Regular channel changelog version 20814.9
| This is a changelog entry for version 20814.9. You can review the changelog for all versions in Regular channel changelog. |
31 Mar 2026
Version 20814.9
Enhancements
-
The following OAuth 2.0 scripts can now use the next-generation scripting engine, which gives them access to common bindings such as
utilsandopenidm:-
AME-33228: OIDC claims
-
AME-33846: Scripted JWT validator
-
AME-33847: Scope validation
-
AME-33848: Authorize endpoint data provider
-
AME-33849: Scope evaluation
-
AME-33850: May act
-
-
The following SAML 2.0 scripts can now use the next-generation scripting engine, which gives them access to common bindings such as
utilsandopenidm:-
AME-32919: SP adapter
-
AME-32920: IDP adapter
-
AME-32921: IDP attribute mapper
-
-
AME-32969: You can now make sure the
samlApplicationbinding is available for all SAML flows by enabling the application context in the hosted IdP or remote SP entity configuration. Previously this was only added in certain situations such as when using an application journey or IdP-initiated integrated mode. -
AME-32997: Added an
Allow Retryoption to the Backchannel Initialize node that lets end users retry a failed backchannel authentication journey. -
AME-33430: You can now include remote consent agent credentials in a
Basic Authenticationheader for pushed consent requests. -
AME-33930: A new
testConnectionaction on therealm-config/services/pingOneWorkerService/workers/pingone-worker-service-nameendpoint lets you test the connection from Advanced Identity Cloud to PingOne. -
AME-33939: A new
listLatestNodeDefinitionsaction on therealm-config/authentication/authenticationtrees/nodesendpoint provides a list of node definitions for the latest version of each node.This action combines the responses from the following separate actions into a single response:
-
getAllTypesaction on therealm-config/authentication/authenticationtrees/nodesendpoint -
schema,templateandlistOutcomesactions on therealm-config/authentication/authenticationtrees/nodes/node-nameendpoint
-
-
ANALYTICS-1383[1]: The new historical change report feature provides a complete audit trail of changes to your managed identities. It tracks all modifications to user profiles, roles, accounts, and applications. You can easily generate reports to see what changed, who made the change, and when it happened, which gives you clear insights for compliance and security monitoring.
-
FRAAS-29084: Custom domains are now restricted to a maximum of 63 characters in the Advanced Identity Cloud admin console. This restriction has always existed on the system backend.
-
OPENAM-22125: A new Proxy Configuration tab in the Http Client Service configuration lets you use separate proxy configurations per HTTP Client instance.
-
OPENAM-24476: Added
java.util.zipclasses to the allowlist for the Scripted Decision node scripting context. -
The following enhancements have been made to the nodes provided with Advanced Identity Cloud:
-
AME-33009: Enhanced the RADIUS Decision node to capture Vendor-Specific Attributes (VSA) returned by the RADIUS server during authentication.
-
Enhancements to the PingOne Protect Evaluation node:
-
AME-33807: Fixed an issue where a default value was sent for the flow subtype. Previously, the node would fall back to using the value configured in Authentication Flow Subtype or Authorization Flow Subtype. Now, if nothing is found in the node state, the node doesn’t send a value to PingOne Protect.
-
OPENAM-24557: Added a configuration property that lets you specify a custom session ID in the node state.
-
OPENAM-24562: Added two configuration properties that let you include a custom browser cookie and any externally maintained
deviceIdin the request sent to PingOne. -
OPENAM-25553: Added a configuration property that lets you include user group information as part of a risk evaluation.
-
-
The following nodes now let you set custom headers on journey success, failure, and error:
-
AME-33813: Set Success Details node
-
AME-33874: Set Failure Details node
-
AME-33873: Set Error Details node
-
-
OPENAM-24401: The CAPTCHA node now prevents submission after expiry.
-
OPENAM-24419: Added a new RSA SecurID node. This node replaces the Marketplace RSA SecurID node, which is now deprecated.
-
OPENAM-24489: The Device Binding and Device Signing Verifier nodes now let you specify a clock skew between the client device and AIC. This helps prevent binding failures caused by clocks being out of sync.
-
OPENAM-24546: Removed certain unused and unsupported configuration properties from the PingOne Protect Initialize node and its associated callback (
PingOneProtectInitializeCallback). -
OPENAM-25372: Added a JWT Password Replay node to secure the user’s password within an encrypted JSON Web Token (JWT). This node is used by PingGateway and replaces the old Password Replay scripting functionality.
-
-
OPENAM-25371: Added a configuration property to the PingOne Verify Evaluation node to enable automatic redirection to the journey after an end user completes verification (when using the
Redirectdelivery mode). -
OPENAM-25618: The new
localesbinding lets you return the localized version of a string from a translation map. It is available to next-generation Configuration Provider node, Journey Decision node, and Device Match node scripts. -
OPENIDM-21493: You can now cancel a clustered reconciliation even when a route associated with the source or target system is unavailable.
-
AME-34191: You can now override the HTTP binding used to redirect users to the SAML error page. To do this, configure an ESV variable named
esv-global-saml-error-page-http-bindingand set its value toHTTP-POSTorHTTP-Redirect. If you don’t set this variable, Advanced Identity Cloud uses the default value ofHTTP-POST. -
IAM-6546: End users now have more options to manage their devices in the hosted account pages. For each device, they can view when it was last used for sign on, view when it was added, edit its name, and delete it.
-
IAM-9672: In the advanced sync Mapping tab, if no properties have been mapped, it now shows a more accurate description of the target and source identity objects whose properties can be mapped.
Fixes
-
AME-33653: Custom nodes now work with the Configuration Provider node.
-
AME-33808: If Node State Attribute For User ID is provided in the PingOne Protect Evaluation node, but the corresponding attribute is missing from the node state, the node triggers the failure outcome rather than using the user ID associated with the AM identity.
-
AME-34217: Added a version setting to the Configuration Provider node. This update provides the underlying infrastructure for a node versioning feature in an upcoming release.
-
AME-34034: Fixed an issue where omitting a shared secret label in the RADIUS Decision node caused Prometheus metrics to become unavailable.
-
ANALYTICS-1326[1]: Fixed an issue in custom reports caused by relationships between custom identities that contain multiple underscores.
-
ANALYTICS-1367[1]: Fixed an issue in custom reports caused by IP addresses in journey events.
-
OPENAM-23918: Resolved a race condition in the OATH Registration node and OATH Device Storage node where recovery codes could potentially be lost.
-
OPENAM-24065: Improved consistency for error responses across realms when processing illegal arguments. The
/authenticatecall now correctly returns a 400 (Bad Request) instead of a 500 (Internal Server Error) for invalid arguments. -
OPENAM-25406: Added an
identity.exists()method to next-generation objects returned byidRepository.getIdentity(). This lets scripts verify an identity’s existence in the identity store before further processing. -
OPENAM-25646: For backward compatibility, we’ve restored the following deprecated fields sent to PingOne Protect by the PingOne Protect Initialize node (in the
PingOneProtectInitializeCallback):-
consoleLogEnabled -
deviceAttributesIgnored -
customHost -
lazyMetadata -
deviceKeyRsyncIntervals -
disableHub
These fields are deprecated and no longer supported in PingOne. This fix restores the fields but you should update your clients and scripts to remove the unsupported fields as soon as possible. -
-
OPENAM-25779: Deletion of the
samlApplicationobject is now deferred for unsuccessful authentication journeys so that the object is still available for subsequent sign-on attempts in the same session. -
IAM-6640: Fixed an issue in the hosted pages theme preview where clicking Edit Personal Info opened two instances of the modal.
-
IAM-8221: Fixed an issue in the terms & conditions live preview where interactive elements weren’t disabled.
-
IAM-9620[2]: Fixed an Identity Governance issue where clicking Save in the certification template creation wizard didn’t disable the button after submission, which could result in the creation of unintended duplicate templates.
-
IAM-9786: Fixed an issue where ESV placeholders manually entered into a field were always treated as strings, regardless of whether they were an array, list, or string.
-
IAM-9886: Fixed a display issue on the Reports Run History tab where the pop-up menu items weren’t displayed correctly.
-
FRAAS-29855[3]: Fixed an issue where OTLP log streaming reported all Advanced Identity Cloud logs with
am-coreoridm-coreas the source and omitted custom IDM event-hook logs. Logs streamed via OTLP now preserve their correct source (for example,am-authentication,am-access,idm-access) and include custom IDM event-hook messages.
Changed functionality
-
OPENIDM-21718: The
maxQueueSizefor queued synchronization now defaults to1000and can’t be configured to a value higher than1000or lower than100. The previous default was20000.The
pageSizestill defaults to100, but now can’t be configured to a value higher than100or lower than10. If the configuredpageSizeis greater thanmaxQueueSize / 10, Advanced Identity Cloud usesmaxQueueSize / 10for the page size.If you have any configuration outside of these bounds, Advanced Identity Cloud automatically adjusts the values to the nearest bound.