Release 3.5.1170

Updated: 23 Oct 2019
Release date: 25 Sep 2019
Created: 22 Oct 2019

Contents

New Features

Enhancements to existing functions

Bug Fixes

New Features

Secure Hash Algorithm 3 (SHA-3) support

SHA-3 is the latest implementation of the Secure Hash Algorithm, which takes digital data inputs of any size and generates an encrypted output of selected length (standard lengths 224, 256, 384 and 512 bits). This release introduces additional support in the API for 4 variations of SHA-3:

  • SHA3-224
  • SHA3-256
  • SHA3-384
  • SHA3-512

Back to top

Certificate Expiration Date for Apps

In Release 3.1, SmartKey added Sort/Search/Filter functions for Expiration Dates for Security Objects. In this release, the same functionality is added for Apps. Expiration Date for apps will be displayed in the following ways:

  • In the Dashboard, users can filter the Apps section to display Apps with Expiring Certs. Any Apps with Certs Expiring in the next 30 days will be displayed.
    img
  • Under Groups, select a Group with Apps, go to the Apps tab. Apps that belong under this group will be displayed. “Cert Expires” column is added.
    img
  • In the Apps table view, a new column will show “Cert Expires”.
    img
  • Clicking on the App will show details of the App Certificate.
    img

Back to top

Enhancements to existing functions

Added to List of supported PKCS11 Mechanisms

DES2-KEY-GEN has been added to the list of PKCS11 Mechanisms supported by SmartKey.

Back to top

Compromised Security Objects are more visible

Security objects that have been compromised are now more visible to users. Compromising a security object means that an unauthorized person has gained access to the security object, the compromised security object can be used to decrypt data without sender’s knowledge. Compromised security objects should be deactivated immediately. SmartKey will flag out compromised security objects in the following ways:

  • On the dashboard, compromised security objects have a red flag next to it. Furthermore, users can use the filter to view only security objects that have been recently compromised.
    img
  • In the Security Object table view, compromised security objects have a red flag next to it.
    img
  • Clicking on the compromised security object will show you details. One of the details includes its deactivation date and when it was compromised.
    img

Back to top

Improvements to Approve/Reject Request for Sensitive Operations

  • If there are pending tasks for the user, user will be able to see an alarm icon next to their username. Clicking on the icon will bring them to the screen where they can resolve their pending tasks.
    img
  • An email will be sent to the approver with the following message:
    img

Back to top

Bug Fixes

  • Fixed issue where SmartKey could not handle uploading of large images. An example is when uploading of profile pictures.
  • Following Release 3.3.1131, we have added support for Elliptic Curve (EC) cryptography X25519 and ED25519. We continue to improve on that support.
    • For X25519, we have disabled options for Sign and Verify as these operations are not applicable to this cryptographic algorithm.
    • For ED25519, we have disabled option for AgreeKey as this operation is not applicable.
  • QuotaExceededError from browser was improperly handled. This issue has been fixed. When QuotaExceededError is encountered, SmartKey will display the following error message – “Your browser has insufficient storage space to use SmartKey. Please go to your browser settings and make space by deleting all cookies and saved website data.”

Back to top