InTrust now supports OpenSSL 3.3.1 and FIPS modules using OpenSSL 3.0.9.
InTrust now supports SQL server "Always on high availability group" functionality.
EMC Centera repositories have been removed from supported repositories list.
InTrust now supports TLS 1.3.
|
important: While InTrust supports TLS 1.3, the TLS 1.2 client protocol remains mandatory due to its dependency on SQL Server as per Microsoft's SQL Server documentation. |
InTrust now includes new filters in IDM to get required events.
InTrust has capability to skip certain eventIDs for comprehensive filtering operation.
InTrust 11.6 now supports OpenSSL 3.1.2 and FIPS modules using OpenSSL 3.0.8.
InTrust 11.6 now supports SQL Server 2022.
InTrust 11.6 now supports Windows Server 2022.
|
Note: With Microsoft ending support for Windows Server 2012 and 2012 R2, it is recommended that all users should upgrade to supported versions of Windows Server to avoid security related issues. |
Intrust 11.5 now supports InTrust 11.5 now supports Oracle 18c, 19c and 21c.
InTrust 11.5 now supports SQL Server 2019.
InTrust 11.5 now supports Openssl 3.0.7.
Intrust 11.5 now supports FIPS approved hashing and encryption algorithms. It can be enabled using the tool adcorgpwd.exe available in the SupportTools folder of installation folder.
For fresh installation, FIPS compliant algorithms are enabled automatically. For upgrade from older versions (11.4.2 or older), you need to enable it manually using the tool adcorgpwd.exe available in the SupportTools folder of installation folder. Once FIPS compliant algorithms are enable, they will remain enabled and cannot be changed back to Non-FIPS algorithms. Please refer Upgrade Document for further details.
This InTrust release does not include Solaris related components or configuration items. It is not expected that future versions will provide them.
© ALL RIGHTS RESERVED. Términos de uso Privacidad Cookie Preference Center