<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
    <channel>
        <title>Release Notes | PingCentral</title>
        <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html</link>
        <description>Release Notes</description>
        <lastBuildDate>Mon, 06 Apr 2026 16:31:56 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <ttl>5</ttl>
        <copyright>Copyright 2026 Ping Identity. All rights reserved.</copyright>
        <item>
            <title><![CDATA[PingCentral 3.1 (April 2026)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-1-april-2026</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-1-april-2026</guid>
            <pubDate>Thu, 27 Mar 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="administrators-can-now-configure-signature-policies-for-saml-sp-connections"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#administrators-can-now-configure-signature-policies-for-saml-sp-connections"></a>Administrators can now configure signature policies for SAML SP connections</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">New</span>
<span class="ping_ticket">PASS-7155</span></p>
</div>
<div class="paragraph">
<p>Administrators can now configure signature policies for SP connections when they create templates and applications, and promote applications to PingCentral environments.</p>
</div>
<div class="paragraph">
<p>Previously, PingFederate administrators had to configure the signature policies after the applications were promoted to PingFederate, which interrupted their workflow and caused unnecessary delays in the process.</p>
</div>
<div class="paragraph">
<p>Note that signature policy configurations are only visible if the corresponding profiles and artifact binding are enabled in the underlying PingFederate SP connection. To learn more, refer to step 8 in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_templates/pingcentral_mng_templates.html#_adding_saml_application_templates" class="xref page">Adding SAML application templates</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="openjdk-version-requirements-if-using-fips-compliant-mode"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#openjdk-version-requirements-if-using-fips-compliant-mode"></a>OpenJDK version requirements if using FIPS-compliant mode</h3>
<div class="paragraph">
<p><span class="ping_changetype-info">Info</span>
<span class="ping_ticket">PASS-7204</span></p>
</div>
<div class="paragraph">
<p>If the FIPS-compliant mode is enabled and OpenJDK 21 is being used, OpenJDK version 21.0.10 or higher is required.</p>
</div>
</div>
<div class="sect2">
<h3 id="security-vulnerability-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#security-vulnerability-fixed"></a>Security vulnerability fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-1323</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed the client-side security vulnerability in DOM-based XSS in redirect URI definitions.</p>
</div>
</div>
<div class="sect2">
<h3 id="apache-commons-compress-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#apache-commons-compress-updated"></a>Apache Commons Compress updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-5852</span></p>
</div>
<div class="paragraph">
<p>The Apache Commons Compress has been updated to version 1.26, which resolved the security vulnerability that affected versions 1.0 to 1.21. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/cve-2021-36090">CVE-2021-36090 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="moment-js-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#moment-js-updated"></a>Moment.js updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6410</span></p>
</div>
<div class="paragraph">
<p>Moment.js has been updated to version 2.29.4, which resolved the path traversal vulnerability that affected versions 1.0.1 to 2.29.1. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/cve-2022-24785">CVE-2022-24785 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="option-to-download-saml-idp-metadata-issue-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#option-to-download-saml-idp-metadata-issue-fixed"></a>Option to download SAML IdP metadata issue fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7017</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed the <strong class="uicontrol:">Promotion Details</strong> page so that it now displays the option to download the SAML IdP metadata if the application was promoted directly from the JSON file.</p>
</div>
</div>
<div class="sect2">
<h3 id="swagger-ui-library-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#swagger-ui-library-updated"></a>Swagger UI library updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7021</span></p>
</div>
<div class="paragraph">
<p>The Swagger UI library has been updated from version 2.9.2 to 3.23.11 to prevent future false-positive scan alerts. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/cve-2019-17495">CVE-2019-17495 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="swagger-json-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#swagger-json-fixed"></a>Swagger.json fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7132</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed the swagger.json endpoint, and it now returns information about the Admin API as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="api-loading-issues-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#api-loading-issues-resolved"></a>API loading issues resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7163</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed the issue where users encountered a continuous loading screen when they tried to access the API. The API now works as expected and returns a response.</p>
</div>
</div>
<div class="sect2">
<h3 id="h2-database-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#h2-database-updated"></a>H2 database updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7070</span></p>
</div>
<div class="paragraph">
<p>The H2 database has been updated to version 2.2.220, which resolved the security vulnerability that affected version 2.1.210. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/cve-2022-45868">CVE-2022-45868 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="hibernate-library-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#hibernate-library-updated"></a>Hibernate library updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7172</span></p>
</div>
<div class="paragraph">
<p>The <code class="filepath">hibernate-ehcache</code> library is no longer used, which resolved the security vulnerability. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0603">CVE-2026-0603 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="socket-appender-in-apache-log4j-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#socket-appender-in-apache-log4j-updated"></a>Socket Appender in Apache Log4j updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7174</span></p>
</div>
<div class="paragraph">
<p>The Socket Appender in Apache Log4j has been updated to version 2.25.3, which resolved the security vulnerability that affected versions 2.0-beta9 through 2.25.2. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161">CVE-2025-68161 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="sso-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sso-issue-resolved"></a>SSO issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7176</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed an issue with SSO, and users are now redirected to the PingFederate sign-on page instead of the PingCentral home page when they sign on.</p>
</div>
</div>
<div class="sect2">
<h3 id="outdated-uri-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#outdated-uri-issue-resolved"></a>Outdated URI issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7187</span></p>
</div>
<div class="paragraph">
<p>We’ve fixed an issue where redirect URIs were still displayed in OAuth or OIDC applications after the environment referenced in the URI was deleted.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 3.0.1 (March 2026)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-0-1-march-2026</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-0-1-march-2026</guid>
            <pubDate>Wed, 04 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="bc-fips-and-java-17-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#bc-fips-and-java-17-issue-resolved"></a>BC FIPS and Java 17 issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7151</span></p>
</div>
<div class="paragraph">
<p>Previously, if you were using Java 17 and BC FIPS was enabled, PingCentral failed to start. This issue has been resolved.</p>
</div>
</div>
<div class="sect2">
<h3 id="obfuscated-password-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#obfuscated-password-issue-resolved"></a>Obfuscated password issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7153</span></p>
</div>
<div class="paragraph">
<p>Previously, the <code class="filepath">obfuscate.sh &lt;password&gt;</code> command line utility (CLI) did not work out-of-the-box unless you modified the script. Once modified, the script was able to generate an obfuscated password, but if you tried to use this password to connect to an external database, PingCentral would fail to start. The CLI has been fixed and now works as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="template-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#template-issue-resolved"></a>Template issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7156</span></p>
</div>
<div class="paragraph">
<p>Previously, after upgrading from version 2.3 to 3.0, administrators using a PostgreSQL database received a server error message when they tried to create a new template. This issue has been resolved.</p>
</div>
</div>
<div class="sect2">
<h3 id="sql-errors-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sql-errors-resolved"></a>SQL errors resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7164</span></p>
</div>
<div class="paragraph">
<p>Previously, when users attempted to promote new applications and IDs were created with MySQL 8, SQL errors occurred. This issue has been resolved.</p>
</div>
</div>
<div class="sect2">
<h3 id="pingaccess-application-creation-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingaccess-application-creation-issue-resolved"></a>PingAccess application creation issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7169</span></p>
</div>
<div class="paragraph">
<p>Previously, users could not create PingAccess applications if the <code class="filepath">ApplicationResources</code> property was set to <code class="filepath">null</code>. This issue has been resolved.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 3.0 (November 2025)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-0-november-2025</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-3-0-november-2025</guid>
            <pubDate>Tue, 04 Nov 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="pingfederate-extended-properties-are-now-available-in-pingcentral"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingfederate-extended-properties-are-now-available-in-pingcentral"></a>PingFederate extended properties are now available in PingCentral</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">New</span>
<span class="ping_ticket">PASS-7124</span></p>
</div>
<div class="paragraph">
<p>PingFederate extended properties are single or multi-value fields that are used to store additional information about connections or OAuth clients. These properties are now displayed in PingCentral templates. Administrators can set these property values when they configure templates, and the applications created from these templates inherit those values. Application owners can also update these values unless the extended property is designated as read-only.</p>
</div>
</div>
<div class="sect2">
<h3 id="entire-urls-now-visible"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#entire-urls-now-visible"></a>Entire URLs now visible</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7098</span></p>
</div>
<div class="paragraph">
<p>Several UI modifications have been made that allow you to see entire URLs within text fields. This new functionality makes it easier for users to verify URLs, and helps prevent copy and paste errors.</p>
</div>
</div>
<div class="sect2">
<h3 id="opencsv-upgrade"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#opencsv-upgrade"></a>Opencsv upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7099</span></p>
</div>
<div class="paragraph">
<p>Opencsv has been upgraded from version 5.8 to 5.11.2 to prevent future false-positive scan alerts. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="spring-security-upgrade"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#spring-security-upgrade"></a>Spring Security upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7100</span></p>
</div>
<div class="paragraph">
<p>Spring Security has been upgraded from version 5.3.39 to 6.2.8 to prevent future false-positive scan alerts. You can find more information in <a href="https://spring.io/security/cve-2024-22243">CVE-2024-22243: Spring Framework URL Parsing with Host Validation</a> in the Spring documentation.</p>
</div>
</div>
<div class="sect2">
<h3 id="java-runtime-environment-update"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#java-runtime-environment-update"></a>Java runtime environment update</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7106</span></p>
</div>
<div class="paragraph">
<p>You can now use either Java 17 or Java 21 as the PingCentral runtime environment. Java 11 is no longer supported.</p>
</div>
</div>
<div class="sect2">
<h3 id="nimbus-jose-jwt-libraries-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#nimbus-jose-jwt-libraries-updated"></a>Nimbus JOSE + JWT libraries updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7134</span></p>
</div>
<div class="paragraph">
<p>The Nimbus JOSE + JWT libraries have been upgraded. You can find more information about the <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53864">CVE-2025-53864 vulnerability</a> on the National Vulnerability Database site.</p>
</div>
</div>
<div class="sect2">
<h3 id="safeguards-are-now-available-for-overwriting-pingfederate-entity-ids"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#safeguards-are-now-available-for-overwriting-pingfederate-entity-ids"></a>Safeguards are now available for overwriting PingFederate entity IDs</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7105</span></p>
</div>
<div class="paragraph">
<p>Previously, it was possible to overwrite a connection in PingFederate if you created a PingCentral application with an entity ID that already exists in PingFederate.
This issue has been resolved, and it’s no longer possible to create new applications using an entity ID that is already used by a PingFederate connection.</p>
</div>
</div>
<div class="sect2">
<h3 id="strict-transport-security-hsts-header-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#strict-transport-security-hsts-header-issue-resolved"></a>Strict-Transport-Security (HSTS) header issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7097</span></p>
</div>
<div class="paragraph">
<p>Previously, if OIDC single sign-on (SSO) was enabled, PingCentral stopped sending the HSTS header and administrators couldn’t sign on. This issue has been resolved and SSO now works as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="cve-issues-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cve-issues-fixed"></a>CVE issues fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7101</span></p>
</div>
<div class="paragraph">
<p>A number of third-party libraries have been updated to address Common Vulnerabilities and Exposures (CVEs) reported in these libraries. These CVEs weren’t exploitable, but they were updated to avoid unnecessary concerns.</p>
</div>
</div>
<div class="sect2">
<h3 id="pingcentral-now-prevents-users-from-creating-apps-with-the-same-name"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-now-prevents-users-from-creating-apps-with-the-same-name"></a>PingCentral now prevents users from creating apps with the same name</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7133</span></p>
</div>
<div class="paragraph">
<p>PingCentral now enforces consistent validation to ensure that new applications cannot have the same name as existing applications.</p>
</div>
</div>
<div class="sect2">
<h3 id="client-secret-size-increased"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#client-secret-size-increased"></a>Client secret size increased</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7135</span></p>
</div>
<div class="paragraph">
<p>Previously, when users attempted to configure a PingCentral environment connection to PingFederate and PingAccess using PingOne OAuth app credentials, the database column wasn’t large enough to store the client secret and an error message displayed. The column limit was increased, which resolved the issue.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.3 (April 2025)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-3-april-2025</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-3-april-2025</guid>
            <pubDate>Thu, 27 Mar 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="fips-compliant-mode-now-available"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#fips-compliant-mode-now-available"></a>FIPS-compliant mode now available</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">New</span>
<span class="ping_ticket">PASS-7036</span></p>
</div>
<div class="paragraph">
<p>Administrators can now enable PingCentral to run in FIPS-compliant mode,
which guarantees that all cryptographic algorithms and protocols meet the U.S. federal standard for security compliance.</p>
</div>
<div class="paragraph">
<p>To enable this option,
access the <code class="filepath"><code><span class="var">&lt;PingCentral_install&gt;</span></code>/conf/application.properties</code> file and set the <code>pingcentral.fips.enabled</code> property value to <code class="filepath">true</code>.
Learn more in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_installing_configuring/pingcentral_fips_mode.html" class="xref page">Configuring PingCentral to run in FIPS-compliant mode</a>.</p>
</div>
<div class="paragraph">
<p>PingCentral is currently running FIPS 140-3. Learn more about this version in <a href="https://csrc.nist.gov/pubs/fips/140-3/final">FIPS 140-3</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="spring-security-upgrade-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#spring-security-upgrade-2"></a>Spring Security upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7022</span></p>
</div>
<div class="paragraph">
<p>Spring Security has been upgraded from version 5.3.31 to 5.3.39 to prevent future false-positive scan alerts.
You can find more information in <a href="https://spring.io/security/cve-2024-38816^">CVE-2024-38816:
Path traversal vulnerability in functional web frameworks</a> in the Spring documentation.</p>
</div>
</div>
<div class="sect2">
<h3 id="d3-color-upgrade"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#d3-color-upgrade"></a>d3-color upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7031</span></p>
</div>
<div class="paragraph">
<p>The d3-color package has been upgraded from version 1.4.1 to 3.1.0, where the security vulnerability was fixed.</p>
</div>
</div>
<div class="sect2">
<h3 id="promotion-approval-requests-enhanced"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promotion-approval-requests-enhanced"></a>Promotion approval requests enhanced</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7033</span></p>
</div>
<div class="paragraph">
<p>Those who approve promotions can now determine if a promotion approval request is for a new or existing application by viewing the newly added detail on the <strong class="uicontrol:">Promotion Approvals</strong> page. <strong class="uicontrol">Last Promoted</strong> or <strong class="uicontrol">Last Updated</strong> now displays next to the date and timestamp that indicates when the application was last promoted or updated.</p>
</div>
</div>
<div class="sect2">
<h3 id="updated-scripts"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#updated-scripts"></a>Updated scripts</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7037</span></p>
</div>
<div class="paragraph">
<p>All PingCentral scripts have been updated to be DevOps-friendly.</p>
</div>
</div>
<div class="sect2">
<h3 id="jdk-21-support-added"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#jdk-21-support-added"></a>JDK 21 support added</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">New</span>
<span class="ping_ticket">PASS-7038</span></p>
</div>
<div class="paragraph">
<p>Support was added for Java Development Kit (JDK) 21 using language level 11.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.2 (December 2024)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-2-december-2024</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-2-december-2024</guid>
            <pubDate>Fri, 20 Dec 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="trusted-ognl-expression-usability-improvement"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#trusted-ognl-expression-usability-improvement"></a>Trusted OGNL expression usability improvement</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7028</span></p>
</div>
<div class="paragraph">
<p>Previously, trusted OGNL expressions could only be assigned to applications one at a time.
Now,
a <strong class="uicontrol:">Select All</strong> checkbox is available to select all applications
and assign the selected trusted OGNL expression to them.</p>
</div>
</div>
<div class="sect2">
<h3 id="signing-and-encryption-certificates-can-now-be-the-same"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#signing-and-encryption-certificates-can-now-be-the-same"></a>Signing and encryption certificates can now be the same</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7029</span></p>
</div>
<div class="paragraph">
<p>Previously, PingCentral did not allow the signing and encryption certificate the same, which is allowed in PingFederate.
When application owners tried to promote and upload the same certificate
and use it for both the signing and encryption certificate,
users received validation errors.
Now, the same certificates can be used in PingCentral.</p>
</div>
</div>
<div class="sect2">
<h3 id="spring-security-upgrade-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#spring-security-upgrade-3"></a>Spring Security upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-7019</span></p>
</div>
<div class="paragraph">
<p>Spring Security has been upgraded from version 5.7.11
to prevent future false-positive scan alerts.
Learn more about this upgrade in <a href="https://spring.io/security/cve-2024-22257">CVE-2024-22257:
Possible Broken Access Control in Spring Security With Direct Use of AuthenticatedVoter</a> in the Spring documentation.</p>
</div>
</div>
<div class="sect2">
<h3 id="cve-issues-fixed-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cve-issues-fixed-2"></a>CVE issues fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7020</span></p>
</div>
<div class="paragraph">
<p>A number of third-party libraries have been updated
to address Common Vulnerabilities and Exposures (CVEs) reported in these libraries.
These CVEs were not exploitable, but they were updated to avoid unnecessary concerns.</p>
</div>
</div>
<div class="sect2">
<h3 id="upgrade-issues-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#upgrade-issues-fixed"></a>Upgrade issues fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7023</span></p>
</div>
<div class="paragraph">
<p>Previously, when upgrading from PingCentral 2.0.2 to 2.1.0, users received a warning message regarding their APIs. This issue has been resolved, and this message no longer displays when the upgrade is performed.</p>
</div>
</div>
<div class="sect2">
<h3 id="saml-application-deletion-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#saml-application-deletion-issue-resolved"></a>SAML application deletion issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7026</span></p>
</div>
<div class="paragraph">
<p>Previously, when users tried to delete SAML applications, either through the PingCentral UI or API,
and they selected the <strong class="uicontrol:">Delete from PingFederate in all environments</strong> option,
the application was not deleted in PingFederate.
This issue has been resolved and now works as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="pingcentral-and-pingfederate-application-sync-issue-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-and-pingfederate-application-sync-issue-resolved"></a>PingCentral and PingFederate application sync issue resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-7027</span></p>
</div>
<div class="paragraph">
<p>Previously, when syncing a PingCentral application with a server-side PingFederate application,
data within the <strong class="uicontrol:">advancedEditPromotionJson</strong> field was being deleted.
This issue has been resolved, and the data within that field is now preserved.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.1 (June 2024)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-1-june-2024</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-1-june-2024</guid>
            <pubDate>Mon, 17 Jun 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="more-control-over-client-secrets"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#more-control-over-client-secrets"></a>More control over client secrets</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6911</span></p>
</div>
<div class="paragraph">
<p>Application owners now have more control
over which client secrets are used when promoting OAuth and OIDC applications from PingCentral to PingFederate.
If the application is configured to use a client secret for authentication,
and the environment to which the application is being promoted requires that a random secret be used,
users can choose to either generate a new client secret or retain the existing client secret.
See <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingcentral_promoting_apps/pingcentral_promoting_apps.html#oauth" class="xref page">Promoting OAuth and OIDC applications</a> for details.</p>
</div>
</div>
<div class="sect2">
<h3 id="mtls-is-now-supported"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#mtls-is-now-supported"></a>mTLS is now supported</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6915</span></p>
</div>
<div class="paragraph">
<p>Mutual TLS (mTLS) can now be used for admin API authentication from PingCentral to PingFederate.
To set up this connection, access the new <strong class="uicontrol">Client TLS Key Pair</strong> page,
import the key pair that you want to use for authentication,
and configure the environment to use the client certificate you specify.
The <strong class="uicontrol">TLS Key Pair</strong> page has also been renamed to <strong class="uicontrol">Server TLS Key Pair</strong>
to clearly differentiate between them.
See <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_installing_configuring/pingcentral_config_mtls.html" class="xref page">Configuring MTLS</a> for details.</p>
</div>
</div>
<div class="sect2">
<h3 id="rocky-linux-is-now-supported"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#rocky-linux-is-now-supported"></a>Rocky Linux is now supported</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6918</span></p>
</div>
<div class="paragraph">
<p>Rocky Linux version 9.3 and later is now a supported enterprise operating system.</p>
</div>
</div>
<div class="sect2">
<h3 id="new-email-parameter-added-to-all-user-accounts"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#new-email-parameter-added-to-all-user-accounts"></a>New email parameter added to all user accounts</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6967</span></p>
</div>
<div class="paragraph">
<p>The email parameter has been added to all PingCentral user accounts, which will let you extract users’ email addresses and notify them about important events, such as upgrades, and maintenance windows. The <strong class="uicontrol">Email Address</strong> field now displays on the <strong class="uicontrol">Add</strong> and <strong class="uicontrol">Edit User</strong> pages, an email property has been added to the API, and for SSO configurations, PingCentral will derive the user’s email from the email claim defined by the email scope.</p>
</div>
</div>
<div class="sect2">
<h3 id="performance-improvements"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#performance-improvements"></a>Performance improvements</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6904 and PASS-6910</span></p>
</div>
<div class="paragraph">
<p>If you have many different applications in many different environments, or if you have many groups using SSO to access PingCentral, you will notice that performance has been greatly improved with this release. Now, when you filter your applications, you will only see managed applications (created from or promoted to PingCentral environments) by default, which improves page loading speeds. The application owner search functionality has also been improved, which makes it faster and easier to configure owners for applications.</p>
</div>
</div>
<div class="sect2">
<h3 id="application-owners-limited-to-whom-they-can-assign-as-owners"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#application-owners-limited-to-whom-they-can-assign-as-owners"></a>Application owners limited to whom they can assign as owners</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6913</span></p>
</div>
<div class="paragraph">
<p>Previously, when application owners used SSO to sign on to PingCentral and group memberships were also supplied, application owners could select any group as an owner of their application, which gave all group members the ability to manage it. Now, application owners can only select a group as an owner if the application owner is a member of the group.</p>
</div>
</div>
<div class="sect2">
<h3 id="certificates-management-usability-improvement"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#certificates-management-usability-improvement"></a>Certificates management usability improvement</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6917</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, the names of the signing certificates available now include the valid date range, which makes it easier to discern between certificates.</p>
</div>
</div>
<div class="sect2">
<h3 id="application-owners-list-is-now-easier-to-navigate"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#application-owners-list-is-now-easier-to-navigate"></a>Application owners list is now easier to navigate</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-2114</span></p>
</div>
<div class="paragraph">
<p>Previously, all application owners were listed on the application <strong class="uicontrol">Summary</strong> tab, regardless of the number of owners. If an application had a large number of owners, the list would be long and difficult to read. Now, if the list is large, <strong class="uicontrol">Show More</strong> and <strong class="uicontrol">Show Less</strong> buttons are available to help you navigate the list.</p>
</div>
</div>
<div class="sect2">
<h3 id="change-template-button-fixed"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#change-template-button-fixed"></a>Change Template button fixed</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6941</span></p>
</div>
<div class="paragraph">
<p>Previously, when importing metadata for a SAML application, the <strong class="uicontrol">Change Template</strong> button would disappear.
This issue has been fixed, and the <strong class="uicontrol">Change Template</strong> button continually displays as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="json-editor-promotion-issues-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#json-editor-promotion-issues-resolved"></a>JSON editor promotion issues resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6966</span></p>
</div>
<div class="paragraph">
<p>Previously, under certain circumstances, server errors were encountered when JSON-based promotions occurred. This issue has been resolved.</p>
</div>
</div>
<div class="sect2">
<h3 id="keystore-password-issues-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#keystore-password-issues-resolved"></a>Keystore password issues resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6970</span></p>
</div>
<div class="paragraph">
<p>Previously, when configuring an environment and uploading a signing certificate, if an existing keystore file (*.p12) was selected, the matching password provided could be too long for PingCentral to accept. This password limit has been increased.</p>
</div>
</div>
<div class="sect2">
<h3 id="assertion-encryption-certificate-issues-resolved"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#assertion-encryption-certificate-issues-resolved"></a>Assertion encryption certificate issues resolved</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6985</span></p>
</div>
<div class="paragraph">
<p>Previously, if an application was configured with an assertion encryption certificate, the certificate would disappear from the <strong class="uicontrol">Promote to Environment</strong> modal when the application was being promoted, and users had to upload the certificate again. This issue has been resolved.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.0.2 (April 2024)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-2-april-2024</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-2-april-2024</guid>
            <pubDate>Tue, 23 Apr 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="upgrade-processes-now-work-as-expected"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#upgrade-processes-now-work-as-expected"></a>Upgrade processes now work as expected</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6905</span></p>
</div>
<div class="paragraph">
<p>Previously, if PingCentral had at least one (service provider) SP connection or one PingAccess template, upgrades from version 1.14 to 2.0 would fail. This issue has been resolved and upgrades now work as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="expressions-can-now-be-added-or-updated-in-saml-applications"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#expressions-can-now-be-added-or-updated-in-saml-applications"></a>Expressions can now be added or updated in SAML applications</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6906</span></p>
</div>
<div class="paragraph">
<p>Previously, if applications were created from SAML templates that contained at least 1 OGNL expression,
the expressions could not be updated,
nor could new expressions be added for attribute mapping.
This issue has been resolved, and expressions can now be added and updated as needed.</p>
</div>
</div>
<div class="sect2">
<h3 id="saml-application-templates-can-now-be-updated"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#saml-application-templates-can-now-be-updated"></a>SAML application templates can now be updated</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6907</span></p>
</div>
<div class="paragraph">
<p>Previously, when administrators tried to change the templates associated with SAML applications, the change would not be saved.
This issue has been resolved, and SAML applications can now be updated with new templates.</p>
</div>
</div>
<div class="sect2">
<h3 id="database-errors-no-longer-occur-during-upgrade"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#database-errors-no-longer-occur-during-upgrade"></a>Database errors no longer occur during upgrade</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6940</span></p>
</div>
<div class="paragraph">
<p>Previously, if PingCentral had a SAML template with expressions or PingAccess templates, database errors would occur when upgrading from version 1.14 to 2.0. The issue has been resolved and upgrade processes now work as expected.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.0.1 (January 2024)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-1-january-2024</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-1-january-2024</guid>
            <pubDate>Tue, 23 Jan 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="sect2">
<h3 id="approval-window-now-displays-most-recently-promoted-version"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#approval-window-now-displays-most-recently-promoted-version"></a>Approval window now displays most recently promoted version</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6865</span></p>
</div>
<div class="paragraph">
<p>Previously, when administrators reviewed application promotion requests and compared the submitted JSON to the most recently promoted version, the original version was displayed instead of the most recently promoted version.
This issue has been resolved, and the most recently promoted version now displays in the approval window.</p>
</div>
</div>
<div class="sect2">
<h3 id="updated-json-for-oidc-applications-now-displays-in-pingfederate-after-promotion"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#updated-json-for-oidc-applications-now-displays-in-pingfederate-after-promotion"></a>Updated JSON for OIDC applications now displays in PingFederate after promotion</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6900</span></p>
</div>
<div class="paragraph">
<p>Previously, if application owners updated the underlying application JSON in their OIDC applications, and administrator approval was required to promote them, the updated JSON was not reflected in PingFederate. This issue has been resolved and the updated JSON now displays in PingFederate as expected.</p>
</div>
</div>
<div class="sect2">
<h3 id="application-synchronization-now-works-as-expected-for-oidc-applications"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#application-synchronization-now-works-as-expected-for-oidc-applications"></a>Application synchronization now works as expected for OIDC applications</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6901</span></p>
</div>
<div class="paragraph">
<p>Previously, when OIDC applications were synchronized to the most up-to-date configurations available, they were saved as OAuth applications. This issue has been resolved, and the synchronization process now works as expected.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 2.0 (December 2023)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-december-2023</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-2-0-december-2023</guid>
            <pubDate>Tue, 19 Dec 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>New features and improvements in PingCentral 2.0.</p>
</div>
<div class="sect2">
<h3 id="template-synchronization-now-available-for-saml-and-pingaccess-applications"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#template-synchronization-now-available-for-saml-and-pingaccess-applications"></a>Template synchronization now available for SAML and PingAccess applications</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6730</span></p>
</div>
<div class="paragraph">
<p>Administrators can now synchronize OAuth, OIDC, SAML, and PingAccess templates to ensure that their templates are based on the most up-to-date configurations available.
Applications based on out-of-date templates have <strong class="uicontrol">Outdated Template</strong> icons displayed next to them, which inform application owners that newer versions of the templates are available.</p>
</div>
<div class="paragraph">
<p>Administrators can also now revert SAML SP connections and PingAccess application templates to previous versions.
You can find details on the <strong class="uicontrol">Reverting templates to previous versions</strong> tab on the <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_templates/pingcentral_mng_templates.html" class="xref page">Managing templates</a>.</p>
</div>
<div class="paragraph">
<p>Note that when you upgrade to PingCentral 2.0, SAML and PingAccess application templates will have base revisions created for them.
OAuth and OIDC templates created prior to version 2.0 cannot be synced with the most recent configurations available.
Recreate the template in version 2.0 to use the sync feature going forward.</p>
</div>
</div>
<div class="sect2">
<h3 id="application-owners-can-now-edit-application-json-themselves"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#application-owners-can-now-edit-application-json-themselves"></a>Application owners can now edit application JSON themselves</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6670</span></p>
</div>
<div class="paragraph">
<p>To accommodate a wide variety of promotion needs, application owners can now edit the application JSON for their applications when they promote them.</p>
</div>
<div class="paragraph">
<p>Note that providing application owners with this ability can be risky, so it’s highly recommended that approvals are enabled for the environment. Administrators can review the submitted application JSON and compare it to the original application JSON before approving the promotion request.</p>
</div>
<div class="paragraph">
<p>Also note that:</p>
</div>
<div class="ulist">
<ul>
<li>
<p>This functionality is not yet available for PingAccess applications.</p>
</li>
<li>
<p>Applications cannot be reverted to a promotion that uses JSON editing.</p>
</li>
<li>
<p>Be aware that the JSON review window compares against the original application JSON and not the most recently promoted JSON.</p>
</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="prevent-application-owners-from-deleting-applications"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#prevent-application-owners-from-deleting-applications"></a>Prevent application owners from deleting applications</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6731</span></p>
</div>
<div class="paragraph">
<p>To prevent application owners from accidentally deleting applications from PingFederate (and PingAccess, when applicable) environments, you can enable a new option that allows only administrators to delete applications from the environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="hide-inactive-promotion-approvals"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#hide-inactive-promotion-approvals"></a>Hide inactive promotion approvals</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6733</span></p>
</div>
<div class="paragraph">
<p>To help manage promotion approvals,
both administrators and application owners can now hide promotion approvals that are in a <strong class="uicontrol:">canceled</strong>,
<strong class="uicontrol:">promoted</strong>,
or <strong class="uicontrol:">rejected</strong> status that display on the <strong class="uicontrol">Promotion Approvals</strong> page.
The <strong class="uicontrol">Visible</strong> filter is enabled by default.</p>
</div>
</div>
<div class="sect2">
<h3 id="approval-expressions-drag-and-drop-enhancement"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#approval-expressions-drag-and-drop-enhancement"></a>Approval expressions drag and drop enhancement</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6732</span></p>
</div>
<div class="paragraph">
<p>Administrators can add multiple approval expressions for an environment, which are evaluated sequentially from top to bottom in an IF/ELSE chain. Now, administrators can change the order in which these expressions display in the list by dragging and dropping them into different locations within the list instead of copying and pasting them between fields.</p>
</div>
</div>
<div class="sect2">
<h3 id="multi-apc-connection-synchronization"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#multi-apc-connection-synchronization"></a>Multi-APC connection synchronization</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6705</span></p>
</div>
<div class="paragraph">
<p>Previously, PingCentral was unable to handle a service provider (SP) connection with multiple Authentication Policy Contracts (APC) mapped within it. The PingCentral 1.14 release enables users to select from multiple mapped contracts when adding an application as a managed application or a template.</p>
</div>
<div class="paragraph">
<p>However, due to a known synchronization limitation, if you update an existing single APC SP connection already managed by PingCentral to include a second APC and subsequently synchronize the application, you won’t find an option to specify your preferred APC.</p>
</div>
<div class="paragraph">
<p>To simplify your workflow and mitigate potential challenges, we recommend refraining from using synchronization to modify multi-APC connections. Instead, consider creating a new SP connection that aligns with your desired APC configuration. This approach grants you control over APC selection, ensuring a smoother and more efficient process.</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-apc-mappings-for-oidc-applications-in-pingfederate"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-apc-mappings-for-oidc-applications-in-pingfederate"></a>Configure APC mappings for OIDC applications in PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-3613</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>PingCentral promotes access token mappings and authentication policy contracts (APCs) with OIDC applications, but the APC mappings that link the APCs to the access token managers are not currently promoted with them. If the APC mappings do not already exist in the target PingFederate environments, applications do not function as expected.</p>
</div>
<div class="paragraph">
<p>When new APCs are promoted in PingCentral, access token mapping referencing the APC is created, but persistent grant mapping is not established, so the configurations are invalid.</p>
</div>
<div class="paragraph">
<p>To resolve these issues, configure the APC mappings within PingFederate.</p>
</div>
</div>
<div class="sect2">
<h3 id="promoting-applications-with-authentication-challenge-policies"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promoting-applications-with-authentication-challenge-policies"></a>Promoting applications with authentication challenge policies</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-4948</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>Customized authentication challenge responses, which support single-page applications, are available in PingAccess 6.2 or later. Applications with this type of policy can be added to PingCentral but cannot be promoted to another environment unless the authentication challenge policy, with the same UUID, also exists in the target environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="sp-certificates-and-assertion-encryption-certificates-must-be-different"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sp-certificates-and-assertion-encryption-certificates-must-be-different"></a>SP certificates and assertion encryption certificates must be different</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5663</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, PingFederate does not allow you to use the same certificate as both a service provider (SP) certificate and an assertion encryption certificate. Instead of preventing the promotion to continue, you receive a message similar to the following:</p>
</div>
<div class="listingblock">
<div class="content">
<pre>Environment'staging':  {pingfed}. This certificate either has the same ID or the same content as the certificate with index 0.</pre>
</div>
</div>
<div class="paragraph">
<p>To continue the promotion, ensure that the SP certificate and the assertion encryption certificate are different.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-truststore-path-if-pingcentral-fails-to-start"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-truststore-path-if-pingcentral-fails-to-start"></a>Update truststore path if PingCentral fails to start</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5977</span></p>
</div>
<div class="paragraph">
<p>After upgrading to 1.8, 1.9, 1.10, or 1.11, PingCentral fails to start if <code class="codeph">$\{pingcentral.home}</code> is used in the trust store path. To prevent this from happening, change the home path to be the absolute trust store path and delete the <strong class="uicontrol">Certificates</strong> table in the database.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-update-or-revert-templates-created-in-1-2-or-earlier"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-update-or-revert-templates-created-in-1-2-or-earlier"></a>Cannot update or revert templates created in 1.2 or earlier</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6466</span></p>
</div>
<div class="paragraph">
<p>Templates created in 1.2 or earlier do not store the environment ID, so you cannot update their grant types, scopes, or policy contracts, nor can you revert them to previous versions.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.14.1 (November 2023)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-14-1-november-2023</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-14-1-november-2023</guid>
            <pubDate>Thu, 02 Nov 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>Enhancements and resolved issues in PingCentral 1.14.1.</p>
</div>
<div class="sect2">
<h3 id="forbidden-error-when-loading-api-documentation"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#forbidden-error-when-loading-api-documentation"></a>Forbidden error when loading API documentation</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6820</span></p>
</div>
<div class="paragraph">
<p>We fixed an error that prevented API documentation from loading when using OIDC single sign-on (SSO) with PingCentral.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.14 (September 2023)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-14-september-2023</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-14-september-2023</guid>
            <pubDate>Tue, 05 Sep 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>New features and improvements in PingCentral 1.14.</p>
</div>
<div class="sect2">
<h3 id="disable-environments-when-down-for-maintenance-or-offline"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#disable-environments-when-down-for-maintenance-or-offline"></a>Disable environments when down for maintenance or offline</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6666 and PASS-6683</span></p>
</div>
<div class="paragraph">
<p>PingCentral administrators can now disable referenced PingFederate environments for any reason, such as PingFederate being unavailable due to maintenance tasks. Additionally, we added a new environment status bar that indicates if an environment is offline. In such cases, application owners will receive a notification indicating that the environment is disabled or offline rather than encountering a UI error. For more information, see step 1 of the Updating environments tab in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_environments/pingcentral_mng_environments.html" class="xref page">Managing environments</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="import-saml-connection-to-pingcentral-from-pingfederate-with-attributes-mapped-to-data-source"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#import-saml-connection-to-pingcentral-from-pingfederate-with-attributes-mapped-to-data-source"></a>Import SAML Connection to PingCentral from PingFederate with attributes mapped to data source</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6667</span></p>
</div>
<div class="paragraph">
<p>All attributes defined in a SAML SP connection are now integrated into the PingCentral application. This enhancement eliminates a limitation and is expected to enhance usability significantly. For more information, see step 3 in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingentral_adding_apps/pingcentral_adding_apps.html#saml_template" class="xref page">Using SAML 2.0 templates</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="additional-synchronization-capabilities"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#additional-synchronization-capabilities"></a>Additional synchronization capabilities</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6696</span></p>
</div>
<div class="paragraph">
<p>We added the ability to effortlessly initiate an application synchronization in PingCentral. Now, when you make external modifications to an application configuration, you can seamlessly update the application information within PingCentral. This removes the need to manually update application information and introduces a more streamlined and efficient process. For more information, see step 2 in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_applications/pingcentral_manage_apps.html#pingcentral_iam_updating_apps" class="xref page">Updating applications</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="other-improvements"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#other-improvements"></a>Other improvements</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span></p>
</div>
<div class="ulist">
<ul>
<li>
<p>We also updated the following bundled components and third-party dependencies:</p>
<div class="ulist">
<ul>
<li>
<p>Apache Commons Text 1.10</p>
</li>
</ul>
</div>
</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="h2-database-migration-when-the-installation-path-has-any-spaces"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#h2-database-migration-when-the-installation-path-has-any-spaces"></a>H2 database migration when the installation path has any spaces</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6591</span></p>
</div>
<div class="paragraph">
<p>We resolved an issue where H2 database migration fails during an upgrade if there are spaces in the installation path for the existing or new instance.</p>
</div>
</div>
<div class="sect2">
<h3 id="sso-inactivity-sign-off"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sso-inactivity-sign-off"></a>SSO inactivity sign off</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-6690</span></p>
</div>
<div class="paragraph">
<p>We fixed an issue where utilizing single sign-on (SSO) to access the PingCentral console incorrectly triggered a timeout based on an ID token’s lifetime.</p>
</div>
</div>
<div class="sect2">
<h3 id="multi-apc-connection-synchronization-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#multi-apc-connection-synchronization-2"></a>Multi-APC connection synchronization</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6705</span></p>
</div>
<div class="paragraph">
<p>Previously, PingCentral was unable to handle a service provider (SP) connection with multiple Authentication Policy Contracts (APC) mapped within it. The PingCentral 1.14 release enables users to select from multiple mapped contracts when adding an application as a managed application or a template.</p>
</div>
<div class="paragraph">
<p>However, due to a known synchronization limitation, if you update an existing single APC SP connection already managed by PingCentral to include a second APC and subsequently synchronize the application, you won’t find an option to specify your preferred APC.</p>
</div>
<div class="paragraph">
<p>To simplify your workflow and mitigate potential challenges, we recommend refraining from using synchronization to modify multi-APC connections. Instead, consider creating a new SP connection that aligns with your desired APC configuration. This approach grants you control over APC selection, ensuring a smoother and more efficient process.</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-apc-mappings-for-oidc-applications-in-pingfederate-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-apc-mappings-for-oidc-applications-in-pingfederate-2"></a>Configure APC mappings for OIDC applications in PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-3613</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>PingCentral promotes access token mappings and authentication policy contracts (APCs) with OIDC applications, but the APC mappings that link the APCs to the access token managers are not currently promoted with them. If the APC mappings do not already exist in the target PingFederate environments, applications do not function as expected.</p>
</div>
<div class="paragraph">
<p>When new APCs are promoted in PingCentral, access token mapping referencing the APC is created, but persistent grant mapping is not established, so the configurations are invalid.</p>
</div>
<div class="paragraph">
<p>To resolve these issues, configure the APC mappings within PingFederate.</p>
</div>
</div>
<div class="sect2">
<h3 id="promoting-applications-with-authentication-challenge-policies-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promoting-applications-with-authentication-challenge-policies-2"></a>Promoting applications with authentication challenge policies</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-4948</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>Customized authentication challenge responses, which support single-page applications, are available in PingAccess 6.2 or later. Applications with this type of policy can be added to PingCentral but cannot be promoted to another environment unless the authentication challenge policy, with the same UUID, also exists in the target environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="sp-certificates-and-assertion-encryption-certificates-must-be-different-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sp-certificates-and-assertion-encryption-certificates-must-be-different-2"></a>SP certificates and assertion encryption certificates must be different</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5663</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, PingFederate does not allow you to use the same certificate as both a service provider (SP) certificate and an assertion encryption certificate. Instead of preventing the promotion to continue, you receive a message similar to the following:</p>
</div>
<div class="listingblock">
<div class="content">
<pre>Environment'staging':  {pingfed}. This certificate either has the same ID or the same content as the certificate with index 0.</pre>
</div>
</div>
<div class="paragraph">
<p>To continue the promotion, ensure that the SP certificate and the assertion encryption certificate are different.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-truststore-path-if-pingcentral-fails-to-start-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-truststore-path-if-pingcentral-fails-to-start-2"></a>Update truststore path if PingCentral fails to start</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5977</span></p>
</div>
<div class="paragraph">
<p>After upgrading to 1.8, 1.9, 1.10, or 1.11, PingCentral fails to start if <code class="codeph">$\{pingcentral.home}</code> is used in the trust store path. To prevent this from happening, change the home path to be the absolute trust store path and delete the <strong class="uicontrol">Certificates</strong> table in the database.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-update-or-revert-templates-created-in-1-2-or-earlier-2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-update-or-revert-templates-created-in-1-2-or-earlier-2"></a>Cannot update or revert templates created in 1.2 or earlier</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6466</span></p>
</div>
<div class="paragraph">
<p>Templates created in 1.2 or earlier do not store the environment ID, so you cannot update their grant types, scopes, or policy contracts, nor can you revert them to previous versions.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.13]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-13</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-13</guid>
            <pubDate>Mon, 23 Oct 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>PingCentral 1.13 was skipped.</p>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.12 (June 2023)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-12-june-2023</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-12-june-2023</guid>
            <pubDate>Mon, 12 Jun 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>New features and improvements in PingCentral 1.12.</p>
</div>
<div class="sect2">
<h3 id="approval-workflow"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#approval-workflow"></a>Approval workflow</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6479</span></p>
</div>
<div class="paragraph">
<p>Previously, PingCentral did not allow an administrator to require approval for a non-administrator to promote an application to an environment. As of now, administrators can use Spring Expression Language (SpEL) based rules to trigger an approval requirement if an expression is or isn’t met. Administrators will find a bell icon indicating active approval requests, and developers are informed when their requests are approved. For more information, see xref:pingcentral_for_iam_administrators:</p>
</div>
<div class="paragraph">
<p>Learn more in <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_approvals/pingcentral_manage_approvals.html" class="xref page">Managing approvals (administrators)</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="client-secret-management-enhancements"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#client-secret-management-enhancements"></a>Client secret management enhancements</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6500</span></p>
</div>
<div class="paragraph">
<p>Administrators can now enforce a strong client secret for applications by requiring that PingCentral generate the client secret. With this feature enabled, when developers promote an application, they won’t be able to create a client secret manually. This avoids the usage of weak client secrets. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_environments/pingcentral_mng_environments.html" class="xref page">Managing environments</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="multiple-slo-service-urls"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#multiple-slo-service-urls"></a>Multiple SLO Service URLs</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6609</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, developers can adjust and configure single logout (SLO) URLs. This adds flexibility and removes the need to manage multiple SAML applications only because different SLO URLs are required. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingcentral_promoting_apps/pingcentral_promoting_apps.html#saml" class="xref page">Promoting SAML applications</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="jdk-17-support"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#jdk-17-support"></a>JDK 17 support</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span></p>
</div>
<div class="paragraph">
<p>We added support for Java Development Kit (JDK) 17.</p>
</div>
</div>
<div class="sect2">
<h3 id="saml-metadata-export"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#saml-metadata-export"></a>SAML metadata export</h3>
<div class="paragraph">
<p><span class="ping_changetype-fixed">Fixed</span>
<span class="ping_ticket">PASS-5630</span></p>
</div>
<div class="paragraph">
<p>To set up a service provider (SP) connection, PingCentral now accepts SAML metadata files exported from other SP connections. These files are used to extract the following information: entity IDs, ACS URLs, SLO service URLs, certificates, and attributes.</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-apc-mappings-for-oidc-applications-in-pingfederate-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-apc-mappings-for-oidc-applications-in-pingfederate-3"></a>Configure APC mappings for OIDC applications in PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-3613</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>PingCentral promotes access token mappings and authentication policy contracts (APCs) with OIDC applications, but the APC mappings that link the APCs to the access token managers are not currently promoted with them. If the APC mappings do not already exist in the target PingFederate environments, applications do not function as expected.</p>
</div>
<div class="paragraph">
<p>When new APCs are promoted in PingCentral, access token mapping referencing the APC is created, but persistent grant mapping is not established, so the configurations are invalid.</p>
</div>
<div class="paragraph">
<p>To resolve these issues, configure the APC mappings within PingFederate.</p>
</div>
</div>
<div class="sect2">
<h3 id="promoting-applications-with-authentication-challenge-policies-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promoting-applications-with-authentication-challenge-policies-3"></a>Promoting applications with authentication challenge policies</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-4948</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>Customized authentication challenge responses, which support single-page applications, are available in PingAccess 6.2 or later. Applications with this type of policy can be added to PingCentral but cannot be promoted to another environment unless the authentication challenge policy, with the same UUID, also exists in the target environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="sp-certificates-and-assertion-encryption-certificates-must-be-different-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sp-certificates-and-assertion-encryption-certificates-must-be-different-3"></a>SP certificates and assertion encryption certificates must be different</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5663</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, PingFederate does not allow you to use the same certificate as both a service provider (SP) certificate and an assertion encryption certificate. Instead of preventing the promotion to continue, you receive a message similar to the following:</p>
</div>
<div class="listingblock">
<div class="content">
<pre>Environment'staging':  {pingfed}. This certificate either has the same ID or the same content as the certificate with index 0.</pre>
</div>
</div>
<div class="paragraph">
<p>To continue the promotion, ensure that the SP certificate and the assertion encryption certificate are different.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-truststore-path-if-pingcentral-fails-to-start-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-truststore-path-if-pingcentral-fails-to-start-3"></a>Update truststore path if PingCentral fails to start</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5977</span></p>
</div>
<div class="paragraph">
<p>After upgrading to 1.8, 1.9, 1.10, or 1.11, PingCentral fails to start if <code class="codeph">$\{pingcentral.home}</code> is used in the trust store path. To prevent this from happening, change the home path to be the absolute trust store path and delete the <strong class="uicontrol">Certificates</strong> table in the database.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-update-or-revert-templates-created-in-1-2-or-earlier-3"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-update-or-revert-templates-created-in-1-2-or-earlier-3"></a>Cannot update or revert templates created in 1.2 or earlier</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6466</span></p>
</div>
<div class="paragraph">
<p>Templates created in 1.2 or earlier do not store the environment ID, so you cannot update their grant types, scopes, or policy contracts, nor can you revert them to previous versions.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.11 (March 2023)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-11-march-2023</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-11-march-2023</guid>
            <pubDate>Tue, 07 Mar 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>For the best possible experience, review these notes before using PingCentral 1.11.</p>
</div>
<div class="sect2">
<h3 id="updated-client-secret-generation-to-produce-client-secrets-compatible-with-pingfederate"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#updated-client-secret-generation-to-produce-client-secrets-compatible-with-pingfederate"></a>Updated client secret generation to produce client secrets compatible with PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span></p>
</div>
<div class="paragraph">
<p>When creating a new client, PingCentral now generates OAuth client secrets compatible with PingFederate. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingcentral_promoting_apps/pingcentral_promoting_apps.html#oauth" class="xref page">Promoting OAuth and OIDC applications</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="multiple-acs-urls"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#multiple-acs-urls"></a>Multiple ACS URLs</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span></p>
</div>
<div class="paragraph">
<p>You can now configure multiple Assertion Consumer Service (ACS) URLs during SAML application creation. This new feature simplifies application development since the same application can use different URLs simultaneously. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingentral_adding_apps/pingcentral_adding_apps.html#saml_template" class="xref page">Using SAML 2.0 templates</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="set-application-name"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#set-application-name"></a>Set application name</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span></p>
</div>
<div class="paragraph">
<p>When promoting an application between environments, you can now configure an application name for OAuth and OpenID Connect (OIDC) clients, SAML connections, and PingAccess applications. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_application_owners/pingcentral_promoting_apps/pingcentral_promoting_apps.html" class="xref page">Promoting applications</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="deleting-an-application-in-pingcentral-also-deletes-it-in-other-environments"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#deleting-an-application-in-pingcentral-also-deletes-it-in-other-environments"></a>Deleting an application in PingCentral also deletes it in other environments</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span></p>
</div>
<div class="paragraph">
<p>You can now choose to delete applications from PingFederate or PingAccess in addition to PingCentral. This feature is flexible because you can select which environments to delete the application from. For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_applications/pingcentral_manage_apps.html" class="xref page">Managing applications</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-oauth-credentials-for-use-instead-of-username-and-password-to-connect-to-pingfederate-or-pingaccess"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-oauth-credentials-for-use-instead-of-username-and-password-to-connect-to-pingfederate-or-pingaccess"></a>Configure OAuth credentials for use instead of username and password to connect to PingFederate or PingAccess</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span></p>
</div>
<div class="paragraph">
<p>Instead of using administrator credentials for basic authentication, you can now configure PingCentral to use OAuth client credentials to connect to PingFederate or PingAccess.
will request an <code class="codeph">access_token</code> to use whenever it connects to PingFederate or PingAccess.
For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_installing_configuring/pingcentral_pf_pa_sso.html" class="xref page">Configuring PingFederate and PingAccess for SSO</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="upgraded-from-v1-h2-database-to-v2"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#upgraded-from-v1-h2-database-to-v2"></a>Upgraded from v1 H2 database to v2</h3>
<div class="paragraph">
<p><span class="ping_changetype-security">Security</span></p>
</div>
<div class="paragraph">
<p>Along with other dependencies (libraries), we’ve upgraded the H2 database from v1 to v2.
For more information, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_installing_configuring/pingcentral_upgrading/pingcentral_upgrading_pc.html" class="xref page">Upgrading PingCentral</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-apc-mappings-for-oidc-applications-in-pingfederate-4"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-apc-mappings-for-oidc-applications-in-pingfederate-4"></a>Configure APC mappings for OIDC applications in PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-3613</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>PingCentral promotes access token mappings and authentication policy contracts (APCs) with OIDC applications, but the APC mappings that link the APCs to the access token managers are not currently promoted with them. If the APC mappings do not already exist in the target PingFederate environments, applications do not function as expected.</p>
</div>
<div class="paragraph">
<p>When new APCs are promoted in PingCentral, access token mapping referencing the APC is created, but persistent grant mapping is not established, so the configurations are invalid.</p>
</div>
<div class="paragraph">
<p>To resolve these issues, configure the APC mappings within PingFederate.</p>
</div>
</div>
<div class="sect2">
<h3 id="promoting-applications-with-authentication-challenge-policies-4"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promoting-applications-with-authentication-challenge-policies-4"></a>Promoting applications with authentication challenge policies</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-4948</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>Customized authentication challenge responses, which support single-page applications, are available in PingAccess 6.2 or later. Applications with this type of policy can be added to PingCentral but cannot be promoted to another environment unless the authentication challenge policy, with the same UUID, also exists in the target environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="sp-certificates-and-assertion-encryption-certificates-must-be-different-4"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sp-certificates-and-assertion-encryption-certificates-must-be-different-4"></a>SP certificates and assertion encryption certificates must be different</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5663</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, PingFederate does not allow you to use the same certificate as both a service provider (SP) certificate and an assertion encryption certificate. Instead of preventing the promotion to continue, you receive a message similar to the following:</p>
</div>
<div class="paragraph">
<p><code class="msgph">Environment’staging': PingFederate. This certificate either has the same ID or the same content as the certificate with index 0.</code></p>
</div>
<div class="paragraph">
<p>To continue the promotion, ensure that the SP certificate and the assertion encryption certificate are different.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-truststore-path-if-pingcentral-fails-to-start-4"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-truststore-path-if-pingcentral-fails-to-start-4"></a>Update truststore path if PingCentral fails to start</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5977</span></p>
</div>
<div class="paragraph">
<p>After upgrading to 1.8, 1.9, 1.10, or 1.11, PingCentral fails to start if <code class="codeph">$\{pingcentral.home}</code> is used in the trust store path. To prevent this from happening, change the home path to be the absolute trust store path and delete the <strong class="uicontrol">Certificates</strong> table in the database.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-update-or-revert-templates-created-in-1-2-or-earlier-4"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-update-or-revert-templates-created-in-1-2-or-earlier-4"></a>Cannot update or revert templates created in 1.2 or earlier</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6466</span></p>
</div>
<div class="paragraph">
<p>Templates created in 1.2 or earlier do not store the environment ID, so you cannot update their grant types, scopes, or policy contracts, nor can you revert them to previous versions.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-migrate-the-h2-database-if-the-installation-path-has-any-spaces"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-migrate-the-h2-database-if-the-installation-path-has-any-spaces"></a>Cannot migrate the H2 database if the installation path has any spaces</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6591</span></p>
</div>
<div class="paragraph">
<p>If the installation path has any spaces in the existing or new instance, the H2 database is not migrated during upgrade. Upon removing the spaces from the file path, the migration is successful.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[PingCentral 1.10 (June 2022)]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-10-june-2022</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#pingcentral-1-10-june-2022</guid>
            <pubDate>Wed, 01 Jun 2022 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>For the best possible experience, review these notes before using PingCentral 1.10.</p>
</div>
<div class="sect2">
<h3 id="update-oauth-and-oidc-template-grant-types-scopes-and-policy-contracts-and-revert-to-previous-versions"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-oauth-and-oidc-template-grant-types-scopes-and-policy-contracts-and-revert-to-previous-versions"></a>Update OAuth and OIDC template grant types, scopes, and policy contracts and revert to previous versions</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-2017</span></p>
</div>
<div class="paragraph">
<p>If you are an administrator, you can now update the grant types, scopes, and policy contracts in OAuth and OpenID Connect (OIDC) templates to further customize them to meet your needs.The history of these templates is also available to review and compare with previous versions. You can see which administrator modified the template configuration or policy contract, when it was modified, and details regarding these modifications. You can also revert templates to previous versions, if necessary. See <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_templates/pingcentral_mng_templates.html" class="xref page">Managing templates</a> for details.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-applications-with-the-latest-template-version-available"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-applications-with-the-latest-template-version-available"></a>Update applications with the latest template version available</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-6007</span></p>
</div>
<div class="paragraph">
<p>If an application is based on an outdated template, an <strong class="uicontrol">Outdated Template</strong> icon now displays next to its name in the applications list. Edit the template and click the <strong class="uicontrol">Update Template</strong> button. See <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_mng_applications/pingcentral_manage_apps.html#pingcentral_iam_updating_apps" class="xref page">Updating applications</a> for details.</p>
</div>
</div>
<div class="sect2">
<h3 id="use-sso-to-access-pingfederate-and-pingaccess-from-pingcentral"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#use-sso-to-access-pingfederate-and-pingaccess-from-pingcentral"></a>Use SSO to access PingFederate and PingAccess from PingCentral</h3>
<div class="paragraph">
<p><span class="ping_changetype-new">New</span>
<span class="ping_ticket">PASS-5202 and PASS-6018</span></p>
</div>
<div class="paragraph">
<p>You can now use SSO to access PingFederate and PingAccess from PingCentral.
For details, see <a href="https://docs.pingidentity.com/pingcentral/3.0/pingcentral_for_iam_administrators/pingcentral_installing_configuring/pingcentral_pf_pa_sso.html" class="xref page">Configuring PingFederate and PingAccess for SSO</a>.</p>
</div>
</div>
<div class="sect2">
<h3 id="account-lockout-mechanisms-added-to-mitigate-password-guessing"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#account-lockout-mechanisms-added-to-mitigate-password-guessing"></a>Account lockout mechanisms added to mitigate password guessing</h3>
<div class="paragraph">
<p><span class="ping_changetype-improved">Improved</span>
<span class="ping_ticket">PASS-6388</span></p>
</div>
<div class="paragraph">
<p>Account lockout mechanisms that prevent users from accessing the application or API after a specified number of failed sign-on attempts were added to this release. Specify the number of failed attempts that are allowed before users are locked out and the lockout period in the <code class="filepath">application.yaml</code> file.</p>
</div>
</div>
<div class="sect2">
<h3 id="cannot-update-or-revert-templates-created-in-version-1-2-or-earlier"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#cannot-update-or-revert-templates-created-in-version-1-2-or-earlier"></a>Cannot update or revert templates created in version 1.2 or earlier</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6466</span></p>
</div>
<div class="paragraph">
<p>Templates created in version 1.2 or earlier do not store the environment ID, so you cannot update their grant types, scopes, or policy contracts, nor can you revert them to previous versions.</p>
</div>
</div>
<div class="sect2">
<h3 id="resolved-a-potential-security-vulnerability"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#resolved-a-potential-security-vulnerability"></a>Resolved a potential security vulnerability</h3>
<div class="paragraph">
<p><span class="ping_changetype-security">Security</span>
<span class="ping_ticket">PASS-6387 and PASS-6378</span></p>
</div>
<div class="paragraph">
<p>Resolved a potential security vulnerability that is described in security bulletin <a href="https://support.pingidentity.com/s/article/SECBL022-PingCentral-Overly-Permissive-Actuator">SECBL022</a> (requires sign-on).</p>
</div>
</div>
<div class="sect2">
<h3 id="configure-apc-mappings-for-oidc-applications-in-pingfederate-5"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#configure-apc-mappings-for-oidc-applications-in-pingfederate-5"></a>Configure APC mappings for OIDC applications in PingFederate</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-6316</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>PingCentralpromotes access token mappings and authentication policy contracts (APCs) with OIDC applications, but the APC mappings that link the APCs to the access token managers are not currently promoted with them. If the APC mappings do not already exist in the target PingFederate environments, applications do not function as expected.When new APCs are promoted in PingCentral, access token mapping referencing the APC is created, but persistent grant mapping is not established, so the configurations are invalid.To resolve these issues, configure the APC mappings within PingFederate.</p>
</div>
</div>
<div class="sect2">
<h3 id="sp-certificates-and-assertion-encryption-certificates-must-be-different-5"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#sp-certificates-and-assertion-encryption-certificates-must-be-different-5"></a>SP certificates and assertion encryption certificates must be different</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5663</span>
<span class="ping_product">PingFederate</span></p>
</div>
<div class="paragraph">
<p>When promoting SAML applications, PingFederate does not allow you to use the same certificate as both a service provider (SP) certificate and an assertion encryption certificate. Instead of preventing the promotion to continue, you receive a message similar to the following:<code class="msgph">Environment’staging': PingFederate. This certificate either has the same ID or the same content as the certificate with index 0.</code>To continue the promotion, ensure that the SP certificate and the assertion encryption certificate are different.</p>
</div>
</div>
<div class="sect2">
<h3 id="promoting-applications-with-authentication-challenge-policies-5"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#promoting-applications-with-authentication-challenge-policies-5"></a>Promoting applications with authentication challenge policies</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-4948</span>
<span class="ping_product">PingAccess</span></p>
</div>
<div class="paragraph">
<p>Customized authentication challenge responses, which support single-page applications, are available in PingAccess 6.2 or later. Applications with this type of policy can be added to PingCentral, but cannot be promoted to another environment unless the authentication challenge policy, with the same UUID, also exists in the target environment.</p>
</div>
</div>
<div class="sect2">
<h3 id="update-truststore-path-if-pingcentral-fails-to-start-5"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#update-truststore-path-if-pingcentral-fails-to-start-5"></a>Update truststore path if PingCentral fails to start</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5977</span></p>
</div>
<div class="paragraph">
<p>After upgrading to 1.8, 1.9, or 1.10, PingCentral fails to start if <code class="codeph">$\{pingcentral.home}</code> is used in the trust store path. To prevent this from happening, change the home path to be the absolute trust store path and delete the <strong class="uicontrol">Certificates</strong> table in the database.</p>
</div>
</div>
<div class="sect2">
<h3 id="adding-saml-applications-through-the-api"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#adding-saml-applications-through-the-api"></a>Adding SAML applications through the API</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5009</span></p>
</div>
<div class="paragraph">
<p>If you attempt to add a SAML application to PingCentral from an existing application through the API, and the connection JSON contains identity attribute names and placeholders, you receive an error message advising you to nullify the <strong class="uicontrol">Names</strong> field. However, even if you nullify this field, you still receive an error message because the JSON contains placeholders. Remove these placeholders before you proceed.</p>
</div>
</div>
<div class="sect2">
<h3 id="managing-environments-through-the-api"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#managing-environments-through-the-api"></a>Managing environments through the API</h3>
<div class="paragraph">
<p><span class="ping_changetype-issue">Issue</span>
<span class="ping_ticket">PASS-5001 and PASS-5002</span></p>
</div>
<div class="paragraph">
<p>When creating, updating, or validating an environment through the API, you receive a server error message if the environment <strong class="uicontrol">Name</strong> or <strong class="uicontrol">Password</strong> fields are null or missing. API requests cannot be processed without this information, so ensure that these fields contain valid values.You will also receive a misleading error message if the <strong class="uicontrol">PingAccess Password</strong> field is null. Rather than informing you that the information in this field is invalid, it informs you that you cannot connect to the PingFederateadministrative console, which is misleading.Requests to connect PingAccess to a PingCentral environment cannot be processed without this information, so ensure that this field contains a valid value.</p>
</div>
</div>
</div>
]]></description>
        </item>
        <item>
            <title><![CDATA[Previous Releases]]></title>
            <link>https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#previous-releases</link>
            <guid isPermaLink="false">https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#previous-releases</guid>
            <pubDate>Tue, 31 Jan 2023 12:00:00 GMT</pubDate>
            <description><![CDATA[

<div class="sectionbody">
<div class="paragraph">
<p>Release notes for previous releases are available here.</p>
</div>
<div class="sect2">
<h3 id="2022-release-notes"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#2022-release-notes"></a>2022 release notes</h3>
<div class="ulist">
<ul>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_June2022">PingCentral 1.10 (June 2022)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_193">PingCentral 1.9.3 (February 2022)</a></p>
</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="2021-release-notes"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#2021-release-notes"></a>2021 release notes</h3>
<div class="ulist">
<ul>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_192">PingCentral 1.9.2 (December 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_191">PingCentral 1.9.1 (December 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_19">PingCentral 1.9 (October 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_182">PingCentral 1.8.2 (December 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_181">PingCentral 1.8.1 (December 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_18">PingCentral 1.8 (June 2021)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_17">PingCentral 1.7 (March 2021)</a></p>
</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="2020-release-notes"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#2020-release-notes"></a>2020 release notes</h3>
<div class="ulist">
<ul>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_16">PingCentral 1.6 (December 2020)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_15">PingCentral 1.5 (September 2020)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_14">PingCentral 1.4 (July 2020)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_13">PingCentral 1.3 (March 2020)</a></p>
</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="2019-release-notes"><a class="anchor" href="https://docs.pingidentity.com/pingcentral/3.0/release_notes/pingcentral_relnotes_home.html#2019-release-notes"></a>2019 release notes</h3>
<div class="ulist">
<ul>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_12">PingCentral 1.2 (November 2019)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_101">PingCentral 1.01 (October 2019)</a></p>
</li>
<li>
<p><a href="https://docs.pingidentity.com/csh?Product=pingcentral&amp;context=pingcentral_relnotes_one_point_o">PingCentral 1.0 (August 2019)</a></p>
</li>
</ul>
</div>
</div>
</div>
]]></description>
        </item>
    </channel>
</rss>