Release Change History

The following changes were made in past DataControl/KeyControl releases. For details about the current KeyControl release and previous releases, visit our Customer Portal at https://trustedcare.entrust.com/. If you do not have a login for TrustedCare, please contact trustedcaresupport@entrust.com.

Changes in Release 10.4.1

Version 10.4.1 is the first release of KeyControl on Oracle Linux. The transition to Oracle Linux from CentOS allows Entrust to improve the security of the KeyControl operating system.

The main KeyControl components were ported directly to Oracle Linux and will continue to work as they did in earlier releases. The same is true for the KeyControl APIs.

Upgrade Path: For Entrust KeyControl, upgrade to 10.4.1 is allowed only from version 10.3.1. For the Entrust KeyControl Policy Agent, upgrade to 10.4.1 is allowed from versions 10.3.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • Entrust KeyControl now runs on the Entrust-hardened version of Oracle Linux.

  • You can now use OpenID Connect (OIDC) Authentication with Active Directory in the KeyControl Vault Management appliance.

  • You can now use OpenID Connect (OIDC) Authentication without configuring Active Directory in the KeyControl Vault Management appliance.

  • AWS multi-Region keys are AWS KMS keys in different AWS Regions that can be used interchangeably. The KeyControl Vault for Cloud Keys now supports using AWS multi-region keys in BYOK.

  • The KeyControl Vault for Cloud Keys now supports the Azure role-based access control (Azure RBAC) as well as the access policy model authorization system.

  • You can now use secondary approval with the KeyControl Vault for Secrets.

  • You can now use Personal Access tokens in your KeyControl Vaults that are using OIDC for authentication to use as a password for API and CLI commands.

  • Added support for TLS 1.3 and Extended Master Secret (TLS). TLS 1.3 is the default for all new KeyControl installations.

  • You can now set KeyControl to use self-signed certificates for all nodes in a cluster.

  • The KeyControl appliance AMI now only supports Instance Metadata Service (IMDS) version 2 for AWS Cloud.

Changes in Release 10.3.1

Version 10.3.1 lays the groundwork for the upgrade to version 10.4.1, which will be the first release of KeyControl on Oracle Linux. The transition to Oracle Linux from CentOS allows Entrust to improve the security of the KeyControl operating system, but it also requires a different migration path than previous KeyControl upgrades.

Upgrade Path: For Entrust KeyControl, upgrade to 10.3.1 is allowed from version 10.2. For the Entrust KeyControl Policy Agent, upgrade to 10.3.1 is allowed from versions 10.2, 10.1.1, and 10.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use OpenID Connect (OIDC) Authentication without configuring Active Directory in your individual KeyControl vaults.

  • You can now use Active Directory (AD) or OpenLDAP for authentication in the KeyControl Vault Management appliance.

    • AD users are supported, but not AD groups.

    • Two-factor authentication is supported for local users only.

Changes in Release 10.2

Upgrade Path: For Entrust KeyControl, upgrade to 10.2 is allowed from versions 10.1 and 10.1.1. For the Entrust KeyControl Policy Agent, upgrade to 10.2 is allowed from versions 10.1 and 10.1.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use hardware security modules with the KeyControl Vault for Secrets.

  • You can now use BYOK with GCP in the KeyControl Vault for Cloud Keys.

  • You can now use MariaDB with TDE in the KeyControl Vault for Databases.

  • The HTTPS proxy server can now be used with BYOK for AWS and Azure.

  • Support for Double Key Encryption for Microsoft 365 in the KeyControl Vault for Cloud Keys.

  • Two-Factor Authentication is now offered with each KeyControl.

Changes in Release 10.1.1

Upgrade Path:  For Entrust KeyControl, upgrade to 10.1 is allowed from versions 10.0 and 10.1. For the Entrust KeyControl Policy Agent, upgrade to 10.1 is allowed from versions 10.0 and 10.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now upgrade KeyControl version 10.0 to KeyControl Vault 10.1.1.

  • It is no longer necessary to enable (SMTP) in the Appliance Manager UI when adding KeyControl Vaults. This restriction in the 10.1 release has been removed.

  • KeyControl Vault PASM vaults now support Ansible. For more detail, see https://github.com/EntrustCorporation/PASM-Vault-Ansible-Plugin.

Changes in Release 10.1

Upgrade Path: You can only deploy Entrust KeyControl 10.1 as a new installation. Upgrade from previous versions of Entrust KeyControl is not supported.

Changes in this release:

  • New Entrust KeyControl Architecture. The Entrust KeyControl family of products has been divided into two components:

    • KeyControl Compliance Manager—This application handles all global requirements for your vaults, such as licensing and authorization.

    • Entrust KeyControl—All of the Entrust KeyControl applications have been separated and moved into individual vaults.

  • You manage licensing for all Entrust KeyControls using KeyControl Compliance Manager.

  • You can now use KeyControl as an external key manager (EKM) provider for Oracle Server.

  • You can now use KeyControl as an AWS KMS External Key Store (XKS).

  • You can now use the new Tokenization Vault and APIs for tokenization, masking, and encryption of data.

  • You can now use KeyControl with Azure-managed HSMs.

  • You can now configure Syslog Server to use Arcsight Comment Event Format (CEF) for logging.

  • KeyControl now supports Remote Administration Ready Smartcards for nShield HSMs.

  • KeyControl now includes the Luna HSM library v10.5.1-174

Changes in Release 10.0

Upgrade Path: For Entrust KeyControl, upgrade to 10.0 is allowed from versions 5.5 and 5.5.1. For the Entrust KeyControl Policy Agent, upgrade to 10.0 is allowed from versions 5.3, 5.4, 5.5, and 5.5.1. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use KeyControl as an EKM provider for Microsoft SQL.

  • You can now use KeyControl to manage your SSH keys.

  • You can now use Bring Your Own Key (BYOK) with Google Cloud Platform.

  • You can now use KeyControl with nShield HSMs that are enrolled in FIPS 140 Level 3 Security Worlds.

Changes in Release 5.5.1

Upgrade Path: For Entrust KeyControl, upgrade to 5.5.1 is allowed from version 5.4 and 5.5. For the Entrust KeyControl Policy Agent, upgrade to 5.5.1 is allowed from release 5.2, 5.2.1, 5.3, 5.4, and 5.5. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • The multi-tenant KMIP server is the next generation server used for KMIP. You must migrate from the legacy KMIP server to take advantage of the new features in the multi-tenant KMIP server. You must complete this migration before you will be able to upgrade to KeyControl version 5.6.

  • You can now authenticate KMIP tenant and vault tenant users using a local user instead of managed authentication.

  • You can now use OpenLDAP Authentication for Secrets Vaults and KMIP Tenants.

  • You can now use OpenID Connect for Secrets Vaults and KMIP Tenants.

Changes in Release 5.5

Upgrade Path: For Entrust KeyControl, upgrade to 5.5 is allowed from version 5.4. For the Entrust KeyControl Policy Agent, upgrade to 5.5 is allowed from release 5.2, 5.2.1, 5.3, and 5.4. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use Bring Your Own Key (BYOK) with Microsoft Azure.

  • You can use KMIP with multiple tenants, which allows administrators to isolate different tenant environments for security and compliance.

  • HSM Root-of-Trust provides enhanced protection for the contents of the object store. Root-of-Trust is gained when the HSM provides the cryptographic keys necessary to unlock the object store.

  • The DataControl file encryption module is now compliant with the Korea Cryptographic Module Validation Program (KCMVP). This can be enabled by setting the environment variable ENTRUST_KCMVP=True before executing the hcl encryptfile command.

Changes in Release 5.4

Upgrade Path: For Entrust KeyControl, upgrade to 5.4 is allowed from version 5.3. For the Entrust KeyControl Policy Agent, upgrade to 5.4 is allowed from release 5.0, 5.1, 5.1.1, 5.1.2, 5.2, 5.2.1, and 5.3. For details, see KeyControl Upgrade and Policy Agent Upgrades.

Changes in this release:

  • You can now use KeyControl to manage your cloud keys using BYOK functionality.

  • Licensing has been updated, including individual entitlements for BYOK, KMIP Servers, and Secrets Vault.

  • The Secrets Vault now has its own GUI.

  • You can now replace an nShield Connect HSM that is on a KeyControl cluster.

  • You can now add an additional nShield Connect HSM to create a high availability cluster in KeyControl.

  • KeyControl now supports online encryption and UEFI secure boot for Ubuntu.

  • You can now disable the KeyControl webGUI alerts for your KeyControl managed user objects to improve performance.