HID Approve SDK Release Notes
This page provides the latest information about the HID Approve SDK.
NEW FEATURES AND BUG FIXES
HID Approve SDK 5.11 for iOS/macOS
What's New
-
Client-Synchronized TOTP
To accommodate end users who manually adjust their mobile system clock ahead or behind the actual time, the SDK will adapt to the time offset. This reduces the number of failed authentications due to incorrect Secure Codes (Time-based OTPs).
This will reduce both failed authentication attempts and help-desk calls for device re-syncronizaton.
The benefits of this feature are immediate and do not require any configuration by the client or server, nor can this feature be disabled. All containers, both newly activated and existing ones, including those created with a previous version of the SDK, will benefit from this feature.
This client TOTP synchronization relies on network communication between the client and the authentication backend to accommodate time offsets. This means that for the client offset to take effect, an operation must be performed with the SDK that requires communication with the authentication backend (such as Container.retrieveTransactionIds, HIDServerActionInfo.getAction, etc).
-
UserID-less Authentication
UserID-less authentication allows integrators to implement authentication flows without the need for a user ID. The authentication backend provides a signed challenge, which is then consumed and signed by the HID Approve SDK.
Subsequently, the authentication backend associates the appropriate user with the session, based on the details inferred from the transaction and the successful verification of the user's digital signature.
This allows for a more user-friendly end user authentication process (fewer steps) and fewer help-desk calls for forgotten user IDs.
Further information, see Transaction Signing.
Note: This feature is currently only available for use with the HID Authentication Service and will be included in future releases of the HID Appliance version 9 (and later).
Enhacments
-
Bitcode support has been removed from our Apple SDKs
HID Approve SDK 5.11 for Android
What's New
-
Client-Synchronized TOTP
To accommodate end users who manually adjust their mobile system clock ahead or behind the actual time, the SDK will adapt to the time offset. This reduces the number of failed authentications due to incorrect Secure Codes (Time-based OTPs).
This will reduce both failed authentication attempts and help-desk calls for device re-syncronizaton.
The benefits of this feature are immediate and do not require any configuration by the client or server, nor can this feature be disabled. All containers, both newly activated and existing ones, including those created with a previous version of the SDK, will benefit from this feature.
This client TOTP synchronization relies on network communication between the client and the authentication backend to accommodate time offsets. This means that for the client offset to take effect, an operation must be performed with the SDK that requires communication with the authentication backend (such as Container.retrieveTransactionIds, HIDServerActionInfo.getAction, etc).
-
UserID-less Authentication
UserID-less authentication allows integrators to implement authentication flows without the need for a user ID. The authentication backend provides a signed challenge, which is then consumed and signed by the HID Approve SDK.
Subsequently, the authentication backend associates the appropriate user with the session, based on the details inferred from the transaction and the successful verification of the user's digital signature.
This allows for a more user-friendly end user authentication process (fewer steps) and fewer help-desk calls for forgotten user IDs.
Further information, see Transaction Signing.
Note: This feature is currently only available for use with the HID Authentication Service and will be included in future releases of the HID Appliance version 9 (and later).
Enhancements
Minor bug fixes:
-
Support for container creation on mobile devices where the system language is set to Arabic [#03356683 and #03329100]
HID Approve SDK 4.8 for Windows
The SDK has been migrated to the Microsoft .NET 6.0 unified development platform for Microsoft Windows.
DOCUMENTATION
Before you start using the HID Approve SDK, see Getting Started.
For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.
For further information about integration with the HID authentication platform, see:
Deploying the ActivID Push-Based Validation Solution with ActivID AS
Deploying the ActivID Push-Based Validation Solution with ActivID Appliance
HID Approve with the HID Authentication Service
LIMITATIONS AND KNOWN ISSUES
This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.
Limitations
HID Approve SDK for iOS
-
Application execution might crash on Apple iOS 13.x if the application is built with Xcode 14.3
-
Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)
HID Approve SDK for Android
None.
HID Approve SDK for Windows
Features unavailable with HID Approve SDK for Windows:
-
Multiple device type configurations on a single domain with Manual Activation are not supported [IAHA-1419]
Known Issues
HID Approve SDK for iOS
- Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
HID Approve SDK for Android
- Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
- Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]
HID Approve SDK for Windows
None.