Hi folks, we'd like to send the summer off with a minor release based the latest version of EJBCA: 6.14.1
This minor primarily fixes some issues that some users reported when running EJBCA 6.14 on JBoss 7.1.1GA, due to some race conditions and library collisions in that particular version that didn't come up during testing. We also took the chance to fix some other minor issues that came up late during QA that we believe should hold you over for the time being. For a full list of new features and implemented improvements in EJBCA 6.14, see the EJBCA 6.14 Release Notes.
In other news, we've decided to release our ACME implementation before moving on to EJBCA 7.0, so you can look forward to seeing EJBCA 6.15 in the next few weeks.
This minor release does not involve any upgrade steps or notable database changes. Read the EJBCA 6.14 Upgrade Notes for important information about the release. For upgrade instructions and information on upgrade paths, see Upgrading EJBCA.
Change Log: Resolved Issues
For full details of fixed bugs and implemented features in EJBCA 6.14.1, refer to our JIRA Issue Tracker.
Issues Resolved in 6.14.1
Released on 24 August 2018
Bug Fixes
ECA-7209 - Configdump crashes on export due to 'isCaAllowed' in certificate profile
ECA-7210 - BC class conflict in some occasions: X509CertificateObject cannot be cast to org.bouncycastle.jce.interfaces.PKCS12BagAttributeCarrier
ECA-7212 - EJBCA fails to start on JBoss AS 7.1.1
ECA-7213 - JSF errors on JBoss AS 7.1.1 and EAP 6.x
ECA-7221 - Configdump support for dumping issuers is missing
ECA-7222 - WebService keyRecoveryEnroll gives NPE if end entity extendedInformation is missing
ECA-7223 - processSoftTokenReq method requires end entity profile to allow clear text password
ECA-7229 - Can not start Peer Connector on JBoss EAP 6.4
ECA-7236 - NPE thrown by publisher when useSeparateCertificateTable is changed from false to true
ECA-7241 - EST enrollment requires end entity profile with batch enrollment enabled
ECA-7242 - EJBCA is trying to parse the string 'KeyId' as an integer when authorising an admin