While working on the platform interface it is possible that users can accidentally change or delete important or sensitive information.
For such cases we introduce re-authentication for sensitive actions. After 22.20 for the following actions you will be asked to enter your password to authenticate:
Please Note: You will be asked to re-authenticate once every 6 hours.
To prevent erroneous and bot registrations we introduce email verification step to our trial registration process. When you register first time with our platform, an email will be sent to your given email address. Click on the link in your received email to finish your registration. There are certain rules and restrictions to this process as well:
Please Note: If you are invited to the platform directly, no email verification will be required.
We constantly improve different aspects of HELM3 deployments in collaboration with our partners. This section lists updates and improvements included in this release.
When your integration flow needs to transfer big objects or attachments, one of the platform microservices called Maester temporarily stores them in MongoDB while passing only the object IDs through the integration flow steps.
Starting from 22.20, you can use a dedicated database for storing Maester
objects and the run-time attachments. To configure, add MAESTER_MONGO_URI
environment variable to HELM3 secrets charts and set it to target this new database.
Note: You will need to migrate the grids to new MongoDB as well to ensure the Maester object availability after implementation.
Organisations who do not need a separate MongoDB instance to store their Maester
objects should set the MAESTER_MONGO_URI
variable to the same value as the
MONGO_URI
variable. This will save objects in your main database.
To configure the re-authentication for sensitive actions:
SENSITIVE_ACTION_AUTH_LIFETIME
environment variable to HELM3 secrets chart and set it to specify how long user authentications are valid. The system expect the value of this parameter in milliseconds. The default is set to 21600000 (6 hours).tenant.featureFlags.sensitiveActionsReauth
feature flag (set it to true
).Information in this section is intended for our customers who use OEM version of the elastic.io platform.
Developing integrations requires a certain level of access to business systems. In cases where the integrators are not responsible for these systems it is critical that only secure access is allowed and that system admins can control credentials used To solve the dilemma we introduce White-labeled credential management feature.
As an integrator you provide a unique URL to the credential holder to enter their access credentials without registering or logging-in to the system. The access holder is presented an interface to enter their credentials, verify them and save.
In addition they can modify the existing credentials as well.
For both cases they are presented with a simple screen to work with only the specified credentials.
There are certain preconditions before you can enable this feature:
autoCreateUsers
set to false
.Once the above conditions are met you can take the following steps to generate the URL to request credentials from their owner:
The initial URL has a form /embedded-credentials/repoId
where the repoId
would be the ID of component for which you need to set the credential. Then you
would need to add the following query parameters to this URL:
workspaceId
(required) - this is the ID of the workspace where integration is set.ssoProviderType
(optional) - values can be SAMLProvider
or OIDCProvider
.ssoProviderId
(optional) - this is the ID of your SSO provider.Let us construct the URL:
TENANT_URL/embedded-credentials/[repoId]?workspaceId=[workspaceId]&ssoProviderType=[ssoProviderType]&ssoProviderId=[ssoProviderId]
If you do not specify ssoProviderType
and ssoProviderId
then they will be
automatically taken from the tenant.loginRedirectSsoProvider
property but only if this is defined.
To set the email verification process
in your tenant the following must be done using an API call to update your tenant records using tenantAdmin
privileges:
attributes.hide_register
parameter to false
.signin_v_2
type - add the attributes.signin_v_2
attribute containing the URL of the provider logo using the attributes.signin_v_2.logo_url
tenant parameter.email_verification
feature flag (NEW) - set attributes.feature_flags.email_verification
to true
.Cannot add property token, object is not extensible
appears in the platform user interface when trying to evaluate JSONata expressions with "$count()"
.1.3.0
Receive Instant Payment Notification
triggerReceive Payment Data Transfer
triggerWebhook
triggerCreate Object
actionUpdate Object
actionMake a Payment
action1.0.5
component-commons-library
to read and upload attachments through the Maester
2.6.27
1.6.0
HMAC
signature for the Webhook subscription
trigger1.0.6
2.5.4
1.4.1
Place Order
actionCircle.ci
configuration.3.1.4
Emit Batch
behavior for the Read CSV attachment
actionAs a part of our on-going improvements of integration components, we
2.6.27
Circle.ci
configuration.Here is the list of components for 22.20 release.
2.2.4
1.4.3
1.0.1
1.3.2
1.1.3
2.0.2
1.3.9
2.2.2
and 2.2.3
1.1.6
2.0.3
1.4.1
1.6.6
1.1.2
1.0.8
1.5.9
2.2.1
1.1.6
a.k.a Lookup Table Component1.1.5
1.3.5
1.0.1