SecureAuth Hotfixes typically come after a release to resolve known issues without requiring customers to wait for or to upgrade to the next release.

More information about these hotfixes and download files can be found on the SecureAuth Hotfixes Downloads Page.


SecureAuth IdP v9.1 and v9.2 Hotfixes


SecureAuth IdP v9.2.0 Hotfixes

9.2.0 Latest Hotfix

The latest hotfix release (9.2.0-21) is comprehensive and resolves all issues addressed by the hotfixes in this table:

Release No.Release DateRef IDIssue


EE-867Help Desk Validation Dates Issue – Date values for Certificate Validation Date and Mobile Validation Date fields are no longer missing from the Help Desk page.
EE-1025Help Desk “Update” User Account – Incorrect profile data is no longer automatically saved since the Update button is now properly disabled.
EE-1027URL Encoding Update – Updates were made to URL encoding to ensure greater security.
EE-1029Google Social ID Login – Social ID login feature was updated due to modifications made by Google API.
9.2.0-2012/21/2018EE-997OATH Token JSON Encryption Issue – Data is now correctly read when JSON encryption is selected as the OATH token storage method.
EE-1000Multi-Data Store Timeout – Data tab on a realm configured for multi-data stores now loads faster without timeouts.


EE-867Cert and Mobile Validation Dates – Cert Validation Date and Mobile Validation Date values now correctly populate the Help Desk page.
EE-937Begin Site Redirect Encoding – Begin site redirect is no longer double encoding the request query, causing the realm to break and the workflow to halt.
9.2.0-19 hotfix – machine learning

Non-issue changes:

  • Installation of FileBeat, MetricBeat, and Cloud Transport Service components which gather information about appliance statistics, software configuration, and end-user authentication events, which are submitted to SecureAuth Cloud.
  • Web.config enhancements to enable the configuration of advanced adaptive capabilities powered by machine learning. Learn more:
9.2.0-1810/10/2018EE-678SAML Consumer UI – When adding a provider for SAML consumption, SecureAuth IdP Web Admin UI no longer disables editing provider information.
EE-917Unable to Save KBQ / KBA ValueWhen saving the "helpdesk challenge" on the Self-service Account Update page, the user's knowledge based answer is now saved when data is encrypted.
9.2.0-1709/07/2018EE-899Debug Logging Issue – Self-service Password Reset page now logs correctly on all configurations.
EE-895Symantec VIP Credentials Display – Symantec VIP Credentials table now displays all user information on the Help Desk and Self-service pages.
EE-903Country Check Cloud Services – When Cloud Services are down, users are no longer stopped during login when SecureAuth IdP performs a country check.
9.2.0-1307/18/2018EE-862Country Code Support Issue – Certain country codes were not being supported for phone call and / or SMS TOTP delivery.


Adaptive Authentication IPv6 Processing – Adaptive Authentication policies returned invalid data for users with IPv6 addresses.
9.2.0-906/11/2018EE-785Adaptive Authentication Redirection – Redirecting the user via an Adaptive Authentication policy with a static query string parameter resulted in a query string with an invalid format.
9.2.0-806/05/2018EE-743User Risk Analysis Response – When retrieving a user risk score from certain third-party providers, SecureAuth IdP was not reading a valid score due to a null reference.

Windows SSO Enhancement – Some IIS settings necessary for Windows SSO / authentication must be manually entered in the web.config, but SecureAuth IdP would remove all these settings if a change was subsequently made on the Workflow tab.

EE-791Adaptive Authentication Redirect Caching – SecureAuth IdP was caching query string parameters from previous Adaptive Authentication redirection URLs, causing redirection failures.

Novell eDirectory Lookup – During login, a user’s profile was not being accessed successfully.


CyberArk Vault Credential Lookup – In multi-domain environments, SecureAuth IdP was not able to retrieve credentials successfully.

9.2.0-404/24/2018EE-709SA Cloud Timeout and Fail Open – Due to extended timeouts and no fail open functionality, users were unable to log in when SA Cloud services are down.
9.2.0-303/21/2018EE-604User Risk Score Bearer Token Authorization – The format for the OAuth2 Bearer Token used when importing a User Risk Score was causing an error, resulting in the inability to import the risk score.


EE-587Account Management Updates – Users could access Help Desk pages from the Portal despite not being a member of the designated group set up on the administrative page.
EE-619Interface / Customization Communication – Customizations referencing a certain interface were no longer able to communicate with it.
EE-616PIN Not Saved – When updating the PIN field in the self-service realm, the PIN was not successfully saved, causing errors when attempting to use the PIN in subsequent login attempts.

Affected SecureAuth IdP Version(s): 9.2

Support Information: Contact SecureAuth Support (,, or 1-866-859-1526) to have the latest hotfix installed on your SecureAuth IdP v9.2.x appliance.

SecureAuth IdP v9.1.0 Hotfixes

9.1.0 Latest Hotfix

The latest hotfix release (9.1.0-46) is comprehensive and resolves all issues addressed by the hotfixes in this table:

Release No.(s)Release Date(s)Ref IDIssue
9.1.0-4611/30/2018EE-930Log Database Collection – SecureAuth IdP no longer stops creating log entries when records grow very large (2,147,483,647+).
EE-986Google ID Social Login – Issue resolved in which Google API changes caused SecureAuth IdP’s social login feature for Google Apps to stop working.
EE-991Begin Site Redirect Encoding – Begin site redirect is no longer double encoding the request query which had been causing the realm to break and the workflow to halt.
9.1.0-4509/06/2018EE-906eDirectory Group Issue – Error no longer occurs when attempting to add a user to a group in eDirectory via the Create User function.
EE-123Timeout Message Display – When users are logged out of Secure Portal based on timeout, the notification now displays the timeout message configured on the realm.
9.1.0-4407/27/2018EE-847OIDC Subject Claim Issue – Introspection endpoint was failing when access token subject claim contained a client ID.
9.1.0-4205/21/2018EE-786OIDC EndSession Redirect – Redirect and session end was not occurring due to the 'post_logout_redirect_uri' parameter requiring the presence of the 'id_token_hint' parameter. Redirect now functions with the presence of 'client_id' only, and does not require 'id_token_hint'.

Create User Failure for eDirectory – Create User page integrated with eDirectory was not functioning due to hardcoded attribute information.

NOTE: This fix enables the creation of users, but certain functionalities of the page are not supported for eDirectory at this time.


Proxy Settings for OIDC Encryption Key Retrieval – Proxy settings configured in SecureAuth IdP are not applied when retrieving OIDC encryption keys.


Create User Group Designation SQL – Create User page with SQL data store integration does not associate users to groups on the page during creation.

NOTE: This fix requires a new stored procedure provided by SecureAuth Support (see contact information below).


Novell eDirectory Lookup – During login, a user’s profile was not accessed successfully and the self-service password reset was unsupported.

EE-642Mobile QR Code Enrollment – When device limitation is enforced, false errors would occur during QR code enrollment.
EE-703SA Cloud Timeout and Fail Open – Due to extended timeouts and no fail open functionality, users were unable to log in when SA Cloud services are down.
EE-446Errant Calls to Invalid URLs – Calls made for IP Evaluation were hitting the wrong endpoint URLs.
EE-629Bad IPv6 Handling – During Adaptive Authentication analysis, IPv6 calls created issues with the evaluation.
9.1.0-39 or earlierVariousEE-559JWT Missing Claim – In OAuth 2.0 Client Credential Flow, the ‘sub’ (subject) claim was missing in the JWT.
EE-586Encryption Functionality – Encryption functionality was static due to the disability of this feature.
EE-533OTPValidateThrottle PUT Call – OTPValidateThrottle PUT call was resetting the count for both values (Select vs. Validate counts).
EE-514, EE-521Self-service PIN Update – The Update button needed two clicks to save new PIN information.
EE-470RADIUS Server Timeouts – RADIUS Server requests were timing out when under a high load.
EE-482Slow Response – When connected to a Syslog Server, too many UDP clients created a massive slow down.
EE-417Tivoli Directory Device Recognition – Device / Browser Profiles were not accurately saved to Tivoli user profiles.
EE-483Link-to-Accept with Proxy – Link-to-Accept did not properly go through the configured proxy settings (both SMS and email).
EE-480Device Recognition on IE10 – PixelRatio property analyzed for fingerprinting was unsupported in IE10 and therefore returned a null response and invalid browser profile.
EE-464YubiKey Validation Call Failure – API calls to validate the YubiKey login fail due to character limitations in the string.
EE-376Account Management Error – Updating the OATH Seed on the Account Management page created an error due to split directory integrations for membership and profile.
EE-429SMTP Timeout Errors – Using the Authentication API to request OTP emails, the user experienced SMTP timeout errors.
EE-366HID Token Read Failure – Login process was unable to read the OATH Seed from an HID token for MFA, and SecureAuth IdP was unable to read the OATH Seed from HID token for post-authentication.
EE-3372016 Light Theme Login Page – When pasting a password (from password manager, for example), the Submit button did not change color and the mouse cursor showed the ‘no entry’ icon. Clicking the button worked, but visually appeared as though it would not.
EE-329Verbiage Customizations – When a user’s browser is not set to English and the preferred language is not selected in the SecureAuth IdP configuration, then the browser defaulted to English, but without the verbiage customizations made in the Web Admin.
EE-345Invalid Username not Updating – With workflow type set to Username & Password, when the user entered an invalid username and then corrected it, the username was still considered invalid and the page reverted the text back to the original invalid entry.
EE-328OTPValidate Throttle not Counting – Instead of creating a unique counter for OTPValidate, the MultiFactorIntervalThrottle counter was used instead.
EE-320Login for Windows UI – Various UI defects were resolved in Login for Windows.
EE-303Username Overflow – On the Account Management page, the username overflowed into the next text box.
EE-295OIDC Redirect URI with Localhost – For OIDC integrations, the Redirect URI did not support localhost.
EE-248NumberProfile API Server Error – Requests to the phone number analysis endpoint with an invalid number (e.g. 123456789) generated a server error response.
EE-265Password Requirements for Create User Page – Password requirements configured on the Web Admin were not applied to the Create User page.
EE-263Unwanted Verbiage on Page – A flag on a page displayed unwanted verbiage on client-side pages.
EE-203Duplicate Knowledge Based Questions – Users were able to select the same KBQ multiple times, thus only having one question to answer for Multi-Factor Authentication.
EE-255No Automatic Redirect – Users were not automatically redirected from SecureAuth IdP with an OIDC token to the relaying application.
EE-212Invalid User Error – LDAP users attempting to log in continually received an “Invalid User” error.
EE-202OATH Token Invalidation – After upgrading to version 9.1, existing OATH Tokens were no longer valid and required re-provisioning.
IDP-1721Login for Windows Configuration – Configuration settings for new Login for Windows product were not available in the Web Admin.
EE-183FIPS Compliance – SecureAuth IdP updates were made for FIPS Compliance requirements.
IDP-2554Admin API HMAC Authentication – It was possible to remove HMAC authentication from the Admin API.
EE-119, EE-175Authentication API Throttling – The Multi-Factor Throttling count doubled based on selection and validation of the OTP, thereby rendering the configuration inaccurate.
IDP-2524Web.config URL Update – Values for some URLs were incorrect in the web.config.
IDP-2486Compilation Error – The SISU code file contained a compilation error.
IDP-2516ChangePassword Error – Username was missing a domain slash for Change Password via the API.
IDP-2497Link-to-Accept UI Update – Color of the button was incorrect.
IDP-2512Authentication API OATH Token Failure – OATH Token was not working as a viable Multi-Factor Authentication option via the Authentication API.

Affected SecureAuth IdP Version(s): 9.1

Support Information: Contact SecureAuth Support (,, or 1-866-859-1526) to have the latest hotfix installed on your SecureAuth IdP v9.1.x appliance.


Hotfixes Knowledge Base articles and downloads - SecureAuth IdP v9.0.x and earlier

Hotfix Documentation, Description and DownloadFor SecureAuth IdP version(s)

SecureAuth IdP ProfileWS Hotfix 170412

 Hotfix Description and Download

Description: This hotfix makes the appliance more secure, strengthening the integration with the Credential Provider, by validating the username, password, and Time-based Passcode (TOTP) via Integrated Windows Authentication (IWA) and SecureAuth Cloud Services.

Release Date: April 12, 2017

Hotfix File:

8.0 to 9.0.1

SecureAuth IdP 9.0.2 Bug Fix Hotfix HF.902_454

 Hotfix Description and Download

Description: This hotfix includes bug fixes for SecureAuth IdP version 9.0.2.

Release Date: January 20, 2017

Hotfix File:


SecureAuth IdP Update Default Credentials Hotfix 161110

 Hotfix Description and Download

Description: This hotfix resolves a potential security vulnerability for credentials used in the Web Services (Multi-Data Store) configured on the Membership Connection Settings section of the Data tab and on the FBA WebService section of the Workflow tab. If the SecureAuth IdP administrator has not changed the default password after initial configuration of the SecureAuth idP appliance, then the appliance may be vulnerable.

Release Date: November 30, 2016

Hotfix File:

7.0 to 9.0.1

SecureAuth IdP SAML Consumer Hotfix 160505

 Hotfix Description and Download

Description: This hotfix resolves an issue in which certain SAML conditions are not being calculated properly in SecureAuth IdP, and also resolves handling subsequent SAML assertions signed as SHA-256.

Release Date: May 19, 2016

Hotfix File:

8.1 to 8.2

SecureAuth IdP 2016 Light Theme Hotfix HF820-66

 Hotfix Description and Download

Description: This hotfix resolves issues related to the 2016 Theme, and should be applied to IdP appliances running version 8.2. If you are not affected by issues this hotfix addresses (see documentation for details), it is recommended you install SecureAuth IdP version 9.0 or greater.

Release Date: February 12, 2016

Hotfix File:


SecureAuth IdP 8.1 Event Viewer Logging Hotfix

 Hotfix Description and Download

Description: This hotfix resolves the issue for SecureAuth IdP appliances running 8.1 that are not generating logs to the Event Viewer. Windows Event Viewer is used by the system administrator to view events for all programs on a machine to monitor its performance, identify and troubleshoot issues, etc.

Release Date: August 17, 2015

Hotfix File:


SecureAuth IdP Security Hotfix HF-15728

 Hotfix Description and Download

Description: This hotfix resolves an issue in which unauthorized users could gain administrative access in some configuration scenarios. It is recommended you install this hotfix on all appliances running versions 6.0 through 8.0.3. Rename the file with a .exe extension after downloading the file.

Release Date: May 13, 2015

Hotfix File:

6.0 - 8.0.3

SecureAuth IdP 8.0.2 Post Authentication Cleanup Utility Hotfix

 Hotfix Description and Download

Description: This hotfix resolves an issue for configuration scenarios that give authenticated users access to content that should be restricted only to authorized users. SecureAuth recommends applying this hotfix on all SecureAuth IdP appliances running versions 6.0 through 8.0.1. Rename the file with a .exe extension after downloading.

Release Date: February 17, 2015

Hotfix File:

6.0 - 8.0.1

SecureAuth IdP 8.0 New Builds on Windows 2012 R2 Hotfix

 Hotfix Description and Download

Description: This hotfix resolves three known issues in the 8.0 release and should be applied to SecureAuth IdP 8.0 builds on Windows 2012 R2 shipped before September 24, 2014. Issues resolved in this hotfix:
1. Authentication Error Message: Error messages appear because the IdP application directory in IIS and its corresponding IdP physical path have not been created in the appliance
2. Deleted Realm Error: The error is a result of a bug in the rc.js and rc.min.js files found in the D:\SecureAuth\SecureAuth0\Scripts folder.
3. User name / Password Error message: The error is a result of a bug in the file.

Release Date: September 24, 2014

Hotfix File:


SecureAuth IdP 7.5 Hotfix for WS-Federation

 Hotfix Description and Download

Description: This hotfix resolves an issue for SecureAuth IdP version 7.5 in which the SecureAuth.IdentityModel.WSFederation.dll can cause errors in WS-Federation workflows. This hotfix updates the DLL to restore proper operation of the WS-Federation capability. This issue, resolved in SecureAuth 7.5.1, only impacts 7.5.

Release Date: July 18, 2014

Hotfix File:


SecureAuth IdP 7.4 ASPNETDB Datastore and Fingerprinting Hotfix

 Hotfix Description and Download

Description: This hotfix resolves the issue for SecureAuth IdP versions prior to 7.5 in which users receive a .NET error during the pre-authentication portion of the workflow in environments using an ASPNETDB datastore with device fingerprinting.

Release Date: February 21, 2014

Hotfix File:

6.0 - 7.4
  • No labels