What's New?
Unified Key Orchestrator v3.1 provides efficient and security-rich centralized key management.
Release notes for v3.1.0.8
New features and enhancements
Following are the new features and enhancements that are included in v3.1.0.8.
Crypto Connect ACSP (CC ACSP)
Crypto Connect ACSP (CC ACSP) is an IBM solution under Crypto Connect, designed to efficiently manage and distribute access to Hardware Security Modules (HSMs). It optimizes resource usage and reduces costs by enabling a single HSM to be shared across multiple applications or containers.
For more information, see Understanding CC ACSP server.
Managed keys status
The managed keys status offers enhanced verification capabilities, checking key and keystore states against the database without performing updates. You can customize verification settings for manual or automated processes, optimizing resource usage, and system performance. Verified keys are flagged if out-of-sync, ensuring up-to-date status tracking.
For more information, see Managed keys status
Crypto Connect CAT updates
Features:
- Database cleanup is performed daily once and also during server startup. It can be configured by using the following environment variables:
CAT_DB_SIZE_LIMITCAT_RETENTION_PERIOD_IN_DAYSCAT_CLEANING_PERIOD_IN_DAYS
- Support for the following PQC data algorithms:
- ML-KEM
- Dilithium
- Kyber
- ML-DSA
- Additional field in API - variant used for PQC algorithm
- Pagination for counting queries
- Authorization with mTLS works with certificates and token is no longer required
- Support for TR31 data
- Support for
CryptoCoprocessorActivitycount queries - Extract symmetric and asymmetric keys from TKDS
Bug fixes:
- Curves for ECC are returned also in data based on SMF46 records
- DES algorithms size unification to 56/112/168
- Improved performance of Kafka error handling
- Updates of dependencies to the latest versions
- Proper system IDs for key lifecycle events
- Better handling of deserialization errors
- Correct PQC security strength for AES algorithms
- Filtering parameters validation
- GraphiQL UI support
- Proper secondary job start time for key lifecycle events
- Streamline cryptographic algorithm names (identical algorithms had different names depending on the source)
Enhancements
-
Enhanced Data set view for better data set analysis with consistency improvements. The following are the enhancements:
- Percentage-based data set representation
- Quick filters for data sets states
- Multi-PLEX view
- Migration state filtering
- Table refresh functionality
- Customizable columns
- Data sets table Download
- View more items per page
- Enhanced data set detail page
For more information, see Viewing data set encryption status.
-
Enhanced the Overview page to display information based on selected vaults and Plexes. You can filter the data based on one or more vaults and Plexes. You can view the following information in the Overview page now.
- Keystores
- Key templates
- Managed keys
- Keys expiration status
- Managed keys states
- Data sets encyptions status
For more information, see the Overview page.
-
UKO KMG Agent updates:
- Supports Elliptic Curve Cryptography (ECC) algorithm for key template creation.
- Added Key usage field to RSA, EC, ML-KEM, and ML-DSA algorithms.
- Added modes to ML-DSA algorithm.
- Added key types: IMPORTER and EXPORTER to AES algorithm.
- Added Key management customization to ML-KEM and ML-DSA algorithms.
For more information, see Creating key templates and Algorithm properties for UKO KMG Agent keystore type.
Known issues
-
Openid Connect problems
Logging on to UKO leaves you with a screen full of 403 Unauthorized messages. In the log you see
javax.security.auth.login.CredentialException: The client ID or the realm name is not set or is not a match for the incoming request. Please check your Openid Connect Client configuration com.ibm.ws.security.authentication.jaas.modules.HashtableLoginModuleWorkaround
This is a current issue with newer versions of Liberty, for example versions 25.0.0.9 or 25.0.0.10. Revert back to an older version, for example 25.0.0.3 until Liberty resolves the issue.
-
Successful key sync is not updated automatically
When a key is synced with the target keystore, the update is not automatically reflected in the managed key instance view of the Managed Keys page. The
Out of Syncflag still appears for the key.Workaround
Close and reopen the managed key instance view of the key.
-
Key template that is configured with UKO KMG Agent and ML-DSA or ML-KEM algorithm with certain key usage combinations cannot be used to create key instance
If you configure a key template by using the UKO KMG Agent and ML-DSA or ML-KEM algorithm, you can use them to create key instances only if you have selected the following key usage combinations, For the other combinations, it will not work.
- For ML-DSA: Only digital signature usage is allowed (The Signature option from the list).
- For ML-KEM: Key encipherment, Data encipherment, or both.
-
Inability to create key template by using UKO KMG Agent and ML-KEM or ML-DSA (for certificate signing)
You cannot create a key template by using UKO KMG Agent and ML-KEM or ML-DSA algorithms if you have selected Certificate signing key usage. This can be resolved by using API.
Release notes for v3.1.0.7
New features and enhancements
Following are the new features and enhancements that are included in v3.1.0.7.
Post-quantum cryptography
UKO now supports post-quantum cryptography (PQC) algorithms (ML-DSA and ML-KEM) for KMG agent.
Additional fix is required for the EKMF Workstation when starting to use PQC in combined environments.
New crypto analytics and inventory capabilities
- New CAT Agent to collect SMF and keystore related information.
- New CC CAT graphQL API to query crypto inventory information residing in PostgreSQL included as part of Crypto Connect.
Enhancements
- New Add-on components tab for the Getting started page.
- You can now choose HMAC algorithm and hashing methods for KMG Agent while creating key templates.
- EKMF Web frontend is removed. It can be configured to get started instead of the UKO frontend, but both cannot be run at the same time anymore. The application switcher is removed as well.
Fixed vulnerabilities
- CVE-2025-22233
- CVE-2025-22235
- CVE-2025-48734
Fixed issues
-
Fixed the issue with nested side panels reusing filters that are applied on a table in the parent component.
-
Fixed the issue with the Managed keys section of key template properties displaying the wrong key count.
-
Fixed front-end accessibility violations.
-
Fixed the issue with the
orderByfilter that appears in the Managed keys tab for every action that is performed. -
The following issues with Key template properties side panel are resolved:
- Key state update doesn’t persist after saving.
- Activate and deactivate key actions after properties change doesn’t persist after saving.
- Unassigning the keystore group from the template displays an incorrect dropdown placeholder.
- Changing the Activate keys after property doesn't update the dropdown with the selected value.
-
Under the Security and recovery section of a vault, if recovery key name is updated, the status was not correctly notified (whether success or failure, the notification was always success). This issue has been fixed.
-
Fixed the issue with the out of sync and in sync key count information in the Overview page being incorrectly displayed.
Known issues
If you make changes to a keystore group that that has keys in it, the Out of sync status might not appear immediately for the keys in the Managed keys tab. Workaround Click on the keys to open the side panel to view the updated Out of sync status.
Release notes for v3.1.0.6
New features and improvements:
- You can download the Microsoft DKE logs from the About page (click the ? icon to open the About page).
- New HMAC key mangement support for KMG keystores.
- Optimized UI performance.
- The cache can now be rebuilt from the Administration panel. Before this was only possible using the API.
- You can create RSA key with different key management flags.
- Updated version of
access-management-api-clientandv4-api-typescript-axiospackage to use official version and fixed vulnerabilities.
Fixed vulnerabilities:
- CVE-2025-27152
- CVE-2025-26791
- CVE-2024-21538
- CVE-2024-4067
Fixed issues:
- KMG key creation: The key cannot be created without entering a key name.
- You can filter key by keystore now.
- Fixed the issue with key template: While creating a key from a template with a placeholder in it, the key naming now matches the one defined in the template.
- Archive and edit template keystore issue: Fixed the modal to show the template-related keys only.
- KMG keystore Connection details side panel now displays connection details correctly.
- The Disconnect action is not available for a keystore if keys in the keystore is not in pre-active state, destroyed state without a pending flag, or removed from the vault.
- Fixed accessibility issues.
Release notes for v3.1.0.5
New features and improvements:
- Import keystores from the Workstation can be disabled via
server.envflag:DISABLE_IMPORT_KEYSTORES_FROM_WORKSTATION=true - Database schema migrations can be disabled via
server.envflag:DISABLE_MIGRATIONS=true - Key state of any version of a CCA key (KMG Keystores) can be changed using the API (previously only possible for latest version)
Fixed Vulnerabilities:
- CVE-2024-38820
- CVE-2024-21538
- CVE-2024-47535
- CVE-2024-52316
- CVE-2024-52317
- CVE-2024-52798
- CVE-2024-55565
- WS-2024-0017
- CVE-2024-50379
- CVE-2024-56337
Release notes for v3.1.0.4
New features and improvements:
- New ‘Getting started’ page
- Improvements to the ‘Overview’ page
- Simplified creation flows while working in the context of a vault, and even more simplified flow while creating a key off of a template.
- RSA algorithm support for KMG keystore type keys.
- Microsoft Double Key Encryption (DKE) keystore support
- Private endpoint (TLS proxy) support for Azure key vaults.
- Face-lifted and more streamlined confirmation modals
- New information tiles for Data sets, Audit log, API and Administration pages
- New - ‘System status’ tab under the Administration page
- Support for IBM WebSphere Application Server Liberty. For more information, see WebSphere Application Server Liberty 24.0.0.7.
- new server.env variables: SAF_VAULT_ID_TO_UPPER_CASE and SAF_ACTION_TO_UPPER_CASE to support the use of RACFVARS in vault-specific EJBROLE definitions
Release notes for v3.1.0.3
New features and improvements:
- Improvements of the administration page.
- Adaptation of the new default Google delete period time from 1 day to 30 days.
- The url to the Open API is changed from
/api/explorerto/openapi/ui. - Fix the issue of the Message Authentication Code (MAC) verification with non-system keys.
Upgrades:
- netty to 4.1.110.Final
- netty.refactor to 1.1.18
- bouncy-castle to 1.78.1
- azure.identity to 1.12.2
Vulnerabilities:
- Issue 4014: Address CVE-2024-35255 vulnerability
- Issue 3993: Address CVE-2024-30172, CVE-2024-29857, and CVE-2024-30171 vulnerability
- Issue 3809: Address CVE-2024-29025 vulnerability
Release notes for v3.1.0.2
New features and improvements:
- Introduction of the server.env parameter
SAF_PROFILE_PREFIXwhich replaces the hardcoded value ofEKMFWEBand affects the security definitions in the EJBROLE and APPL classes - Removal of the limitation to 50 vaults
- The vault administrator role has been added to the documentation and workflows
- The missing views for the tables
T_VAULTS_API_V4,T_TEMPLATES_API_V4,T_KEYS_API_V4, andT_KEYSTORES_API_V4have been created - Compatibility with the latest version of WebSphere Liberty (24.0.0.2)
Release notes for v3.1.0.1
New features and improvements:
- Key templates can now define key instance naming schemes in the user interface. In previous versions this was only possible using custom properties. Note that the use of system placeholders in the main key naming scheme and the key instance naming scheme will have an impact on whether a key can be rotated. In addition, you can decide for some type of keystores, whether previous versions of the key should be deactivated upon key rotation.
- The
environmentandlocationfields are obsolete and have been removed from Azure keystores. - Keys can now be filtered by template alignment status.
- Keys can now be filtered by whether the key in keystore is in sync with what is expected.
- Better support for native rate limitation for operations in different clouds.
- Integration between UKO and EKMF Workstation allows for seamless management of Pervasive Encryption and AWS AES keys between the two products, including data integrity calculations. The installation instructions have been updated to include the steps required for shared use of EKMF Workstation and UKO.
- Use filters to display keys that can be edited by UKO (Edit) or that are View only (secure room required) because they are managed by EKMF Workstation
- Multi-zone key distribution; a key created on the EKMF Workstation that spans multiple instances, zones and application names are now fully supported.
- Support for specifying the key zone used by UKO (defaults to
I) - Support for specifying the key zone used by EKMF Workstation (defaults to
2)
- Migration to v3.1.0.1 can be done manually or using workflows.
Vulnerabilities:
- Issue 2596: Address CVE-2022-45868 vulnerability
- Issue 3125: Address CVE-2023-44487 vulnerability
Upgrades:
- netty to 4.1.100.Final
- reactor-netty-http to 1.1.12
- h2 to 2.2.220
Release notes for v3.1.0.0
Application switcher
With UKO v3.1 you can decide between the prevoius EKMF Web V2.1 application and the new UKO v3.1 application. To switch between the applications, click on the switch icon in
the top right corner.
z/OSMF workflows
UKO provides z/OSMF workflows for installation, migration and other basic tasks.
Data set dashboard
Proactively manage your data set encryption deployment with an enterprise view of which data sets are encrypted and which keys are in use.
Security-rich key generation
Generate keys with IBM FIPS 140-2 level 4 certified CryptoExpress cards on IBM Z for hardware generated keys.
Policy-based key generation
Easily create your key templates to generate keys that adhere to your internal policies such as enforcing key naming conventions.
Role-based access and dual control
Comply with security standards with role-based access that defines functions for each role, and enforce dual control requiring 2 or more people to activate EKMF.
External RESTful API
Seamlessly integrate key management with your business processes.
Advanced auditability and compliance
Provide auditors with consolidated key management logs for all keys managed.
Key rotation
Rotate managed keys, including master keys, on demand to comply with your policy requirements.
Multi-tenancy
Leverage secure repositories with fine-grained access controls known as vaults to enable multi-tenancy and self-service key management.
Secure room operation
Set up UKO for z/OS in combination with Enterprise Key Management Foundation Workstation (EKMF Workstation) for secure room operation.
An EKMF Workstation and UKO for z/OS coexistence compatibility fix is planned for EKMF Workstation Q4 releases (9.5.4 and 10.2.4) expected end of December. Requests for earlier delivery as an interim Fix Pack to existing versions will be considered on request.
Notices
- Key rotation for PE keys works only using the RESTful APIs. UI update will be provided in the first fixpack.
- CCA Firmware update is required to enable and support Azure and Google with the
CKM-RAKWexport keyword. This will require update to CCA 7.4.46 or 8.1.75 (and 7.5/8.2)