Release notes
These release notes cover multiple versions of PingGateway software. They make it easier to upgrade, especially when you are skipping releases. Some older versions have reached the end of support (EOS) or end of life (EOL). Learn more in Product Support Lifecycle Policy | PingGateway and Agents. If you are still running an EOL version, upgrade as soon as possible to an actively maintained version. |
PingGateway integrates web applications, APIs, and microservices with the Ping Identity Platform. Based on reverse proxy architecture, PingGateway enforces security and access control.
Name changes for ForgeRock products
Product names changed when ForgeRock became part of Ping Identity.
The following name changes have been in effect since early 2024:
Old name | New name |
---|---|
ForgeRock Identity Cloud |
PingOne Advanced Identity Cloud |
ForgeRock Access Management |
PingAM |
ForgeRock Directory Services |
PingDS |
ForgeRock Identity Management |
PingIDM |
ForgeRock Identity Gateway |
PingGateway |
Learn more about the name changes in New names for ForgeRock products in the Knowledge Base.
Requirements
Ping Identity supports customers who use the versions specified here. Other versions and alternative environments might work as well. When opening a support ticket for an issue, however, make sure you can also reproduce the problem on a combination covered here. |
Downloads
Download product software from the Backstage download site:
File | Description |
---|---|
|
Cross-platform distribution including all software components. |
|
Web application for testing PingGateway configurations |
Learn more about using the Docker image provided with the product software in Deploy with Docker.
Operating systems
PingGateway 2025.3 software is supported on actively maintained versions of the following Linux operating systems:
-
Amazon Linux
-
Debian
-
Red Hat Enterprise Linux
-
Rocky Linux
-
SUSE Linux Enterprise
-
Ubuntu Linux
PingGateway 2025.3 software is supported on Microsoft Windows Server 2016, 2019, and 2022.
PingGateway 2024.11 and earlier software is supported on the following operating systems:
PingGateway version | |||
---|---|---|---|
Vendor |
7.2 |
2023.x |
2024.x |
Amazon Linux |
(Not supported) |
2, 2023 |
|
Red Hat Enterprise Linux |
7, 8 |
7, 8, 9 |
|
Centos OS |
7 |
||
Ubuntu LTS |
20.04 |
22.04, 20.04 |
|
Windows Server |
2016, 2019 |
2016, 2019, 2022 |
|
SUSE Linux Enterprise |
12, 15 |
||
Rocky Linux |
(Not supported) |
9.x |
Java
PingGateway supports OpenJDK, including OpenJDK-based distributions:
-
AdoptOpenJDK/Eclipse Adoptium
-
Amazon Corretto
-
Azul Zulu
-
Red Hat OpenJDK
Ping Identity tests PingGateway the most extensively with Eclipse Adoptium.
PingGateway version |
7.2 |
2023.x |
2024.x |
2025.3 |
---|---|---|---|---|
Java version |
11 |
17, 11 |
21, 17 |
21, 17(1) |
(1) Java 17 is deprecated in 2025.3.
Recommendations:
-
Use the HotSpot JVM.
-
Keep your Java installation updated with the latest security fixes.
-
Java 11 is the earliest long-term supported (LTS) Java version for IG 2023.11 and earlier versions. Earlier versions of Java don’t contain required cryptography fixes. If you are using an earlier version of Java, secure your installation.
FQDNs
When applications access PingGateway directly without going through a load balancer,
use a fully qualified domain name (FQDN) like gateway.example.com
.
The applications use the FQDN, for example, when redirecting for OAuth 2.0 or CDSSO.
Browser cookies can use the FQDN as well.
When using an FQDN in production, ensure DNS correctly provides it.
Alternatively, update the hosts files on all the systems that access PingGateway to
(/etc/hosts
or C:\Windows\System32\drivers\etc\hosts
) to set the PingGateway FQDN.
Certificates
For secure network communications with client applications you don’t control, install a properly signed digital certificate that your client applications recognize, such as one that works with your organization’s PKI or one signed by a recognized CA.
To use the certificate during installation, include the certificate in
a file-based keystore supported by the JVM (JKS, JCEKS, PKCS#12) or on a PKCS#11 token.
To import a signed certificate into the server keystore, use the Java keytool
command.
Third-party software for encryption
Bouncy Castle is required for signature encryption with RSASSA-PSS or Deterministic ECDSA. Learn more at The Legion of the Bouncy Castle.
Third-party software
Ping Identity provides support for using the following third-party software when logging common audit events:
Software | Version |
---|---|
Java Message Service (JMS) |
2.0 API |
MySQL JDBC Driver Connector/J |
8 (at least 8.0.19) |
Splunk |
8.0 (at least 8.0.2) |
Elasticsearch and Splunk have native or third-party tools to collect, transform, and route logs. Examples include Logstash and Fluentd. Use these alternatives if possible. These tools have advanced, specialized features focused on getting log data into the target system. They decouple the solution from the Ping Identity Platform systems and version, and provide inherent persistence and reliability. You can configure the tools to avoid losing audit messages if a Ping Identity Platform service goes offline, or delivery issues occur. These tools can work with common audit logging:
|
Ping Identity provides support for using the following third-party software when monitoring servers:
Software | Version |
---|---|
Grafana |
5 (at least 5.0.2) |
Graphite |
1 |
Prometheus |
2.0 |
For hardware security module (HSM) support, Ping Identity Platform software requires a client library that conforms to the PKCS#11 standard v2.20 or later.
Studio browser
Ping Identity tests Studio with many browsers, including the latest stable version of Chrome.
What’s new
PingGateway 2025.3
Use Bouncy Castle FIPS
PingGateway now describes how to use Bouncy Castle FIPS to help with FIPS 140–3 compliance without requiring an HSM using a PKCS#11 interface.
Learn more in FIPS 140–3 compliance.
Offload TLS handshakes
ClientTlsOptions
and ServerTlsOptions
now support an optional offloadHandshake
setting (default: false
).
When processing a TLS handshake with revocation checks enabled,
the handshake process can take an extended amount of time, blocking the event thread from processing other requests.
When this option is true
, PingGateway processes the TLS handshake in a separate worker thread.
The event thread continues to process other requests.
Close connections gracefully
PingGateway now supports options to help close connections more gracefully.
Use the new "connectionTimeToLive"
and "connectionShutdownGracePeriod"
settings for connections
to servers and
from client applications.
Custom unauthorized responses for Kerberos
The KerberosIdentityAssertionPlugin
now supports customzing the HTTP 401 Unauthorized responses with an optional unauthorizedResponseHandler
.
When a browser can’t supply a Kerberos token and isn’t configured to deal appropriately with HTTP 401 Unauthorized,
the default response can leave the user stuck on an unauthorized page.
Use the unauthorizedResponseHandler
provide an appropriate response to resolve this issue.
OpenTelemetry now supported
OpenTelemetry support is no longer a technology preview. It is now a supported feature.
The feature has Evolving interface stability. It is subject to change without notice, even in a minor or maintenance release.
PingGateway 2024.11
Device profile support for risk evaluation
PingGateway now supports gathering device profile data from the user-agent and including the profile data in PingOne Protect risk evaluation requests.
Learn more in PingOne Protect integration.
PKCE support for OAuth 2.0 clients
The AuthorizationCodeOAuth2ClientFilter and ClientRegistration configurations now support RFC 7636: Proof Key for Code Exchange by OAuth Public Clients (PKCE).
PKCE is enabled by default and recommended.
To disable it, set "pkce_method": "none"
or "pkceMethod": "none"
as described in the reference documentation.
Graceful shutdown
The stop.sh
and stop.bat
scripts now accept additional arguments to change how long the script waits
before forcing the PingGateway process to terminate.
Learn more in Graceful shutdown.
Lifetime for CDSSO sessions
The CrossDomainSingleSignOnFilter now has
a "lifetime"
setting to configure the duration after which PingGateway removes
the initial CDSSO authentication session state.
Propagate disconnections
PingGateway now supports a ClientHandler and
ReverseProxyHandler "propagateDisconnection"
setting
to reset the connection to the protected application when the user-agent disconnects
and PingGateway is in streaming mode.
Support for DER certificates
PingGateway now supports a
derCertificate(string)
function to convert a base64-encoded DER-format string into a certificate.
More flexible AmSessionIdleTimeoutFilter
settings
A new "idleTimeoutUpdate": "INCREASE_ONLY_THEN_ALWAYS"
setting for
AmSessionIdleTimeoutFilters
lets you enforce the longest timeout of either the idle timeout from the current filter or the tracking token,
and then set the tracking token timeout to the idle timeout of the filter.
PingGateway uses the updated tracking token on the next interaction with an AmSessionIdleTimeoutFilter.
The next AmSessionIdleTimeoutFilter filter can use a different "idleTimeoutUpdate"
setting, for example,
to enforce a shorter idle timeout.
PingGateway 2024.9
OpenTelemetry capabilities
This release adds the ability to push traces to an OpenTelemetry service.
These capabilities are available in Technology preview. They aren’t yet supported, may be functionally incomplete, and are subject to change without notice. |
Learn more in the following documentation:
Multiple versions of a secret with FileSystemSecretStore
With the new FileSystemSecretStore versionSuffix
setting you can have multiple versions of a secret with the same ID.
Learn more in FileSystemSecretStore.
Replace setting for HeaderFilter
Use the new HeaderFilter replace
setting to replace headers instead of removing then adding them.
Learn more in HeaderFilter.
Runtime exception condition for retries
The new runtimeExceptionCondition
setting lets you restrict which runtime exceptions lead to retries.
Learn more in ClientHandler and ReverseProxyHandler.
Security provider setting for keystores
The new securityProvider
setting lets you choose the Java security provider to use when loading a keystore.
Learn more in KeyStoreSecretStore.
Delayed route metrics creation
The new delayRouteMetrics
setting lets you defer creation of route metrics until a request passes through the route.
This can improve startup times for deployments with many routes.
Learn more in Router.
Separate endpoint for administration
PingGateway now lets you configure a separate endpoint for administrative connections. PingGateway is expected to require a separate administrative endpoint in a future release.
Learn more in AdminHttpApplication (admin.json
).
New PingOne Authorize example
The documentation now includes an example showing how to protect a web application with help from PingOne Authorize.
Learn more in PingOne Authorize integration.
Asynchronous reads in FileAttributesFilter
and SqlAttributesFilter
When you omit the deprecated target
setting from
a FileAttributesFilter
or an SqlAttributesFilter,
PingGateway reads the file or performs the SQL query asynchronously when calling the filter.
Place the filter immediately before the entity reading the data from the context.
PingGateway 2024.6
IG becomes PingGateway
Product names changed when ForgeRock became part of Ping Identity. PingGateway was formerly known as ForgeRock Identity Gateway. Learn more about the name changes in New names for ForgeRock products.
PingOne Protect integration
You can now use PingOne Protect risk evaluations to help protect web applications. Configure PingGateway routes to react dynamically to risk scores from PingOne Protect.
PingOne Protect integration is available in Technology preview. It isn’t yet supported, may be functionally incomplete, and is subject to change without notice. |
Learn more in PingOne Protect integration.
Changes to the Prometheus Scrape Endpoint
To facilitate consumption of Prometheus metrics, the format of some metrics has been updated
and the new format is available on the new endpoint …/openig/metrics/prometheus/0.0.4
.
The old format and endpoint are deprecated, but for backward compatibility, they are enabled and available by default.
The new property serveDeprecatedPrometheusEndpoint
in
AdminHttpApplication
is available to deliver Prometheus metrics in the deprecated format.
It is enabled by default.
Learn more in Metrics at the Prometheus Scrape Endpoint.
New metrics at the Prometheus Scrape Endpoint
Startup and Websocket metrics are now available at the Prometheus Scrape Endpoint. Learn more in Startup metrics at the Prometheus Scrape Endpoint and WebSocket metrics at the Prometheus Scrape Endpoint.
PingOneApiAccessManagementFilter now supported
The PingOneApiAccessManagementFilter is now supported for general use.
Hardened security for OpenID Connect ID tokens
PingGateway now supports OpenID Connect ID token validation according to the OpenID Connect specifications.
For this release, signature validation is optional. The next major release is expected to make ID token signature validation required.
The following new properties enable validation of the ID token signatures and the
iss
, aud
, exp
, iat
, and nonce
claims:
-
-
skipSignatureVerification
-
clientSecretUsage
In addition, use the
clientSecretId
andsecretsProvider
properties for HMAC-based signature validation. -
-
-
issuer
-
secretsProvider
-
idTokenVerificationSecretId
-
idTokenSkewAllowance
-
Learn more about ClientRegistration configurations and Issuer configurations in Incompatible changes.
IG 2024.3
Local authentication on behalf of PingOne Advanced Identity Cloud and Kerberos validation
The following new objects are available for local processing on behalf of PingOne Advanced Identity Cloud as part of an PingOne Advanced Identity Cloud journey:
-
KerberosIdentityAssertionPlugin and the service objects UsernamePasswordServiceLogin and KeytabServiceLogin.
These objects exist alongside the Technical Preview objects, IdentityAssertionHandlerTechPreview, ScriptableIdentityAssertionPluginTechPreview, and IdentityAssertionPluginTechPreview, introduced in the last release.
Monitoring of caches
Monitoring metrics are now available at the Prometheus Scrape Endpoint and Common REST Monitoring Endpoint for the caches described in Caches.
Learn more in Cache metrics at the Prometheus Scrape Endpoint.
Use of secrets in Studio
IG now uses secrets instead of deprecated passwords. Learn how IG manages migration in Upgrade from an earlier version of Studio.
Use of Splunk or ElasticSearch audit event handlers in Studio
IG Studio no longer uses the deprecated Splunk or ElasticSearch audit event handlers. Learn how IG manages migration in Upgrade from an earlier version of Studio.
Hardened security for secrets
With PingOne Advanced Identity Cloud and from AM 7.5, passwords hardcoded in the identity provider configuration can optionally be managed by the identity provider’s secret service. These passwords include the IG agent passwords and OAuth 2.0 client passwords.
IssuerRepository
An IssuerRepository is provided as a default object. Learn more in Default objects.
Dedicated filter for PingOne’s API Access Management (Technology preview)
PingOneApiAccessManagementFilter is a new filter dedicated to PingOne’s API Access Management. Use this filter with API Access Management to evaluate HTTP requests and responses.
The PingOneApiAccessManagementFilter is available in Technology preview. It isn’t yet supported, may be functionally incomplete, and is subject to change without notice. |
IG 2023.11.x
IG 2023.11.1 is a maintenance version to fix issues listed in Fixed in 2023.11.1. It contains no new features. |
General features
Harden OAuth 2.0 access token requests
GrantSwapJwtAssertionOAuth2ClientFilter is a new filter to transform requests for OAuth 2.0 access tokens into secure JWT bearer grant type requests.
Use this filter with PingOne Advanced Identity Cloud or AM to increase the security of less-secure grant-type requests like Client credentials grant or Resource owner password credentials grant.
Learn more in Secure the OAuth 2.0 access token endpoint.
Include key ID in JWT header
The new includeKeyId
property is available in JwtBuilderFilter
to include the ID of the signature key in the header of a built JWT.
Local processing on behalf of PingOne Advanced Identity Cloud (Technology preview)
The following new objects are available for local processing on behalf of PingOne Advanced Identity Cloud as part of an PingOne Advanced Identity Cloud journey:
The IdentityAssertionHandlerTechPreview, ScriptableIdentityAssertionPluginTechPreview, and IdentityAssertionPluginTechPreview are available in Technology preview. They aren’t yet supported, may be functionally incomplete, and are subject to change without notice. |
Secret format JwkPropertyFormat
JwkPropertyFormat is a new secret format. Use it with FileSystemSecretStore to decode JSON Web Key (JWK) formatted keys into secrets.
More flexible use of CA-certificates in mutual TLS
The new property certificateVerificationSecretId
is available in
SecretsTrustManager to use of CA certificates in mutual TLS.
In previous releases, the use of CA-signed certificates was more restricted.
Safeguard against accidental exposure of private keys with JwkSetHandler
The exposePrivateSecrets
new property is available in
JwkSetHandler
to safeguard against the accidental exposure of private keys in a JWK set.
The property is false
by default to prevent exposure of private keys.
To expose private keys, explicitly set the property to true
.
SAML
Prevention of redirect loops when session cookies aren’t present in the SAML flow
In SamlFederationFilter,
the new redirectionMarker
property is enabled by default to prevent redirect loops
when a session cookie isn’t present in the SAML flow.
When the marker is present in the request query parameters, the request isn’t redirected for authentication.
IG 2023.9
Revocation of access tokens initiated by OAuth 2.0 Resource Servers
The following new properties have been added in AuthorizationCodeOAuth2ClientFilter and Issuer:
-
AuthorizationCodeOAuth2ClientFilter:revokeOauth2TokenOnLogout
-
Issuer:revocationEndpoint
In OpenID Connect, use these properties to revoke access and refresh tokens issued by Authorization Servers during login.
Logout initiated by OpenID Connect relying parties
The following new properties have been added in AuthorizationCodeOAuth2ClientFilter and Issuer:
-
AuthorizationCodeOAuth2ClientFilter:openIdEndSessionOnLogout
-
Issuer:endSessionEndpoint
In OpenID Connect, use these properties to initiate logout from authorization servers.
Option to require the Authorization Server to prompt the end-user to reauthenticate and consent
A new property prompt
is available in AuthorizationCodeOAuth2ClientFilter.
Use the property in OIDC flows to require the authorization server to prompt the end user to reauthenticate and consent.
Improved error handling for AuthorizationCodeOAuth2ClientFilter
When an OAuth 2.0 authorization operation fails, the AuthorizationCodeOAuth2ClientFilter injects the error and error description into the OAuth2FailureContext. In previous releases, OAuth2FailureContext was used only for the OAuth2TokenExchangeFilter.
New context for use with AuthorizationCodeOAuth2ClientFilter
In AuthorizationCodeOAuth2ClientFilter, retrieve the original target URI for a request from the new IdpSelectionLoginContext.
Improved security for CrossDomainSingleSignOnFilter
When verificationSecretId
in CrossDomainSingleSignOnFilter isn’t configured,
IG discovers and uses the AM JWK set to verify the signature of AM session tokens.
If the JWK set isn’t available, IG doesn’t verify the tokens.
In earlier releases,
IG didn’t verify the tokens when verificationSecretId
in CrossDomainSingleSignOnFilter wasn’t configured.
To minimize the risk of CDSSO token tampering, always configure verificationSecretId
in CrossDomainSingleSignOnFilter.
IG 2023.6
Large JWT session cookies are automatically split
In stateless sessions, when the JWT session cookie exceeds 4 KBytes, IG automatically splits it into multiple cookies.
If your JWT session size is too close to the value of connectors:maxTotalHeadersSize
in AdminHttpApplication,
IG can block your next request containing split JWT session cookies.
Consider increasing the value of connectors:maxTotalHeadersSize
.
JWT session cookies not compressed by default
To improve security, JWT session cookies are no longer compressed by default.
Startup allowed if there is an existing PID file
IG can now start up when there is an existing PID file. When activated, IG removes the existing PID file and creates a new one during startup. In previous releases, if there was an existing PID file during startup, the startup failed.
Activate the feature in the following ways:
-
By the new property
pidFileMode
in AdminHttpApplication. -
With the new configuration token
ig.pid.file.mode
.
Prevention of redirect loops when session cookies aren’t present in the CDSSO flow
In CrossDomainSingleSignOnFilter,
the new redirectionMarker
property is enabled by default to prevent redirect loops
when the session cookie isn’t present in the CDSSO flow.
When the marker is present in the request query parameters, the request isn’t redirected for authentication.
Regex-based alias selection in KeyStoreSecretStore and HsmSecretStore
The new mappings:aliasesMatching
property in KeyStoreSecretStore and HsmSecretStore is available
to map all aliases that match a regular expression to a secret ID.
Some KeyStores, such as a global Java TrustStore, can contain hundreds of valid certificates. Use this property to map multiple aliases to a secret ID without listing them all in the mapping.
Entity of StaticResponseHandler can be an array of strings
To improve readability, you can now define the entity
property of a StaticResponseHandler
as an array of strings or as a string.
Maximum size for the sum of all request headers
The new connectors:maxTotalHeadersSize
property in AdminHttpApplication defines
the maximum size in bytes for the sum of all headers in a request.
This property replaces the deprecated Vert.x properties maxHeaderSize
and initialSettings:maxHeaderListSize
.
Support for unencoded policy advices
To support SDK in legacy installations,
a new useLegacyAdviceEncoding
property in the PolicyEnforcementFilter is available to provide unencoded advices.
By default, advices are encoded with the encoder used by the AM version.
The use of this property is deprecated and should be used only to support SDK in legacy installations.
IG 2023.4
Authentication of IG agent to PingOne Advanced Identity Cloud and AM
IG agents automatically authenticate to PingOne Advanced Identity Cloud and AM with a non-configurable authentication module. Authentication chains and modules are deprecated and replaced by nodes, trees, and journeys.
You can now authenticate IG agents to PingOne Advanced Identity Cloud and AM 7.3 with a journey. The procedure is currently optional, but will be required when authentication chains and modules are removed.
Policy advices from PingOne Advanced Identity Cloud and AM available in a header
By default, when PingOne Advanced Identity Cloud or AM denies a request with advices, IG returns a redirect response with advices as parameters.
When the request includes the x-authenticate-response
header with the value header
,
IG now returns the response with the advices in a WWW-authentication
header.
Use this method for SDKs and single page applications. Placing advices in a header gives these applications more options for handling the advices.
Use the new authenticateResponseRequestHeader
property in PolicyEnforcementFilter to configure
the x-authenticate-response
header name.
SAML
The SamlFederationHandler is deprecated and replaced by the SamlFederationFilter.
The SamlFederationFilter can be used in a route protect a downstream application in the same way as other authentication-triggering filters like a SingleSignOnFilter or CrossDomainSingleSignOnFilter.
When triggered, the SamlFederationFilter can initiate the login or logout of a SAML service provider with a SAML identity provider.
WebSocket connection renewal
IG can now automatically renew WebSocket connections to AM after a defined delay.
Limit side effects when backend applications are slow
ClientHandler and ReverseProxyHandler have a new waitQueueSize
property to set
the maximum number of outbound requests allowed to queue when no downstream connections are available.
Use this property to limit memory use when there is a backlog of outbound requests, for example,
when the protected application or third-party service is slow.
In previous releases, the queue size was unlimited.
It is now limited to the square of the value of the connections
property by default.
IG 2023.2
Session eviction
AM 7.3 can be configured to invalidate sessions based on user ID
and send a notification with the topic /agent/session.v2
to IG.
IG can now use the notification to evict all sessions bound to the user.
This feature requires AM 7.3. |
Preserve POST data during authentication
The DataPreservationFilter triggers POST data preservation when an unauthenticated client posts HTML form data to a protected resource.
Prevent unnecessary session expiry
When the AmService property sessionIdleRefresh
is enabled, IG now requests session refresh:
-
The first time IG gets an SSO token from AM, irrespective of the age of the token.
-
When
sessionIdleRefresh.interval
has elapsed.
In previous releases, IG requested session refresh only after sessionIdleRefresh.interval
elapsed.
If IG got an SSO token close to its maximum idle time,
the token could expire before sessionIdleRefresh.interval
elapsed and IG triggered a refresh.
CapturedUserPasswordFilter supports secret rotation
When relying on a SecretsProvider to retrieve the shared key required by the CapturedUserPasswordFilter, you can now rotate a secret without reloading the filter if the underlying secret store supports secret rotation.
KeyStoreSecretStore allows unprotected KeyStores
KeyStoreSecretStore can now use KeyStores that aren’t password-protected. In previous releases, KeyStores had to be password-protected.
Delay destroying HttpClientHandlerHeaplets during shutdown
When IG is cleanly shut down, the destruction of HttpClientHandlerHeaplets is now delayed until all other IG heaplets are destroyed. This change allows the other IG heaplets to use HttpClientHandlerHeaplets during shutdown. For example, AmService can now call logout on any agent tokens it has allocated, which can help to reduce the build up of tokens in AM.
ClientHandlers and ReverseProxyHandlers are examples of HttpClientHandlerHeaplets.
Automatic reload of FileSystemSecretStore and KeystoreSecretStore
A new autoRefresh
property is available in FileSystemSecretStore and KeyStoreSecretStore settings
to configure automatic reloaded of the secret store when a file or a keystore is edited or deleted.
Groovy 4
IG now uses Groovy 4 for scripting. Learn more in the Release notes for Groovy 4.0
IG 7.2
Token exchange
OAuth2TokenExchangeFilter is a new filter to exchange a client’s access token or ID token for a new token with increased or reduced scopes, while preserving the original token subject.
Connectivity with OAuth 2.0-protected third-party services
OAuth2ClientFilter renamed as AuthorizationCodeOAuth2ClientFilter
IG provides several client authentication filters to protect resources using different types of information and credentials. To make it easier to differentiate between these filters, the OAuth2ClientFilter is now named AuthorizationCodeOAuth2ClientFilter. For backward compatibility, you can still use the name OAuth2ClientFilter in routes.
The following client authentication filters are available to authenticate clients:
-
AuthorizationCodeOAuth2ClientFilter, using OAuth 2.0 delegated authorization.
-
ClientCredentialsOAuth2ClientFilter, using the client’s OAuth 2.0 credentials.
-
ResourceOwnerOAuth2ClientFilter, using the resource owner’s password credentials.
ClientCredentialsOAuth2ClientFilter uses client_secret_basic
or client_secret_post
The ClientCredentialsOAuth2ClientFilter
can now get a client’s access token using the token endpoint authentication method client_secret_post
.
In previous releases, it could use only client_secret_basic
.
Client authentication is now provided by the endpointHandler
property of ClientCredentialsOAuth2ClientFilter,
which uses ClientSecretBasicAuthenticationFilter or ClientSecretPostAuthenticationFilter.
In previous releases, it was provided by the now deprecated properties clientId
and clientSecretId
.
ResourceOwnerOAuth2ClientFilter for services to access resources protected by OAuth 2.0
A new filter ResourceOwnerOAuth2ClientFilter is available for services to access resources protected by OAuth 2.0 using the Resource Owner Password Credentials grant type.
Filters to support OAuth 2.0 client authentication
When processing requests or responses, IG can require access to systems such as the PingOne Advanced Identity Cloud to query user information. The following filters enable OAuth 2.0 client authentication to these systems, where IG is the client:
Use these filters with the following objects:
OAuth 2.0 session sharing across routes
The oAuth2SessionKey
property has been added to
AuthorizationCodeOAuth2ClientFilter
to allow multiple applications to share the same OAuth 2.0 session.
After a resource owner gives one application protected by IG consent to use its data, they don’t need to give consent for another application protected by IG.
In previous releases, the OAuth 2.0 session was bound to the full URI of the client callback containing the IG hostname. It wasn’t possible to use the same OAuth 2.0 session to access different applications.
Circuit breaking
CircuitBreakerFilter
CircuitBreakerFilter is a new filter to monitor for failures. When the failures reach a specified threshold, the CircuitBreakerFilter prevents further calls to downstream filters and returns a runtime exception.
Circuit breaker in ClientHandler and ReverseProxyHandler
A new property circuitBreaker
has been added to ClientHandler
and ReverseProxyHandler
to provide a circuit breaker service when the number of failures reaches a configured threshold.
Stability
JwtBuilderFilter produces encrypted JWT
The JwtBuilderFilter now produces encrypted JWTs, as well as unsigned JWTs, signed JWTs, and signed then encrypted JWTs.
JwtSession cookie compression
The property useCompression
has been added to JwtSession.
When a session stores large items like tokens,
use the default value true
to reduce size of the cookie that stores the JWT.
Other
Windows start script for IG in standalone mode
A script is now provided to start IG in standalone mode on Windows.
Stop scripts for IG in standalone mode
Scripts are now provided to stop IG in standalone mode on Unix/OS X and Windows.
IG_OPTS
environment variables for startup
IG_OPTS
is a new environment variable to separate Java runtime options for
IG startup and stop scripts with IG in standalone mode.
Use IG_OPTS
instead of JAVA_OPTS
for all options that aren’t shared with the stop script.
SNI to serve different certificates for TLS Connections to different server names
In ServerTlsOptions, sni
is a new property
to serve different secret key and certificate pairs for TLS connections to different server names in the deployment.
In previous releases, only the keyManager
property was available
to serve the same secret key and certificate pair for TLS connections to all server names.
Use this property when IG is acting server-side, or to front multiple services or websites on the same port of a machine.
IG proxies all WebSocket subprotocols by default
In previous releases, for IG in standalone mode it was necessary to list the WebSocket subprotocols
IG proxied using the vertx
property of
admin.json.
IG now proxies all WebSocket subprotocols by default; it isn’t necessary to specify protocols. If you do specify protocols, IG supports only those protocols and no others.
Configurable conditions for retries in ClientHandler and ReverseProxyHandler
condition
is a new property in the retries
configuration of ClientHandler and ReverseProxyHandler.
Use this property to configure a condition on which to trigger a retry.
In previous releases, a retry could be triggered only for runtime exceptions.
User ID in audit logs
Audit logs can now include a user ID. Example scripts and setup information is provided in Recording user ID in audit events.
Tracking ID logged in access audit events
In routes containing an OAuth2ResourceServerFilter, OAuth 2.0 token tracking IDs are now logged in access audit events.
Transformation from string to placeholder string
The $string
transformation has been added to facilitate the transformation from a string
to a placeholder string that isn’t encoded.
Use this transformation for placeholder strings that mustn’t be encrypted when they reference a secret value.
Learn more in string in Token Transformation.
Use expressions to configure paths in UriPathRewriteFilter
The mapping
object in UriPathRewriteFilter now uses configuration expressions to define the fromPath
and toPath
.
In previous releases, the mapping
object was a static JSON map.
Learn more in UriPathRewriteFilter.
PolicyDecisionContext includes actions from the policy decision response
Actions from the AM policy decision response are now available for use in the PolicyDecisionContext.
The resource value used when making the policy request is now available in the PolicyDecisionContext.
AmService detects AM version
AmService now reads the AM version from the AM endpoint
and uses the discovered version instead of the value configured in the AmService property version
.
The property version
is used only if the AmService can’t discover the AM version.
Certificate issued by a trusted CA for any hostname or domain is accepted for a connection to any domain
When IG is acting as a WebSocket proxy and the downstream application is on HTTPS,
the WebSocket configuration host can now allow a certificate issued by a trusted CA for any hostname or domain
to be accepted for a connection to any domain.
Learn more in the documentation for the hostnameVerifier
property of
ClientTlsOptions.
Product information in startup logs
Key product information, such as the product version and build number, is now included in the startup logs.
Improved error handling in ScriptableFilter and ScriptableHandler
The ScriptableFilter and ScriptableHandler now propagate script exceptions as runtime exceptions in the promise flow. In previous releases, they replaced the exception with a response with HTTP status 500. Users didn’t know if the response was from the requested endpoint or caused by an exception in the chain.
AmService Websocket connections protected from timeout
A heartbeat can be configured for the AmService WebSocket notification service to prevent Websocket connections from being closed for timeout.
Timeout of idle AM sessions
A new filter, AmSessionIdleTimeoutFilter, is available to force the revocation of AM sessions that have been idle for a specified timeout.
Use this filter in front of a SingleSignOnFilter or CrossDomainSingleSignOnFilter to manage idle timeout for client sessions in AM.
Proxy configuration can be created in the heap and used for AM notifications
A new ProxyOptions heaplet is available to define a proxy to which a ClientHandler or ReverseProxyHandler can submit requests. An AmService can use it to submit Websocket notifications.
A new global ProxyOption heap object is provided.
Fixes
The following pages list important fixes in major or minor versions.
Fixed in PingGateway 2025.3
-
OPENIG-9015: PingGateway throws IllegalArgumentException with JwtSession and 'sessionIdleRefresh: true' in AmService
-
OPENIG-8900: Existing query parameters should not be decoded when working with the marker parameter in the DataPreservationFilter
-
OPENIG-8211: OAuth2ResourceServerFilter: default value for realm should be empty
-
OPENIG-6608: Can’t set cookie domain in session cookies
Fixed in PingGateway 2024.11
-
OPENIG-8853: Welcome page doesn’t display the current year in the copyright section
Fixed in PingGateway 2024.9
-
OPENIG-8544: PingOneApiAccessManagementFilter
"includeBody": false
isn’t a possible value -
OPENIG-8489: Attempting to create the default router directory can fail when filesystem is read-only even when the directory exists
-
OPENIG-8325: Fix undelivered connection closures found in performance test
-
OPENIG-8259:
ig_http_server_active_requests
metric shows negative values -
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync
Fixed in PingGateway 2024.6
-
OPENIG-8432: Config expression doesn’t work in audit service’s event handler configuration
-
OPENIG-8370: IG standalone 2023.11 and above throws NPE and return response 500
-
OPENIG-8340: RouterHandler should validate the directory being set in the config
-
OPENIG-8295: When a trailing header is used in a StaticResponseHandler the HTTP response doesn’t conform to the HTTP spec
Fixed in IG 2024.3
-
OPENIG-7557: Inline named object declarations in IG config interactions with heap objects are misleading
-
OPENIG-7633: Http endRequest metrics should check if handler is null
-
OPENIG-7674: Misleading deprecation notice in ClientRegistration without secretsProvider
-
OPENIG-7680: GzipFlowableTransformer fails when there is empty bytebuffer after actual gzip content
-
OPENIG-7736: IG drops some bytes during POST and PUT of large data/images
-
OPENIG-7738: readWithCharset method doesn’t return the content of the file as a plain string.
-
OPENIG-7790: HTTP Client Active Request Gauge can display negative values
-
OPENIG-7859: org.forgerock.openig.filter.oauth2.client.ClientRegistration#revokeToken logs incorrect endpoint when revocation fails
-
OPENIG-7978: PEF should return 401 when no subjects can be found instead of 500
-
OPENIG-8069: Vertx threads are getting locked on org.forgerock.http.vertx.monitoring.meters.Gauges.get(Tags)
-
OPENIG-8070: vert.x threads are getting locked on SessionInfoCache$IndexTable
Fixed in IG 2023.11.1
-
OPENIG-7633: Http endRequest metrics should check if handler is null
-
OPENIG-7736: IG drops some bytes during POST and PUT of large data/images
Fixed in IG 2023.11
-
OPENIG-7453: SecretsTrustManager fails to load CA-signed certificates due to restrictive KeyUsage
-
OPENIG-7768: Declaring JwtSession named 'Session' in config.json fails
-
OPENIG-7774: CorsFilter should handle invalid policies better instead of throwing NPE
-
OPENIG-4817: Can’t specify any host information for HTTP/2 request
Fixed in IG 2023.6
-
OPENIG-7429: IG can’t handle requests with IPv6 URL
-
OPENIG-7474: SwitchFilter’s handler fails to send original POST request entity
Fixed in IG 2023.4
-
OPENIG-5913: (UI) Route configuration lost sometime after un-deploy from route list
Fixed in IG 7.2
-
OPENIG-6911: Failed agent authentication isn’t clear from the IG logs
-
OPENIG-6394: Stack traces are printed twice in the log files
-
OPENIG-6206: When checking for peer certificates in a request, validate that the SSLSession is available
-
OPENIG-5872: Stop Tyrus WebSocket connection retry when Websocket Client is closed
-
OPENIG-5868: WebSocketClientHandshakeException: Invalid subprotocol seen when using IG standalone to proxy WebSocket requests
-
OPENIG-5805: The notification service should attempt to refresh the caller token when receiving a 401 on WebSocket connections
-
OPENIG-5793: Unexpected behaviour of EL function matches
-
OPENIG-5778: sessionInfo requests can lead to a build up of agent tokens being created
-
OPENIG-5743: Standalone: Possible OOME for large requests
-
OPENIG-5725: Add SNI configuration
-
OPENIG-5683: HTTP/2 : set max connections
-
OPENIG-5610: Null Pointer Exception when using ForwardedRequestFilter with ResourceHandler
-
OPENIG-5540: PEM secret format fails to decode some EC private keys
-
OPENIG-5539: The ForwardedRequestFilter shouldn’t change original URI parameter values when rebasing
-
OPENIG-5425: JwkSetHandler: No error displayed when using an invalid configuration such as a public key exported -as jwk- for decryption usage
-
OPENIG-4956: Inbound WebSocket connection isn’t closed when outbound connection is closed abruptly
Security advisories
Ping Identity issues security advisories in collaboration with our customers to address any security vulnerabilities transparently and rapidly.
Ping Identity’s security advisory policy governs the process on how security issues are submitted, received, and evaluated as well as the timeline for the issuance of security advisories and patches.
You can find security advisories in the Knowledge Base.
Deprecated
Features and properties are deprecated and removed as defined in Product stability labels.
Unless otherwise stated, when a deprecated setting and its replacement setting are both provided, the replacement setting is used.
2025.3
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Java support |
Java 17 |
Java 21 |
Not yet removed |
2024.11
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
AdminHttpApplication ( |
Provided objects you can override by defining objects with the same name:
|
Override defaults by defining filters for the new settings:
|
Not yet removed |
The |
Define a |
Not yet removed |
|
Define a |
The |
Not yet removed |
|
AuthorizationCodeOAuth2ClientFilter |
The |
Each AuthorizationCodeOAuth2ClientFilter will have its own private list of issuers. |
Not yet removed |
GatewayHttpApplication ( |
The |
Define a |
Not yet removed |
Define a |
The |
Not yet removed |
|
The session settings will no longer default to those defined in |
If no |
Not yet removed |
|
Issuer |
The |
Each AuthorizationCodeOAuth2ClientFilter will have its own private list of issuers. |
Not yet removed |
IssuerRepository |
The entire object
and the default |
For issuers known in advance, add their settings to the For discovery, if the |
Not yet removed |
JwtSession |
The entire object. |
Use a |
Not yet removed |
Prometheus metrics |
The |
Use the |
Not yet removed |
Router |
The default path for the |
Set the |
Not yet removed |
2024.9
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
AdminHttpApplication ( |
Allow administrative connections on gateway endpoints (current default) |
Configure a separate |
Not yet removed |
|
- |
Not yet removed |
|
|
|
Not yet removed |
|
Lazy loading in FileAttributesFilter and SqlAttributesFilter |
|
FileAttributesContext and SqlAttributesContext |
Not yet removed |
RouterHandler alias |
|
|
Not yet removed |
2024.6
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Prometheus endpoint |
|
|
Not yet removed |
Prometheus metrics:
|
|
|
Not yet removed |
Prometheus metrics:
|
|
|
Not yet removed |
TokenResolver class used as follows:
|
Whole class |
Not replaced. Use the following expression format instead:
|
Not yet removed |
2024.3
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Vert.x |
Options described in 4.5.0 Deprecations and breaking changes |
Options described in VertxOptions |
Not yet removed |
Common REST Monitoring Endpoint |
Whole feature |
Prometheus Scrape Endpoint |
Not yet removed |
2023.11
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Java support |
Java 11 |
Java 17 |
2024.3 |
2023.9
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Retrieval of the target URI in AuthorizationCodeOAuth2ClientFilter |
|
IdpSelectionLoginContext |
Not yet removed |
2023.6
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Vert.x |
|
|
Not yet removed |
PolicyEnforcementFilter |
|
Advice encoding with the encoder used by the AM version. |
Not yet removed |
2023.4
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
CookieFilter |
Use of the Set-Cookie2 HTTP header, obsoleted by RFC 6265: Set-Cookie2 |
Not replaced |
Not yet removed |
SamlFederationHandler |
Whole object |
SamlFederationFilter |
Not yet removed |
2023.2
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
Studio |
Structured Editor |
Not replaced |
Not yet removed |
KeyStoreSecretStore |
Required property |
Optional property |
Not yet removed |
HsmSecretStore |
property |
property |
Not yet removed |
Names of Prometheus counter metrics |
|
In a future release, the deprecated names are expected to be replaced with
names ending in Only the metric name is deprecated; the information provided by the metric is not deprecated. Other Prometheus metrics aren’t affected. |
Not yet removed |
Names of Vert.x counter metrics |
|
In a future release, the deprecated names are expected to be replaced with
names ending in Only the metric name is deprecated; the information provided by the metric isn’t deprecated. Other Vert.x metrics aren’t affected. |
Not yet removed |
KeyStore |
Whole object |
KeyStoreSecretsStore There will be no replacement for keystore loading from a URL. |
Not yet removed |
KeyManager |
Whole object |
SecretsKeyManager |
Not yet removed |
TrustManager |
Whole object |
SecretsTrustManager |
Not yet removed |
CapturedUserPasswordFilter |
A |
A After removal, it will no longer be possible to store the shared key in a Base64SecretStore. |
Not yet removed |
7.2
Feature or property | Setting | Replacement setting | Removed in |
---|---|---|---|
CapturedUserPasswordFilter |
|
|
2025.3 |
ClientCredentialsOAuth2ClientFilter |
|
|
2025.3 |
ClientHandler |
|
|
2025.3 |
|
ClientTlsOptions property |
2025.3 |
|
ClientRegistration |
|
|
2025.3 |
OAuth2ClientFilter |
Filter name |
AuthorizationCodeOAuth2ClientFilter |
2025.3 |
ReverseProxyHandler |
|
|
2025.3 |
|
ClientTlsOptions property |
2025.3 |
Removed
The listed features and properties have been removed.
2025.3
This release no longer supports AM 7.1 and earlier (deprecated in 2023.2).
Feature or property | Setting | Replacement setting | Deprecated in |
---|---|---|---|
CapturedUserPasswordFilter |
|
None; the filter expects a password encrypted with AES |
7.2 |
ClientCredentialsOAuth2ClientFilter |
|
|
7.2 |
ClientHandler |
|
Set the |
7.2 |
|
|
7.2 |
|
ClientRegistration |
|
|
7.2 |
CorsFilter |
|
|
7.1 |
CsvAuditEventHandler |
|
None |
- |
ElasticsearchAuditEventHandler |
Whole object |
None |
7.1 |
Functions |
|
None |
7.1 |
IdentityAssertionHandlerTechPreview |
Whole object |
IdentityAssertionHandler |
- |
OAuth2ClientFilter |
Whole object |
AuthorizationCodeOAuth2ClientFilter |
7.2 |
ReverseProxyHandler |
|
Set the |
7.2 |
|
|
7.2 |
|
ScriptableIdentityAssertionPluginTechPreview |
Whole object |
ScriptableIdentityAssertionPlugin |
- |
SplunkAuditEventHandler |
Whole object |
None |
7.1 |
The following filters and handlers are no longer instantiable in PingGateway scripts.
If you can’t configure them the way you want to, write your own similar ScriptableFilter
or ScriptableHandler
:
-
AssignmentFilter
-
EntityExtractFilter
-
HeaderFilter
-
LocationHeaderFilter
-
StaticRequestFilter
-
SwitchFilter
-
DispatchHandler
-
SequenceHandler
-
StaticResponseHandler
2024.3
Feature or property | Setting | Replacement setting | Deprecated in |
---|---|---|---|
IG product |
Creation of a .war file |
.zip file |
6 |
SingleSignOnFilter |
|
|
7 |
Java support |
Java 11 |
Java 17 |
2023.11 |
JwtSession |
|
|
7, 6.5 |
OpenAmAccessTokenResolver |
Whole object |
None |
7 |
JwtBuilderFilter |
Use of unsigned or unencrypted JWTs |
Use of signed or encrypted JWTs |
7 |
GrantSwapJwtAssertionOAuth2ClientFilter |
Use of unsigned or unencrypted JWTs |
Use of signed or encrypted JWTs |
Not deprecated |
CryptoHeaderFilter |
Whole object |
JwtBuilderFilter |
7 |
Ldap |
|
None |
7.1 |
KeyManager |
|
|
6.5 |
CapturedUserPasswordFilter |
|
|
7 |
PasswordReplayFilter |
|
PasswordReplayFilter’s |
7 |
KeyStore |
|
|
7 |
DesKeyGenHandler |
Whole object |
None |
7 |
SqlAttributesFilter |
|
|
7 |
AmService |
|
|
6.5 |
TlsOptions |
Whole object |
ClientTlsOptions |
7 |
ClientHandler and ReverseProxyHandler |
|
|
7 |
JwtBuilderFilter |
|
|
6.5 |
AuditService |
|
|
7 |
ClientRegistration |
|
|
7 |
|
|
7 |
|
The name of the ClientRegistration heaplet to identify a client registration when a user initiates a login |
The |
7 |
|
Route |
|
A |
7 |
2023.2
Feature or property | Setting | Replacement setting | Deprecated in |
---|---|---|---|
IG product |
Delivery of a .war file |
.zip file |
6 |
Environment variable and system property |
|
|
6 |
PolicyEnforcementFilter |
|
|
6 |
ClientHandler and ReverseProxyHandler |
|
|
6.5 |
UserProfileFilter |
|
|
6.5 |
|
|
6.5 |
|
|
|
6.5 |
|
StatelessAccessTokenResolver |
|
|
6.5.1 |
|
|
6.5.1 |
Incompatible changes
Incompatible changes are changes affecting existing functionality and migration from a previous release. Before you upgrade, make appropriate changes to your scripts and plugins.
2025.3
New default port and paths for administrative endpoints
By default, PingGateway now listens for HTTP administrative requests on port 8085
and omits the deprecated /openig
path prefix from the paths to administrative endpoints.
You can change the default behavior by using the admin.json
adminConnector setting.
Examples in the documentation reflect the new default settings.
Prometheus Scrape Endpoint changes
-
The
/metrics/prometheus
endpoint is no longer served by default. If possible, use/metrics/prometheus/0.0.4
instead.The
admin.json
serveDeprecatedPrometheusEndpoint setting now defaults tofalse
. Set it totrue
and restart PingGateway if you must use the old endpoint. -
The metric
ig_jvm_free_used_memory_bytes
has been renamedig_jvm_free_memory_bytes
.
PingGateway now validates ID token signatures by default
The ClientRegistration
skipSignatureVerification setting now defaults to true
meaning PingGateway now validates OpenID Connect ID token signatures by default.
OAuth2ResourceServerFilter no longer sets a realm by default
The OAuth2ResourceServerFilter
optional realm setting
no longer sets an HTTP authentication realm by default.
useDeprecatedIssuerRepository is now false by default
The useDeprecatedIssuerRepository
settings for the
AuthorizationCodeOAuth2ClientFilter
and Issuer configurations
are now false
by default.
2024.6
Router now checks for directory
The Router handler now checks
the directory
in its configuration is an existing directory PingGateway can read.
If not, PingGateway throws an exception.
ClientRegistration configurations
To enable OpenID Connect ID token signature validation and the provider uses HMAC-based signatures, ClientRegistration configurations now require settings to access the client secret used for signature validation:
-
"skipSignatureVerification"
: must befalse
to enable ID token signature validation -
"clientSecretUsage"
: must beID_TOKEN_VALIDATION_AND_CLIENT_AUTHENTICATION
orID_TOKEN_VALIDATION_ONLY
-
"clientSecretId"
: must identify the client secret -
"secretsProvider"
: must provide for the client secret for signature validation
Learn more in ClientRegistration.
The Issuer for AuthorizationCodeOAuth2ClientFilter now uses asymmetric signature validation by default.
Issuer configurations
When you enable OpenID Connect ID token signature validation, update these properties of your Issuer configurations:
-
"issuer"
: must match theiss
claim value in the ID token (required unless it’s obtained from the provider’s well-known configuration URL) -
"idTokenVerificationSecretId"
: (optional) identifies the provider’s public key for signature validation -
"secretsProvider"
: (optional) provides the public key for signature validation -
"idTokenSkewAllowance"
: (optional) permits clock skew during signature validation
Learn more in Issuer.
The Issuer for AuthorizationCodeOAuth2ClientFilter now uses asymmetric signature validation by default.
2024.3
IG .war file
The IG .war file is no longer created. It was deprecated in IG 6 and stopped being delivered in IG 2023.2. Learn about migration in Migrate from web container mode to standalone mode.
secretsProvider
property changes from optional to required
Because the default secret service has been removed, you must configure a secretsProvider
for the following:
-
ClientHandler,
proxy
property -
ReverseProxyHandler,
proxy
property
Scripts
Groovy scripts used in the IG configuration must now use the UTF-8 character set. In previous releases, Groovy files referenced in the IG configuration could rely on default encoding or system properties.
Vert.x
Upgrade to Vert.x 4.5 renames and removes Vert.x options
used by WebSocket connections to AM and accessed through the vertx
setting of an
AmService.
Learn more about Vert.x changes in 4.5.0 Deprecations and breaking changes.
Use the Vert.x options described in VertxOptions.
Handling of failed HTTP responses
IG now fails an HTTP response promise when:
-
Streaming is disabled by the
streamingEnabled
property of admin.json. This is the default setting. -
The response provides response headers but not the entire response body.
In previous releases, IG completed the response promise but the response was unreadable.
JWT must be signed or encrypted
The following filters must now be configured with a SecretsProvider and signature or encryption:
Improved security for CrossDomainSingleSignOnFilter
When verificationSecretId
in CrossDomainSingleSignOnFilter is configured,
IG uses it to verify the signature of AM session tokens.
When verificationSecretId
isn’t configured,
IG discovers and uses the AM JWK set to verify the signature of AM session tokens.
From this release, if verificationSecretId
isn’t configured
and IG can’t use the AM JWK set, the CrossDomainSingleSignOnFilter fails to start.
In previous releases, the CrossDomainSingleSignOnFilter accepted unsigned tokens.
IG .zip file
To prevent confusion during upgrade, PingGateway-2025.3.0.zip now unpacks to a directory containing the IG version number.
For example, this release unpacks to /path/to/identity-gateway-2024.3.0
.
In previous releases, PingGateway-2025.3.0.zip unpacked to /path/to/identity-gateway
.
2023.11
Change to host header capitalization for HTTP/2
For HTTP/2, PingGateway pseudo-headers and host
response headers are now lowercase.
This isn’t a breaking change. RFC 2616, 4.2 Message Headers explains, "Field names are case-insensitive."
Some applications expect case-sensitive header names, such as Host
, however.
Update these applications to accept case-insensitive headers.
Safeguard against accidental exposure of private keys with JwkSetHandler
A new exposePrivateSecrets
property is available in JwkSetHandler
to safeguard against the accidental exposure of private keys in a JWK set.
The property is false
by default to prevent exposure of private keys.
To expose private keys, you must now explicitly set the property to true
.
7.2
ScriptableResourceUriProvider accepts returned values only as a String
ScriptableResourceUriProvider accepts returned values only as a String
.
In previous releases, it accepted returned values as a String
or Promise<String>
.
Learn more in the documentation for ScriptableResourceUriProvider
in
PolicyEnforcementFilter.
AM 5.x.x EOL
AM 5.x.x has reached product end of life and is no longer supported.
The default value of the AmService property version
has changed to 6
.
Learn more in Product Support Lifecycle Policy | PingGateway and Agents.
keyType
for CapturedUserPasswordFilter is required
For better security, the keyType
for CapturedUserPasswordFilter is now required and the use of DES
is deprecated.
JWT classes relocated to new packages
Classes related to JWT stateless sessions have moved from the org.forgerock.openig.jwt
package
to the org.forgerock.openig.session.jwt
package.
Classes and functions used to validate a JWT with a JwtValidatorCustomizer in a JwtValidationFilter
have moved from the org.forgerock.openig.tools.jwt
package to the org.forgerock.openig.tools.jwt.validation
package.
The IG scripting engine has been updated to incorporate the changes automatically.
CDSSO requires session cookies with SameSite=None
, Secure=True
To improve privacy, browsers have recently changed third-party cookie policies to require the following settings
for session cookies: SameSite=None
, Secure=True
.
Depending on your deployment and route configuration, configure session cookies as follows:
-
For stateful sessions in standalone mode, byadmin.json.
-
For stateful sessions in web container mode, by the web container:
-
For Tomcat, learn more in Configure SameSite for HTTP session cookies in Tomcat and Configure IG for HTTPS (server-side) in Tomcat.
-
For Jetty, learn more in Configure SameSite for HTTP session cookies in Jetty and Configure IG for HTTPS (server-side) in Jetty.
-
For JBoss, learn more in Configure SameSite for HTTP session cookies in JBoss and Configure IG for HTTPS (server-side) in JBoss.
-
-
For stateless sessions in standalone mode and web container mode, by JwtSession.
Known issues
The following important issues remained open at the time of the latest release for each version:
PingGateway 2024.6
Issue | Comment |
---|---|
OPENIG-8259: |
Fixed in 2024.9 |
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
IG 2024.3
Issue | Comment |
---|---|
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
IG 2023.11
Issue | Comment |
---|---|
OPENIG-7736: IG drops some bytes during POST and PUT of large data/images |
Fixed in 2024.3, 2023.11.1 |
OPENIG-7680: GzipFlowableTransformer fails when there is empty bytebuffer after actual gzip content |
Fixed in 2024.3 |
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
IG 2023.9
Issue | Comment |
---|---|
OPENIG-7736: IG drops some bytes during POST and PUT of large data/images |
Fixed in 2024.3 |
OPENIG-7680: GzipFlowableTransformer fails when there is empty bytebuffer after actual gzip content |
Fixed in 2024.3 |
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
OPENIG-4817: Can’t specify any host information for HTTP/2 request |
Fixed in 2023.11 |
IG 2023.6
Issue | Comment |
---|---|
OPENIG-7736: IG drops some bytes during POST and PUT of large data/images |
Fixed in 2024.3 |
OPENIG-7680: GzipFlowableTransformer fails when there is empty bytebuffer after actual gzip content |
Fixed in 2024.3 |
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
OPENIG-5294: Clear Issuer cache on exception |
Fixed in 2023.9 |
OPENIG-4817: Can’t specify any host information for HTTP/2 request |
Fixed in 2023.11 |
IG 2023.4
Issue | Comment |
---|---|
OPENIG-7429: IG can’t handle requests with IPv6 URL |
Fixed in 2023.6 |
OPENIG-7296: In Studio, switching deployment status of a route makes it out of sync |
Fixed in 2024.9 |
OPENIG-5294: Clear Issuer cache on exception |
Fixed in 2023.9 |
OPENIG-4817: Can’t specify any host information for HTTP/2 request |
Fixed in 2023.11 |
Limitations
Limitations are inherent to the design, not bugs to be fixed.
Audit events
-
The log file of audit events can be overwritten when the log file is rotated.
When a
CsvAuditEventHandler
is used to log audit events, PingGateway overwrites the log file if it is rotated before therotationFileSuffix
changes. By default,rotationFileSuffix
is defined as a date in_yyyy-MM-dd
format.PingGateway rotates log files when a
maxFileSize
,rotationInterval
, orrotationTimes
limit is reached.Set the log rotation parameters so the log isn’t likely to rotate before
rotationFileSuffix
changes.
Filters
-
The
CookieFilter
isn’tJwtSession
compatible.
-
The JWT created by
JwtBuilderFilter
isn’t encrypted.Carefully consider the security of your configuration when using this filter.
-
Filters can’t use the value of
System.currentTimeMillis()
.This applies to
JwtBuilderFilter
for claims such asexp
andiat
.
-
When a user has a pre-existing fragment cookie during authentication—for example, from a previous, incomplete authentication attempt—the pre-existing fragment overwrites the current fragment.
To minimize the effect of this limitation, the
FragmentFilter
cookie has amaxAge
property you can use to configure the maximum duration it can remain valid.
Handlers
-
ClientHandler blocks with asynchronous HTTP clients.
PingGateway processes responses from asynchronous HTTP clients with two thread pools of the same size:
-
The first thread pool receives the response headers.
-
The second thread pool completes the promise by executing the callback and writing the response content to the stream. Reading and writing to the stream are synchronous, blocking operations.
Synchronous operation can cause routes to declare a blocked ClientHandler. To recover from blocking, restart the route or, if the route is
config.json
, restart the server. To prevent blocking, increase the number of worker threads. -
-
The
ClientHandler
andReverseProxyHandler
propertysystemProxy
can’t be used with a proxy that requires a username and password. Use the handler’sproxy
property instead.
HTTP
-
PingGateway doesn’t forward host information for HTTP/2 requests.
When acting as a reverse proxy and receiving HTTP/2 requests, PingGateway doesn’t forward the host information in the HTTP/2
:authority:
pseudo-header to the protected application.If the protected application uses the HTTP/1.1
Host
header or HTTP/2:authority:
pseudo-header to route requests, an error occurs.
-
When acting as a client for HTTPS mutual authentication, the PingGateway client certificate isn’t configurable.
The client certificate must be the first in the
ClientHandler
orReverseProxyHandler
keystore.
SAML
-
When SAML is used with an AM policy agent, class cast exceptions occur.
-
The
SamlFederationHandler
doesn’t support filtering.This limitation is mitigated by the SAML 2.0 requests processed with the original URI value feature. Don’t use a
SamlFederationHandler
as the handler for aChain
.More generally, don’t use a
SamlFederationHandler
when its use depends on something in the response. The response can be handled independently of PingGateway and can be null when control returns to PingGateway. For example, don’t use this handler in aSequenceHandler
where the post-condition depends on the response.
-
When the user defined mapping is incorrectly set, missing SAML assertions produce an infinite loop during authentication attempts.
Scripts
-
PingGateway scripts aren’t sandboxed. They can access anything in their environment.
Make sure all scripts PingGateway loads are safe.
Streaming
-
PingGateway requires you set the
admin.json
propertystreamingEnabled
set totrue
to process files bigger than 2 GB and Server Sent Events.
Studio
-
Studio deploys and undeploys routes through a main router named
_router
, the name of the main router in the default configuration.If you use a custom
config.json
, make sure that it contains a main router named_router
.
-
To avoid undesirable side effects, Studio only lets you deploy or undeploy routes created and modified using Studio.
Release levels and interface stability
Learn more about release levels in Product Support Lifecycle Policy | PingGateway and Agents.
Product stability labels
Ping Identity Platform software supports many features, protocols, APIs, GUIs, and command-line interfaces. Some of these are standard and very stable. Others offer new functionality that is continuing to evolve.
Ping Identity acknowledges you invest in these features and interfaces and so need to understand when they are expected to change. For that reason, we define stability labels and use these definitions in Ping Identity Platform products.
Stability Label | Definition |
---|---|
Stable |
This documented feature or interface is expected to undergo backwards-compatible changes only for major releases. Changes may be announced at least one minor release before they take effect. |
Evolving |
This documented feature or interface is continuing to evolve and so is expected to change, potentially in backwards-incompatible ways even in a minor release. Changes are documented at the time of product release. While new protocols and APIs are still in the process of standardization, they are Evolving. This applies, for example, to recent Internet-Draft implementations and to newly developed functionality. |
Legacy |
This feature or interface has been replaced with an improved version, and is no longer receiving development effort from Ping Identity. You should migrate to the newer version, however the existing functionality will remain. Legacy features or interfaces will be marked as Deprecated if they are scheduled to be removed from the product. |
Deprecated |
This feature or interface is deprecated, and likely to be removed in a future release. For previously stable features or interfaces, the change was likely announced in a previous release. Deprecated features or interfaces will be removed from Ping Identity products. |
Removed |
This feature or interface was deprecated in a previous release, and has now been removed from the product. |
Technology Preview |
Technology previews provide access to new features that are considered as new technology that is not yet supported. Technology preview features may be functionally incomplete, and the function as implemented is subject to change without notice. DO NOT DEPLOY A TECHNOLOGY PREVIEW INTO A PRODUCTION ENVIRONMENT. Customers are encouraged to test drive the technology preview features in a non-production environment, and are welcome to make comments and suggestions about the features in the associated forums. Ping Identity does not guarantee that a technology preview feature will be present in future releases, the final complete version of the feature is liable to change between preview and the final version. Once a technology preview moves into the completed version, said feature will become part of Ping Identity Platform. Technology previews are provided on an “AS-IS” basis for evaluation purposes only, and Ping Identity accepts no liability or obligations for the use thereof. |
Internal/Undocumented |
Internal and undocumented features or interfaces can change without notice. If you depend on one of these features or interfaces, contact support to discuss your needs. |
Getting support
Ping Identity provides support services, professional services, training, and partner services to assist you in setting up and maintaining your deployments. For a general overview of these services, see https://www.pingidentity.com.
Ping Identity has staff members around the globe who support our international customers and partners. For details on Ping Identity’s support offering, visit https://www.pingidentity.com/support.
Ping Identity publishes comprehensive documentation online:
-
The Ping Identity Knowledge Base offers a large and increasing number of up-to-date, practical articles that help you deploy and manage Ping Identity Platform software.
While many articles are visible to everyone, Ping Identity customers have access to much more, including advanced information for customers using Ping Identity Platform software in a mission-critical capacity.
-
Ping Identity product documentation, such as this document, aims to be technically accurate and complete with respect to the software documented. It is visible to everyone and covers all product features and examples of how to use them.
Release timeline
Release date | Version | Release type(1) |
---|---|---|
2025-03 |
PingGateway 2025.3.0 |
Major |
2024-11 |
PingGateway 2024.11.0 |
Minor |
2024-09 |
PingGateway 2024.9.0 |
Minor |
2024-06 |
PingGateway 2024.6.0 |
Minor |
2024-04 |
IG 2023.11.1 |
Maintenance |
2024-03 |
IG 2024.3.0 |
Major |
2023-11 |
IG 2023.11.0 |
Minor |
2023-09 |
IG 2023.9.0 |
Minor |
2023-06 |
IG 2023.6.0 |
Minor |
2023-04-25 |
IG 2023.4.0 |
Minor |
2023-02-21 |
IG 2023.2.0 |
Major |
2022-06-28 |
IG 7.2.0 |
Minor |
2022-04-06 |
IG 7.1.2 |
Maintenance |
2021-09-24 |
IG 7.1.1 |
Maintenance |
2022-05-11 |
IG 7.1.0 |
Minor |
2021-03-16 |
IG 7.0.2 |
Maintenance |
2021-03-12 |
IG 6.5.4 |
Maintenance |
2020-10-27 |
IG 7.0.1 |
Maintenance |
2020-09-24 |
IG 6.5.3 |
Maintenance |
2020-08-07 |
IG 7.0.0 |
Major |
2019-11-27 |
IG 6.5.2 |
Maintenance |
2019-11-18 |
IG 5.5.2 |
Maintenance |
2019-04-07 |
IG 6.5.1 |
Maintenance |
2018-12-18 |
IG 5.5.1 |
Maintenance |
2018-11-28 |
IG 6.5.0 |
Minor |
2018-06-15 |
IG 6.1.0 |
Minor |
2018-05-08 |
IG 6.0.0 |
Major |
2017-10-19 |
IG 5.5.0 |
Minor |
2017-04-03 |
OpenIG 5 |
Major |
2016-01-27 |
OpenIG 4 |
Major |
2014-08-11 |
OpenIG 3 |
Major |
2012-05-15 |
OpenIG 2.1 |
Minor |
(1) Learn about the scope of expected changes for different release types Product Support Lifecycle Policy | PingGateway and Agents.