HID Approve SDK Release Notes

This page provides the latest information about the HID Approve SDK.

HID Approve SDK 6.1 for iOS/macOS

What's New

HID Approve SDK for Apple Wallet Extension - introduces support for Apple Wallet Extensions, enabling seamless authentication during card activation using an existing HID Approve credential. This capability allows Wallet Extensions to leverage credentials provisioned in the host application, reducing friction during the activation flow.

This feature relies on sharing a provisioned HID Approve container between the host application and the Wallet Extension.

For further information, see Integrating with the Apple® Wallet Extension.

Important:
  • This feature is supported on iOS only

    It is not supported on macOS.

  • It requires a host application embedding the full HID Approve SDK

  • The Wallet Extension must embed the HID Approve Wallet SDK subset only

  • Shared container configuration is required for credential access

Note: This feature is additive and does not impact existing provisioning or authentication flows.

HID Approve SDK 6.1 for Android

Security Updates

This release includes important security updates and third-party component updates. It is strongly recommended updating to this version for the most robust security.

Improvements and Bug Fixes

  • Improved performance of the start-up sequence

  • Transaction.getExpiryDate() now returns the transaction expiration date with compatible server versions (available on the HID Authentication Service)

  • Biometric authentication throws AuthenticationException when biometrics are disabled (Google® Android® 16 and later)

HID Approve SDK 5.14 for Windows

What's New

  • The SDK has been migrated to the Microsoft .NET 8.0 unified development platform for Microsoft Windows (previously .NET 6.0)

  • Pending transactions can be canceled by the SDK

    If the container associated with the transaction is protected by a user password, this password is not required to cancel the transaction (ITransaction.cancel).

  • When canceling a transaction, a flag can be set and shared with the service to indicate that the user is flagging suspicious activity

    Based on the service configuration, specific actions may be triggered server-side to handle this flag (ITransaction.cancel).

  • Direct Client Signature (DCS) Authentication enables integrators to use asymmetric private keys to sign authentication requests directly

    This improves the workflow and security of authentication processes within applications using the HID Approve SDK (IContainer.GenerateAuthenticationRequest).

    Additionally, this eliminates reliance on symmetric keys (e.g., OTP) for such workflows.

Note: These new features are only available with the HID Authentication Service. They are not supported by the ActivID Authentication Server or ActivID Appliance (all versions).

Additional Updates and Fixes

  • Multiple device type configurations on a single domain with Manual Activation are now supported. [IAHA-1419]

  • IDevice.DeleteContainer() now supports an optional parameter to specify the reason for deletion

  • IDevice.CreateContainer() and IContainer.Renew() now gracefully close sessions with the HID Authentication Service

  • IContainer.FindKeys() now returns a single object for RSA key pairs

Security and Compliance

Code protection has been updated to a new third-party provider.

Documentation

Before you start using the HID Approve SDK, see Getting Started.

For further information about the features and benefits of the advanced authentication solution, see Mobile Authentication & Transaction Signing.

For further information about integration with the HID authentication platform, see:

Deploying the ActivID Push-Based Validation Solution with ActivID AS

Deploying the ActivID Push-Based Validation Solution with ActivID Appliance

Deploying HID Approve with the HID Authentication Service

Limitations and Known Issues

This section describes issues known by HID Global as of the release date, but which have not been addressed in the current product version. When possible, fixes and workarounds are suggested. This section also describes known limitations of this release.

Limitations

HID Approve SDK for iOS/macOS

  • Only "create container" and a few other operations are demonstrated in the macOS Demo App (for a full feature demo, use the iOS Demo App)

HID Approve SDK for Android

None.

HID Approve SDK for Windows

None.

Known Issues

HID Approve SDK for iOS/macOS

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • HID Approve SDK 6.1 may introduce performance degradation on older iPhone models (8 and earlier), especially when multiple containers are registered

HID Approve SDK for Android

  • Non-explicit error when using push-based validation (for authentication or transaction signing) and "silent lock" mode if the user's authentication record becomes blocked on the server-side (perhaps resulting from too many consecutive incorrect PIN/password attempts). [IAHA-2200]
  • Minor discrepancy for "silent lock" mode configuration validation between iOS/Android. When the lock type policy is set to "silent lock", Android will systematically enforce the presence of the "operation protection" key, while iOS only enforces it if either the "password" or "biometricorpassword" policies are set. In any case, to configure the "silent lock" mode correctly, the protection type should also be specified correctly. [IAHA-2201]

HID Approve SDK for Windows

None.

What Was New in Previous Versions

HID Approve SDK for iOS/macOS

HID Approve SDK for Android

HID Approve SDK for Windows