Occasionally, we remove functionality from Trust Protection Platform to stay current with emerging technologies and to serve the changing needs of our customers. Some of the more common reasons for deprecating features include the following:
- Minimal use of a feature by the majority of our customers
- Technologies that have become obsolete
- Features that have become too expensive to maintain
- Changes in our technology road map
- Important security enhancements to Trust Protection Platform
For a list of features that have been deprecated prior to the current release, visit:
Scheduled Feature Deprecations
Although planned feature deprecations are subject to change, the following list indicates which features are planned for removal from upcoming releases of Trust Protection Platform:
Venafi Platform 20.4
WebSDK Authorization Method involving API keys is only available with a License Key
Starting in 20.4, only customers with a special, temporary license key from Venafi will be able to leverage WebSDK API Keys to authenticate to the WebSDK. Without the license key, both POST Authorize and the WebSDK Permission will not be available.
Eliminate Manual Approval option for DigiCert CA
DigiCert has recommended that we update our driver to take advantage of a new "skip_approval" option which streamlines processing on their side for up to a 30% increase in performance. As a result, Venafi Platform workflow will be the only method for requiring human approval of certificate requests beginning in 20.2.
Palo Alto Network FW, Imperva MX and BlueCoat SSLVA drivers will support provisioning of device certificates only
Starting in 20.4 both drivers will be able to provision device certificates only. After upgrading to 20.4 existing Palo Alto Network FW and Imperva MX applications will be converted to Basic applications and retain certificate association. All existing BlueCoat SSLVA applications that do not have Device Certificate enabled will be converted to Basic Applications while retaining certificate association. Those BlueCoat SSLVA applications that have Device Certificate enabled will not be converted to Basic ones.
Provisioning certificates in bulk to Palo Alto Network FW and Imperva MX application drivers can be accomplished using the Adaptable Bulk Provisioning job.
Server Agent RHEL 5 and CentOS 5 Support
Red Hat Enterprise Linux 5 will reach End of Extended Lifecycle add-on support on 30 Nov 2020. Continued development of the Venafi Server Agent requires contemporary software development toolchains, and we will be discontinuing the support for this version of the operating system.
Venafi Platform 21.1
WebSDK Authorization Method involving API Keys (End-of-Support)
The WebSDK authorization method that involves API keys was formally deprecated in Trust Protection Platform 20.1 and will no longer be available in code beginning in 21.1. The "WebSDk" permission that is available on users and groups will no longer be available. The temporary license key introduced in 20.4 will no longer be available.
Server Agent TLS 1.1 Support
Server Agents will require TLS 1.2 or newer when connecting to TPP servers. Load balancers used between Server Agents and the TPP servers will need to be updated/reconfigured to not perform protocol downgrade beyond TLS 1.2.
Server Agent 32-bit (i386) Linux Support
While RHEL 6 and 7 did ship i386 architecture for the OS, the architecture has not been a popular one to install, and majority of existing installations are 64bit (X86_64). Going forward new versions of Venafi Server Agent for Linux will ship only for the X86_64 platform.
Server Agent plain text syslog event message copies
For easier integration with SIEM tools and improved message parsing, the Server Agent log messages copied to syslog will be in JSON format.
Venafi Platform 21.4
With the release of SAML support, we plan on deprecating the support for pass-through authentication.