HID Approve SDK Release Notes

This page provides the latest information about the HID Approve SDK.

NEW FEATURES AND BUG FIXES

HID Approve SDK 5.14 for iOS/macOS

The new version is currently in development and will be available soon.

HID Approve SDK 5.14 for Android

The new version is currently in development and will be available soon.

HID Approve SDK 5.14 for Windows

What's New

  • The SDK has been migrated to the Microsoft .NET 8.0 unified development platform for Microsoft Windows (previously .NET 6.0)

  • Pending transactions can be canceled by the SDK

    If the container associated with the transaction is protected by a user password, this password is not required to cancel the transaction (ITransaction.cancel).

  • When canceling a transaction, a flag can be set and shared with the service to indicate that the user is flagging suspicious activity

    Based on the service configuration, specific actions may be triggered server-side to handle this flag (ITransaction.cancel).

  • Direct Client Signature (DCS) Authentication enables integrators to use asymmetric private keys to sign authentication requests directly

    This improves the workflow and security of authentication processes within applications using the HID Approve SDK (IContainer.GenerateAuthenticationRequest).

    Additionally, this eliminates reliance on symmetric keys (e.g., OTP) for such workflows.

Note: These new features are only available with the HID Authentication Service. They are not supported by the ActivID Authentication Server or ActivID Appliance (all versions).

Additional Updates and Fixes

  • Multiple device type configurations on a single domain with Manual Activation are now supported. [IAHA-1419]

  • IDevice.DeleteContainer() now supports an optional parameter to specify the reason for deletion

  • IDevice.CreateContainer() and IContainer.Renew() now gracefully close sessions with the HID Authentication Service

  • IContainer.FindKeys() now returns a single object for RSA key pairs

Security and Compliance:

Code protection has been updated to a new third-party provider.

DOCUMENTATION

Before you start using the HID Approve SDK, see Getting Started.

For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.

For further information about integration with the HID authentication platform, see:

Deploying the ActivID Push-Based Validation Solution with ActivID AS

Deploying the ActivID Push-Based Validation Solution with ActivID Appliance

Deploying HID Approve with the HID Authentication Service

LIMITATIONS AND KNOWN ISSUES

This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.

Limitations

HID Approve SDK for iOS/macOS

  • Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)

HID Approve SDK for Android

None.

HID Approve SDK for Windows

None.

Known Issues

HID Approve SDK for iOS/macOS

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • HID Approve SDK 5.14 may introduce performance degradation on older iPhone models (8 and earlier), especially when multiple containers are registered

HID Approve SDK for Android

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]

HID Approve SDK for Windows

None.