Skip to main content

What's New

Learn about the latest major additions to the SecureAuth SaaS platform!

23.10 Open Finance Brasil Compliance Updates

We remain dedicated to supporting the latest additions to Open Finance specifications.

  • implemented DCR adjustments to be compliant with the latest changes to the Open Finance Brazil specification:

    • recurringPayments scope added to Open Finance Brazil workspaces.

    • credit-fixed-incomes, exchanges, bank-fixed-incomes, variable-incomes, treasure-titles, and funds added for the regulatory DADOS role

    • recurringPayments added for the regulatory PAGTO role

  • Added a new mechanism to reject OBBR payment consents that has not been authorized within 5 minutes.

    This feature has to be enabled in the server configuration:

    server:
      obbr_reject_orphaned_payment_consent_using_scheduled_job: true            

20.10 Prepare for Organizations

Acquaint yourself with the latest enhancements integrated into the world of organizations in the Admin platform. Delve into the B2B Delegated Administration Portal to manage organizations effortlessly. Now, you can extend organization management capabilities to your business customers and partners, empowering them to handle organization accounts, add user populations, manage users, and much more with ease.

We've tailored these updates to foster a more collaborative and delegated administration environment, ensuring smooth operations and enriched interactions among your business network. The upcoming global release of this feature underscores its pivotal role in fortifying B2B interactions and administrative delegation within SecureAuth.

With a global rollout coming soon, now is the opportune time to familiarize yourself with these new features, ensuring a seamless transition and readiness to harness the full potential of the enhanced B2B Delegated Administration capabilities. Your proactive engagement with these updates will position you well for the enriched administrative experience that awaits.

If you do not have Organization and Delegated Administration capabilities available in your tenant yet, contact Support.

15.10 New Navigation

Explore the release of a rejuvenated Admin platform navigation. We've reimagined the navigation to be simpler and more intuitive ensuring a user-friendly experience that enhances your interaction with the platform. This is a fantastic opportunity to familiarize yourself with the improved interface and the seamless navigation experience awaiting you in the forthcoming release.

New Navigation

New navigation is enabled for all new tenants. For already existing tenants, it will be enabled shortly. If you want to explore it now, contact Support.

09.10 New Libraries in Extension Scripts

Added node-env/5 dependencies and make timeouts configurable.

New libraries:

Additionally, bumped the axios library to the newest version.

21.09 Enhancing Password Protocols in Identity Pools: Recent Updates

In just a few days, we've supercharged our Identity Pools with essential password-related features:

  • Introduce a minimum lowercase character count via the Identity Pool's APIs for robust password policies.

  • Designate a password expiration timeframe directly within the Identity Pool settings using our APIs.

  • Activate the all-new Mandatory Password Reset & Change Flags through the Identity Pools APIs.

Stay tuned! These advancements will be integrated into the UI shortly.

06.09 Brazil Open Banking Payment APIs Adjustments

Implemented backwards compatibility adjustments from the Brasil Open Finance Specification for the payment consent APIs.

  • GET /open-banking/payments/v2/consents/{consentID} does not allow retrieval of a consent created with the v3 endpoint. In this case, an error code of USO_NAO_COMPATIVEL_VERSAO is returned with HTTP status 400.

  • GET /open-banking/payments/v3/consents/{consentID} allows consents created with the v2 endpoint to be queried.

5.09 New Audit Events

We've added a couple of new audit events that you can utilize to have a greater control over what changes are introduced within your tenants:

  • System-level Token Revocation

  • Service creation, modification, and deletion

25.08 Client Registration Improvements

Changed the admin- / developer-level Create OAuth/SAML Client API to not assign hybrid response modes by default when the application is created using the single_page / server_web / mobile_desktop application types.

16.08 SSO Replaces Authentication Context Caching

Single Sign-On (SSO) Capabilities replaces the authentication context caching. If your organization used this mechanism, switch to Enable SSO in Identity Providers settings.

16.08 FDX DCR Support

FDX DCR available globally. From now on, the registration_endpoint points to the /fdx/dcr/register instead of the regular /oauth2/register DCR endpoint.

15.08 Improved Default Policies for Passwordless Authentication

Previously, pwd (authentication with a password) was the only allowed amr (authentication method reference) for the NIST-AAL-1/2/3 authorization policies.

Now, the NIST-AAL-1/2/3 authorization policies include otp (One Time Passwords -- Verification Codes) and pop (passkeys) as the allowed amr allowing users to authenticate using these other mechanisms.

Note

The change applies only to new tenants. If you want to use passwordless authentication on your already existing tenant, be sure to check the contents of the NIST-AAL-1/2/3 policies to include additional amr values.

11.08 Single Sign-On (SSO) Globally Available

Organizations can set up persistent user sessions with single sign-on to allow their customers/users to authenticate just once and access multiple apps.

Enable SSO

04.08 Open Finance Brazil Payment v3 APIs Support

Extended the Open Finance Brazil Consent Management APIs to support requests including v3 payments:

  • POST /servers/{wid}/open-banking-brasil/consents

  • DELETE /servers/{wid}/open-banking-brasil/consents

  • POST /servers/{wid}/open-banking-brasil/consents/{consentID}/consume

  • DELETE /servers/{wid}/open-banking-brasil/consents/{consentID}

  • GET /servers/{wid}/open-banking-brasil/consents/{consentID}

When a v3 payment consent is targeted with the delete APIs, it receives a rejection reason JSON:

{
 "rejectionReason": {
  "code": "REJEITADO_USUARIO",
  "details": "O usurio rejeitou a autorizao do consentimento"
 }
}

02.08 Authorization for Kong Gateway Better than Ever

In order to avoid configuration issues where the Kong authorizer's configuration differs too much from the helm chart values, certificate details need to be provided as part of the httpServer.certificate setting instead of the httpServer setting to closely match what Kong Authorizer supports.

With this change, support for httpServer.certificate.generated_key_type and httpServer.certificate.password settings was also introduced.

20.07 Provision Users Just in Time

Organizations that use third-party Identity Providers to sign in to the Admin platform or web applications protected by the authorization server may enable automatic user provisioning to Identity Pools for:

  • Unified User Representation

  • Attribute Augmentation

  • Operational Attribute Capture

  • Hybrid Authentication Support

User Provisioning

Just In Time User Provisioning

19.07 FDX 5.3 API Compliance Profile

We are proud to announce the addition of the FDX 5.3 security and consent compliance profile to our rich portfolio of open finance compliance profiles. It enables financial institutions and open banking platforms to quickly upgrade to FDX 5.3 and achieve instant compliance.

The recently released FDX API 5.3 introduced the requirement for data providers to align the Consent Grant details and OAuth scopes. It may sound like a mysterious technical detail to many but it is critical for interoperability, security, and compliance.

We have addressed this and other consent and OAuth details in our FDX compliance profile. It lets data providers offload the complexity of continuous compliance with evolving FDX consent and API security profile.

18.07 Extended RAR Support

Add new set of APIs (create, get, update, delete and list) for new entity authorization details. The feature is currently available behind the feature flag.

Authorization detail is an object defined in the OAuth RAR spec used to specify fine-grained authorization requirements. An admin can define multiple authorization details within a workspace. Authorization detail has a reference to a service and must have unique type. Additionally for every authorization detail schema must be defined, for example:

{
   "type": "payment_initiation",
   "locations": [
      "https://example.com/payments"
   ],
   "instructedAmount": {
      "currency": "EUR",
      "amount": "123.50"
   },
   "creditorName": "Merchant A",
   "creditorAccount": {
      "bic":"ABCIDEFFXXX",
      "iban": "DE02100100109307118603"
   },
   "remittanceInformationUnstructured": "Ref Number Merchant"
}         

A minimal schema must have at least a type property:

{
  "properties": {
    "type": {
      "description": "type",
      "type": "string",
      "minLength": 1
    }
  },
  "description": "basic user data",
  "type": "object",
  "required": [
    "type"
  ]
}         

11.07 Get User by Identifier or Address API

Added the Get User Details by Key API allowing to retrieve user information by user's identifier or a verified address.

28.06 Open Finance Brazil APIs Updated

Updated swaggers and models in accordance with the newest release candidate for the Open Finance Brasil consents API.

26.06 Easily Connect SAML IDPs

We added a bunch improvements to the process of connecting SAML IDPs:

  • You can switch between two configuration options: Metadata-based Configuration which enables us to fetch your IDP configuration from a metadata endpoint, and Manual Configuration which enables you to configure the IDP manually.

  • To enhance the IDP (Identity Provider) configuration process, we have included two new fields to the SAML IDP.

    • The Entity ID field allows you to specify the unique identifier for the IDP entity.

    • The ACS URL field enables you to input the Assertion Consumer Service URL for the IDP. These additions provide more flexibility and customization options when setting up IDPs in our application.

IDP Connection

IDP Configuration

SAML IDP Registration
SAML IDP Configuration

12.06 Configure Custom Token and Code TTLs for Client Apps

You can now configure custom Token and Code Time-to-Live periods for client apps that take precedence over the TTLs you apply at the authorization server level (Settings >> Tokens >> TTL). Learn how.

Client Level Token Time to Live

12.06 Enrich Token Claims for Client Application

It is now possible to assign Token Claim Enrichment Extensions directly to a client application. Extensions attached at the client level affect only the client they are assigned to and are executed after Extensions at the server level (if there are any). Learn how.

Assigning Extension at Client Level

30.05 B2B/Delegated Administration Portal Coming Soon

User Management

Organization Management

B2B Portal
B2B Portal

CIAM B2B Portal allows to administer organizations and their user populations without any technical hassle. You can delegate organization administration to your partners/customers and empower them with the self-management of users, configuration of sign-in options, roles configuration, and application permissions.

B2B/Delegated Admin Portal Availability

We are continuously striving to provide an exceptional B2B/Delegated Administration Portal, and to ensure a seamless experience, it is currently accessible through feature flags. To leverage the capabilities of the portal, contact Support.

15.05 Improve Your User Experience with Single Sign On (SSO)

Single Sign On Authentication (SSO) allows your users to log in just once to an application connected to CIAM and use the resulting session as a proof of authentication to all applications in the workspace for as long as the session is valid, thus removing the need to re-authenticate when the user wants to use another app.

SSO can be configured in a workspace Authentication > Settings > Persistence view.

Currently, the SSO feature is behind a feature flag. To enable it, contact Support.

SSO View

08.05 FAPI 2.0 Certified

FAPI 2.0 is an API security profile based on the OAuth 2.0 framework suitable for protecting APIs in high-value scenarios. 4th of May, we bacame the first CIAM platform to be certified! You can read more about FAPI 2.0, what it introduces, how it differs from FAPI 1.0 and Advanced, and more in the Exploring Financial Grade API 2.0 blog post. If you need a FAPI-grade authorization server, we got you covered. Just create a workspace of the Fintech and mission-critical applications profile, and choose the FAPI specification version you need to comply with.

We offer an authorization server that meets FAPI-grade requirements. Fintech and mission-critical application workspaces can be tailored to comply with your preferred FAPI specification - FAPI 1.0, FAPI Advanced, or FAPI 2.0. You have the option to modify your existing workspace settings to adhere to FAPI requirements or create a new Fintech and mission-critical applications workspace. When creating a new workspace, simply select the desired FAPI profile to ensure compliance.

FAPI-grade authz server

Please note that FAPI 2.0 is still in the draft phase, but certification is possible with the Implementers Draft FAPI 2.0 specification. Be aware that until FAPI 2.0 becomes final, we do not assume responsibility for FAPI 2.0 workspace settings, and we may introduce breaking changes as the FAPI 2.0 specification is refined.

03.05 Added OpenTelemetry Support to All Authorizers

Authorizers now offer full support of OpenTelemetry -- an observability framework that combines metrics, traces, and logs to monitor and analyze the performance and behavior of distributed systems. Tracing data, a key component of OpenTelemetry, consists of interconnected spans that represent individual units of work within a request, such as function calls or external service requests. Use it to analyze performance, diagnose errors, or for monitoring and alerting purposes.

29.03 One Token To Rule them All - New dcr_manage Scope In OAuth2 Service

One Ring to rule them all, One Ring to find them, One Ring to bring them all, and in the darkness bind them... Wait, that's not it. We've added a new dcr_manage scope to the OAuth 2.0 service. This new scope provides clients with access tokens containing it to access and call DCR (Dynamic Client Registration) management endpoints. These endpoints include GET, PUT, and DELETE methods for any dynamically registered client within the same workspace.

In simpler terms, this DCR extension is a powerful feature that enables a "one token to manage them all" approach to dynamically registered clients. With the addition of the dcr_manage scope, clients can now easily access and manage all dynamically registered clients with a single access token. This eliminates the need for multiple access tokens for different clients and allows for a more streamlined and efficient management process.

This feature also supersedes other settings like registration access tokens. Clients can now use their access token with dcr_manage scope to manage registered clients without having to generate and use multiple access tokens for different purposes.

15.03 Multiple Tenants Per Email Account and Login Improvements

Since now, you can register multiple tenants under one email account! To cater to this multitenancy improvement, we adjusted the way you log into the Admin platform:

  1. You will be asked for your tenant name and within which region your tenant is.

    You may notice that we may have already suggested some tenant names for you! We provide you with a list of tenants based on the cookie we use when you access the Admin platform. If you do not see the tenant you are looking for on the list, just select More tenants and provide your tenant's name and region.

    Users that did not log in during the last 30 days and forgot their tenants' names may use the Forgot? option in the Provide Tenant Details view.

  2. You will be asked to log into your account.

    Notice that from now on, if your account has username or phone number provided, you can use them to log in instead your email!

Old Way

This Is The Way

One tenant per email

Multiple tenants per email

Old way of logging in
New way of logging in 1
Provide Tenant Details
New Login Screen

10.03 Configurable Registration Access Token TTL

Previously, the DCR registration token was always valid for 30 days. Now, the TTL is configurable and can be extended. Optionally, the token expiry can be disabled.

You can configure DCR Registration Token settings in your workspace OAuth > Authorization Server > Client Registration view.

06.03 Extend User Authentication Process with Custom Applications

We offer two options for extending the user authentication process: Post Authentication scripts and Post Authentication custom applications.

The Post Authentication script allows custom JavaScript code execution upon user's authentication, enabling the modification of certain authentication context attributes, enhancement of the user context, or triggering custom API calls.

The Post Authentication custom application option allows connecting a Third-party Application. This application can interrupt the authorization flow after the user logs in using an IDP, redirecting the user to a custom, business-specific application hosted by the customer. This application requires users to complete additional processes or interactions as needed during the authentication process before they can proceed to granting their consent to the client. When the user completes this third-party flow, they are redirected back to the original authorization flow.

Read more!

28.02 Offline Approval for FDX Dynamic Client Registration

We're excited to announce that our FDX implementation now supports offline approval of Dynamic Client Registration.

With our DCR offline approval feature, you can register a client app even if it's currently inactive. This is ensured by the fdx_client_status parameter. Its values are mapped with the FDX client_status values, whereas mapping is based on the client app's ability to perform token flows. The mapping is as follows:

fdx_client_status

client_status

Notes

Approved, Tentative

active

The client app can perform token flows

Pending, Rejected, Inactive

inactive

The token cannot be issued for the client app

Initially, the FDX client app status is set to Active.

You can change the initial client status on UI within the tenant under the required workspace OAuth > Authorization Server > Client Registration > Enable Dynamic client registration: ON > DCR Client's Initial State:

DCR Client's Initial State

You can also change the status of the registered client app with the new Update FDX Client's Status PUT endpoint.

This endpoint requires an access token with the update_client_status scope. Pass the required status in the request body, for example: {update_client_status: "Approved"}. No restrictions to status transition are applied.

Our enhanced FDX implementation and DCR support provide ways for a faster, more secure integration between financial institutions and third-party providers. Benefit from the convenience and security of our FDX and DCR solutions providing compliance with FAPI standards for secure API interaction with consumer consent.

20.01 Passwordless Authentication Support

Passwordless authentication is a way of protecting the user credentials by replacing the traditional, knowledge-based authentication (such as entering a password you know) to a possession-based authentication (such as confirming the login with your fingerprint on a device you own). The possession-based approach has a number of advantages, primarily:

  • There is no password so you can't give it away to a phishing site

  • Your credentials are never stored on the server, in fact, they never leave the device used for authentication

The FIDO alliance is an organization trusted with maintaining the standards for passwordless authentication.

When authenticating with SecureAuth Identity Pools, you have the option to use a Passkey instead of relying on passwords.

16.01 Breaking Change: Pagination In Identity Pools List APIs

Pagination has been introduced when calling the List Identity Pools API. Callers can filter by id or name of the Identity Pool, search before or after its id, sort by id or name, order ascending or descending, and limit the number of returned results.

Callers who wish to use this API to return all Identity Pools should either set a high limit or enable pagination in their UI.

09.01 Token Endpoint Authentication Signing Algorithms Are Now Configurable On The Server Level

Token endpoint authentication signing algorithms are now configurable on the server level via the token_endpoint_auth_signing_alg_values parameters, for example:

{
"token_endpoint_auth_signing_alg_values":
  [
    "HS256",
    "RS256",
    "ES256",
    "PS256"
  ]
}         

Depending on the server security profile, only specific algorithms are allowed, for instance, for FAPI-based profiles the only supported algorithms are ES256 and PS256. When a client is dynamically registered in Open Banking Brazil workspace with the insurance industry, if the token_endpoint_auth_signing_alg is not explicitly provided, it is set automatically to PS256.

token_endpoint_auth_signing_alg on the client side should no longer use none value as per the OIDC specification.

Instead of none, the value should be empty or set to one of the algorithms supported by the server (see token_endpoint_auth_signing_alg_values_supported in the well-known page). none is still accepted but it's converted to an empty string.

2022

26.12 Configuration Export/Import

We value your feedback and are always looking for ways to improve our platform. In response to customer requests, we've made enhancements to our configuration export and import capabilities to improve performance.

We've updated our import and export APIs to exclude dynamic and non-configuration objects, which speeds up the process. To provide the option to still retrieve these objects, we've introduced a new with_data query parameter to the Export Global Tenant Configuration Root API and the Export Tenant's Configuration System API . When with_data is set to true, these APIs will include dynamic and non-configuration objects in the exported configuration:

  • Consents

  • ConsentActions

  • ConsentGrants

  • ScopeGrants

  • PrivacyLedgerEvents

  • OpenbankingUKConsents

  • OpenbankingBRConsents

  • OpenbankingFiles

  • CDRArrangements

  • OpenbankingFDXConsents

Before the change, those fields were populated by default.

07.11 Utilize Improved Identity Pools

We added a bunch of new improvements to Identity Pools:

  • User credentials now include the expiresAt parameter. Once the password expires, it fails verification, and the user needs to either reset it or change.

    Password expiry can be utilized when migrating users from external identity sources without their passwords defined. Just provide no password and set the expiry date for a date in the past to trigger password change for your users.

  • Added option to set Preferred Authentication Mechanism useful when both password and OTPs are enabled for an IDP. Now, it is possible to pick the default one that shows up on the login screen.

  • Admin platform users can now manage user identifiers and addresses within Identity Pools. Admins can add new identifiers with the email, mobile, UUID types, or even identifiers coming from external sources. Additionally, admins can add new verifiable email or mobile addresses for users and define whether the address is verified or not.

    Adding new identifiers and addresses
  • Refactored Identity APIs to enable developers to extend them more easily.

26.10 Manage Users' Identifiers and Addresses in Identity Pools

SecureAuth Platform admin users can now manage user's identifiers and addresses within SecureAuth Identity Pools. Admins can add new identifiers with the email, mobile, UUID types, or even identifiers coming from external sources. Additionally, admins can add new verifiable email or mobile addresses for users and define whether the address is verified or not.

Adding new identifiers and addresses

24.10 Cache Request Responses Within SecureAuth Authorizers

We improved SecureAuth authorizer's integration with the Open Policy Agent's REGO language, so that the caching features in the REGO http.send() function are effective. You can now use the following fields in your REGO policies:

  • cache - Cache HTTP response across OPA queries. Default: false.

  • force_cache - Cache HTTP response across OPA queries and override cache directives defined by the server. Default: false.

  • force_cache_duration_seconds - If the force_cache field is set to true, this field specifies the duration in seconds for the freshness of a cached response.

In SecureAuth v2.8.0, the authorizers provide an inter-query cache that persists across policy validations, which enables calls to the http.send() method to access cached responses from previous policy validations. The cache is recreated on each API discovery cycle, so the duration of cached responses is limited by the authorizer's discovery interval.

{{< dropdown-content title="Authorizer's API discovery configuration" iscode="true" datalang="yaml" >}} discovery: enabled: true # when true, API discovery is enabled interval: 30s # how often discovery is performed {{< /dropdown-content >}}

The cache size can be configured via the rego_inter_query_cache_size configuration setting for SecureAuth authorizers:

enforcement:
    rego_inter_query_cache_size: 1000000 # maximum size for the Rego inter-query builtin cache

20.10 Full Support for Brazilian Open Insurance

SecureAuth platform now fully supports Brazilian Open Insurance (OPIN) initiative.

  • The Open Finance Brazil type of workspace is configured to provide industry-specific OPIN configuration, for example, OPIN scopes.

  • Added permission mappings and groups validation required by OPIN. It can be used in the consent creation endpoint.

  • Added the following endpoints from the OPIN spec for consent creation and management:

    • Create Insurance Data Access Consent

    • Get Insurance Data Access Consent

    • Delete Insurance Data Access Consent

  • Added DCR requirements support coming from the the Open Insurance specification. This includes:

    • Requirement of using mTLS for DCR registration

    • Software statement parsing and validation for the model provided by the specification

    • Software role to scope mapping during DCR

  • Extended mTLS aliases in the OAuth wellknown endpoint to include the backchannel authentication endpoint when Client Initiated Backchannel Authentication method is enabled as required by the OPIN specification.

  • Add an option to configure supported acr (Authentication Context Class Reference) values in the authorization server's OAuth advanced settings. Workspaces now use whatever is configured in the settings instead of an internal hardcoded list.

14.10 Bunch of New Articles for Financial Data Exchange (FDX) Compliance

Financial Data Exchange

We have added a whole lot of new articles on complying with the Financial Data Exchange (FDX) standards body! Check out brand new solution guide. Learn how to build consent pages that comply with the FDX requirements, how data providers can protect their APIs with SecureAuth, and much more:

21.09 Password Policies for Identity Pool Users

Times, when qwerty1234 was thought to be a safe password, are long gone! Make sure that your users fulfill all of the requirements for safe passwords with SecureAuth password policies. Such policies enable the Identity Pool administrators to specify, for example, the minimal length of a password, number of special characters, and many more.

Password Policies

16.09 Integration with Kusk API Gateway

Kusk API Gateway enables developers to build, validate, deploy, and monitor REST APIs based on Envoy Proxy running on your Kubernetes cluster. Do you know what else can be run in a K8s cluster? That's right! SecureAuth authorizers! It is now possible to integrate the Kusk Gateway with SecureAuth and protect the APIs deployed behind your gateway with advanced access control measures. The integration is based on the SecureAuth Standalone Authorizer.

Kusk Gateway APIs access control

1.09 Event-Based Notifications Using Webhooks

With SecureAuth Extensions, you can set up event-based notifications in order to subscribe third-party applications to important events captured by our platform. You can, for example, notify an external CRM system that a user granted their consent for an application registered within your Open Banking workspace, and more.

External_Logging_with_Event-based_notifications.svg