<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Nevis - Medium]]></title>
        <description><![CDATA[Nevis is a leader in Identity and Access Management. With its passwordless login solutions, the specialist in authentication protects the data of government authorities, service providers, and industrial companies all over the world. - Medium]]></description>
        <link>https://medium.nevis.net?source=rss----9c62dda0f5e1---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Nevis - Medium</title>
            <link>https://medium.nevis.net?source=rss----9c62dda0f5e1---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 05 Apr 2026 04:34:56 GMT</lastBuildDate>
        <atom:link href="https://medium.nevis.net/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Identity Suite: What’s New in November 2025]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-november-2025-a19afed10327?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/a19afed10327</guid>
            <dc:creator><![CDATA[Davide Cucuzzella]]></dc:creator>
            <pubDate>Mon, 05 Jan 2026 09:32:15 GMT</pubDate>
            <atom:updated>2026-01-05T09:31:54.320Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*It5B6HodyrIZmg_Z" /><figcaption>Photo by <a href="https://unsplash.com/@mr_mgk?utm_source=medium&amp;utm_medium=referral">Marios Gkortsilas</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h3>Swiyu / EUDIW onboarding</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pEsflt6jUKbH9zibh4JAgA.png" /></figure><p>EID (Digital Identity) provider integrations deliver the highest level of trust and the most frictionless customer experience. By integrating with trusted national and regional Digital Identity providers, you can leverage high-assurance, government-backed verification to dramatically reduce fraud and meet compliance requirements like KYC. This feature allows your customers to onboard and log in in seconds using their verified digital identities, accelerating conversion and enhancing the overall customer journey. <br>Nevis provides out-of-the-box integrations with 3 EUDI wallets configured for EID digital onboarding:</p><ul><li>Signicat e-ID Hub — European e-id</li><li>walt.id — EUDI Wallet + custom Verifiable Credentials</li><li>Swiss e-ID — for Swiss citizens</li></ul><h3>OpenSSL 3.5 upgrade</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*KeGq1rkMFdW_PaaR" /></figure><p>nevisProxy has been updated to use OpenSSL 3.5.4. OpenSSL 3.5 is a significant release as it includes the first NIST-standardized post quantum cryptography (PQC) algorithms, such as ML-KEM for key exchange and ML-DSA for digital signatures, to protect against future quantum computer attacks. This is one of the first early steps from Nevis to prepare for the long-term support of the coming post quantum cryptography era.</p><h3>SCIM Continuous provisioning</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/347/0*8JR61zgQdpC9iACq" /></figure><p>Our existing SCIM provisioning solution mainly consisted of the in and out-bound one time and bulk capabilities so far. With our recent additions, which also covered the PATCH operation support for SCIM, now enables projects to deliver continuous provisioning integration in both directions. Besides this, the SCIM solution was also amended by additional filtering capabilities as well as performance improvements. Further enhancements that ease the integration (like sample client solutions, integration guides) are still to come. But we already paved the way to enable the full power of SCIM based provisioning.</p><h3>IDM REST APIs — phase I</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/579/0*wD9iswAF9fqBvfOV" /></figure><p>Nevis has started to fully round up its REST based interface coverage for nevisIDM with the current release cycle. In our phased approach, we’ve started with the login and authentication processes, prioritized by the needs previously communicated to us. The current rolling release and the upcoming LTS26 releases now contain REST endpoints for entities such as the SAML or Ticket credential, also has full OATH credential coverage completion, besides several others. And with our second phase coming next May, all credentials and any other remaining gaps in our other IDM REST coverage (history operations for example) should be closed and delivered.</p><h3>OpenAPI support</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/575/0*WWH_sBqc8vkkuSZW" /></figure><p>Nevis has standardized it’s API descriptor approach in the current rolling release. OpenAPI / swagger based descriptors are now available for the public REST interfaces of all Nevis components. The documentation is available on <a href="https://apidocs.nevis.net/">https://apidocs.nevis.net/</a> For quick access of the component documentation, see the links below:</p><ul><li><a href="https://apidocs.nevis.net/nevisadapt/">nevisAdapt</a></li><li><a href="https://apidocs.nevis.net/nevisadmin4/">nevisAdmin4</a></li><li><a href="https://apidocs.nevis.net/nevisauth/">nevisAuth</a></li><li><a href="https://apidocs.nevis.net/nevisfido/">nevisFIDO</a></li><li><a href="https://apidocs.nevis.net/nevisidm/">nevisIDM</a></li><li><a href="https://apidocs.nevis.net/nevismeta/">nevisMeta</a></li></ul><h3>Performance optimisations — phase I</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/400/0*HJhovqlxZA-iaK_u" /></figure><p>Nevis is undergoing a rehaul of its approach towards performance, specifically with regards to the amount of SQL statements executed towards the database in different use cases. We follow a phased approach on this topic, and expect to complete in all areas by the May 2026 release. But in the current cycle, we already deliver several relevant changes, with a focus on authentication processing. Below are the areas covered:</p><ul><li>Caching upgrades in nevisIDM and nevisFIDO, e.g. introduction of the IDM policy cache</li><li>Endpoint optimisations, from SCIM through generic credential properties to login-info bulk updates</li><li>Hibernate tuning for endpoints and in general, e.g. enhanced transactionality coverage</li></ul><p>In our coming phase II for May 2026 further enhancements are planned, for example, on the authstate and service layers, but additional caching will be included also.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a19afed10327" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-november-2025-a19afed10327">Identity Suite: What’s New in November 2025</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Identity Suite: What’s New in May 2025]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-may-2025-607d50fa8a9d?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/607d50fa8a9d</guid>
            <category><![CDATA[openid-connect]]></category>
            <category><![CDATA[mobile]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[fido2]]></category>
            <dc:creator><![CDATA[Lukas Westermann]]></dc:creator>
            <pubDate>Wed, 16 Jul 2025 08:44:51 GMT</pubDate>
            <atom:updated>2025-07-17T13:55:53.945Z</atom:updated>
            <content:encoded><![CDATA[<p>The latest release of Nevis brings key enhancements across various areas, including FIDO2 and OpenID Connect product certifications, credential management, UI, and mobile security. We’ve been listening closely to your ideas and change requests, and we’re excited to deliver features that matter to you!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-ZFU_gk3IQOO8EnnV8bnLQ.jpeg" /></figure><h4>We are FIDO2 certified!</h4><p>While Nevis already supported FIDO2 and passkeys for a long while, we are happy to announce that we recently successfully obtained the<strong> FIDO2 Functional Server Certification</strong>. As one of a few vendors, Nevis now provides certified FIDO implementations <strong>across both major FIDO variants</strong>: FIDO UAF and FIDO2.</p><h4>OpenID Connect (OIDC) Certification</h4><p>Nevis is now officially certified at the <strong>OpenID Foundation</strong> for their <strong>OpenID Provider’s (OP) Basic Profile</strong> with the Nevis Identity Platform! This milestone marks a major step in our mission to deliver<strong> secure, seamless and standards-based digital identity solutions.</strong> With OIDC certification, integrating Nevis into modern identity ecosystems is easier and more secure than ever. Whether you’re streamlining customer journeys or scaling your identity architecture, Nevis has you covered. <strong>Turn security into an experience — with Nevis, it’s not just possible, it’s certified.</strong></p><h4>Credential Intelligence</h4><p>Credential intelligence uses external information sources to detect if the users credentials have been <strong>leaked</strong> in data breaches and thus unsafe.</p><p>Credential intelligence can be used to trigger a password change in case of compromised credentials bringing extra security for our customers. This feature can be utilised in the registration, login, and password change use-cases.</p><h4>New default login UIs</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mB_INN9rSTc-FKFSTx62ZA.png" /></figure><p>A fresh new style for the default login widget, available directly in Nevis.</p><h4>PKCE for the Relying Party</h4><p><strong>PKCE (Proof Key for Code Exchange) support</strong> is now fully available across both the server and client sides of our OIDC/OAuth2 implementation! In line with RFC 7636, we’ve enabled PKCE in <strong>OAuth2ClientState</strong>, <strong>RelyingPartyState</strong>, and the <strong>Generic Social Login Step</strong>, empowering you to build secure, end-to-end authorization flows for public clients and federated login use cases. This upgrade strengthens protection against code interception attacks when Nevis is acting as the client (or service provider), while keeping your integrations smooth and modern.</p><h4>OpenID Connect Seamless Key Rollover</h4><p>Nevis introduces seamless key rollover support for the OAuth2 /OpenID Connect flows, delivering a new level of operational stability and security agility. With support for overlapping key validities organizations can now rotate signing and encryption keys for ID and access tokens <strong>without requiring user re-authentication or interaction</strong>. This enables true <strong>zero downtime</strong> during OIDC certificate updates, even when tokens are actively in use or have already been issued. The update lays the groundwork for a resilient, standards-compliant token lifecycle, addressing the needs of long-lived tokens and high-assurance environments.</p><h4>Mobile App Attestation</h4><p>Our latest SDK introduces App Attestation support across both native Android and iOS SDKs as well our Flutter and React Native plugins. App Attestation is a security mechanism provided by <a href="https://developer.apple.com/documentation/devicecheck/establishing-your-app-s-integrity">Apple</a> and <a href="https://developer.android.com/google/play/integrity/overview">Google</a> that allows backend services to cryptographically verify the authenticity and integrity of mobile applications before processing requests. By implementing this technology, we ensure that only customer-approved applications can interact with our backend services, creating a robust defense against malicious apps attempting to impersonate legitimate clients. This verification process occurs at the application level, where the mobile operating system generates cryptographic proofs that confirm the app’s identity, code integrity, and runtime environment, which are then validated by our servers before granting access to authentication services.</p><h4>Android Strongbox Support</h4><p>We’ve integrated StrongBox support for Android devices that feature this hardware-backed security module. StrongBox is Android’s implementation of a Hardware Security Module (HSM), introduced in Android 9, which provides tamper-resistant storage for cryptographic keys within dedicated secure hardware separate from the main processor. When available on a user’s device, our SDK automatically utilizes StrongBox to store sensitive key material, ensuring that cryptographic operations occur within the most secure environment possible. This hardware-level protection makes it extremely difficult for attackers to extract or manipulate keys, even with physical access to the device or sophisticated software-based attacks, significantly enhancing the overall security posture of our authentication process.</p><h4>Minimal Canary Deployment</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QUcEe_Gftha5C-KEjISzfw.png" /></figure><p>When using canary deployments, infrastructure must have enough capacity for both primary and canary needs, potentially requiring double the primary’s peak resources. This can be costly, especially when such deployments are used for configuration testing. To <strong>lower costs</strong> for multiple projects with canary deployments while maintaining ingress-based traffic control and zero downtime, we introduce an optional inventory item to customize the resource and replica settings for the canary deployment.</p><h4>Improving Interoperability with FIDO &amp; Generic Credentials</h4><p>Nevis continuously expands its offering in the FIDO and Passkey areas, adding more and more features to them with every release cycle. The usage of these credentials is also constantly growing. The current solution, which relies on the<strong> usage of Generic credentials together with specific FIDO credentials</strong> is becoming more and more of a constraint. Nevis has changed this, allowing for parallel usage of FIDO and Generic credentials for <strong>both our rolling and LTS24 releases</strong>. More changes and flexibility will also be delivered in the coming Nevis releases regarding FIDO and Generic credential usage.</p><p><em>Sources: Cover Photo by </em><a href="https://unsplash.com/@les_photos_de_raph?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash"><em>Raphaël Biscaldi</em></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=607d50fa8a9d" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-may-2025-607d50fa8a9d">Identity Suite: What’s New in May 2025</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Multi-domain support in Passkey: A closer look at Related Origin Requests]]></title>
            <link>https://medium.nevis.net/multi-domain-support-in-passkey-a-closer-look-at-related-origin-requests-34ea4e271400?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/34ea4e271400</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[passkey]]></category>
            <category><![CDATA[fido]]></category>
            <category><![CDATA[nevis]]></category>
            <category><![CDATA[authentication]]></category>
            <dc:creator><![CDATA[Alexis Faulkner]]></dc:creator>
            <pubDate>Wed, 22 Jan 2025 13:28:35 GMT</pubDate>
            <atom:updated>2025-01-22T13:28:35.287Z</atom:updated>
            <content:encoded><![CDATA[<p>The constant evolution and improvement of passkeys continues with the introduction of Related Origin Requests, an exciting feature designed to streamline authentication across related domains. This functionality enables users to leverage their existing passkeys for seamless sign-in across different domains within the same organization, enhancing both security and user experience across all brands and services.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*k9TxUC7C9PSxglSRNE3iGQ.jpeg" /></figure><h3>What does Related Origin Requests allow</h3><p>Related Origin Requests allow websites to share passkeys, not just between closely related domains, but also across different brands and domains owned by the same organization. This means a single passkey could potentially be used across all of a company’s online properties. For example, a user could sign in to google.com, google.co.uk, youtube.com, and wallet.google all with the same passkey. It&#39;s important to note that this feature has limitations, including a maximum of five &#39;labels&#39; associated with each passkey.</p><h3>How to use Related Origins</h3><p>To enable Related Origin Requests across multiple domains, a .well-known file must be hosted at the root level of the primary website (the Relying Party or RP) where the passkeys are registered. For example google they would host the file at https://www.google.com/.wellknown. This file, known as a domain assertion, allows browsers to verify that other specified domains are authorized to use the same passkeys. By hosting this file, the primary website effectively grants permission to related domains, streamlining the user experience and enhancing security by ensuring only authorized sites can access the passkeys.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/831/1*ZB2cyqOUrUb5WXQh7qzK8A.png" /></figure><p>As an example:</p><p>Let’s say the RP ID for your organization’s main website is example.com. You would host a domain .well-known file on example.com that specifies other related domains, such as example.co.uk, example.shop.com, and example.app.com, are authorized to use passkeys created for example.com.</p><p>The browser, when encountering a passkey for example.com on one of the related domains, would consult the domain assertion file on example.com to confirm that sharing the passkey is permitted. This process helps prevent phishing attacks by ensuring passkeys are only used within the intended network of related domains and served only via https.</p><p>For the above example the .wellknown file for example.com would be stored in <a href="https://example.com/.wellknown">https://example.com/.wellknown</a>would look as follows:</p><pre>{     <br>  &quot;origins&quot;: [        <br>                &quot;https://example.co.uk&quot;,         <br>                &quot;https://example.shop.com&quot;,         <br>                &quot;https://example.app.com&quot;     <br>              ] <br>}</pre><h3>Current Limitations and Considerations</h3><p>While Related Origin Requests offer significant potential, it’s important to acknowledge their are some current limitations due to how cutting edge it is.</p><p>As of January 2025 the browsers support is as follows;</p><ul><li>Chrome: supported as of version 128</li><li>Safari: supported as of MacOs 15 and iOS 18 macOS 15+</li><li>Firefox: Currently no support</li></ul><p>We have seen that using Chrome 128 or newer on versions of iOS that are below 18 are not compatible. This suggests that iOS is a limited factor when using Chrome.</p><h3>The Nevis Authentication Cloud support</h3><p>The Authentication Cloud provides support for Related Origin Requests allowing for organizations with multiple brands to be able to use a single passkey across all of their domains. This is allowing their users to quickly authenticate and access their sites whichever brand or domain they are accessing.</p><h3>The Path Toward a Seamless Passwordless Future</h3><p>Related Origin Requests represent a significant stride toward a more user-friendly and frictionless passwordless experience. As broader browser and operating system support emerges, this functionality will further solidify the role of passkeys in simplifying and securing online authentication across all the domains/ brands an organisation has.</p><p>Take a look at <a href="https://passkeys.dev/docs/advanced/related-origins/#how-it-works">passkeys.dev</a> for additional details.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=34ea4e271400" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/multi-domain-support-in-passkey-a-closer-look-at-related-origin-requests-34ea4e271400">Multi-domain support in Passkey: A closer look at Related Origin Requests</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Identity Suite: What’s New in November 2024]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-november-2024-d7618ca7ec05?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/d7618ca7ec05</guid>
            <category><![CDATA[passkey]]></category>
            <category><![CDATA[gitops]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[identity-suite]]></category>
            <category><![CDATA[devops]]></category>
            <dc:creator><![CDATA[Davide Cucuzzella]]></dc:creator>
            <pubDate>Wed, 18 Dec 2024 13:45:43 GMT</pubDate>
            <atom:updated>2024-12-18T13:45:43.817Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qFTMbDCGr5-m82hiPtYnsg.jpeg" /></figure><p>The latest release of Identity Suite introduces a comprehensive set of improvements designed to optimise user workflows and bolster security measures. This November 2024 update encompasses key enhancements to the inventory editor, deployment processes, Git integration, and Mobile SDK functionalities. Users can anticipate increased efficiency, reduced manual intervention, and a more streamlined experience across the platform. Continue reading for a detailed overview of the key features and benefits included in this release.</p><h3>Inventory Editor Improvements</h3><p>Our improved inventory editor makes your workflow smoother than ever. With the help of the new editor action menu you can easily fold and unfold sections to focus on what matters. Collapsible ranges allow you to organize and review data effortlessly. Open and close validation errors. They’re now highlighted, so you can fix issues instantly. These updates are designed to save you time and reduce frustration, ensuring your inventory stays accurate and stress-free.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cltr-O2UNvPpjHojm-8jSA.png" /></figure><h3>Background Deployment</h3><p><strong>Seamless Updates with Background Deployment</strong></p><p>Our new background deployment feature makes the process more efficient and smarter. It allows you to test small updates without manual intervention while continuing your work uninterrupted. Deployments run quietly in the background, eliminating downtime and streamlining workflows. Perfect for efficient testing and reducing delays, it ensures you stay productive during the process. Focus on what matters while your updates take care of themselves.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LLlEkRPZBf0UKlQu3aH1xQ.png" /></figure><h3>Improve Git publish UI</h3><p>The improved Git publish UI gives you more clarity. It allows now to compare the content of pattern attachments (e.g. Groovy scripts or XML files) before committing to Git to easily track changes and ensure accuracy. And we also have the new Git Tagging option. It helps your version management, stay organised and efficiency. These enhancements simplify workflows, reduce errors, and make publishing with Git more productive.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*bYhlxOSw_UvQnGcbilqA-g.png" /></figure><h3>Variable default values</h3><p>Introducing our new variable default values: a smarter way to set up your processes. From now on you can assign sample or predefined default values to your variables. This means no more adding different values for validation, default values are automatically applied. It saves you time and reducing repetitive manual input. Configuration becomes more productive, letting you focus on optimising.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nr08Z3dEZ7A2bnmC47I5MQ.png" /></figure><h3>Single Document for Release Notes</h3><p>We have revamped our release note structure and developed a comprehensive and more appealing format that focuses on all the relevant changes for the release. This way our clients could obtain release specific information more quickly and easily regardless of technical component. You can read the first version applicable for the November 2024 release <a href="https://docs.nevis.net/nevislifetimesupport/Releases/All_Rolling_Releases_RR/Q4_RR_Upgrade_November_2024">here</a>.</p><h3>Mobile</h3><h3>Fetch Channel</h3><p>The SDK now retrieves out-of-band operations directly from the backend, offering more flexibility and control. This allows you to provide users with an alternative to push notifications and QR codes when those methods are delayed or unavailable. Alternatively, you can use this as the sole notification method, ensuring the mobile app retrieves the notification for the user. This approach eliminates potential notification delivery failures and puts users in control of their operations.</p><p>For more information on how to implement, take a look at <a href="https://docs.nevis.net/mobilesdk/3.8.0/api-references/javadoc/ch/nevis/mobile/sdk/api/operation/outofband/PendingOutOfBandOperations.html">PendingOutOfBandOperations (NEVIS Mobile Authentication SDK 3.8.0.1)</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cvdlee8zN4hJtOOAtaB8iA.png" /></figure><h3>Security Enhancements</h3><h4>Android Key Attestation</h4><p>The Android operating system is used by many different device manufacturers, each of whom may implement varying keystore hardware mechanisms. The new Key Attestation functionality ensures that your users’ key hardware stores are approved and secure by Google, providing assurance that the security key is not at risk of being tampered with.</p><p>This functionality is only required on Android due to the diverse range of manufacturers, while iOS devices, being solely produced by Apple, have guaranteed keystore security by default.</p><p>See <a href="https://docs.nevis.net/configurationguide/mobile-auth-concept-and-integration-guide/use-cases-and-best-practices/uaf-surrogate-full-basic-comparison#full-basic-attestation">Authenticator Attestation (Full Basic / Surrogate Basic) | Nevis documentation</a></p><h4>Other enhancements</h4><p><strong>Elliptical Curve Support: </strong>The mobile authentication now fully supports Elliptic Curve Cryptography (ECC) with the P-256 curve for generating new FIDO UAF credentials, replacing the previous use of RSA whenever possible. ECC is considered more resilient to future cryptographic attacks, ensuring long-term security for your applications.</p><p><strong>Alphanumeric Password Authenticator: </strong>You can now offer users the option of using an alphanumeric password for FIDO UAF authentication. The SDK supports storing and managing basic password validation, such as minimum and maximum length. However, your application is responsible for ensuring the password’s complexity and strength (entropy) to meet your specific security requirements.</p><p>See <a href="https://docs.nevis.net/mobilesdk/concept/concept-description/authenticators#application-password">Authenticators | Nevis documentation</a></p><h3>Credential Sync</h3><p>Since users can delete registrations from their devices or through the backend on another device, inconsistencies can arise between stored registrations on the front and back ends. To address this, the Mobile SDK now performs checks and synchronizations to remove any redundant registrations, ensuring users have only valid credentials on their devices and preventing the backend from offering authentication from invalid devices.</p><p>Learn more how to add credential sync using<a href="https://docs.nevis.net/mobilesdk/3.8.0/api-references/javadoc/ch/nevis/mobile/sdk/api/operation/DeviceInformationCheck.html">DeviceInformationCheck (NEVIS Mobile Authentication SDK 3.8.0.1)</a> and <a href="https://docs.nevis.net/mobilesdk/3.8.0/api-references/javadoc/ch/nevis/mobile/sdk/api/operation/DeviceInformationSync.html">DeviceInformationSync (NEVIS Mobile Authentication SDK 3.8.0.1)</a>.</p><h3>Wildcard Facet ID’s</h3><p>To simplify integration during development, the SDK now allows the use of wildcards in FacetIDs for both iOS and Android. This eliminates the need for integrators to generate FacetIDs during the early development phase and permits testing to occur sooner. However, it’s important to note that wildcarding is <strong>not permitted</strong> in the production SDK.</p><p>See <a href="https://docs.nevis.net/mobilesdk/guide/configuration#wildcard-facet-ids">Mobile Authentication: Configuration Guide</a></p><h3>Passkey and FIDO 2 Credential filtering</h3><p>The newly introduced credential filtering feature is based on an allow-list concept. Configuring an allow list allows you to restrict FIDO2 authenticators for the registration and authentication ceremonies.</p><p>Through the help of this you can limit the FIDO2 security keys allowed to be used to a specific set of keys from a specific vendor. With that many new use cases are being supported, for example, it is now possible to limit that only keys used for registration are possible to be used for authentication. Besides the feature sets supported, this also elevates the level of security that can be provided.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d7618ca7ec05" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-november-2024-d7618ca7ec05">Identity Suite: What’s New in November 2024</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Unlocking the Power of Passkeys: The Crucial Role of UX in Seamless Authentication]]></title>
            <link>https://medium.nevis.net/unlocking-the-power-of-passkeys-the-crucial-role-of-ux-in-seamless-authentication-1315ca25f56b?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/1315ca25f56b</guid>
            <category><![CDATA[ux]]></category>
            <category><![CDATA[fido]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[passkey]]></category>
            <category><![CDATA[figma]]></category>
            <dc:creator><![CDATA[Alexis Faulkner]]></dc:creator>
            <pubDate>Tue, 30 Jul 2024 14:10:20 GMT</pubDate>
            <atom:updated>2024-07-30T14:10:20.061Z</atom:updated>
            <content:encoded><![CDATA[<p>The world is shifting towards a passwordless future, and passkeys are becoming more widely adopted across the entire technology landscape. As this innovative FIDO standard gains traction, businesses are recognizing the immense potential of passkeys to revolutionize authentication, enhancing both security and user experience.</p><p>However, the success of passkey implementation goes beyond mere technical integration; it hinges on designing a user experience (UX) that’s intuitive, seamless, and trustworthy.</p><h3><strong>The UX Challenge of Passkeys</strong></h3><p>While passkeys eliminate the vulnerabilities of traditional passwords, they introduce a new set of UX considerations. Users need to understand how passkeys work, how to create and manage them, and how to authenticate with them across different devices and platforms. A poorly designed passkey experience can lead to confusion, frustration, and ultimately, user abandonment.</p><p>To address this challenge, we’ve created a comprehensive set of Figma templates, based on the <a href="https://fidoalliance.org/UX-guidelines/">FIDO UX guidelines</a>, specifically designed for passkey UX visualization. These templates provide a framework for crafting a user-centric authentication flow that accelerates the integration of passkeys into your existing user interface.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pPAR8dE8kezkWqzYOcBVfw.png" /></figure><h3>Your UX Accelerator to Passkey Implementation</h3><p>Our Figma templates offer a visual representation of the passkey UX design flow that covers various scenarios, including:</p><ul><li><strong>Passkey creation:</strong> Guiding users through the process of setting up a passkey, explaining the benefits, and addressing potential concerns.</li><li><strong>Passkey authentication:</strong> Designing intuitive prompts and interactions for biometric or device-based authentication.</li><li><strong>Passkey management;</strong> Aiding users to add, remove and manage each of their passkeys on their current device as well as their others.</li></ul><p>These templates not only visualize the user journey but also incorporate best practices for security and usability. They help designers, developers, and product managers understand the nuances of passkey UX and allow them to make informed decisions to optimize the user experience.</p><h3><strong>Beyond Technical Implementation: The Importance of UX in Passkey Adoption</strong></h3><p>A well-designed passkey experience is crucial for driving user adoption. By simplifying the onboarding process, minimizing friction, and ensuring clarity at every step, you can encourage users to embrace this new authentication method and enjoy its benefits.</p><p>Our Figma templates empower you to create a passkey experience that is:</p><ul><li><strong>Intuitive:</strong> Users easily understand how to use passkeys without extensive instructions.</li><li><strong>Secure:</strong> Passkey authentication is implemented with robust security measures to protect user data.</li><li><strong>Consistent:</strong> The passkey experience is consistent across different devices and platforms.</li><li><strong>Trustworthy:</strong> Users feel confident in the security and reliability of the passkey system.</li></ul><p>Find our passkey UX flows in figma communities <a href="https://www.figma.com/community/file/1395675909430339257/nevis-security-passkey-signup-and-login-template?searchSessionId=lyyl41j8-s0rso0dch77">here</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1315ca25f56b" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/unlocking-the-power-of-passkeys-the-crucial-role-of-ux-in-seamless-authentication-1315ca25f56b">Unlocking the Power of Passkeys: The Crucial Role of UX in Seamless Authentication</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Identity Suite: What’s New in May 2024]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-may-2024-c38b2699ccd7?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/c38b2699ccd7</guid>
            <category><![CDATA[postgresql]]></category>
            <category><![CDATA[sbom]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[identity-suite]]></category>
            <dc:creator><![CDATA[Gyula Vas]]></dc:creator>
            <pubDate>Tue, 18 Jun 2024 08:05:12 GMT</pubDate>
            <atom:updated>2024-06-18T08:05:12.824Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*0s-agBSY96Bkdzg-" /><figcaption>Photo by <a href="https://unsplash.com/@goumbik?utm_source=medium&amp;utm_medium=referral">Lukas Blazek</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h3><strong>Product analytics</strong></h3><p>Great products aren’t built in a vacuum–you need a continuous process of <strong>getting feedback</strong> from users to guide your product roadmap and keep the pulse on satisfaction levels.</p><p>Product analytics<strong> </strong>is an excellent source of insights about how the product performs and how it can be further improved. Product analytics helps <strong>Nevis</strong> to understand what and how users are doing.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*7bCUTqgw0pVcqDs9AJRTzQ.png" /></figure><p>As of the<a href="https://nevissecurity.atlassian.net/wiki/pages/resumedraft.action?draftId=3296100366"> </a><a href="https://docs.nevis.net/nevisadmin4/User-Guide/Overview-of-the-User-Interface/Product-Analytics"><strong>2024 May Identity Suite release</strong></a> Nevis is introducing a new feedback loop — which is an iterative process — whereby insights gathered from customer feedback are implemented into the product development process and used to inform product decisions on a consistent basis. The process repeats indefinitely as new feedback influences new product strategies, and changes may prompt additional feedback from customers.</p><h3>LTS-24</h3><p>The release marks a new milestone in terms of functionality and stability, it is cloud ready and it includes support for PostgreSQL, Red Hat Enterprise 9 and OpenTelemetry.</p><p>The Nevis LTS lifecycle model follows a fixed release cycle. New features are held back until a new major LTS release version is available, after a predefined and fixed period of time. To ensure highest security at all times, security patches and functional bug fixes are released more frequently. For more details please visit our <a href="https://docs.nevis.net/nevislifetimesupport/">release support page.</a></p><h3>PostgreSQL</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/474/0*ZiIauMbQLkda2oCE" /></figure><p>New Identity Suite Rolling and LTS releases are now fully compatible with PostgreSQL. For new clients who build their Identity Suite based on Microsoft Azure One-Click deployment, this is the only supported option.</p><h3>Software Bill of Materials (SBOM)</h3><p>In an effort to increase transparency and provide quality assurances concerning the security of the software supply chain we are investigating and plan to roll out Software Bill of Materials (SBOM) for the main Nevis components. The supported SBOM format will be <a href="https://cyclonedx.org/">CycloneDX</a> and the roll out will begin with the main components for Rolling Releases and LTS releases will follow.</p><p>SBOMs are important in modern software development and management to help ensure security, compliance, quality, and efficiency throughout the software development lifecycle.</p><p>By having a complete list of dependencies, it can help to identify vulnerabilities within the product and quickly assess their status and related security risks.</p><p>Interested in getting an early look at our SBOM? Reach out to us for a preview before the official release.</p><h3>Single provisioning queue for IDM</h3><p>Our built-in identity provisioning and synchronization has long been able to integrate with message queue (MQ) solutions. The solution was extended with the possibility to configure external MQ applications. Those supporting XA transaction management can now be integrated easily. But those without XA can also be utilised through the configuration of an external Artemis bridge. While our so far existing current solution also stays available for project implementation, including performance and memory handling improvements.</p><p>The default setting stayed the same, using the internal Artemis bridge. though, customers opting for this shall experience greatly lower memory and cache consumption values. In case if an external queue is configured, the internal Artemis bridge is not started. Two major directions exist in this scenario. On one hand, those using XA compatible servers can simply change the destination of the messages to it. On the other hand those without XA support (e.g. Azura Service Bus) can opt for an external Artemis bridge instead. This way allowing for the integration of various external message bus platforms.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c38b2699ccd7" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-may-2024-c38b2699ccd7">Identity Suite: What’s New in May 2024</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Identity Suite: What’s New in February 2024]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-february-2024-156413e50bde?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/156413e50bde</guid>
            <category><![CDATA[passkey]]></category>
            <category><![CDATA[identity-suite]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[fido]]></category>
            <category><![CDATA[fido2]]></category>
            <dc:creator><![CDATA[Gyula Vas]]></dc:creator>
            <pubDate>Fri, 22 Mar 2024 08:06:56 GMT</pubDate>
            <atom:updated>2024-03-22T08:06:56.230Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*OKWKIq-oHTJfZVWz" /><figcaption>Photo by <a href="https://unsplash.com/@olloweb?utm_source=medium&amp;utm_medium=referral">Agence Olloweb</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h3><strong>Inventory search</strong></h3><p>We’re excited to introduce our latest enhancement: the search feature has been extended to the inventory level! Now, navigating through your projects’ and inventories’ content is easier than ever. Enter your query and find what you need in no time. With this new update, you can also search for inventory content, secret description, secret file description, file description, secret file name, and file name.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_zTTqSB35PC4PIDB6VDoUg.png" /></figure><h3>Mobile authentication project template</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/616/1*r-ZTHGOU7FLJcz6hNy2GVQ.png" /></figure><p><a href="https://docs.nevis.net/configurationguide/project-templates/mobile-authentication/">This project template</a> elevates security by providing multi factor authentication (MFA) for login and self registration cases out of the box, based on FIDO UAF standards. Security and convenience at the same time is realised through the use of public key cryptography and multi-factor authentication on mobile devices.</p><p>The template is by default configured to connect with the native (<a href="https://testflight.apple.com/join/q0lkyEVR">iOS</a> or <a href="https://appdistribution.firebase.google.com/pub/i/b58532b9c7f4ced2">Android</a>) Nevis DEMO mobile access application to support complete sign-up and sign-in scenarios.</p><h3>Passkey project template</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/616/1*Lu0dpSK-StQaMs2UImm3Pw.png" /></figure><p><a href="https://docs.nevis.net/configurationguide/project-templates/passkey/">This project template</a> represents a strong &amp; secure user authentication — for login and self registration cases out of the box — based on FIDO2 standards. <a href="https://fidoalliance.org/passkeys/">Passkey</a> is in fact a replacement for password. It is easy to use, resistant to threats (phishing, credential stuffing, other remote attacks) &amp; works across most of the user’s devices. Users do not need to enrol a new FIDO credential on each service or each new device.</p><h3>…and more</h3><p>See <a href="https://docs.nevis.net/nevislifetimesupport/Quarterly-Releases/All_Rolling_Releases_RR/Q1_RR_Upgrade_February_2024">our release notes</a> for more.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=156413e50bde" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-february-2024-156413e50bde">Identity Suite: What’s New in February 2024</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Refresh token rotation]]></title>
            <link>https://medium.nevis.net/refresh-token-rotation-1a649cd622ae?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/1a649cd622ae</guid>
            <category><![CDATA[oauth]]></category>
            <category><![CDATA[token]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[identity-suite]]></category>
            <dc:creator><![CDATA[Peter Szabo]]></dc:creator>
            <pubDate>Wed, 13 Dec 2023 08:49:30 GMT</pubDate>
            <atom:updated>2023-12-13T09:09:15.862Z</atom:updated>
            <content:encoded><![CDATA[<p>In the OAuth 2.0 Authorization flow refresh tokens are used by the client to request a new access token after the current ones expires. Access tokens have a limited lifespan, and when they expire, the refresh token can be used to obtain a new one without requiring the user to reauthenticate. However even refresh tokens can expire and the client has to reauthenticate to obtain a new refresh token. This can be a <strong>tiring and uncomfortable process.</strong></p><p>It can be a self explanatory reaction to solve the problem described above to elevate the lifetime of the refresh token to tackle the issue of the frequent reauthentication. However this also carries significant risk because if an attacker <strong>steals a refresh token</strong>, they can easily access the protected resources and act on the user’s behalf for a <strong>prolonged period of time</strong>.</p><p>Refresh token rotation solves the aforementioned problems by<strong> replacing the refresh token </strong>every time a new access token is issued and also invalidating the old one. The new refresh token’s <strong>lifetime will be the same as the invalidated one</strong>. That means in practice that if the old refresh token’s lifetime was 30 days than the new refresh token’s lifetime will be also 30 days starting from the day of issuance.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*h9YokLE0Wo3pHJ_yJJroxw.png" /></figure><p>In scenarios, where <strong>more than one client implementations or parallel processes </strong>share refresh tokens, these clients and processes have to ensure <strong>synchronization</strong> of the refresh tokens across them. Upon every usage of the refresh token, this replication has to happen, before the other client(s) trying to use their expired version of the refresh token.</p><p><strong>Advantages of refresh token rotation</strong></p><ul><li><strong>Better user experience</strong>: Refresh token rotation simultaneously elevates security and enhance user experience by reducing the number of reauthentication requests.</li><li><strong>Reducing the number of long lived tokens</strong>: Refresh token rotation allows the replacement of long lived refresh tokens, reducing the reliance on long-lived credentials and promoting a more secure infrastructure.</li><li><strong>Regulatory compliance</strong>: The feature can help companies to adhere to security and regulatory standards that require the implementation of certain measures, such as token rotation.</li><li><strong>Enhanced security</strong>: Refresh token rotation adds an additional layer of security to the authentication system, making it more resilient against token-related attacks.</li><li><strong>Additional alerting:</strong> In case a refresh token is compromised and utilized, the rightful owner of the refresh token will be required to reauthenticate upon next use. Such reauthentication events, not due to expired token status, but due to usage of an already invalidated token, could raise immediate security alerts in the operator’s systems.</li><li><strong>Minimizes attack opportunity: </strong>Regular rotation minimizes the window of opportunity for attackers to misuse a compromised refresh token.</li></ul><p>As of <strong>2023 May Nevis supports refresh token rotation</strong> in the Identity Suite. Implementing this feature can add an extra security layer for your OAuth 2.0 implementation with unchanged or even better user experience.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1a649cd622ae" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/refresh-token-rotation-1a649cd622ae">Refresh token rotation</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Enhancing Push Authentication Security with Encryption]]></title>
            <link>https://medium.nevis.net/enhancing-push-authentication-security-with-encryption-f658a7e12c2c?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/f658a7e12c2c</guid>
            <category><![CDATA[mobile-apps]]></category>
            <category><![CDATA[push-notification]]></category>
            <category><![CDATA[product]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Alexis Faulkner]]></dc:creator>
            <pubDate>Tue, 12 Dec 2023 09:00:21 GMT</pubDate>
            <atom:updated>2023-12-12T10:59:46.251Z</atom:updated>
            <content:encoded><![CDATA[<p>Push notifications is a crucial element for everyone and just about every service utilises it. However, recent concerns regarding its vulnerabilities, as highlighted in a <a href="https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/">Reuters report</a>, have put the spotlight on the need for additional security measures for protecting push notifications. Apple and Google may be inadvertently exposing users data to risks, but there are multiple methods to mitigate these risks.</p><p>As Nevis utilises push notifications for it’s push authentication, it’s critical to us to ensure your data remains secure and private. In this article we discuss the actions we take protect our customers and your users.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*jZz_kBYRK6znaEC0CMbc0Q.jpeg" /></figure><h3>Decoupling the Push Message from Sensitive Data</h3><p>Our first line of defence involves separating the push message from the actual encrypted payload. This approach ensures that even as the notification traverses through Apple or Google’s push notification servers, it remains devoid of any user IDs, personally identifiable information (PII), or confidential data.</p><ul><li>With the Authentication Cloud, you can additionally provide a notificationMessage in your API calls to separate the encrypted payload (message) from the push notification in a transaction confirmation, as detailed in our <a href="https://docs.nevis.net/authcloud/api-doc/api-use-cases/mobile-app/sign-transaction-push">Sign Transaction with Push documentation</a>.</li><li>We use <em>RSA</em> or <em>ECDH-ES</em> for the <a href="https://docs.nevis.net/nevisfido/reference-guide/dispatchers/fcm-dispatcher#encryption">encrypting the payload</a>.</li></ul><h3>Offering Alternatives to Push</h3><p>Flexibility is key in digital security. Recognising this, we offer alternatives to push-based authentication. Users can opt for QR code or deep-link based authentication methods. These alternatives not only provide additional layers of security but also cater to varied user preferences and needs.</p><ul><li>Simply set &quot;channel&quot;: &quot;app&quot; for your operations in the Authentication Cloud, see <a href="https://docs.nevis.net/authcloud/api-doc/api-use-cases/mobile-app/authenticate-QR-code">the docs</a>.</li><li>For Identity Suite, refer to <a href="https://docs.nevis.net/configurationguide/pattern-libraries/nevisadmin-plugin-mobile-auth#channel">the <em>Channel</em> option</a> in the mobile authentication patterns.</li></ul><h3>Innovating with Backchannel Authentication</h3><p>Looking ahead, we are introducing an additional option in Q1 2024. This method will introduce a backchannel directly to users, enhancing the user experience and reducing dependency on central services from Apple and Google. The “pull to authenticate” feature is a step towards greater autonomy and security in the authentication process. Supporting similar user experience people know from push authentication, also in areas where Google or push services are blocked.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*lhDHTPodc8NOI6LbM9RS6Q.png" /></figure><h3>Summary</h3><p>While it’s important to be aware of the risks associated with push notifications, it’s equally crucial to focus on the available solutions and advancements. Our approach at Nevis is to offer a secure, flexible, and user-friendly authentication experience, free from over-dependence on any single service provider. Stay tuned for more updates, as we continue to prioritize your digital security and privacy.</p><p>With Nevis, push authentication is both secure and convenient.</p><p><em>Want to read more on push authentication security? </em><a href="https://medium.nevis.net/authentication-cloud-introducing-number-matching-1f07dfcda49a"><em>Learn about number matching</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f658a7e12c2c" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/enhancing-push-authentication-security-with-encryption-f658a7e12c2c">Enhancing Push Authentication Security with Encryption</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Identity Suite: What’s New in November 2023]]></title>
            <link>https://medium.nevis.net/identity-suite-whats-new-in-november-2023-a5acce3b6280?source=rss----9c62dda0f5e1---4</link>
            <guid isPermaLink="false">https://medium.com/p/a5acce3b6280</guid>
            <category><![CDATA[java17]]></category>
            <category><![CDATA[identity-suite]]></category>
            <category><![CDATA[fido]]></category>
            <category><![CDATA[product]]></category>
            <dc:creator><![CDATA[Davide Cucuzzella]]></dc:creator>
            <pubDate>Mon, 11 Dec 2023 09:26:26 GMT</pubDate>
            <atom:updated>2023-12-11T09:26:26.150Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*wPzFD4ZCGZ6MAvx8" /><figcaption>Photo by <a href="https://unsplash.com/@justindkauffman?utm_source=medium&amp;utm_medium=referral">Justin Kauffman</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h3>New Rolling Release Lifecycle</h3><p>Starting in May 2024, the Nevis Identity Suite will switch to a six-month Rolling Release cycle, with releases in May and November. In short, fewer releases and longer support.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*cx9BKhmtnXtupcuC.png" /></figure><h4>What does this mean?<a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Lifecycle-Announcements/Six-months-RR-cycle-announcement#what-does-this-mean">​</a></h4><ul><li>Rolling Release “Full support” period will increase from 3 to 6 months.</li><li>Rolling Release “Fade-Out support” period will increase from 4 to 7 months.</li><li>Customers will have 12 months to upgrade to the next Rolling Release version.</li><li>Customers will have to upgrade at least once per year to stay supported instead of twice.</li></ul><p>The definitions of “Full support” and “Fade-out support” remains unchanged. See <a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Rolling_Release_RR">Rolling Release (RR)</a>.</p><h4>Long-Term Support (LTS)<a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Lifecycle-Announcements/Six-months-RR-cycle-announcement#long-term-support-lts">​</a></h4><p>Except for the <a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Lifecycle-Announcements/java-17-upgrade#long-term-support-lts-21">extension of LTS-21 support</a>, the Identity Suite LTS lifecycle will remain unchanged. See <a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Long_Term_Support_LTS#full-support">Long Term Support (LTS)</a>.</p><h3>Java 17 upgrade</h3><p>Nevis upgrades the runtime of all Java-based components from Java 8 to Java 17. The support of Java 17 is a major change with significant technological differences. We are committed to make the upgrade process as smooth as possible for all customers. For this reason, we will adjust the regular life cycle of the following Nevis releases.</p><h4>What does this mean?<a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Lifecycle-Announcements/java-17-upgrade#what-does-this-mean">​</a></h4><ul><li>We will release the first Nevis <strong>rolling release</strong> version with <strong>Java 17</strong> in <strong>November 2023</strong>.</li><li>We <strong>extend the life cycle of the August 2023 rolling release</strong> with Java 8 to facilitate the upgrade to Java 17.</li><li>There will be <strong>no LTS-23</strong> release in November 2023.</li><li>We will release the first Nevis <strong>long-term support</strong> version with <strong>Java 17</strong> in <strong>May 2024</strong>.</li></ul><p>Java 17 is the latest released long-term support (LTS) version of Java. Nevis components will benefit from various improvements, security enhancements, and bug fixes that come with the upgrade to Java 17.</p><p>Do not hesitate to consult your Nevis Value Added Reseller if you have questions about how to plan and implement the Nevis upgrade to Java 17.</p><p>Read more info at <a href="https://docs.nevis.net/nevislifetimesupport/Nevis-Lifecycle/Lifecycle-Announcements/java-17-upgrade">Java 17 Upgrade Announcement | Nevis documentation</a></p><h3>Adaptive Authentication Project template</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ISWW0is3xwSYsOd0u96-_g.png" /></figure><p>It supports out-of-the-box Adaptive user authentication during the login process. You no longer have to decide between security and user convenience, as you can dynamically react during login flows, depending on underlying contextual information or business rules.</p><p>The template primarily features username / password login infrastructure as first authentication step and further, additional security elements (silent e-mail notification, step-up authentication) according to the risk evaluation performed.</p><h3>Social logins templates</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/654/1*ldzn4gy4VJCWOWbQARYvag.png" /></figure><p>This project template implements single-factor user authentication (SFA) based on social platform credentials. Platforms supported out-of-the-box are as follows: Apple, Google, Facebook, Microsoft.</p><p>Social login allows users to log in using their existing accounts from social identity providers.</p><h3>Inventory Diff</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/720/1*5w2GkPY0zxiPeZ4-KWHaLA.png" /></figure><p>It become possible to compare your inventories to each other with the new inventory difference view. With its help you can compare different environments and you can also made modifications on your primary inventory based on the comparison.</p><h3>Project Search</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*M9sADqdFeaSMBoEdyTWFcQ.png" /></figure><p>From now on with this new function you can search for project related contents like property values, project description, variable names, pattern names, pattern notes, attachment names, attachment content, within the “Project Search” dialog. It will help you to find where your different configurations are used. To specify your results you can search in all project or select one project, and you can narrow the result for categories. We are planing to increase this function to other parts of the application as well.</p><h3>New notifications on nevisAdmin4</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/736/1*2kbfSIoTsongKRusyPrMFA.png" /></figure><p>Introducing real-time notifications for enhanced collaboration and transparency. Stay informed when others make changes to projects and know about ongoing deployments. This feature ensures everyone is on the same page, improves communication, and boosts productivity.</p><h3>FIDO UAF Java test client library for automated testing</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VYP3TezzG0FO5uTqt5pPiA.png" /></figure><p>The mobile authentication test client library can be used in Gatling simulation projects to support writing Java based load testing scenarios for FIDO UAF, which can be run against a running Nevis Mobile Authentication setup. Gatling is a highly capable load testing tool which comes with excellent HTTP protocol support out of the box. Writing passwordless load tests using Gatling however requires additional comprehensive knowledge of the FIDO UAF protocol and operations. The purpose of the test client library is to help fill this gap by providing high level helper methods which can be easily integrated into a Gatling scenario. Please note, this solution only supports FIDO UAF but not FIDO2 based credential testing.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a5acce3b6280" width="1" height="1" alt=""><hr><p><a href="https://medium.nevis.net/identity-suite-whats-new-in-november-2023-a5acce3b6280">Identity Suite: What’s New in November 2023</a> was originally published in <a href="https://medium.nevis.net">Nevis</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>