Nexus' software components have new names:

Nexus PRIME -> Smart ID Identity Manager
Nexus Certificate Manager -> Smart ID Certificate Manager
Nexus Hybrid Access Gateway -> Smart ID Digital Access component
Nexus Personal -> Smart ID clients

Go to Nexus homepage for overviews of Nexus' solutions, customer cases, news and more.


Skip to end of metadata
Go to start of metadata

Version: 20.11

Release Date: 2020-12-07

Main new features

The Smart ID 20.11 release provides major updates in Identity Manager, Self-Service and Physical Access. The Digital Access and Messaging components are providing minor improvements and bugfixes only. All components also provide several bugfixes and library updates to ensure high quality and security.

New APDU encoding framework

The new APDU encoding framework in Identity Manager allows to encode smart cards now also with low-level APDU commands, besides the standard middleware encoding.

The feature is important for customers in the public sector, for eIDAS and LoA3 cases – in general where high security on the card encoding level are demanded. APDU scripts are easily configured in Identity Manager and executed via Smart ID Messaging and Smart ID Desktop. See also APDU script applications for PKI cards in Identity Manager.

Improved user forms in Identity Manager and Self-Service

It is now possible to configure URLs to external web resources in a user form and to configure individual file names for file downloads in a form. Also, the forms in processes to issue or lock virtual smart cards and mobile virtual smart cards have been simplified for the users. 

Several updates for Physical Access

The Physical Access component introduces several updates on the PACS connectors, such as the new RCO Admin API, the new connector to Siemens SiPass and a PACS Simulator for test and demo purposes.

Smart ID client versions

These versions are recommended for Smart ID 20.11:

Detailed feature list

Features

Jira ticket noDescriptionDigital AccessIdentity Manager & Self-ServicePhysical AccessMessaging
CRED-9443

Database indices added

3 database indices have been added to the Identity Manager database to increase performance in large environments.


X

CRED-9675

groovy-dateutil library added

The groovy scripting library was updated to the latest version in the previous release. Due to some restructuring in groovy, some functionalities around date formatting got lost. Therefore the groovy-dateutil library was added now to the standard deployment to provide this functionalities again in Smart ID.


X

CRED-10226

Extended several field lengths in the database

Extended the max length for several core fields in the Identity Manager database (such as firstname, lastname, email, title etc.) in the tables "Person", "Card" and "Request".


X

CRED-10277

"Locale" added to service task

Added "Locale" as additional attribute to the service task "Process: Copy Values of LoggedIn User to Process Map". see Standard service tasks in Identity Manager.


X

HAG-2258

Updated help text

Updated text to "Smart ID Digital Access" in the Digital Access Admin interface and in the help pages.

X


IDC-1219

Added logging of RabitMq

Added logging of the Message Queue (RabitMq) to the standard logs of Physical Access.



X
IDC-1648

Improved connector status heartbeat

The connector status heartbeat in Physical Access has been improved. It now also updates the status after the connector was shut down.



X
PMOB-2442

Change in configuration setting

The hideSensitive configuration setting in the Smart ID Messaging component Hermod is set to 'true' as default.




X
PMOB-2456

Added validation in the 'to' list

Added validation to make sure that null isn't used in the 'to' list in the Smart ID Messaging component Hermod.




X
PMOB-2494

Added a testMode option

The Smart ID Messaging component Hermod now has a testMode option that automatically triggers a load test simulator for prov, auth and sign.




X
PMOB-2498

Added database indices

Database indeces have been added to foreign key source tables in the Smart ID Messaging component Hermod.




X
PMOB-2502

Added return status for database lock

The return http status 503 has been added to the Smart ID Messaging component Hermod. It will be sent if a database lock cant be acquired after retries.




X
PMOB-2510

Added retry to sql queries

Added retry to sql queries if a database lock cant be acquired in the Smart ID Messaging component Hermod.




X
CRED-7630

Extended list view for configuration items

To improve usability, the list views of several configuration items in Identity Manager Admin are extended. For example, Data Pools, all Core Templates and Search Configuration now show more columns with additional information in the corresponding list menus.


X

CRED-9045

Support for TLS in SMTP connector

Support for TLS has been added in Identity Manager in the SMTP implementation to ensure an encrypted email communication.


X

CRED-9114

Added date format configuration in mappings

In the "mappings" configuration of Identity Manager, it is now possible to define date formats for fields of type date or timestamp, if the mapped field is not exact match but of type string. This enables the possibility to implicitly convert date to string or vice versa via mapping. The typical and most important use case for this feature is BatchSync to, for example, import data from a string field (e.g. from CSV) into a date field in to Smart ID without any further, explicit conversion. See Set up mapping in Identity Manager.


X

CRED-9513

Extended remote printing capabilities

With this release of Smart ID it is possible to configure different locations of Card SDK printer stations in Identity Manager Admin. In the card production workflow it then can be decided (either automatically via certain attributes in the background or manually by an operator) on which location the card shall be printed. The Card SDK does not need to be installed in the Operations client but can be any Card SDK client that is connected to the Identity Manager Server. See Set up printers in Identity ManagerSet up form in Identity Manager and Set up process in Identity Manager.


X

CRED-9659

Mobile App OTP can be activated

The standard service task in Identity Manager for provisioning to Smart ID Digital Access has been extended. Now it is also possible to provision Smart ID Mobile App for OTP authentication. See "HAG: User provisioning" in Standard service tasks in Identity Manager


X

CRED-9699

Possibility to expand object relation view by default

So far, the object relation view in Identity Manager was by default shown collapsed. It can now be shown expanded by default via a setting in Identity Manager Admin.


X

CRED-9708

Support for hiding the device encryption certificate

The device encryption certificate can be hidden (for internal communication purposes) for Smart ID Desktop and Mobile App.


X

CRED-9739

Introducing APDU encoding framework

It is now possible to encode smartcards directly via APDU scripts, as well as via Pkcs#11 middleware. APDU scripts can be configured (uploaded, modified) together with the Encoding Descriptions in Identity Manager Admin. For that purpose, the Editor, used for Encoding Descriptions has been extended to let the Administrator edit any additional file attached to the encoding (such as .cpf card profiles, APDU scripts and others). During runtime, the APDU scripts will be send to the client and executed via Smart ID Messaging and Desktop App. See APDU script applications for PKI cards in Identity Manager.

With this new feature it is possible to execute high sophisticated card encodings e.g. for eIDAS use cases, qualified signature cards etc. via standard functionalities.


X

CRED-9801

HTTP(s) links to 3rd party resources in user forms

It is now possible to configure a link to HTTP(S) 3rd party resources in the user forms, for example, to redirect to an intranet portal or to download a security policy document via Self-Service or Identity Manager operator UI. the URLs to the resources can either be static configuration or dynamically created via runtime data. See Set up form in Identity Manager.


X

CRED-9930

New standard service task for logging

A new standard service has been implemented in Identity Manager to be able to write certain, custom specific entries into the logfile during the BPMN process execution. The service task allows to configure the loglevel that should be used and also write either static content or dynamic content, resolved from the process map, into the logfile.See " Process: Log something in the log file" in Standard service tasks in Identity Manager.


X

CRED-9937

Improved service task to set value in process map

The standard service task "Process: Set Value of Variable in Process Map" has been extended: now it is possible to not only set fixed values but also use a JUEL expression to resolve parameters from other data fields. See "Process: Set Value of Variable in Process Map" in Standard service tasks in Identity Manager.


X

CRED-9946

Customized file names for download buttons

It is now possible to customize the file names when downloading binary data (e.g. photos, pdf, certificates etc.) from Identity Manager or Self-Service. The format of the filename can be defined in the form design (via fixed values and dynamic values created out of data pool fields). See Set up form in Identity Manager.


X

CRED-9968

Support for Smart ID Certificate Manager 8.3

Updated Nexus Certificate Manager integration - supporting the latest version of Certificate Manager via Identity Manager.


X

CRED-10012

Extended the CSV upload service task
The standard service task to process CSV files uploaded on the client has been extended:

  • the handling of columns to be imported has been improved: a mapping of the fields (csv to import pool) can be defined and columns can be ignored
  • it is now possible to define the delimiter
  • it can be configured whether the CSV contains a header line or not
  • result lists are available in the BPMN process map for further processing of imported or updated records in the workflow

See "Miscellaneous: Import CSV file" in Standard service tasks in Identity Manager.


X

CRED-10086

Added use of PIN pad readers for card encoding

Encoding of smart cards in combination with a PIN pad reader was not implemented in combination with Desktop App so far. This has been added now, so that end users, encoding their smart card in Self-Service also can use a PIN pad reader.


X

CRED-10138

Added support for registration requests via the EST protocol

Similar to the already existing ACME and SCEP registration now also registration requests for the EST protocol is supported via a standard service task in Identity Manager. See "Cert: Create EST order request" in Standard service tasks in Identity Manager.

(This feature is only available in combination with Smart ID Certificate Manager.)


X

DEVOPS-400

Added options for Self-Service login

Added flexibility and configuration options of the Self-Service login screen:

  • it is now possible to decide if SAML login should always be forced directly or if the user ends up on the login screen and can decided login method (including SAML login via a new button)
  • all available login methods (SAML SSO, username/password and certificate) are now configurable, so that any of these method can be activated or deactivated for the end users

See Enable two-factor authentication to Identity Manager clients via SAML federation and Set up authentication profile in Identity Manager.


X

DEVOPS-85

Changed configuration of CA certificates for Identity Manager

Instead of creating a java keystore with CA certificates for Identity Manager to trust, the certificates can now be added to a folder and they will be loaded into Identity Manager at startup. Supported formats are .base64 and .cer


X

DEVOPS-95

Changed configuration of database properties for Identity Manager

The configuration file database.properties is no longer needed. Database settings are now set using environment variables. 


X

DEVOPS-382

Improvements in Docker configuration

Several improvements in the Docker configuration of Smart ID have been implemented in this release. Most requested feature was splitting up the compose files for the different services. The Identity Manager but also the Digital Access dockers have now separate configurations so that it is easier to deploy the solution distributed over multiple servers. 

See Deploy Smart ID and Smart ID 20.11 deployment configuration release note.

XX

HAG-723

Added support for SMB v2.0 and v2.1

The Common Internet File System (CIFS) version used by Digital Access is now updated to a later version. Prerequisite for customers is to upgrade the SMB version to v2.0 or v2.1 as v1.0 won't be supported after this.

X


IDC-1067

Added support for PACS Connector Siemens SiPass

Support is added for a new Standard PACS connector in Physical Access. Now Siemens SiPass is supported for all standard use cases in Smart ID Physical Access.



X
IDC-1569

Added support for PostgreSQL

Added support for PostgreSQL (version 11+12) for Physical Access.



X
IDC-1573

Added support for new RCO Admin API

With the latest release of RCO R-Card M5 a new REST Admin API was introduced. Smart ID Physical Access supports this now as well (in addition to the old RCO API).



X
IDC-1604

Improved error handling in Web API

The error handling of the Physical Access SCIM interface - which is the main communication channel with Identity Manager - has been improved to avoid potential data loss during provisioning.



X
IDC-1665

Introduced PACS Simulator

With this release, a new PACS Simulator for Physical Access is introduced. The simulator comes as an ordinary PACS connector as part of Smart ID but does not communicate with a real PACS. it just simulates the communication and writes the results into files. The purpose of this connector is to run tests, demos etc. of the Smart ID Physical Access package also in an offline demo environment.



X

Corrected bugs

Jira ticket noDescriptionDigital AccessIdentity Manager & Self-ServicePhysical AccessMessaging
CRED-7317

Fixed an issue in the Procecss Task for creating custom entries in the Object History. The custom values was not visible completely in the Object History list.


X

CRED-9305

Fixed error handling during card encoding via Desktop App. When Messaging Server was not reachable, a cryptic message was displayed on the screen.


X

CRED-9376

Fixed an issue with with popup window, for mandatory fields that are missing in user forms of Identity Manager. It could happen that the popup did not show up after process got canceled and restarted a second time.


X

CRED-9390

Fixed a bug in the tenant application of Identity Manager. When deleting a tenant, the signature of the object history got broken when working with multiple tenants.


X

CRED-9580

Translation of headlines in user forms did not work properly when logging in via SAML in Identity Manager operator UI. This is fixed now.


X

CRED-9627

The "resultCount" variable of the "AssertUniqueness" task was not filled up if there was no result. This has been fixed now, empty results the variable is set to "0".


X

CRED-9676

Fixed an issue when changing active/inactive state in the "HAG: User Provisioning" standard service task. Depending of on the state configuration it could happen that the state change failed.


X

CRED-9696Display of user roles in Object History was not updated correctly when changing selection of history entry. This is fixed now.
X

CRED-9759

Fixed a concurrency issue when executing standard service tasks for Personal Messaging.


X

CRED-9774

The List/Selection view for Batch Orders had an issue that the underlying search configuration was chosen randomly if multiple search configs for that purpose had been configured. Due to lack of a configuration element to explicitly select the search config, now always the first search config that is configured in the corresponding Order Template will be used.


X

CRED-9812

Setting a hidden or read-only date value as filter criterion in a search configuration was not possible. This is fixed now


X

CRED-9867

Fixed an "Internal Server Error" issue (related to certain authentication profile configuration) when downloading a configuration file from Identity Manager Admin.


X

CRED-9948

Fixed an issue with downloading P12 files in Smart ID Self-Service.


X

CRED-9989

Order CoreObjects where not capable of handling coreObjectDescriptors in all cases: the referenced objects (via the "CoreObjects" data field) only provided CoreObject IDs. This has been fixed now.


X

CRED-9992

"New process" in batch order details view are made invisible. it has no meaning there and could be executed accidentally.


X

CRED-10003

Added missing FK index on CertificateBinaryDataMap table for Oracle DB. Missing index did lead to locking the table when deleting certificates.


X

CRED-10006Using search filter with filter value "empty" did not work in BatchSync. This is fixed now.
X

CRED-10010

Fixed a permission issue when displaying templates (e.g. available card templates for requests) in Smart ID Self-Service. All templates used to be visible in the combobox instead of only the ones the user has permission for.


X

CRED-10018

The "line break" checkbox in the Form designer didn't have any effect in Smart ID Self-Service. This has been fixed.


X

CRED-10063

BatchSync now allows to configure a separate skip policy for read process and write operations. Before only write operations could be addressed.


X

CRED-10135

Fixed inconsistency in CSV export (via Export Definition). Empty fields have been exported with quotes (""). This has been removed now to align with non-empty fields.


X

CRED-10146

Configuration Export failed in Identity Manager Admin, after a CA Configuration was uploaded. This has been fixed now.


X

CRED-10147

Improved error handling in the "Core Objects: Drop Relation" service task: empty task parameters could result in a misleading error message.


X

CRED-10163

Fixed behavior of multiple search buttons in combination with ObjectList component in a user form. Results from the different search buttons have been mixed up in the result lists.


X

CRED-10165

Encrypted field value got corrupted when using a mapping task to transfer the value from plain text fields. This is fixed now.


X

CRED-10175

Fixed an issue when signing and encrypting an email in Identity Manager. The signature is now also visible for the receiver if the email is encrypted.


X

CRED-10190

Configuration of predefined sorting in Search Config did only work for one sorting criterion. This has been fixed, multiple sorting criteria can be defined again in Identity Manager Admin.


X

CRED-10198Fixed behavior when displaying of passwords as images in Identity Manager operator UI and Smart ID Self-Service.
X

CRED-10201

Fixed error handling in Nexus GO Card Configuration. Now a human readable error message is shown when the connection to Nexus GO API fails.


X

CRED-10216

Improved error handling for "extended error mode" in PKI card encoding. Certain exceptions (e.g. CAServiceException) where not handled correctly in the past.


X

CRED-10259

Fixed connection test to Messaging Server in Identity Manager Admin. Test button reported 'success' even if AuthenticationToken was wrong.


X

CRED-10278Fixed an issue in XML parsing of CardJob. PKI card encoding response with Smart ID Desktop App could result in an error.
X

CRED-10313

Fixed display of "hidden" secret fields in Smart ID Self-Service. The actual value was shown instead of "dots".


X

CRED-10323

Smart ID 20.11 now supports PostgreSQL databases version 11 and 12 in all components.

XXX
DA-6Corrected the MariaDB configuration string.X


DA-63

Added the extended attribute "Radius Status server supported" to the general Radius authentication method.

If the value is set to false, it means that the configured Radius server does not support "Status message packet", so that the policy service will not send any Server-Status check to the Radius server.

X


HAG-1304

Allow the user to login even if the 'Allow user not listed in any User Storage' is set to true and the user attribute property is set. This is resolved for Swedish Bank ID, Nexus GO, Open ID and Freja ID authentication methods.

X


HAG-1308

Fixed an issue where Smart ID Mobile App profile was not activated for a user after Self provisioning flow.
The profile shall be created in the self service even if the Personal authentication method is not enabled for a user, and the user should not be able to login using that authentication method.

X


HAG-1396

Fixed the display of message on the forgot password page to show Swedish characters.

X


HAG-2249

Removed the duplicate entries appearing in the Database dropdown after saving the Database Service settings.

X


HAG-2253

Fixed the output of well known config API to work with Google where Digital Access acts as the Identity Provider.

X


IDC-1437

Fixed error handling for duplicate entitlement assignments in Physical Access. Now the error is reported back if a duplicate assignment happens instead of just writing the result into the log.



X
IDC-1583

Fixed an issue when deleting a large number of entitlement assignments at the same time on MS SQL Server. The error was detected in SiPort Environment.



X
IDC-1626

Fixed an issue in the SiPort connector causing new profiles to be created (and not deleted anymore) in the Physical Access database before save has been triggered.



X
IDC-1692

Fixed a bug in RCO Connector when creating/ deleting users in RCO.



X
PMOB-2421Added validation to prevent empty userid in provisioning.


X
PRSM-69

Fixed changing card state of visitor cards if non-personal card is being assigned (visitor card remained active).


X

PRSM-82

Improved uniqueness check when doing card activation to enforce only one active card per employee. Not all cases where covered by the check previously.


X

PRSM-974

Fixed process for deactivating Contractor record in Smart ID Base package.


X

PRSM-1041

Added validation for duplicate entitlement assignment in Physical Access and improved user experience/error message during validation. 


XX
PRSM-1043

Fixed default permissions for creating company in Smart ID Base module.


X

PRSM-1044

Locking of temporary employee card when deactivating employee didn't work. This has been fixed now.


X

PRSM-1065

Fixed object relation handling when withdrawing non-personal card for Visitor.


X

PRSM-1077

Fixed provisioning of status to Physical Access component and corresponding PACS system when a Contractor gets reactivated in the Physical Access module.


XX
PRSM-1083

Fixed batch job for triggering renewal of Virtual Smart Cards in Digital ID.


X
X
PRSM-1088

Fixed an issue when activating an temporary employee card in Digital ID package.


X

PRSM-1093

Fixed wrong relation between employee and employee card when withdrawing non-personal card in Physical Access module.


X

PRSM-1095

Fixed activation of cards (that are in state 'issued') via Batch Order.


X

PRSM-1097

Fixed some labels/translations in Smart ID Self-Service (e.g. VSC provisioning).


X

PRSM-1103

BPMN fixes: changed several processes from "CoreObjectID" to "CoreObjectDescriptor" collections. the CoreObjectID is deprecated and didn't work anymore in several places (e.g. the Self-Service).


X

Release announcement

From this release, only Docker deployment is supported for the Smart ID components Identity Manager, Physical Access, Digital Access and Messaging. For full instructions, see Deploy Smart ID.

From Smart ID 20.11 and on, components now only have the Smart ID version number and not the different component version numbers. For information on previous releases, see Nexus Documentation Archive.

For details on the updated Smart ID configurations and deployment configurations, see here: 

 Smart ID configuration release note

Features

KeyDescription

DEVOPS-378

Simplified issuing of virtual smart cards and mobile virtual smart cards 

In the processes Provisioning certificate to virtual smartcard and Install certificates on mobile ID, the selection of certificates is now predefined with hidden fields in the form. The form to recover encryption certificates will appear, only if a service task found valid or active encryption certificates.

For more information, see: 

DEVOPS-416

Improved locking process for virtual smart cards and mobile virtual smart cards

In the processes Lock virtual smartcard and Lock mobile ID, the user must first enter a valid reason to revoke a mobile ID or a virtual smart card. If the object has a related encryption certificate, a check box is shown and can be checked to revoke the encryption certificate. 

For more information, see: 

PRSM-1085

New lookup table for countries

The data pool Country has been changed from an external data source to an internal data source, of the type lookup table.

PRSM-464

New process to create non-personal visitor card

A production method has been added, to produce a card directly after the definition of card requests.

 Smart ID deployment configuration release note


Smart ID deployment configuration release note
# RELEASE NOTES FOR SMARTID DEPLOYMENT CONFIG

All notable changes to this project will be documented in this file. Be aware that the [Unreleased] features are not yet available in the official tagged builds.

## [Release 20.11.0-2020-12-22]

### Added
- Added support for selfservice branding. [DEVOPS-471]
- Added log4j volume mapping for idm containers. [DEVOPS-470]

### Changed
- Updated traefik version to 2.3.4 [DEVOPS-464]
- Renamed selfservice container from "idm_selfservice" to "selfservice".
- Renamed all environment variables starting with "IDM_SELFSERVICE_x" to "SELFSERVICE_x".
- Changed Hermod config to disable by default some end-points and to hide sensitive data in logs. [DEVOPS-484]
- Improved the `stop-smartid.sh` script to handle dynamically all docker-compose stop commands and to work regardless of where the script is called from.
- Improved the `init-smartid.sh` script to work regardless of where the script is called from.
- Improved the `createca.sh` script to work regardless of where the script is called from.
- Renamed `idm-selfservice-language.json` to `idm-selfservice-config.json`.

### Fixed
- Fixed volume mapping for selfservice tomcat server.xml by using a separate variable than identitymanager.
- Fixed French translations for IDM and Selfservice.


## [Release 20.11.0-2020-12-07]

### Added
- Added `postgres/init/init-smartid-databases.sql` so that Physical Access database is created when starting up postgres. The "pauser" is created, and a default password is set.
- Added LE CA Certificate to cacerts. [DEVOPS-455]
- Added AJP port variables in smartid.env and use them in identitymanager docker-compose files. Also added AJP Connector in `config/idm-tomcat-server.xml`, which has to be enabled manually (and port set accordingly). [DEVOPS-348]
- Add following new features to the identitymanager docker-compose files: [DEVOPS-406]
  - Support for new CA store volume mapping
  - Support for new system properties environment variable
  - Support for new DB properties environment variables
  - Support for new spring bean volume mapping. See `IDM_VOLUME_PATH_SPRING` in `smartid.env`.
  - Support for new jars volume mapping. See `IDM_VOLUME_PATH_LIBS` in `smartid.env`.
  - Support for new class files volume mapping. See `IDM_VOLUME_PATH_CLASSES` in `smartid.env`.
- Add following new features to the selfservice docker-compose file: [DEVOPS-406]
  - Support for new CA store volume mapping
  - Support for new IDM url environment variable
- Added adminer as tool [DEVOPS-407]
- Added maxVersion for TLS to be 1.2 due to compatibility issues with some mobile devices. [DEVOPS-413]

### Changed
- Changed smartid version to 20.11.0.
- Moved "/certs/boostrap" to "/boostrap".
- Changed postgres version in smartid.env from 9.6.18 to 12.5. [DEVOPS-431]
- Split identity manager containers into their own docker-compose files: [DEVOPS-382]
  - Added `identitymanager/admin/docker-compose.yml`
  - Added `identitymanager/tenant/docker-compose.yml`
  - Added `identitymanager/init-db/docker-compose.yml`
  - Added `identitymanager/operator/docker-compose.yml`
- Adapted `init-/stop-smartid.sh`, and paths inside `smartid.env` and some docker-compose files to fit new docker-compose yaml files. [DEVOPS-382]
- Change the ini-smartid.sh script to ask if traefik is going to be used as Ingress/proxy. [DEVOPS-408]
- Changed in `config/hermod-conf.yml` some values to <IDM-HOST-HERE> and <DA-HOST-HERE> on client samples.

### Removed
- Removed MSSQL from deployment package, since Physical Access now support postgres. [DEVOPS-448]
- Removed unnecessary variables in `smartid.env`.
- Removed identitymanager compose docker-compose file. [DEVOPS-382]
- Removed entrypoint definition from identitymanager docker-compose files. [DEVOPS-406]
- Removed pgAdmin and portainer and its variables from smartid.env. [DEVOPS-407]
- Removed modern and old options for tls in `config/traefik/traefik-tls.yml`. [DEVOPS-413]
- Removed TRAEFIK_TLS_OPTION from smartid.env. [DEVOPS-413]
- Removed identitymanager spring beans because we changed how handle them.
- Removed samples.


## [Release 20.06.1-2020-10-27]

### Added
- Added port forwarding to hermod container in the messaging docker-compose file.
- Added spring bean files for identitymanager in `config/idm/spring_operation` and spring_admin. 
- Added translation files for identitymanager in `config/idm/translation_id`m and for selfservice in `config/idm/translation_selfservice`.
- It is now possible to enable Strict SNI using TRAEFIK_TLS_STRICTSNI=true

### Changed
- changed smartid version to 20.06.1.
- Changed HERMOD_DOMAIN_PREFIX from "mb" to "messaging".
- Changed the DB init/update script behavior, can be controlled with `IDM_DBUPDATE_SCRIPT` in smartid.env.
- Changed `traefik-tls.toml` file to YAML and used variables from .env file. Possibility to change TLS certificate file names TRAEFIK_TLS_DEFAULT_CERTIFICATE and TRAEFIK_TLS_DEFAULT_CERTIFICATEKEY.
- Improved the `init-smartid.sh` script.
- Moved seflservice to a separate docker-compose file.

### Fixed
- Fixed the jdbc url for `config/da-admin-customize.conf`.

### Removed
- Dropped `restart: always` for identittymanager init-db.
- Removed explicit DBHOST naming in `smartid.env` to force user to set its own value.


## [Release 20.06.0-2020-09-28]

### Added
- Added possibility to add custom-beans for IDM Operator and Admin, in `config/idm`.
- Added possibility to change translation for IDM Operator, Admin, Selfservice and Tenant.
- Added IDM_DB_QUARTZ example for MSSQL, Oracle and DB2.
- Added `container_name` for all containers in:
  - identitymanager/docker-compose.yml
  - traefik/docker-compose.yml
- Added docker hostname for postgresdb DB_HOST in `postgres/docker-compose.yml`, this will make test deployment work from start.
- Added docker hostname for mssqldb PA_DB_HOST in `mssql/docker-compose.yml`.
- Added `restart: always` to all containers. All containers will the start up after re-boot, if they have been started once before.
- Included SAML example files for IDM in `/samples/idm_saml`.

### Changed
- Changed smartid version to 20.06.0.
- Changed explorer/operator url in `idm-selfservice-application.yml`.
- Changed location of Identity Manager SAML samples files from `/docker/compose/examples` to `/samples/idm_saml`.
- Updated `init-smartid.sh`:
  - Now check if docker and docker-compose are installed, if not the script will exit.
  - Now asks if the deployment is a production deployment, if "Yes", the script will complete and deployment configuration can be done. If "No":
    - Ask if postgres and/or mssql shall be deployed and started.

### Fixed
- Moved comments in `smartid.env` file to be on a separate line instead of behind the value. This was breaking the applications since comments would be evaluated as part of the value.
- Fixed `init-smartid.sh` so that it works properly on CentOS.
- Fixed a typo for variable `IDM_DB_QUARTZ`.
- Fixed typo in idm-operator container in `identitymanager/docker-compose.yml`, in the path to the castore.jks.

## Removed
- Removed `init-smartid-test.sh`, it is included in init-smartid.sh.



Contact

Contact Information

For information regarding support, training and other services in your area, please visit our website at www.nexusgroup.com/

Support

Nexus offers maintenance and support services for Smart ID components to customers and partners. For more information, please refer to the Nexus Technical Support at www.nexusgroup.com/support/, or contact your local sales representative.