Release notes for App ID
22 June 2023
- IdP-initiated login is now available
- If you want to log in to your applications on IBM Cloud from your identity provider's UI, you can enable IdP-initiated login. Learn more.
4 May 2023
- IBM Cloud Foundry service broker unsupported
-
All services that use the Cloud Foundry service broker will stop working on 1 June 2023, when Cloud Foundry enters the End-of-Support stage.
Does this change affect me?
Not sure if your App ID instance is using the Cloud Foundry service broker? In the Cloud Foundry services section, check whether your App ID instance is listed as an alias. If your instance is already an alias, you do not need to take any action.
If your instance is not an alias and you want to keep it, please contact IBM Cloud support to discuss next steps.
1 February 2023
- Ability to bulk delete Cloud Directory users
- It's now more efficient for users to clean up App ID instances. You can now use the
bulk_remove
API endpoint to remove multiple users from an App ID instance at once. Learn more.
15 December 2022
- New App ID API endpoints
- App ID added options to make it more efficient for you to migrate your users from one service instance to another. You can now use the
export_all
orimport_all
API endpoints to migrate all of your users (up to approximately 16,000).
27 June 2022
- Swift Server SDK unsupported
- IBM Cloud no longer supports the Swift Server SDK for App ID. To continue to receive support for your App ID integration, you can move to directly calling the APIs.
21 January 2022
- App ID availability in Configuration Governance
- IBM Cloud App ID is now available as part of the Configuration Governance component of the Security and Compliance Center. You can create guardrails for App ID such as enforcing whether monitoring of runtime activity made by application users is tracked.
15 December 2021
- Logging enhancement
- As of 15 December 2021, App ID now logs email addresses from login attempts even if the user is unknown to the service. Previously, email addresses were logged only if the user was known to App ID.
27 September 2021
- New region availability
- As of 27 September 2021, App ID is now available in the Sao Paulo region. For a detailed list of the regions in which the service is available, see Regions and endpoints.
12 July 2021
- New region availability
- As of 12 July 2021, App ID is now available in the Toronto and Osaka regions. For a detailed list of the regions in which the service is available, see Regions and endpoints.
21 February 2021
- Kubernetes Ingress annotation
- As of 21 February 2021, the custom Kubernetes Service Ingress image is deprecated. The App ID docs are now updated to include information for integrating with the community Kubernetes image. To get started, see Containerized apps with Ingress. For more detailed deployment information, see the Kubernetes Service documentation.
20 November 2020
- App to app access control
- You can now control which actions that an application is able to perform in your apps by using role-based app-to-app access control. For more information, see the access control docs.
18 June 2020
- Securing your data in App ID
- You can now restore deleted instances of App ID during the data retention period. Learn more.
27 January 2020
- Cloud Directory: Connect your own email provider
- You can now bring your own custom email provider or connect your SendGrid account to have more control over your email communication with your users. For more information, see the configuring email settings docs.
- Import and export user roles
- You can now include any roles that are assigned to a user as part of using the export and import APIs. For more information, see the migrating profiles or managing Cloud Directory users documentation.
- Post-MFA extensions
- You can now create post-MFA extensions to help you to monitor and improve your users MFA experiences. For more information, see the extending MFA docs.
- Pre-MFA extensions
- You can now create pre-MFA extensions that allow you to make custom decisions at runtime about which users must complete your MFA flow. For more information, see the extending MFA docs.
15 December 2019
- Access control
- You can now define which users are able to access your app data, use specific features, or perform specific actions in your apps by using role-based access control. For more information, see the access control docs.
- Cloud Directory: Custom MFA flows
- You can now make custom decisions about who must complete the MFA flow by configuring your own extension and registering it with App ID. For more information, see Customizing MFA.
22 November 2019
- Single-page applications: SDK
- Don't manage a backend for your app? You can now easily secure your browser applications by using the JavaScript SDK. For more information, see the SPA docs.
12 September 2019
- Increase the security of your SAML flow
- You can now increase the security of your SAML work flows by enabling request signing and response encryption. For more information, see SAML.
8 August 2019
- Track runtime authentication events with Activity Tracker
- Now you can track, manage, and analyze authentication events that are performed by your app users at runtime by integrating Activity Tracker and App ID. Releasing your secured custom, mobile, or web app to your users is only the beginning of your journey toward adoption. After your app is deployed, you need to have insights into how your users are interacting with your app. For example, the number and trends of active users. In regulatory markets, such as with HIPAA, you must have a way to share the detailed records of both successful and failed authentication events with auditors. With App ID, you can now have a very detailed view of runtime events that are related to user authentication.
- Edit user profile information directly in the dashboard
- You can now update profiles for users of your application through the App ID dashboard. Then, you can use that information to personalize their experience of your app. For more information, see user profiles.
30 July 2019
- Create future user profiles through the dashboard
- You can now start building profiles for users that you know will use your application in the future through the App ID dashboard. For more information, see Preregistering future users.
- Slack channel
- Have questions while working with App ID? Get in touch directly with the development team on Slack!
- The App ID Identity and Access Istio adapter
- Centralize all your identity management in a single place with the App Identity and Access adapter. The adapter can be configured to work with any OIDC-compliant identity provider, which enables it to control authentication and authorization policies in all environments including both front and backend apps. And, it does it all without any change to your code or the need to redeploy your application. For more information, see Securing multicloud apps with Istio.
- Access user profile information through the GUI
- View information about all your users that you can leverage to build personalized app experiences. For more information, see Storing and accessing profiles.
- Cloud Directory: Automatically associate users with a profile
- Automatically associate Cloud Directory users with an App ID profile as you create them. For more information, see Managing users.
18 May 2019
- Cloud Directory: View user information
- View information about your Cloud Directory users that you can leverage to build personalized app experiences. For more information, see Viewing user information.
24 April 2019
- Version 4 of the runtime APIs
- Update your apps! To further the standards on which App ID is based, we've made a few changes. With those changes, we were able to tighten interoperability within the OIDC workflow and broaden the frameworks that are able to use the service. For more information about the changes that you must make before September 2019, see the blog IBM Cloud App ID: Updated runtime APIs.
- Cloud Directory: Single sign-on
- Provide smooth authentication experiences between multiple web apps with single sign-on (SSO) for Cloud Directory. With SSO enabled, user's are not prompted to reenter their credentials the next time they attempt to access your app. Instead, they are automatically signed in to any of your apps that are protected by the same App ID instance. For more information, see Single sign-on.
- Updated dashboard
- Navigate through your Cloud Directory information quickly! Using IBM Design Thinking, the App ID dashboard has been redesigned to give you an even better user experience.
7 February 2019
- Cloud Directory: Multi-factor authentication - SMS
- Require users to enter a second form of authentication during sign-in to increase the security of your app. With Cloud Directory, the first factor is the user's password that they would normally use. Then, the service sends the user a one-time code through SMS that the user must enter before they can gain access to your app. For more information, see Multi-factor authentication.
11 December 2018
- Cloud Directory: Multi-factor authentication - Email
- Require users to enter a second form of authentication during sign-in to increase the security of your app. With Cloud Directory, the first factor is the user's password that they would normally use. Then, the service sends the user a one-time code through the email that is registered that the user must enter before they can gain access to your app. For more information, see Multi-factor authentication.
- Cloud Directory: Password policies
- Further enforce app security by specifying rules that users must adhere to when they create the password that they use to sign in. For example, you can set an advanced policy that dictates the number of times a password must change before a user can reuse a previous password. Or, you can prevent users from creating a password that contains their username or email address. For more information, see Defining password policies.
17 March 2017
- Introducing App ID
- IBM Cloud App ID allows you to easily add authentication to web and mobile apps. You no longer have to worry about setting up infrastructure for identity, ensuring geo-availability, and confirming compliance regulations. Instead, you can enhance your apps with advanced security capabilities like multifactor authentication and single sign-on.