Release Notes
Introduction
MTG Certificate Lifecycle Manager Server is a product suite with several components. This section contains the release notes for the following components:
-
MTG Certificate Lifecycle Manager
-
MTG CMP Server
-
MTG EST Server
-
MTG SCEP Server
-
MTG ACME Server
-
MTG ERS CLI Client
-
MTG AEC Server
-
MTG Revocation Info Server
For MTG KMS refer to the respective release notes page.
Version 6.2.0
Date: 2025-08-25
Compatibility Tests
MTG CLM Documentation
-
MTG CLM Documentation just turned interactive! Within the refactored Introduction and Guides & How Tos sections, you will now find numerous and action-packed widgets. Our newfound and disruptive approach serves as a unique way to learn more about hidden MTG CLM features and to engage directly with enhanced documentation content. The list of pages containing such widgets is bound to continue expanding in future releases.
MTG CMP, EST, SCEP, ACME Server & Autoenrollment Connector
-
During the connection to CLM, Keycloak, and OpenSearch server, the system now checks whether TLSv1.3 is supported. If it is, TLSv1.3 is used.
MTG ERS CLI Client
-
During the connection to CLM and Keycloak the system now checks whether TLSv1.3 is supported. If it is, TLSv1.3 is used.
-
Added support for RA mode, enabling the use of certificate request command without requiring prior end entity configuration. For more information, refer to the dedicated guide section.
Certificate request command is no longer backwards compatible with versions prior to 6.2.0. Make sure to adjust any client-side scripts that are configured for older versions of MTG ERS CLI CLIENT. |
Version 6.1.0
Date: 2025-07-28
"mtg-java17" package is deprecated and not provided for the following supported Linux distributions anymore: Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9 openSUSE Leap 15.5 openSUSE Leap 15.6 Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS Please follow our MTG Java Migration Instructions on how to install and use Adoptium Temurin JRE 17. It is strongly suggested to migrate to Adoptium Temurin JRE 17 as soon as possible, so your systems receive the security updates of Java 17. |
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Certificate validity is now configured at the policy level. All certificates issued with a given policy inherit its single validity period. Request-level validity settings are no longer used.
-
New value
CA_DECIDES
instructs the provider to set validity. -
Verify each policy’s validity period after upgrade; existing requests continue to work but will use the policy’s value.
Migration Impact: Certificate validity is now controlled exclusively through policy configuration, providing more predictable and manageable certificate lifecycle control.
-
In systems prior to 6.1.0, policies contain one or more validity periods, which signify the allowed values that can be selected when requesting a certificate. During the migration process, the policy validity takes the value of the longest allowed value previously configured, or CA_DECIDES in case the configured provider does not support configurable certificate validity. For example : Ιf the previous policy had an allowed validity of 3 and 6 months, then a new validity of 6 months is set. If however all validities were set, then two years is set as the preferred validity. |
Not all providers support configurable validity period for the certificates they issue; providers of type MTG_CARA and GLOBAL_SIGN allow all validities, the rest of them, MS_NDES, MSCA and PSW_PUBLIC_CAS, allow only CA_DECIDES. |
The CLM-API representations for policies and certificate requests have changed due to moving the requested certificate validity from certificate request to policy. If you are using any of these representations, update your client-side applications accordingly. |
-
Added new variable placeholders in notifications templates that allow fast navigation to certificate and certificate request details page.
-
Included minor performance enhancements.
-
To effectively disable implicit notifications, users can now select an empty list of implicit events in MTG CLM UI.
-
Included several UI/UX enhancements in MTG CLM UI.
-
Fixed bug on refreshing table pages on MTG CLM UI.
Version 6.0.0
Date: 2025-06-30
"mtg-java17" package is deprecated and not provided for the following supported Linux distributions anymore: Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9 openSUSE Leap 15.5 openSUSE Leap 15.6 Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS Please follow our MTG Java Migration Instructions on how to install and use Adoptium Temurin JRE 17. It is strongly suggested to migrate to Adoptium Temurin JRE 17 as soon as possible, so your systems receive the security updates of Java 17. |
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Introduced a new, flexible and highly configurable notifications mechanism. Using channel types, event types, templates, contacts and subscriptions, the user has fine-grained control over the notifications they receive. For more information, see Notifications.
-
Added new configuration parameters, see Notification Related Properties.
-
The configuration parameter
frontend.base.url
is now mandatory. -
Removed configuration parameter:
notify.cert.expiring.time.intervals
. -
Due to the new notifications mechanism, the mailing list entities and the configurations
EXPIRING_CERT_NOTIFICATION_INTERVAL_DAYS
andMAIL_SIGNATURE
got deprecated and removed. -
Added support for importing certificates discovered using CT Logs, in MTG CLM UI , see Certificate Import Methods
-
Added endpoint to allow certificate discovery using CT Logs, using crt.sh, a service provided by Sectigo®.
Version 5.2.0
Date: 2025-05-26
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Global configuration of TLS version has been removed, TLS version is configured automatically for each base URL instead. The system first attempts to establish TLS 1.3 connections and falls back to TLS 1.2, when necessary. This automatic negotiation ensures maximum security while also maintaining backwards compatibility. The change eliminates manual TLS configuration, while providing better performance through improved handshake process within TLS 1.3.
-
Implemented UI/UX improvements on role details page in MTG CLM UI.
-
Added link to CLI tool page to documentation page in MTG CLM UI. Users of the platform can now download directly from the dedicated section of the CLI page.
MTG SCEP Server
-
It now integrates with Microsoft Intune. It is possible to request certificates by configuring the SCEP-based connector at Microsoft Intune by simply providing the MTG SCEP URL and the Root CA. More information can be found here.
Version 5.1.0
Date: 2025-04-28
Compatibility Tests
MTG Certificate Lifecycle Manager
-
CLM roles were migrated from
realm
namespace toclient
namespace in Keycloak (you can find more details for client roles in official Keycloak documentation). As a result,CLM_
prefix is no longer required and was removed from existing CLM roles.
Version 5.0.2
Version 5.0.1
Date: 2025-04-03
Compatibility Tests
MTG Certificate Lifecycle Manager
-
During the migration to version 5.0.0, users with accounts created using Keycloak versions older than 24.0.0 may encounter errors. This version addresses the issue and prevents these errors from occurring.
-
In some cases, migrating to version 5.0.0 may take longer than expected, potentially causing errors. This version optimizes the process to prevent such issues.
-
In certain cases after upgrading to version 5.0.0, duplicate end entities in the same realm may still appear. This update enhances the process by seamlessly merging them.
Version 5.0.0
Date: 2025-03-26
Documentation Update from 30.06.2025
When integrating with Microsoft Active Directory set the Edit Mode option to |
Compatibility Tests
MTG Certificate Lifecycle Manager
-
While end entity strategies and aliases are a powerful mechanism for identifying and managing end entities across different use cases and protocols, they sometimes led to restrictions on certificate issuance for different policies. Additionally, choosing the proper strategy has been challenging for software users. As a result, all end entity strategy values apart from END_ENTITY_DATA_SET have been removed. Strategies are no longer visible in MTG CLM UI, and users can no longer select a strategy. This new method simplifies policy creation and reduces the number of declined certificate requests.
In systems prior to version 5.0.0, any number of end entities with the same dataset (CN, O, etc.) could exist in the same realm. This is not possible in version 5.0.0 or later. To resolve this conflict, the following actions are performed during migration at boot.
During the migration process, which includes the merging described above, a significant amount of log data is generated to improve system observability. This log data documents the actions taken and can be used for future reference or to configure client-side applications with the updated data. |
If two or more end entities with the same dataset, which are about to be merged, have passwords with the same policy, only one of those passwords is retained, and the others are deleted. |
The CLM-API is no longer backward compatible due to the removal of end entity strategies. If you are using any of the old values for end entity strategies, update your client-side applications accordingly. Only END_ENTITY_DATA_SET should be used moving forward. |
-
Removed endpoint that sets end entity alias.
-
End entities with same dataset is not allowed in same realm.
-
Removed endpoint that finds end entity based on data that are included in provided PKCS10 Request.
-
Stopped displaying Strategy field in policy and end entity pages in MTG CLM UI, since it always defaults to END_ENTITY_DATA_SET.
-
Stopped displaying Alias field in end entity pages in MTG CLM UI.
-
Removed pages related to end entity alias in MTG CLM UI.
-
Added documentation page in MTG CLM UI, with links for general CLM Documentation and CLM API Documentation.
-
Displayed current version at the bottom of the side menu in MTG CLM UI.
-
Included several UI/UX enhancements in MTG CLM UI.
-
Adjusted health endpoint to only return healthy status after the initialization of global, required parameters has been concluded.
-
Users and API client are stored exclusively in keycloak.
-
Because users and API client are stored exclusively in keycloak, synchronize operations are redundant and the corresponding endpoints in MTG CLM Server and actions in MTG CLM UI have been removed.
Because users and API client are stored exclusively in keycloak, their corresponding ID has also changed to the one provided by keycloak and the previously used one has been stored to keycloak for future reference. Additionally, principals' ID stored as entity metadata (created by, last modified by, archived by) have also been adjusted to the new ones. |
MTG SCEP Server
-
Some devices add quotation marks at the beginning and end of the challenge password. To support these devices, the software now removes them before evaluation.
-
It has been adjusted to accommodate the removal of end entity strategies.
MTG Revocation Info Server
-
It now supports publishing certificate revocation lists (CRL) to an LDAP directory. More information can be found here.
-
Configuration parameters have been renamed.
Configuration parameter tomcat.ajp.enable has been renamed to tomcat.ajp.enabled .
Configuration parameter tomcat.ajp.secret.required has been renamed to tomcat.ajp.secret-required .
|
-
It now supports extending the cache’s lifetime if CARA is unavailable. More information can be found here.
Version 4.10.0
Date: 2025-02-24
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Introducing endpoint that requests MAC verification using provided policy and any end entity with provided CommonName.
-
A new constraint has been added for unique realm names.
Rename any realm with a duplicate name and update any client-side applications that reference the old realm name, if necessary. |
-
The side menu has been restructured to improve user experience in the MTG CLM UI.
MTG CMP Server
-
New methods to identify an end entity have been introduced. More information can be found here.
Version 4.8.0
Date: 2024-12-23
Compatibility Tests
Third-Party
This version has been tested with the following versions of third-party software:
-
Keycloak 26.0
-
MariaDB 10.6
-
PostgreSQL 16
-
Oracle DB 19.3
ERS
-
CARA 2.7.4
PostgreSQL 12 is not supported anymore. |
Database migration during startup of MTG Certificate Lifecycle Manager may take longer than usual. If the application (e.g. logs) seems not responding, this is due to the migration. Please wait appropriately. The application DB user should have the rights to create functions and triggers. |
Deprecation of PDF Documentation
Providing documentation in the form of PDF files is deprecated for several ERS components. In the next version of MTG Certificate Lifecycle Manager Server, documentation will only be available at docs.mtg.de in HTML format. This change affects the following components:
|
Version 4.7.0
Date: 2024-11-25
Compatibility Tests
Version 4.6.0
Date: 2024-10-29
Compatibility Tests
Third-Party
This version has been tested with the following versions of third-party software:
-
Keycloak 25.0
-
MariaDB 10.6
-
PostgreSQL 12, 16
-
Oracle DB 19.3
ERS
-
CARA 2.7.2
Keycloak update. Some configuration parameters, especially the new hostname or proxy options, need to be adjusted, otherwise keycloak will not start or operate properly. Please consult the keycloak release notes and the official keycloak migration guides. |
MTG Certificate Lifecycle Manager
-
Endpoints
/admin/import-provider-clients
and/admin/import-provider-users
have been renamed to/admin/sync-provider-clients
and/admin/sync-provider-users
, respectively. Additionally, keycloak clients that have been removed using keycloak UI are now gracefully handled when/admin/sync-provider-clients
is invoked. -
Added endpoints that return the roles that provide access to a provided end entity, policy, certificate request or certificate and added section to display them in details page in MTG CLM UI.
-
Endpoint
/roles/users
got replaced with/roles/users/assign
and/roles/users/unassign
, and/roles/api-clients
with/roles/api-clients/assign
and/roles/api-clients/unassign
, respectively. Role actions were adjusted accordingly in MTG CLM UI. -
Added options in role details page to assign/unassign role to multiple users/API clients in MTG CLM UI.
Version 4.5.0
Version 4.4.0
Date: 2024-09-27
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Introduced roles which substitute permissions set directly to user or API clients. In this version permissions are assigned to roles and roles are assigned to users or API clients. See Appendix A for more details about the migration from the previous version.
-
Introduced realm default roles. See Appendix A for more details.
-
Added buttons in API client details page for resetting secret and deleting API client in MTG CLM UI.
-
Deleted deprecated and unused permissions.
-
CockroachDB is not supported anymore.
Version 4.3.0
Version 4.2.1
Version 4.2.0
Date: 2024-07-19
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Added functionality to be able to configure the content of a password, for end entities, API clients, and private keys.
-
Updates in MTG CLM UI regarding the PSW - Public CAs certificate provider, to increase usability and user experience.
-
Fixed an issue when importing certificates with the same common name within the same PEM file.
-
Fixed an issue in MTG CLM UI that prevented to set the active crypto module.
-
Added better error message when an already requested certificate is requested again.
-
Updated bom files to schema version 1.5.
Version 4.1.0
Version 4.0.0
Date: 2024-06-06
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Introduced Crypto Modules used for encryption, decryption, and random number generation. See Migration of 3.10.0 to 4.0.0.
-
Introduced new configuration parameters.
-
Extended HttpClient configurability to prevent memory leaks.
-
Added de-duplication of alerts in MTG CLM UI.
-
The search filter in users table is not pre-filled by default, instead this behaviour can be configured in MTG CLM UI.
-
Introduced
allowWildcard
parameter in CLM Policies to allow/restrict wildcards certificates. -
Refactored statistics in new, separate API Endpoints.
-
Performance enhancement to Dashboard page in MTG CLM UI.
Crypto Modules is a significant change in the MTG CLM. Please become familiar with the various aspects by consulting the documentation. |
MTG EST Server
-
Introduced new configuration parameters.
-
Extended HttpClient configurability to prevent memory leaks.
MTG SCEP Server
-
Introduced new configuration parameters.
-
Extended HttpClient configurability to prevent memory leaks.
MTG AEC Server
-
Introduced new configuration parameters.
-
Extended HttpClient configurability to prevent memory leaks.
MTG CMP Server
-
Introduced new configuration parameters.
-
Extended HttpClient configurability to prevent memory leaks.
Version 3.10.0
Version 3.9.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Fixed issue during certificate creation of more than 10 end entities. Added pagination at bulk creation.
-
When certificates are imported over MTG CLM UI, then they are immediately created if the corresponding certificate request is in status
APPROVED
. -
Renamed internal directory name of response artifact when multiple certificates are requested.
-
Added the X.509 certificate in the response artifact when multiple certificates with server-generated key are requested.
Version 3.8.0
This version contains updates in several third-party libraries. The opening of ephemeral UDP ports for supporting DNS name resolution has been documented.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Added a new field to supply the name of the CA in a Microsoft CA certificate provider. This accelerates access to services of Microsoft CA.
-
Read access for CAs is not restricted to users with administrator rights anymore. Any authenticated user has read access.
-
Latest audit events are only fetched for selected realm.
-
The search filter in users table is pre-filled with the ID of the logged-in user. Additionally, users are not fetched after each keystroke, instead they are fetched after pressing Enter.
Version 3.7.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Added new certificate provider
Microsoft CA
. -
Download certificate key pair/private key is hidden when not available in MTG CLM UI.
-
Policies' allowed cryptographic algorithms are restricted by selected certificate provider’s type.
-
Renamed some labels related to certificate providers in MTG CLM UI.
-
Fixed an issue related to self-signed certificates batch creation.
Version 3.6.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Fixed certificates' search by expiration date.
-
Dashboard’s
Certificates expiring shortly
~View All
in MTG CLM UI navigates to all realm’s certificates expiring shortly instead of all certificates of the realm. -
Add search for certificate request based on end entity’s CN.
Version 3.5.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Server responses do not contain user provided secrets and sensitive data.
-
Thorough refactor of permission mechanism to increase performance of the application.
-
Added option to download certificate’s private key in
PEM
format. -
Added column
Created Date
on certificate requests table in MTG CLM UI. -
Fixed issues regarding sorting in MTG CLM UI.
-
Search for end entities when the policy is provided in search filter have been refactored. Now, all end entities are returned with an additional property. This property indicates whether the end entity violates or not the constraints posed be the end entity rules of the policy. In the MTG CLM UI, if the end entity violates the rules then it is displayed, but it cannot be selected.
Version 3.4.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Updated API endpoint that issues certificates from multiple certificate requests (
api/v1/certificates/cert-requests
) to handle all certificate requests (PKCS10, Public Key, Server Generated, Self-signed). -
Updated API endpoint that issues certificates from multiple certificate requests (
api/v1/certificates/cert-requests
), added optional query parameteromitArtifacts
with default valuefalse
. If set totrue
, then no artifacts are included in server response. -
Updated API endpoint that issues certificates from multiple certificate requests (
api/v1/certificates/cert-requests
), artifacts are not flat into the zip file, but in a directory named after the corresponding certificate request ID.
MTG EST Server
-
The URLs that use the policy ID are changed, to be consistent to the RFC specification.
Update URLs at the EST client side that use a policy. |
MTG SCEP Server
-
Added new application parameter to configure whether the complete chain is included in the SCEP-SuccessResponse.
-
Added new application parameter to configure whether the complete chain is included in the GetCACert response.
Version 3.3.0
This version contains updates in several third-party libraries.
Compatibility Tests
MTG Certificate Lifecycle Manager
-
Added new billing endpoints for active end entities.
-
Added Edwards-curve Digital Signature Algorithm (EdDSA) support for PKCS10, public key, self-signed and server generated certificates.
-
Added signed audit logging for calls to the API.
Older versions
For versions older than version 3.2.1 see the respective release notes of each component.
Appendix A: Migration 4.3.0 to 4.4.0
Until version 4.3.0, each security identity was correlated with a set of permissions.
In version 4.4.0 a role is correlated with a set of permissions.
When CLM starts it migrates data.
You need to make sure that keycloak is running.
During migration, a single role is created for each unique permission set.
This role is associated to corresponding security identities.
If two or more security identities have exact the same permissions set, then a single role is added to CLM and is associated with the security identities.
The migrated roles have the name CLM_MIGRATED_ROLE_N
, where N is an increasing number.
You may rename the migrated roles to better reflect your use case.
If a permission set contains the ADMIN
global permission, then the default CLM_ADMIN
role is associated with the security identity.
Regardless of the state of the CLM application prior to migration, the roles CLM_ADMIN
and KC_ADMIN
will be correctly configured and stored to Keycloak application after migration completes.
For each realm a new default role is also created. This default role has as default the global permissions APICLIENTS_READ
, USERS_READ
and in the realm the permissions FULL_READ
, ENDENTITIES_CREATE
,POLICIES_CERTS_CREATE
, POLICIES_CERTS_REVOKE
.
This role is automatically assigned to API clients that are going to be created in the future.
Older API clients are not assigned to this role.
They are migrated as described above.
You can assign to them this new role over the application.
Migration of 3.10.0 to 4.0.0
Before starting CLM 4.0.0 for the first time you should configure CARA to support the new functions of CLM.
Permissions
Following permissions for the CLM application should be added to CARA.
-
GenerateKeyPairPermission (48)
-
GenerateRandomPermission (95)
Root certificate for encryption
Since version 4.0.0, new key pairs of end entities are never stored in CARA but in the CLM.
In order to store them encrypted in the CLM database, a root certificate used exclusively for encryption must be created in CARA.
First you must create a root CA with an RSA key pair.
You may choose an HSM-based or software-based device to generate the key pair for this root.
You may also choose an appropriate RSA key size that satisfies your security policy.
When the root CA certificate is created you must take the ID of this CA certificate and configure it to a new configuration property for the CLM application.
For this, go to CARA UI and choose VCA ~ Choose correct Frontend ~ Frontends ~ Konfigurieren ~ Choose correct application
.
Then, place the new property clm.encryption.root.cert.id
with value the ID of the newly created CA.
If the private key is deleted/destroyed from the HSM/Database of CARA, then it is not possible to restore the private keys stored in CLM. |
Automatic creation of crypto module
When CLM starts for the first time, it checks if the configuration property crypto.module.builtin.default
is set to true.
It also checks if the built-in provider password, provided in the configuration property crypto.module.builtin.password
, is non-empty.
Then, a built-in crypto module is configured and is set as the active crypto module of CLM.
Otherwise, if there is a CARA certificate provider configured in CLM, then a CARA-based crypto module is configured and is set as the active crypto module of CLM.
Finally, if there is no CARA provider present but the password is present, then a built-in crypto module is configured and is set as the active crypto module of CLM.
As long as no active crypto module exists (or is misconfigured), it is not possible to create key pairs in CLM. |