Release Notes

Introduction

MTG Certificate Lifecycle Manager Server is a product suite with several components. This section contains the release notes for the following components:

  • MTG Certificate Lifecycle Manager

  • MTG CMP Server

  • MTG EST Server

  • MTG SCEP Server

  • MTG ACME Server

  • MTG ERS CLI Client

  • MTG AEC Server

  • MTG Revocation Info Server

For MTG KMS refer to the respective release notes page.

Version 6.2.0

Date: 2025-08-25

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

MTG CLM’s 1st version of 2026 will only be compatible with MariaDB 11.4. All versions before will still support MariaDB 10.6 exclusively.

ERS

  • CARA 2.8.1

MTG CLM Documentation

  • MTG CLM Documentation just turned interactive! Within the refactored Introduction and Guides & How Tos sections, you will now find numerous and action-packed widgets. Our newfound and disruptive approach serves as a unique way to learn more about hidden MTG CLM features and to engage directly with enhanced documentation content. The list of pages containing such widgets is bound to continue expanding in future releases.

MTG Certificate Lifecycle Manager

  • Added new certificate provider PCSP.

  • Added support for MS Teams notifications. For more instructions on how to integrate, refer to this page.

  • Fixed evaluation of end-user permissions for displaying edit button on CA details page in MTG CLM UI.

MTG CMP, EST, SCEP, ACME Server & Autoenrollment Connector

  • During the connection to CLM, Keycloak, and OpenSearch server, the system now checks whether TLSv1.3 is supported. If it is, TLSv1.3 is used.

MTG ERS CLI Client

  • During the connection to CLM and Keycloak the system now checks whether TLSv1.3 is supported. If it is, TLSv1.3 is used.

  • Added support for RA mode, enabling the use of certificate request command without requiring prior end entity configuration. For more information, refer to the dedicated guide section.

Certificate request command is no longer backwards compatible with versions prior to 6.2.0. Make sure to adjust any client-side scripts that are configured for older versions of MTG ERS CLI CLIENT.

CARA Revocation Info Server (RIS)

  • During the connection to CARA and OpenSearch server, the system now checks whether TLSv1.3 is supported. If it is, TLSv1.3 is used.

Version 6.1.0

Date: 2025-07-28

"mtg-java17" package is deprecated and not provided for the following supported Linux distributions anymore:

Red Hat Enterprise Linux 8

Red Hat Enterprise Linux 9

openSUSE Leap 15.5

openSUSE Leap 15.6

Ubuntu 20.04 LTS

Ubuntu 22.04 LTS

Ubuntu 24.04 LTS

Please follow our MTG Java Migration Instructions on how to install and use Adoptium Temurin JRE 17. It is strongly suggested to migrate to Adoptium Temurin JRE 17 as soon as possible, so your systems receive the security updates of Java 17.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

Known Issues

In Keycloak versions 26.2.0 to 26.3.1 it is not possible to use TLSv1.3 with MariaDB.

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • Certificate validity is now configured at the policy level. All certificates issued with a given policy inherit its single validity period. Request-level validity settings are no longer used.

    • New value CA_DECIDES instructs the provider to set validity.

    • Verify each policy’s validity period after upgrade; existing requests continue to work but will use the policy’s value.

    Migration Impact: Certificate validity is now controlled exclusively through policy configuration, providing more predictable and manageable certificate lifecycle control.

In systems prior to 6.1.0, policies contain one or more validity periods, which signify the allowed values that can be selected when requesting a certificate. During the migration process, the policy validity takes the value of the longest allowed value previously configured, or CA_DECIDES in case the configured provider does not support configurable certificate validity. For example : Ιf the previous policy had an allowed validity of 3 and 6 months, then a new validity of 6 months is set. If however all validities were set, then two years is set as the preferred validity.
Not all providers support configurable validity period for the certificates they issue; providers of type MTG_CARA and GLOBAL_SIGN allow all validities, the rest of them, MS_NDES, MSCA and PSW_PUBLIC_CAS, allow only CA_DECIDES.
The CLM-API representations for policies and certificate requests have changed due to moving the requested certificate validity from certificate request to policy. If you are using any of these representations, update your client-side applications accordingly.
  • Added new variable placeholders in notifications templates that allow fast navigation to certificate and certificate request details page.

  • Included minor performance enhancements.

  • To effectively disable implicit notifications, users can now select an empty list of implicit events in MTG CLM UI.

  • Included several UI/UX enhancements in MTG CLM UI.

  • Fixed bug on refreshing table pages on MTG CLM UI.

MTG SCEP Server

  • Changed the default value of the configuration parameter scep.getcacert.include.cachain.onmessage from true to false.

If you still need to keep the old behavior, set the value explicitly to true.

MTG ERS CLI Client

  • Option --valid-for of create certificate command is now redundant and has been removed, due to validity requested from providers being moved from certificate request to policy.

Version 6.0.0

Date: 2025-06-30

"mtg-java17" package is deprecated and not provided for the following supported Linux distributions anymore:

Red Hat Enterprise Linux 8

Red Hat Enterprise Linux 9

openSUSE Leap 15.5

openSUSE Leap 15.6

Ubuntu 20.04 LTS

Ubuntu 22.04 LTS

Ubuntu 24.04 LTS

Please follow our MTG Java Migration Instructions on how to install and use Adoptium Temurin JRE 17. It is strongly suggested to migrate to Adoptium Temurin JRE 17 as soon as possible, so your systems receive the security updates of Java 17.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

Known Issues

In Keycloak versions 26.2.0 to 26.2.4, and possibly in future versions as well (as of the time of this writing), it is not possible to use TLSv1.3 with MariaDB.

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • Introduced a new, flexible and highly configurable notifications mechanism. Using channel types, event types, templates, contacts and subscriptions, the user has fine-grained control over the notifications they receive. For more information, see Notifications.

  • Added new configuration parameters, see Notification Related Properties.

  • The configuration parameter frontend.base.url is now mandatory.

  • Removed configuration parameter: notify.cert.expiring.time.intervals.

  • Due to the new notifications mechanism, the mailing list entities and the configurations EXPIRING_CERT_NOTIFICATION_INTERVAL_DAYS and MAIL_SIGNATURE got deprecated and removed.

  • Added support for importing certificates discovered using CT Logs, in MTG CLM UI , see Certificate Import Methods

  • Added endpoint to allow certificate discovery using CT Logs, using crt.sh, a service provided by Sectigo®.

Version 5.2.0

Date: 2025-05-26

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

Known Issues

In Keycloak versions 26.2.0 to 26.2.4, and possibly in future versions as well (as of the time of this writing), it is not possible to use TLSv1.3 with MariaDB.

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • Global configuration of TLS version has been removed, TLS version is configured automatically for each base URL instead. The system first attempts to establish TLS 1.3 connections and falls back to TLS 1.2, when necessary. This automatic negotiation ensures maximum security while also maintaining backwards compatibility. The change eliminates manual TLS configuration, while providing better performance through improved handshake process within TLS 1.3.

  • Implemented UI/UX improvements on role details page in MTG CLM UI.

  • Added link to CLI tool page to documentation page in MTG CLM UI. Users of the platform can now download directly from the dedicated section of the CLI page.

MTG SCEP Server

  • It now integrates with Microsoft Intune. It is possible to request certificates by configuring the SCEP-based connector at Microsoft Intune by simply providing the MTG SCEP URL and the Root CA. More information can be found here.

MTG Revocation Info Server

  • It now supports OCSP GET requests. This is useful in lightweight environments.

Version 5.1.0

Date: 2025-04-28

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • CLM roles were migrated from realm namespace to client namespace in Keycloak (you can find more details for client roles in official Keycloak documentation). As a result, CLM_ prefix is no longer required and was removed from existing CLM roles.

MTG ACME Server

  • Fixed an issue where existing end entities were unable to receive certificates.

  • Added more descriptive error messages when requesting certificate using ACME.

Version 5.0.2

Date: 2025-04-07

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • In some cases, migrating to version 5.0.1 still may take longer than expected, potentially causing errors. This version optimizes the process to prevent such issues.

Version 5.0.1

Date: 2025-04-03

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • During the migration to version 5.0.0, users with accounts created using Keycloak versions older than 24.0.0 may encounter errors. This version addresses the issue and prevents these errors from occurring.

  • In some cases, migrating to version 5.0.0 may take longer than expected, potentially causing errors. This version optimizes the process to prevent such issues.

  • In certain cases after upgrading to version 5.0.0, duplicate end entities in the same realm may still appear. This update enhances the process by seamlessly merging them.

MTG CMP Server

  • It now supports a CertConfirmContent with an empty statusInfo.

Version 5.0.0

Date: 2025-03-26

Documentation Update from 30.06.2025

When integrating with Microsoft Active Directory set the Edit Mode option to UNSYNCED instead of the previous READ ONLY attribute. Please refer here to find out more.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

Known Issues

In Keycloak versions 26.1.2 and 26.1.3 users will experience issues after renaming a role. As a workaround, either restart the Keycloak server after renaming the role or use Keycloak version 26.1.1 or earlier / version 26.1.4 or later.

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • While end entity strategies and aliases are a powerful mechanism for identifying and managing end entities across different use cases and protocols, they sometimes led to restrictions on certificate issuance for different policies. Additionally, choosing the proper strategy has been challenging for software users. As a result, all end entity strategy values apart from END_ENTITY_DATA_SET have been removed. Strategies are no longer visible in MTG CLM UI, and users can no longer select a strategy. This new method simplifies policy creation and reduces the number of declined certificate requests.

In systems prior to version 5.0.0, any number of end entities with the same dataset (CN, O, etc.) could exist in the same realm. This is not possible in version 5.0.0 or later. To resolve this conflict, the following actions are performed during migration at boot.

  1. End entities with exactly the same dataset are merged into a single end entity. This remaining end entity is one of the original entities with the same dataset. For example, if three end entities share the same dataset, they are merged into one of them.

  2. All related data (e.g., certificates, certificate requests, etc.) from the merged end entities is transferred to the consolidated end entity. In our example, the data from the two other entities is linked to the remaining entity.

  3. The remaining end entities are deleted. In our example, the two redundant entities are removed.

During the migration process, which includes the merging described above, a significant amount of log data is generated to improve system observability. This log data documents the actions taken and can be used for future reference or to configure client-side applications with the updated data.

If two or more end entities with the same dataset, which are about to be merged, have passwords with the same policy, only one of those passwords is retained, and the others are deleted.
The CLM-API is no longer backward compatible due to the removal of end entity strategies. If you are using any of the old values for end entity strategies, update your client-side applications accordingly. Only END_ENTITY_DATA_SET should be used moving forward.
  • Removed endpoint that sets end entity alias.

  • End entities with same dataset is not allowed in same realm.

  • Removed endpoint that finds end entity based on data that are included in provided PKCS10 Request.

  • Stopped displaying Strategy field in policy and end entity pages in MTG CLM UI, since it always defaults to END_ENTITY_DATA_SET.

  • Stopped displaying Alias field in end entity pages in MTG CLM UI.

  • Removed pages related to end entity alias in MTG CLM UI.

  • Added documentation page in MTG CLM UI, with links for general CLM Documentation and CLM API Documentation.

  • Displayed current version at the bottom of the side menu in MTG CLM UI.

  • Included several UI/UX enhancements in MTG CLM UI.

  • Adjusted health endpoint to only return healthy status after the initialization of global, required parameters has been concluded.

  • Users and API client are stored exclusively in keycloak.

  • Because users and API client are stored exclusively in keycloak, synchronize operations are redundant and the corresponding endpoints in MTG CLM Server and actions in MTG CLM UI have been removed.

Because users and API client are stored exclusively in keycloak, their corresponding ID has also changed to the one provided by keycloak and the previously used one has been stored to keycloak for future reference. Additionally, principals' ID stored as entity metadata (created by, last modified by, archived by) have also been adjusted to the new ones.

MTG ACME Server

  • It has been adjusted to accommodate the removal of end entity strategies.

MTG EST Server

  • It has been adjusted to accommodate the removal of end entity strategies.

MTG SCEP Server

  • Some devices add quotation marks at the beginning and end of the challenge password. To support these devices, the software now removes them before evaluation.

  • It has been adjusted to accommodate the removal of end entity strategies.

MTG Revocation Info Server

  • It now supports publishing certificate revocation lists (CRL) to an LDAP directory. More information can be found here.

  • Configuration parameters have been renamed.

Configuration parameter tomcat.ajp.enable has been renamed to tomcat.ajp.enabled. Configuration parameter tomcat.ajp.secret.required has been renamed to tomcat.ajp.secret-required.
  • It now supports extending the cache’s lifetime if CARA is unavailable. More information can be found here.

Version 4.10.0

Date: 2025-02-24

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

ERS

  • CARA 2.7.7

MTG Certificate Lifecycle Manager

  • Introducing endpoint that requests MAC verification using provided policy and any end entity with provided CommonName.

  • A new constraint has been added for unique realm names.

Rename any realm with a duplicate name and update any client-side applications that reference the old realm name, if necessary.
  • The side menu has been restructured to improve user experience in the MTG CLM UI.

MTG CMP Server

  • New methods to identify an end entity have been introduced. More information can be found here.

Version 4.9.0

Date: 2025-01-28

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 26

  • MariaDB 10.6

  • PostgreSQL 16

  • Oracle DB 19.3

ERS

  • CARA 2.7.6

MTG Revocation Info Server

  • The server starts up independently of whether CARA is available.

Version 4.8.0

Date: 2024-12-23

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 26.0

  • MariaDB 10.6

  • PostgreSQL 16

  • Oracle DB 19.3

ERS

  • CARA 2.7.4

PostgreSQL 12 is not supported anymore.
Database migration during startup of MTG Certificate Lifecycle Manager may take longer than usual. If the application (e.g. logs) seems not responding, this is due to the migration. Please wait appropriately. The application DB user should have the rights to create functions and triggers.
Deprecation of PDF Documentation

Providing documentation in the form of PDF files is deprecated for several ERS components. In the next version of MTG Certificate Lifecycle Manager Server, documentation will only be available at docs.mtg.de in HTML format.

This change affects the following components:

  • MTG Certificate Lifecycle Manager

  • MTG CMP Server

  • MTG EST Server

  • MTG SCEP Server

  • MTG ACME Server

  • MTG ERS CLI Client

  • MTG AEC Server

  • MTG Revocation Info Server

MTG Certificate Lifecycle Manager

  • Several performance enhancements regarding the dashboards have been implemented.

  • The Realm Data section in dashboard has been removed in MTG CLM UI. Also, the corresponding endpoint has been removed from MTG CLM.

  • Resolved issues in dashboard of MTG CLM UI.

MTG AEC Server

  • Several performance enhancements have been realized.

MTG CMP Server

  • Checking revocation of RA-mode certificate.

MTG EST Server

  • The JSON format of error messages has been changed to simple text.

Version 4.7.0

Date: 2024-11-25

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 26.0

  • MariaDB 10.6

  • PostgreSQL 12, 16

  • Oracle DB 19.3

ERS

  • CARA 2.7.2

Keycloak update.

MTG Certificate Lifecycle Manager

  • Resolved an issue with preset search values when the lazy user search feature is enabled in MTG CLM UI.

  • Added a button to the role details page in MTG CLM UI to navigate to the role details in the Keycloak UI.

MTG AEC Server

  • Attribute mail of AD is provided as property in the end entity.

MTG EST Server

  • Checking revocation of client certificate, additionally in the authorization layer.

Version 4.6.0

Date: 2024-10-29

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 25.0

  • MariaDB 10.6

  • PostgreSQL 12, 16

  • Oracle DB 19.3

ERS

  • CARA 2.7.2

Keycloak update. Some configuration parameters, especially the new hostname or proxy options, need to be adjusted, otherwise keycloak will not start or operate properly. Please consult the keycloak release notes and the official keycloak migration guides.

MTG Certificate Lifecycle Manager

  • Endpoints /admin/import-provider-clients and /admin/import-provider-users have been renamed to /admin/sync-provider-clients and /admin/sync-provider-users, respectively. Additionally, keycloak clients that have been removed using keycloak UI are now gracefully handled when /admin/sync-provider-clients is invoked.

  • Added endpoints that return the roles that provide access to a provided end entity, policy, certificate request or certificate and added section to display them in details page in MTG CLM UI.

  • Endpoint /roles/users got replaced with /roles/users/assign and /roles/users/unassign, and /roles/api-clients with /roles/api-clients/assign and /roles/api-clients/unassign, respectively. Role actions were adjusted accordingly in MTG CLM UI.

  • Added options in role details page to assign/unassign role to multiple users/API clients in MTG CLM UI.

Version 4.5.0

Date: 2024-10-10

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.7.2

MTG Certificate Lifecycle Manager

  • Naming method for default realm role has changed. It uses the name of the realm instead of the ID.

Version 4.4.0

Date: 2024-09-27

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.7.1

MTG Certificate Lifecycle Manager

  • Introduced roles which substitute permissions set directly to user or API clients. In this version permissions are assigned to roles and roles are assigned to users or API clients. See Appendix A for more details about the migration from the previous version.

  • Introduced realm default roles. See Appendix A for more details.

  • Added buttons in API client details page for resetting secret and deleting API client in MTG CLM UI.

  • Deleted deprecated and unused permissions.

  • CockroachDB is not supported anymore.

MTG SCEP Server

  • Added support for decrypting the client message with an RA certificate/private key rather than that of the CA. Also, the response can be signed with the RA certificate/private key.

Version 4.3.0

Date: 2024-08-23

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.6.0

MTG Certificate Lifecycle Manager

  • The ScepPermission must be set at the application role of the CLM application in CARA, if it is not already set.

  • Several performance enhancements have been realized.

  • The Java built-in HTTP client is used as default instead of the Reactor Netty HTTP client.

Version 4.2.1

Date: 2024-07-30

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.6.0

MTG Certificate Lifecycle Manager

  • Added option to opt-in java http client instead of reactor netty http client.

Version 4.2.0

Date: 2024-07-19

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.6.0

MTG Certificate Lifecycle Manager

  • Added functionality to be able to configure the content of a password, for end entities, API clients, and private keys.

  • Updates in MTG CLM UI regarding the PSW - Public CAs certificate provider, to increase usability and user experience.

  • Fixed an issue when importing certificates with the same common name within the same PEM file.

  • Fixed an issue in MTG CLM UI that prevented to set the active crypto module.

  • Added better error message when an already requested certificate is requested again.

  • Updated bom files to schema version 1.5.

MTG EST Server

  • Updated bom files to schema version 1.5.

MTG SCEP Server

  • SCEP requests can be logged. This is configurable.

  • Updated bom files to schema version 1.5.

MTG AEC Server

  • Updated bom files to schema version 1.5.

MTG CMP Server

  • Updated bom files to schema version 1.5.

MTG ERS CLI Client

  • Updated bom files to schema version 1.5.

MTG Revocation Info Server

  • Updated bom files to schema version 1.5.

Version 4.1.0

Date: 2024-06-21

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.6.0

MTG Certificate Lifecycle Manager

  • Added new certificate provider PSW - Public CAs.

  • Removed UI-blocking elements in Dashboard page in MTG CLM UI.

Version 4.0.0

Date: 2024-06-06

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

The following Linux distributions are not supported anymore: Red Hat Enterprise Linux 7 and openSUSE Leap 15.4.

ERS

  • CARA 2.6.0

CLM 4.0 is compatible only with CARA 2.6.0.

MTG Certificate Lifecycle Manager

  • Introduced Crypto Modules used for encryption, decryption, and random number generation. See Migration of 3.10.0 to 4.0.0.

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

  • Added de-duplication of alerts in MTG CLM UI.

  • The search filter in users table is not pre-filled by default, instead this behaviour can be configured in MTG CLM UI.

  • Introduced allowWildcard parameter in CLM Policies to allow/restrict wildcards certificates.

  • Refactored statistics in new, separate API Endpoints.

  • Performance enhancement to Dashboard page in MTG CLM UI.

Crypto Modules is a significant change in the MTG CLM. Please become familiar with the various aspects by consulting the documentation.

MTG EST Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

MTG SCEP Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

MTG AEC Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

MTG CMP Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

MTG ACME Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

MTG Revocation Info Server

  • Introduced new configuration parameters.

  • Extended HttpClient configurability to prevent memory leaks.

Version 3.10.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 24.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

Keycloak update.

ERS

  • CARA 2.5.7

MTG Certificate Lifecycle Manager

  • Re-organized cryptographic restrictions section in policy creation/editing.

  • Issue with retrieving the certificate providers for users with non-admin permissions has been fixed.

  • Issue with empty subject distinguished name in certificate fixed.

Version 3.9.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 23.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.5.7

MTG Certificate Lifecycle Manager

  • Fixed issue during certificate creation of more than 10 end entities. Added pagination at bulk creation.

  • When certificates are imported over MTG CLM UI, then they are immediately created if the corresponding certificate request is in status APPROVED.

  • Renamed internal directory name of response artifact when multiple certificates are requested.

  • Added the X.509 certificate in the response artifact when multiple certificates with server-generated key are requested.

MTG SCEP Server

  • Additional data contained in the extensions of the PKCS#10 request can be used for issuing the certificate.

  • The shared.secret configuration parameter can be set also as a hexadecimal representation of the SHA-256 hash output of the plain value.

Version 3.8.0

This version contains updates in several third-party libraries. The opening of ephemeral UDP ports for supporting DNS name resolution has been documented.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 23.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.5.7

MTG Certificate Lifecycle Manager

  • Added a new field to supply the name of the CA in a Microsoft CA certificate provider. This accelerates access to services of Microsoft CA.

  • Read access for CAs is not restricted to users with administrator rights anymore. Any authenticated user has read access.

  • Latest audit events are only fetched for selected realm.

  • The search filter in users table is pre-filled with the ID of the logged-in user. Additionally, users are not fetched after each keystroke, instead they are fetched after pressing Enter.

MTG AEC Server

  • Extended mapping file to support permissions for the use of a template to issue a certificate.

Version 3.7.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 23.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.5.7

MTG Certificate Lifecycle Manager

  • Added new certificate provider Microsoft CA.

  • Download certificate key pair/private key is hidden when not available in MTG CLM UI.

  • Policies' allowed cryptographic algorithms are restricted by selected certificate provider’s type.

  • Renamed some labels related to certificate providers in MTG CLM UI.

  • Fixed an issue related to self-signed certificates batch creation.

Version 3.6.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 23.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.5.6

MTG Certificate Lifecycle Manager

  • Fixed certificates' search by expiration date.

  • Dashboard’s Certificates expiring shortly ~ View All in MTG CLM UI navigates to all realm’s certificates expiring shortly instead of all certificates of the realm.

  • Add search for certificate request based on end entity’s CN.

MTG EST Server

  • Added support for HTTP-based reverse proxying. AJP is still supported.

  • Configuration parameters have been added and one parameter has been renamed. Please consult the administration manual.

Configuration parameter tomcat.ajp.enable has been renamed to tomcat.ajp.enabled.

MTG ACME Server

  • Added support for HTTP-based reverse proxying. AJP is still supported.

  • Configuration parameter has been renamed. Please consult the administration manual.

Configuration parameter tomcat.ajp.enable has been renamed to tomcat.ajp.enabled.

Version 3.5.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 23.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

Keycloak update.

ERS

  • CARA 2.5.6

MTG Certificate Lifecycle Manager

  • Server responses do not contain user provided secrets and sensitive data.

  • Thorough refactor of permission mechanism to increase performance of the application.

  • Added option to download certificate’s private key in PEM format.

  • Added column Created Date on certificate requests table in MTG CLM UI.

  • Fixed issues regarding sorting in MTG CLM UI.

  • Search for end entities when the policy is provided in search filter have been refactored. Now, all end entities are returned with an additional property. This property indicates whether the end entity violates or not the constraints posed be the end entity rules of the policy. In the MTG CLM UI, if the end entity violates the rules then it is displayed, but it cannot be selected.

Version 3.4.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 22.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

ERS

  • CARA 2.5.2

MTG Certificate Lifecycle Manager

  • Updated API endpoint that issues certificates from multiple certificate requests (api/v1/certificates/cert-requests) to handle all certificate requests (PKCS10, Public Key, Server Generated, Self-signed).

  • Updated API endpoint that issues certificates from multiple certificate requests (api/v1/certificates/cert-requests), added optional query parameter omitArtifacts with default value false. If set to true, then no artifacts are included in server response.

  • Updated API endpoint that issues certificates from multiple certificate requests (api/v1/certificates/cert-requests), artifacts are not flat into the zip file, but in a directory named after the corresponding certificate request ID.

MTG EST Server

  • The URLs that use the policy ID are changed, to be consistent to the RFC specification.

Update URLs at the EST client side that use a policy.

MTG SCEP Server

  • Added new application parameter to configure whether the complete chain is included in the SCEP-SuccessResponse.

  • Added new application parameter to configure whether the complete chain is included in the GetCACert response.

MTG ACME Server

  • Fine-granular database transaction handling in challenge requests. This mitigates issues with deadlocks in MariaDB.

MTG AEC Server

  • If the AD account is a computer, then the FQDN is set as CN.

MTG ERS CLI Client

  • Added Edwards-curve Digital Signature Algorithm (EdDSA) support for certificate requests.

Version 3.3.0

This version contains updates in several third-party libraries.

Compatibility Tests

Third-Party

This version has been tested with the following versions of third-party software:

  • Keycloak 22.0

  • MariaDB 10.6

  • PostgreSQL 12

  • Oracle DB 19.3

Keycloak update.

ERS

  • CARA 2.5.2

MTG Certificate Lifecycle Manager

  • Added new billing endpoints for active end entities.

  • Added Edwards-curve Digital Signature Algorithm (EdDSA) support for PKCS10, public key, self-signed and server generated certificates.

  • Added signed audit logging for calls to the API.

MTG AEC Server

  • Added policy and template handling to drop requirement on Windows Microsoft CA, CEP, and CES.

  • New parameter allows to configure the SASL protection modes.

MTG ACME Server

  • More specific instead of a generic error on policy violation is sent to the client.

  • Default value has been provided for one configuration property.

Older versions

For versions older than version 3.2.1 see the respective release notes of each component.

Appendix A: Migration 4.3.0 to 4.4.0

Until version 4.3.0, each security identity was correlated with a set of permissions. In version 4.4.0 a role is correlated with a set of permissions. When CLM starts it migrates data. You need to make sure that keycloak is running. During migration, a single role is created for each unique permission set. This role is associated to corresponding security identities. If two or more security identities have exact the same permissions set, then a single role is added to CLM and is associated with the security identities. The migrated roles have the name CLM_MIGRATED_ROLE_N, where N is an increasing number. You may rename the migrated roles to better reflect your use case. If a permission set contains the ADMIN global permission, then the default CLM_ADMIN role is associated with the security identity. Regardless of the state of the CLM application prior to migration, the roles CLM_ADMIN and KC_ADMIN will be correctly configured and stored to Keycloak application after migration completes.

For each realm a new default role is also created. This default role has as default the global permissions APICLIENTS_READ, USERS_READ and in the realm the permissions FULL_READ, ENDENTITIES_CREATE,POLICIES_CERTS_CREATE, POLICIES_CERTS_REVOKE. This role is automatically assigned to API clients that are going to be created in the future. Older API clients are not assigned to this role. They are migrated as described above. You can assign to them this new role over the application.

Migration of 3.10.0 to 4.0.0

Before starting CLM 4.0.0 for the first time you should configure CARA to support the new functions of CLM.

Permissions

Following permissions for the CLM application should be added to CARA.

  1. GenerateKeyPairPermission (48)

  2. GenerateRandomPermission (95)

Root certificate for encryption

Since version 4.0.0, new key pairs of end entities are never stored in CARA but in the CLM. In order to store them encrypted in the CLM database, a root certificate used exclusively for encryption must be created in CARA. First you must create a root CA with an RSA key pair. You may choose an HSM-based or software-based device to generate the key pair for this root. You may also choose an appropriate RSA key size that satisfies your security policy. When the root CA certificate is created you must take the ID of this CA certificate and configure it to a new configuration property for the CLM application. For this, go to CARA UI and choose VCA ~ Choose correct Frontend ~ Frontends ~ Konfigurieren ~ Choose correct application. Then, place the new property clm.encryption.root.cert.id with value the ID of the newly created CA.

If the private key is deleted/destroyed from the HSM/Database of CARA, then it is not possible to restore the private keys stored in CLM.

Automatic creation of crypto module

When CLM starts for the first time, it checks if the configuration property crypto.module.builtin.default is set to true. It also checks if the built-in provider password, provided in the configuration property crypto.module.builtin.password, is non-empty. Then, a built-in crypto module is configured and is set as the active crypto module of CLM. Otherwise, if there is a CARA certificate provider configured in CLM, then a CARA-based crypto module is configured and is set as the active crypto module of CLM. Finally, if there is no CARA provider present but the password is present, then a built-in crypto module is configured and is set as the active crypto module of CLM.

As long as no active crypto module exists (or is misconfigured), it is not possible to create key pairs in CLM.