HID Approve SDK Release Notes

This page provides the latest information about the HID Approve SDK.

NEW FEATURES AND BUG FIXES

HID Approve SDK 5.11 for iOS/macOS

What's New

  • Client-Synchronized TOTP

    To accommodate end users who manually adjust their mobile system clock ahead or behind the actual time, the SDK will adapt to the time offset. This reduces the number of failed authentications due to incorrect Secure Codes (Time-based OTPs).

    This will reduce both failed authentication attempts and help-desk calls for device re-syncronizaton.

    The benefits of this feature are immediate and do not require any configuration by the client or server, nor can this feature be disabled. All containers, both newly activated and existing ones, including those created with a previous version of the SDK, will benefit from this feature.

    This client TOTP synchronization relies on network communication between the client and the authentication backend to accommodate time offsets. This means that for the client offset to take effect, an operation must be performed with the SDK that requires communication with the authentication backend (such as Container.retrieveTransactionIds, HIDServerActionInfo.getAction, etc).

  • UserID-less Authentication

    UserID-less authentication allows integrators to implement authentication flows without the need for a user ID. The authentication backend provides a signed challenge, which is then consumed and signed by the HID Approve SDK.

    Subsequently, the authentication backend associates the appropriate user with the session, based on the details inferred from the transaction and the successful verification of the user's digital signature.

    This allows for a more user-friendly end user authentication process (fewer steps) and fewer help-desk calls for forgotten user IDs.

    Further information, see Transaction Signing.

    Note: This feature is currently only available for use with the HID Authentication Service and will be included in future releases of the HID Appliance version 9 (and later).

Enhacments

  • Bitcode support has been removed from our Apple SDKs

HID Approve SDK 5.11 for Android

What's New

  • Client-Synchronized TOTP

    To accommodate end users who manually adjust their mobile system clock ahead or behind the actual time, the SDK will adapt to the time offset. This reduces the number of failed authentications due to incorrect Secure Codes (Time-based OTPs).

    This will reduce both failed authentication attempts and help-desk calls for device re-syncronizaton.

    The benefits of this feature are immediate and do not require any configuration by the client or server, nor can this feature be disabled. All containers, both newly activated and existing ones, including those created with a previous version of the SDK, will benefit from this feature.

    This client TOTP synchronization relies on network communication between the client and the authentication backend to accommodate time offsets. This means that for the client offset to take effect, an operation must be performed with the SDK that requires communication with the authentication backend (such as Container.retrieveTransactionIds, HIDServerActionInfo.getAction, etc).

  • UserID-less Authentication

    UserID-less authentication allows integrators to implement authentication flows without the need for a user ID. The authentication backend provides a signed challenge, which is then consumed and signed by the HID Approve SDK.

    Subsequently, the authentication backend associates the appropriate user with the session, based on the details inferred from the transaction and the successful verification of the user's digital signature.

    This allows for a more user-friendly end user authentication process (fewer steps) and fewer help-desk calls for forgotten user IDs.

    Further information, see Transaction Signing.

    Note: This feature is currently only available for use with the HID Authentication Service and will be included in future releases of the HID Appliance version 9 (and later).

Enhancements

Minor bug fixes:

  • Support for container creation on mobile devices where the system language is set to Arabic [#03356683 and #03329100]

HID Approve SDK 4.8 for Windows

The SDK has been migrated to the Microsoft .NET 6.0 unified development platform for Microsoft Windows.

Note: This version should be considered as a new starting point and, as such, there are no supported migration paths from previous versions.

DOCUMENTATION

Before you start using the HID Approve SDK, see Getting Started.

For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.

For further information about integration with the HID authentication platform, see:

Deploying the ActivID Push-Based Validation Solution with ActivID AS

Deploying the ActivID Push-Based Validation Solution with ActivID Appliance

HID Approve with the HID Authentication Service

LIMITATIONS AND KNOWN ISSUES

This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.

Limitations

HID Approve SDK for iOS

  • Application execution might crash on Apple iOS 13.x if the application is built with Xcode 14.3

  • Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)

HID Approve SDK for Android

None.

HID Approve SDK for Windows

Features unavailable with HID Approve SDK for Windows:

  • Multiple device type configurations on a single domain with Manual Activation are not supported [IAHA-1419]

Known Issues

HID Approve SDK for iOS

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]

HID Approve SDK for Android

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]

HID Approve SDK for Windows

None.