HID Approve SDK Release Notes

This page provides the latest information about the HID Approve SDK.

HID Approve SDK 6.0 for iOS/macOS

What's New

  • Pending transactions can be canceled by the SDK

    If the container associated with the transaction is protected by a user password, this password is not required to cancel the transaction (HIDTransaction.cancel).

  • When canceling a transaction, a flag can be set and shared with the service to indicate that the user is flagging suspicious activity

    Based on the service configuration, specific actions may be triggered server-side to handle this flag (HIDTransaction.cancel).

  • Direct Client Signature (DCS) Authentication enables integrators to use asymmetric private keys to sign authentication requests directly

    This improves the workflow and security of authentication processes within applications using the HID Approve SDK (HIDContainer.generateAuthenticationRequest).

    Additionally, this eliminates reliance on symmetric keys (e.g., OTP) for such workflows.

Note: These new features are only available with the HID Authentication Service. They are not supported by the ActivID Authentication Server or ActivID Appliance (all versions).

Improvements and Bug Fixes

  • HIDDevice.deleteContainer() now supports an optional parameter to specify the reason for deletion

  • HIDDevice.createContainer() and HIDContainer.renew() now gracefully close sessions with the service

  • HIDContainer.findKeys() now returns a single object for RSA key pairs

  • HIDDevice.newInstance() now throws explicit exception HIDLostCredentials (106) when irrecoverable error is detected

  • HIDDevice.retrieveActionInfo() and HIDTransaction.setStatus() now throw HIDTransactionExpired (1000) when transactions are no longer valid

  • Fix some use cases with incorrect transaction message maximum length

  • Fix a crash when SDK used without internet connection and SDK logs enabled

  • Fix use cases where data were unexpectedly backed up in Apple iCloud

  • Updated Runtime Application Self-Protection (RASP) solution

Important: Version 6.0 introduces a new Runtime Application Self-Protection (RASP) solution. While this enhancement should not impact your current integration, please note that this change will shorten the lifecycle of the previous 5.x versions of the SDK.

In practice, you may continue using v5.x SDK in your integration until you choose to migrate to version 6.0 of the HID Approve SDK. However, if you open a support case related to a v5.x SDK and a patch is necessary, the patch will be applied to version 6. This will require you to upgrade your application at that time.

HID Approve SDK 6.0 for Android

What's New

  • Pending transactions can be canceled by the SDK

    If the container associated with the transaction is protected by a user password, this password is not required to cancel the transaction (Transaction.cancel).

  • When canceling a transaction, a flag can be set and shared with the service to indicate that the user is flagging suspicious activity

    Based on the service configuration, specific actions may be triggered server-side to handle this flag (Transaction.cancel).

  • Direct Client Signature (DCS) Authentication enables integrators to use asymmetric private keys to sign authentication requests directly

    This improves the workflow and security of authentication processes within applications using the HID Approve SDK (Container.generateAuthenticationRequest).

    Additionally, this eliminates reliance on symmetric keys (e.g., OTP) for such workflows.

Note: These new features are only available with the HID Authentication Service. They are not supported by the ActivID Authentication Server or ActivID Appliance (all versions).

Improvements and Bug Fixes

  • Device.deleteContainer() now supports an optional parameter to specify the reason for deletion

  • Device.createContainer() and Container.renew() now gracefully close sessions with the service

  • Container.findKeys() now returns a single object for RSA key pairs

  • Device.retrieveActionInfo() and Transaction.setStatus() now throw TransactionExpiredException (1000) when transactions are no longer valid

  • Fix some use cases with incorrect transaction message maximum length

  • Improve error handling by throwing more meaningful exceptions (see Updates to the HID Approve SDK for Google Android for more details)

  • BioPasswordPolicy.resetBiometricPrompt() now cancels the biometric prompt

Security and Compliance

Replace a deprecated third-party handling regular expression management (see Updates to the HID Approve SDK for Google Android for more details).

HID Approve SDK 5.14 for Windows

What's New

  • The SDK has been migrated to the Microsoft .NET 8.0 unified development platform for Microsoft Windows (previously .NET 6.0)

  • Pending transactions can be canceled by the SDK

    If the container associated with the transaction is protected by a user password, this password is not required to cancel the transaction (ITransaction.cancel).

  • When canceling a transaction, a flag can be set and shared with the service to indicate that the user is flagging suspicious activity

    Based on the service configuration, specific actions may be triggered server-side to handle this flag (ITransaction.cancel).

  • Direct Client Signature (DCS) Authentication enables integrators to use asymmetric private keys to sign authentication requests directly

    This improves the workflow and security of authentication processes within applications using the HID Approve SDK (IContainer.GenerateAuthenticationRequest).

    Additionally, this eliminates reliance on symmetric keys (e.g., OTP) for such workflows.

Note: These new features are only available with the HID Authentication Service. They are not supported by the ActivID Authentication Server or ActivID Appliance (all versions).

Additional Updates and Fixes

  • Multiple device type configurations on a single domain with Manual Activation are now supported. [IAHA-1419]

  • IDevice.DeleteContainer() now supports an optional parameter to specify the reason for deletion

  • IDevice.CreateContainer() and IContainer.Renew() now gracefully close sessions with the HID Authentication Service

  • IContainer.FindKeys() now returns a single object for RSA key pairs

Security and Compliance

Code protection has been updated to a new third-party provider.

Documentation

Before you start using the HID Approve SDK, see Getting Started.

For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.

For further information about integration with the HID authentication platform, see:

Deploying the ActivID Push-Based Validation Solution with ActivID AS

Deploying the ActivID Push-Based Validation Solution with ActivID Appliance

Deploying HID Approve with the HID Authentication Service

Limitations and Known Issues

This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.

Limitations

HID Approve SDK for iOS/macOS

  • Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)

HID Approve SDK for Android

None.

HID Approve SDK for Windows

None.

Known Issues

HID Approve SDK for iOS/macOS

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • HID Approve SDK 6.0 may introduce performance degradation on older iPhone models (8 and earlier), especially when multiple containers are registered

HID Approve SDK for Android

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]

HID Approve SDK for Windows

None.

What Was New in Previous Versions

HID Approve SDK for iOS/macOS

HID Approve SDK for Android

HID Approve SDK for Windows