Airlock Header

Airlock IAM 8.4

Highlights and important changes

New features for configuration automation

Customers can now programmatically manage and deploy configurations reliably and repeatably, simplifying complex deployments. By treating configurations as code, administrators can fully embrace modern DevOps practices.

Airlock IAM 8.4 introduces a powerful YAML-based configuration format, added CLIs for seamless automation, and the ability to break configurations into modular, manageable units. Plus, the upgraded Config Editor supports all these new features and now also functions as a standalone editor for maximum flexibility.

In our detailed video, we walk you through Airlock IAM 8.4's Config Automation features, showing how to streamline your identity management workflows with YAML-based configuration. Watch the video here.

More flexibility in token exchange and new delegation capabilities

The current implementation of OAuth Token Exchange is used to convert external tokens into internal ones or to swap tokens between different security zones.

With IAM 8.4, tokens can now include more than one identity. This makes it, for example, possible for a helpdesk employee to act on behalf of a customer. Using the extended features in token exchange allows for more complex delegation and representation scenarios.

Additionally, the token management system has been optimized to improve scalability. These improvements reduce the number of tokens stored in the database by up to 90%, which lowers the database load during access and especially during token clean-up.

Improved flows for targeted user guidance and better event processing

The capabilities of IAM flows have been further enhanced to better meet customer needs and improve the user experience for end-users.

A new feature for handling error situations in IAM flows allows for more precise guidance, making user journeys simpler and easier to understand.

With automatically generated events in all flow steps and new event filters, it's now possible to process events more effectively at any stage of a workflow – perfect for notifying end-users about critical actions or providing timely updates.

Improvements in authentication factors: FIDO, passkeys, OATH OTP, and more

This update brings useful advancements to authentication factors:

  • Enhanced FIDO features streamline the authentication and enrollment process with Passkeys, minimizing friction caused by hard-to-control browser behavior.
  • The OATH OTP feature supports a wide variety of ready-to-use and free authenticator apps. With new end-user self-service enrollment options, OATH OTP has become a first-class citizen authentication factor in Airlock IAM.
  • And finally, the new Airlock 2FA feature empowers your service desk staff to better assist end-users when enrolling new devices.

Various features: Redis Sentinel, usage analytics, custom attributes, and Open API enforcement

Various other improvements range from Sentinel support for the Redis session store to usage analytics, custom additional flow attributes, and improved OpenAPI specifications containing response data.

As always, many other new features and improvements are documented in the changelog.

Release video in English

Release video in German

Config Automation Deep Dive: 

Information for you

-Our whitepapers-

Whitepaper: How to make cIAM a success

Increasing requirements for security and user-friendliness make Customer Identity and Access Management an essential. Read our whitepaper to find out how you can secure your competitive advantage with the right CIAM strategy.

 

Request whitepaper

Whitepaper: Security for cloud-native applications

You can read about how companies can ensure the security of web applications and APIs in Kubernetes in the white paper "Security for cloud-native applications", which was created in collaboration between heise and Airlock.

 

Request whitepaper

Whitepaper: Zero Trust is a journey

The ongoing digital transformation of the world is progressing and having a profound impact on our personal and professional lives in ways that were difficult to imagine just a few years ago.


This white paper discusses the effects of continuous digitalization and its impact.

Request free of charge

Off to DevSecOps

In this white paper, you will learn the most important insights into how you can implement DevSecOps successfully and efficiently, which security components are required for this and the advantages of a microgateway architecture.

 

Request free of charge

Airlock 2FA - Strong authentication. Simple.

Double security - this is what two-factor authentication offers in the field of IT security.


Find out more about strong authentication and the possibilities offered by Airlock in our white paper.

Download for free

Further whitepapers

We provide you with free white papers on these and other topics:

 

  • Successful IAM projects
  • compliance
  • Data protection (DSGVO)
  • Introduction of PSD2
  • PCI DSS requirementsPCI DSS requirements
Request free of charge