PingAccess Agent SDK for C release notes
These release notes summarize the changes in current and previous PingAccess Agent SDK for C updates. Updated July 18, 2024.
The PingAccess Agent SDK for C no longer supports FreeBSD 8. |
Agent SDK for C 1.4 (July 2024)
Cache multiple token-types for Web + API applications in Apache and IIS agent deployments
New PA-15516
If you use a Web + API application, the vnd-pi-resource-cache
PingAccess agent protocol (PAAP) header now contains an additional path so Web + API applications can cache both cookie and authorization header token-types. For more information, see the Cache multiple token-types for Web + API applications entry in the PingAccess 8.1 release notes, and the agent.cache.defaultTokenType
property on the desired agent configuration page.
Existing agent environments ignore the new To see the performance boost, upgrade to PingAccess 8.1 and upgrade to the latest version of the agent. Otherwise, continue to use an earlier agent version. |
Block bad characters in Apache and IIS agent deployments
New PAA-251
Configure a PingAccess Apache agent or the PingAccess agent for IIS to block requests that contain bad characters in the URI, query parameters, form parameters, or request body without having to reach out to PingAccess for a decision.
Added eight new properties to each agent:
-
agent.request.block.xss.characters
-
agent.request.block.uri.characters
-
agent.request.block.query.characters
-
agent.request.block.form.characters
-
agent.request.block.xss.http.status
-
agent.request.block.uri.http.status
-
agent.request.block.query.http.status
-
agent.request.block.form.http.status
Learn more in the configuration page for your agent:
For large scale or more complex blocking decisions, it’s best practice for the agent to reach out to PingAccess for a decision. |
Configure the IIS agent to ignore CRL checking if revocation server is unresponsive
Improved PAA-265
Added a new configuration option to give protected applications better reliability without giving up the ability to perform CRL checking when the server is available: the agent.engine.configuration.checkCertRevocation.bestEffort
property.
This change provides better alignment between PingAccess, PingFederate, and PingAccess policy server CRL checking. Learn more in IIS agent configuration.
Agent SDK for C 1.1.1 (January 2017)
Workaround for Network Security Services library known issue
Info
Established a workaround for a known issue in the Network Security Services library that results in a memory leak when the agent closes a HTTPS connection to a PingAccess policy server. For more information, see this KB article.