Release Notes

This page provides the latest information about the HID Validation Authority.

What's New

  • Rebranding Update: ActivID Validation Authority is now HID Validation Authority

    ActivID Validation Authority has been officially rebranded as HID Validation Authority. The core functionality, reliability and support remain the same.

  • Support for 3072-bit Asymmetric Key

    The Asymmetric Signature Key, Asymmetric Audit Log Key, and Asymmetric SSL Key can now be configured to use a 3072-bit. For more details on regenerating keys and which keys to regenerate, refer to Configuring the Keystore.

  • Email Logging Configuration

    Email logging has been enhanced in HID Validation Authority, allowing automated alerts to be triggered based on severity levels such as INFO, DEBUG, TRACE, WARN, ERROR, and FATAL. This improvement provides greater flexibility in monitoring system events and ensures timely responses to operational issues. By default, Validation Authority is configured to send email alerts for ERROR and FATAL events, helping to focus on critical issues. For more details, refer to Configure System Settings - Logging.

  • Asymmetric SSL Key Renewal

    In alignment with the CA/B Forum’s upcoming reduction of SSL/TLS certificate lifespans to 47 days by 2029, HID Validation Authority now supports automated Asymmetric SSL Key renewal at scheduled intervals. This enhancement ensures continuous compliance with industry standards while reducing manual certificate management effort. For more details, refer to Configure Asymmetric SSL Key Renewal.

  • Asymmetric Audit Log Key Renewal

    HID Validation Authority now supports automated Asymmetric Audit Log Key renewal at scheduled intervals. This enhancement ensures continuous compliance with industry standards while reducing manual certificate management effort. For more details, refer to Configure Asymmetric Audit Log Key Renewal.

  • Certificate Authority

    HID Validation Authority now supports Microsoft Windows Server 2022 Certificate Authority.

  • Platform and Software Upgrades

    HID Validation Authority now supports the following:

    • Oracle JDK 11.0.26/17.0.12

    • OpenJDK 11.0.2/17.0.2 (from OpenJDK.org)

    • Microsoft Windows Server 2025

    • PostgreSQL 17 Database

    • Tomcat minor version upgrade

List of Tested Configuration

For this release, HID Global has tested the following configurations on the listed operating systems. For details, see the environment information listed in the Configuration Requirements section.

Operating System Java Version Database HSM
Windows Server 2016 Oracle JDK 11.0.26

PostgreSQL 15

SQL Server 2019

Oracle SunJCE keystore (Soft HSM)

Thales Luna HSM with firmware 7.0.3, software 7.8.4-254, and client version 10.7.2-16

Windows Server 2019 OracleJDK 11.0.12 PostgresSQL 17 Thales T7 HSM with firmware 7.11.2, software 7.11.1, and client version 7.13.2-1
Windows Server 2022

Oracle JDK 17.0.12

OpenJDK 17.0.2

PostgreSQL 15/17

Oracle 19c

Oracle SunJCE keystore (Soft HSM),

Entrust nCipher with firmware 12.72.1 and client version 13.3.2

Windows Server 2025 Oracle JDK 17.0.12 PostgreSQL 17

Oracle SunJCE keystore (Soft HSM),

Thales T7 HSM with firmware 7.11.2, software 7.11.1, and client version 7.13.2-1

RHEL 8

Oracle JDK 11.0.26/17.0.12

OpenJDK 11.0.2/17.0.2

SQL Server 2019

Oracle 19c

Oracle SunJCE keystore (Soft HSM)

Thales Luna HSM with firmware 7.0.3, software 7.8.4-254, and client version 10.7.2-16

Special Notes for HSM Users

For HSM-specific client configuration, please carefully read the appropriate section corresponding to your HSM type in the Installation and Configuration section.

  • Thales Luna HSM (formerly Gemalto/SafeNet LunaSA) and Luna PCIe

    • Tested on Luna K7 with firmware 7.0.3 and software 7.8.4-254, client version 10.7.2-16

      Note: Using firmware version 7.0.3, SSL handshakes do not work. Use the Oracle SunJCE keystore (software-only keystore) for SSL keys.
  • Entrust nCipher (formerly Thales nShield) Connect, Connect+, Connect XC, Solo and Solo+

    • Tested with firmware 12.72.1 and client version 13.3.2

  • Thales T7 HSM (LunaSA 7.11.0)

    • Tested with firmware 7.11.2 and software 7.11.1 and client version 7.13.2-1.

SSL Ciphers

Validation Authority is configured by default with the following list of ciphers – used with TLS 1.2 protocol.

HID Global has tested the following browsers using Entrust nShield (formerly Thales nShield) Connect XC HSM:

  • Google® Chrome

  • Firefox®

  • Microsoft Edge®

Read carefully the previous section “Special Notes for HSM Users”, as each HSM provider has issues in implementing SSL ciphers.

Consider using the Oracle SunJCE keystore (software-only key store) for SSL keys if the HSM of your choice does not support ciphers of your interest.

Note: You might need to adjust the cipher list during the configuration to make sure SSL handshake negotiations end up with the cipher of your choice.

Known Problems and Limitations

  • HID Validation Authority does not support EC algorithm for SSL key with HSMs.

  • JDK 17 is not supported on Thales T7 HSM. Please refer to the List of Tested Configuration table for compatible combinations.