Release Change History

The following changes were made in past DataControl/KeyControl releases. For details about the current KeyControl release and previous releases, visit our Customer Portal at https://trustedcare.entrust.com/. If you do not have a login for TrustedCare, please contact trustedcaresupport@entrust.com.

Changes in Release 10.3.1

Upgrade Path: For Entrust KeyControl, upgrade to 10.3.1 is allowed from version 10.2. For the Entrust KeyControl Policy Agent, upgrade to 10.3.1 is allowed from versions 10.2, 10.1.1, and 10.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use OpenID Connect (OIDC) Authentication without configuring Active Directory in your individual KeyControl vaults.

  • You can now use Active Directory (AD) or OpenLDAP for authentication in the KeyControl Vault Management appliance.

    • AD users are supported, but not AD groups.

    • Two-factor authentication is supported for local users only.

Changes in Release 10.2

Upgrade Path: For Entrust KeyControl, upgrade to 10.2 is allowed from versions 10.1 and 10.1.1. For the Entrust KeyControl Policy Agent, upgrade to 10.2 is allowed from versions 10.1 and 10.1.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use hardware security modules with the KeyControl Vault for Secrets.

  • You can now use BYOK with GCP in the KeyControl Vault for Cloud Keys.

  • You can now use MariaDB with TDE in the KeyControl Vault for Databases.

  • The HTTPS proxy server can now be used with BYOK for AWS and Azure.

  • Support for Double Key Encryption for Microsoft 365 in the KeyControl Vault for Cloud Keys.

  • Two-Factor Authentication is now offered with each KeyControl.

Changes in Release 10.1.1

Upgrade Path:  For Entrust KeyControl, upgrade to 10.1 is allowed from versions 10.0 and 10.1. For the Entrust KeyControl Policy Agent, upgrade to 10.1 is allowed from versions 10.0 and 10.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now upgrade KeyControl version 10.0 to KeyControl Vault 10.1.1.

  • It is no longer necessary to enable (SMTP) in the Appliance Manager UI when adding KeyControl Vaults. This restriction in the 10.1 release has been removed.

  • KeyControl Vault PASM vaults now support Ansible. For more detail, see https://github.com/EntrustCorporation/PASM-Vault-Ansible-Plugin.

Changes in Release 10.1

Upgrade Path: You can only deploy Entrust KeyControl 10.1 as a new installation. Upgrade from previous versions of Entrust KeyControl is not supported.

Changes in this release:

  • New Entrust KeyControl Architecture. The Entrust KeyControl family of products has been divided into two components:

    • KeyControl Compliance Manager—This application handles all global requirements for your vaults, such as licensing and authorization.

    • Entrust KeyControl—All of the Entrust KeyControl applications have been separated and moved into individual vaults.

  • You manage licensing for all Entrust KeyControls using KeyControl Compliance Manager.

  • You can now use KeyControl as an external key manager (EKM) provider for Oracle Server.

  • You can now use KeyControl as an AWS KMS External Key Store (XKS).

  • You can now use the new Tokenization Vault and APIs for tokenization, masking, and encryption of data.

  • You can now use KeyControl with Azure-managed HSMs.

  • You can now configure Syslog Server to use Arcsight Comment Event Format (CEF) for logging.

  • KeyControl now supports Remote Administration Ready Smartcards for nShield HSMs.

  • KeyControl now includes the Luna HSM library v10.5.1-174

Changes in Release 10.0

Upgrade Path: For Entrust KeyControl, upgrade to 10.0 is allowed from versions 5.5 and 5.5.1. For the Entrust KeyControl Policy Agent, upgrade to 10.0 is allowed from versions 5.3, 5.4, 5.5, and 5.5.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use KeyControl as an EKM provider for Microsoft SQL.

  • You can now use KeyControl to manage your SSH keys.

  • You can now use Bring Your Own Key (BYOK) with Google Cloud Platform.

  • You can now use KeyControl with nShield HSMs that are enrolled in FIPS 140 Level 3 Security Worlds.

Changes in Release 5.5.1

Upgrade Path: For Entrust KeyControl, upgrade to 5.5.1 is allowed from version 5.4 and 5.5. For the Entrust KeyControl Policy Agent, upgrade to 5.5.1 is allowed from release 5.2, 5.2.1, 5.3, 5.4, and 5.5. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • The multi-tenant KMIP server is the next generation server used for KMIP. You must migrate from the legacy KMIP server to take advantage of the new features in the multi-tenant KMIP server. You must complete this migration before you will be able to upgrade to KeyControl version 5.6.

  • You can now authenticate KMIP tenant and vault tenant users using a local user instead of managed authentication.

  • You can now use OpenLDAP Authentication for Secrets Vaults and KMIP Tenants.

  • You can now use OpenID Connect for Secrets Vaults and KMIP Tenants.

Changes in Release 5.5

Upgrade Path: For Entrust KeyControl, upgrade to 5.5 is allowed from version 5.4. For the Entrust KeyControl Policy Agent, upgrade to 5.5 is allowed from release 5.2, 5.2.1, 5.3, and 5.4. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use Bring Your Own Key (BYOK) with Microsoft Azure.

  • You can use KMIP with multiple tenants, which allows administrators to isolate different tenant environments for security and compliance.

  • HSM Root-of-Trust provides enhanced protection for the contents of the object store. Root-of-Trust is gained when the HSM provides the cryptographic keys necessary to unlock the object store.

  • The DataControl file encryption module is now compliant with the Korea Cryptographic Module Validation Program (KCMVP). This can be enabled by setting the environment variable ENTRUST_KCMVP=True before executing the hcl encryptfile command.

Changes in Release 5.4

Upgrade Path: For Entrust KeyControl, upgrade to 5.4 is allowed from version 5.3. For the Entrust KeyControl Policy Agent, upgrade to 5.4 is allowed from release 5.0, 5.1, 5.1.1, 5.1.2, 5.2, 5.2.1, and 5.3. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use KeyControl to manage your cloud keys using BYOK functionality.

  • Licensing has been updated, including individual entitlements for BYOK, KMIP Servers, and Secrets Vault.

  • The Secrets Vault now has its own GUI.

  • You can now replace an nShield Connect HSM that is on a KeyControl cluster.

  • You can now add an additional nShield Connect HSM to create a high availability cluster in KeyControl.

  • KeyControl now supports online encryption and UEFI secure boot for Ubuntu.

  • You can now disable the KeyControl webGUI alerts for your KeyControl managed user objects to improve performance.

Changes in Release 5.3

Upgrade Path: For Entrust KeyControl, upgrade to 5.3 is allowed from version 5.2 and 5.2.1 only. For the Entrust KeyControl Policy Agent, upgrade to 5.2 is allowed from release 5.0, 5.1, 5.1.1, 5.1.2, 5.2, and 5.2.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • Added support for Luna Cloud HSM.

    • You can now use the Luna Cloud HSM as a single HSM or in a cluster with Luna HSM.
    • You can now encrypt KMIP objects with keys stored in the Luna Cloud HSM.
  • You can now add a Key Encryption Key (KEK) to an existing Cloud VM Set.
  • The htadmin user can now reset the credentials for the Security Administrator (secroot) account. If you do not want to allow htadmin to reset the secroot credentials, you can disable this option.

  • You can now set an expiration date for the secroot user account or set it to never expire.