HID Approve SDK Release Notes

This page provides the latest information about the HID Approve SDK.

NEW FEATURES AND BUG FIXES

HID Approve SDK 5.10 for iOS/macOS

What's New

  • XCframework - Production (Prod)

    Safeguarded against attached debuggers.

    Package changes - simulator support has been removed and shifted to the NonProd package.

  • XCframework - Non-Production (NonProd)

    Introducing a new Non-Production variant of the SDK with reduced security controls intended to facilitate debugging.

    Note: This version is not shielded against attached debuggers or method swizzling.
    Important: As an integrator, you are responsible for ensuring that the Non-Production version of the SDK is not deployed in production. Using this version might compromise security and introduce potential attack vectors.
  • Mobile Transaction Context - a new capability that allows for the provision of additional context from the client authentication device when accompanying a signed transaction

    For further details, see HIDTransaction.setStatus in the API documentation.

  • Platform compatibility:

    • iOS - minimum target version raised to iOS 13

    • macOS - minimum target version raised to 10.15

Enhancements

  • Extended userid inputval to offer better flexibility and alignment with the authentication back-end

Note: Bitcode support will be removed from the SDK in a future version. For further details, see Disabling Bitcode.

HID Approve SDK 5.10 for Android

What's New

  • Mobile Transaction Context - a new capability that allows for the provision of additional context from the client authentication device when accompanying a signed transaction

    For further details, see Transaction.setStatus in the API documentation.

  • Platform compatibility - minimum target version raised to 8.0

Enhancements

  • SDK API updates - the API returns the rooted status of the device

  • Algorithm update - updated internal algorithms to align with NIST recommendations

  • Extended userid inputval to offer better flexibility and alignment with the authentication back-end

Note: A new runtime permission, POST_NOTIFICATIONS, is required for applications to enable notifications on Android 13 (or later) (API level 33 or later).

HID Approve SDK 4.8 for Windows

The SDK has been migrated to the Microsoft .NET 6.0 unified development platform for Microsoft Windows.

Note: This version should be considered as a new starting point and, as such, there are no supported migration paths from previous versions.

DOCUMENTATION

Before you start using the HID Approve SDK, see Getting Started.

For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.

For further information about integration with the HID authentication platform, see:

Deploying the ActivID Push-Based Validation Solution with ActivID AS

Deploying the ActivID Push-Based Validation Solution with ActivID Appliance

HID Approve with the HID Authentication Service

LIMITATIONS AND KNOWN ISSUES

This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.

Limitations

HID Approve SDK for iOS

  • Application execution might crash on Apple iOS 13.x if the application is built with Xcode 14.3

  • Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)

HID Approve SDK for Android

None.

HID Approve SDK for Windows

Features unavailable with HID Approve SDK for Windows:

  • Multiple device type configurations on a single domain with Manual Activation are not supported [IAHA-1419]

Known Issues

HID Approve SDK for iOS

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]

HID Approve SDK for Android

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]

HID Approve SDK for Windows

None.