume mounts for container installations of Keyfactor Command can now be done on a per-deployment basis by entering the volume and volumeMounts information in the appropriate appConfig section. For examples, see Keyfactor Command Configuration Files.

  • Installation and Configuration

    • In the configuration wizard, on the top section of the Database tab, there is a new checkbox, Use SQL Always-On, which appends MultiSubnetFailover=True to the connection strings template for the configured installation.

  • Keys

    • In order to move to supporting the NIST standardized OIDs for Post-Quantum algorithms, the following algorithms have switched their underlying OIDs: ML-DSA-44 now uses 2.16.840.1.101.3.4.3.17, ML-DSA-65 now uses 2.16.840.1.101.3.4.3.18, ML-DSA-87 now uses 2.16.840.1.101.3.4.3.19. Any previous Dilithium algorithms are not supported.

  • Keyfactor Universal Orchestrator

    • Installations on Windows now only support SecureString input for the following values: -ClientCertificatePassword, -ClientSecret

  • Logging and Auditing

    • The information message logged to the audit log on user login or log out to the Keyfactor Command Management Portal now includes the authentication provider’s display name.

  • PAM

    • SMTP supports PAM secrets for username and password.

    • PAM Providers LocalDB Provider Type has been renamed to Command Secret Provider.

    • PAM providers and provider types can now be configured in the Helm values file for container installs of Keyfactor Command.

    • Values for client credentials in the Helm values file for container installs of Keyfactor Command can now be set using PAM.

  • Security Roles and Claims

    • Active Directory security claims can now be created in Keyfactor Command instances using OAuth identity providers if Active Directory is available in the environment. An Active Directory identity provider does not need to be created for this purpose.

  • SQL Server

    • A Use SQL Always-On checkbox has been added to the Database tab of the Configuration wizard. This option automatically appends MultiSubnetFailover=True to the connection string template. This setting ensures faster and more reliable failover in environments using multiple SQL listener nodes (such as primary and secondary). In the event of a failure on the primary SQL node, this feature enables a seamless failover experience, allowing the connection to quickly switch to the secondary node. For more information, see High Availability.

    • Fortanix application-level encryption now caches the authentication token to improve performance.

  • Workflow and Alerts
Fixes
  • Uploading a PFX or p12 that exists in Keyfactor Command and has metadata values other than the defaults now causes those metadata values to be populated.

  • The issued certificate request alerts grid now correctly shows the template display name rather than the template short name in the template display name column.

  • On certificate renewal using the configure option for a certificate with SANs, the SANs are no longer cleared on selecting a new template.

  • On upgrade from versions of Keyfactor Command prior to 12.0, SAN email template defaults and regular expressions defined as MAIL will seamlessly become fields defined as EMAIL and will not lose the configurations.

Deprecation & Removals
  • The license for the Logi Analytics Platform, used by the Keyfactor Command dashboard and reports, will expire on November 28, 2027 and will not be renewed. Customers who have not upgraded to Keyfactor Command 25.3 or later by that date will no longer be able to use the dashboard or reports.
Known Issues
  • The PermissionSetId in /IdentityProviders/ endpoint responses is shown inconsistently for different verbs. For PUT it is not among the response parameters. For GET and POST it is among the response parameters. This will be corrected in a future release.

  • A workflow with a step of type Send Email generates an unhelpful error if the email address resolves to null. This will be corrected in a future release.

  • The ML-DSA information in Logi reports may be slightly incorrect due to the differences between new and old OIDs because the following algorithms have switched their underlying OIDs: ML-DSA-44, ML-DSA-65, ML-DSA-87. Reports will be updated in a future release.

  • The Certificate Count by User per Template report does not allow selection of templates when run interactively and when run on a schedule, selected templates are not saved. This will be corrected in release 25.1.1.

  • An incomplete error message is sent when Test SMTP Fails. This seems to be a known issue on Google’s side. The page link that is missing in some messages should be: https://support.google.com/a/answer/3726730?hl=en.

  • On a PFX enrollment where Include Chain is selected, if the certificate chain cannot successfully be built, an error message pops up indicating a chain building error. However, the certificate is still issued. Because of the error message format, users may think that the certificate was not issued. This will be clarified in a future release.

    Note:  In order for chain certificates to be included with end entity certificates for download, one of the following must be true:
API Endpoint Change Log

Please review the information in the API Change Log for this release carefully if you have implemented any integration using these endpoints: API Change Log v25.1.