IBM Cloud Docs
Release notes for App ID

Release notes for App ID

22 June 2023

IdP-initiated login is now available
If you want to log in to your applications on IBM Cloud from your identity provider's UI, you can enable IdP-initiated login. Learn more.

4 May 2023

IBM Cloud Foundry service broker unsupported

All services that use the Cloud Foundry service broker will stop working on 1 June 2023, when Cloud Foundry enters the End-of-Support stage.

Does this change affect me?

Not sure if your App ID instance is using the Cloud Foundry service broker? In the Cloud Foundry services section, check whether your App ID instance is listed as an alias. If your instance is already an alias, you do not need to take any action.

If your instance is not an alias and you want to keep it, please contact IBM Cloud support to discuss next steps.

1 February 2023

Ability to bulk delete Cloud Directory users
It's now more efficient for users to clean up App ID instances. You can now use the bulk_remove API endpoint to remove multiple users from an App ID instance at once. Learn more.

15 December 2022

New App ID API endpoints
App ID added options to make it more efficient for you to migrate your users from one service instance to another. You can now use the export_all or import_all API endpoints to migrate all of your users (up to approximately 16,000).

27 June 2022

Swift Server SDK unsupported
IBM Cloud no longer supports the Swift Server SDK for App ID. To continue to receive support for your App ID integration, you can move to directly calling the APIs.

21 January 2022

App ID availability in Configuration Governance
IBM Cloud App ID is now available as part of the Configuration Governance component of the Security and Compliance Center. You can create guardrails for App ID such as enforcing whether monitoring of runtime activity made by application users is tracked.

15 December 2021

Logging enhancement
As of 15 December 2021, App ID now logs email addresses from login attempts even if the user is unknown to the service. Previously, email addresses were logged only if the user was known to App ID.

27 September 2021

New region availability
As of 27 September 2021, App ID is now available in the Sao Paulo region. For a detailed list of the regions in which the service is available, see Regions and endpoints.

12 July 2021

New region availability
As of 12 July 2021, App ID is now available in the Toronto and Osaka regions. For a detailed list of the regions in which the service is available, see Regions and endpoints.

21 February 2021

Kubernetes Ingress annotation
As of 21 February 2021, the custom Kubernetes Service Ingress image is deprecated. The App ID docs are now updated to include information for integrating with the community Kubernetes image. To get started, see Containerized apps with Ingress. For more detailed deployment information, see the Kubernetes Service documentation.

20 November 2020

App to app access control
You can now control which actions that an application is able to perform in your apps by using role-based app-to-app access control. For more information, see the access control docs.

18 June 2020

Securing your data in App ID
You can now restore deleted instances of App ID during the data retention period. Learn more.

27 January 2020

Cloud Directory: Connect your own email provider
You can now bring your own custom email provider or connect your SendGrid account to have more control over your email communication with your users. For more information, see the configuring email settings docs.
Import and export user roles
You can now include any roles that are assigned to a user as part of using the export and import APIs. For more information, see the migrating profiles or managing Cloud Directory users documentation.
Post-MFA extensions
You can now create post-MFA extensions to help you to monitor and improve your users MFA experiences. For more information, see the extending MFA docs.
Pre-MFA extensions
You can now create pre-MFA extensions that allow you to make custom decisions at runtime about which users must complete your MFA flow. For more information, see the extending MFA docs.

15 December 2019

Access control
You can now define which users are able to access your app data, use specific features, or perform specific actions in your apps by using role-based access control. For more information, see the access control docs.
Cloud Directory: Custom MFA flows
You can now make custom decisions about who must complete the MFA flow by configuring your own extension and registering it with App ID. For more information, see Customizing MFA.

22 November 2019

Single-page applications: SDK
Don't manage a backend for your app? You can now easily secure your browser applications by using the JavaScript SDK. For more information, see the SPA docs.

12 September 2019

Increase the security of your SAML flow
You can now increase the security of your SAML work flows by enabling request signing and response encryption. For more information, see SAML.

8 August 2019

Track runtime authentication events with Activity Tracker
Now you can track, manage, and analyze authentication events that are performed by your app users at runtime by integrating Activity Tracker and App ID. Releasing your secured custom, mobile, or web app to your users is only the beginning of your journey toward adoption. After your app is deployed, you need to have insights into how your users are interacting with your app. For example, the number and trends of active users. In regulatory markets, such as with HIPAA, you must have a way to share the detailed records of both successful and failed authentication events with auditors. With App ID, you can now have a very detailed view of runtime events that are related to user authentication.
Edit user profile information directly in the dashboard
You can now update profiles for users of your application through the App ID dashboard. Then, you can use that information to personalize their experience of your app. For more information, see user profiles.

30 July 2019

Create future user profiles through the dashboard
You can now start building profiles for users that you know will use your application in the future through the App ID dashboard. For more information, see Preregistering future users.
Slack channel
Have questions while working with App ID? Get in touch directly with the development team on Slack!
The App ID Identity and Access Istio adapter
Centralize all your identity management in a single place with the App Identity and Access adapter. The adapter can be configured to work with any OIDC-compliant identity provider, which enables it to control authentication and authorization policies in all environments including both front and backend apps. And, it does it all without any change to your code or the need to redeploy your application. For more information, see Securing multicloud apps with Istio.
Access user profile information through the GUI
View information about all your users that you can leverage to build personalized app experiences. For more information, see Storing and accessing profiles.
Cloud Directory: Automatically associate users with a profile
Automatically associate Cloud Directory users with an App ID profile as you create them. For more information, see Managing users.

18 May 2019

Cloud Directory: View user information
View information about your Cloud Directory users that you can leverage to build personalized app experiences. For more information, see Viewing user information.

24 April 2019

Version 4 of the runtime APIs
Update your apps! To further the standards on which App ID is based, we've made a few changes. With those changes, we were able to tighten interoperability within the OIDC workflow and broaden the frameworks that are able to use the service. For more information about the changes that you must make before September 2019, see the blog IBM Cloud App ID: Updated runtime APIs.
Cloud Directory: Single sign-on
Provide smooth authentication experiences between multiple web apps with single sign-on (SSO) for Cloud Directory. With SSO enabled, user's are not prompted to reenter their credentials the next time they attempt to access your app. Instead, they are automatically signed in to any of your apps that are protected by the same App ID instance. For more information, see Single sign-on.
Updated dashboard
Navigate through your Cloud Directory information quickly! Using IBM Design Thinking, the App ID dashboard has been redesigned to give you an even better user experience.

7 February 2019

Cloud Directory: Multi-factor authentication - SMS
Require users to enter a second form of authentication during sign-in to increase the security of your app. With Cloud Directory, the first factor is the user's password that they would normally use. Then, the service sends the user a one-time code through SMS that the user must enter before they can gain access to your app. For more information, see Multi-factor authentication.

11 December 2018

Cloud Directory: Multi-factor authentication - Email
Require users to enter a second form of authentication during sign-in to increase the security of your app. With Cloud Directory, the first factor is the user's password that they would normally use. Then, the service sends the user a one-time code through the email that is registered that the user must enter before they can gain access to your app. For more information, see Multi-factor authentication.
Cloud Directory: Password policies
Further enforce app security by specifying rules that users must adhere to when they create the password that they use to sign in. For example, you can set an advanced policy that dictates the number of times a password must change before a user can reuse a previous password. Or, you can prevent users from creating a password that contains their username or email address. For more information, see Defining password policies.

17 March 2017

Introducing App ID
IBM Cloud App ID allows you to easily add authentication to web and mobile apps. You no longer have to worry about setting up infrastructure for identity, ensuring geo-availability, and confirming compliance regulations. Instead, you can enhance your apps with advanced security capabilities like multifactor authentication and single sign-on.