Release Notes
Release Highlights¶
Note From the Team¶
Hey everyone,
We are very excited to release Open AMT Cloud Toolkit version 2.4. For this release, the team primarily focused on adding features requested by customers and making improvements to automation tests. You can find more details under what's new section which outlines key features added to this release. Also, If you haven't had a chance yet, I encourage you to watch the release video where Mike provides some highlights from this release.
Best wishes,
The Open AMT Cloud Toolkit Team
What's New?¶
Customer Request: Support for configuring Wi-Fi only platforms
With this release, customers can now provision and manage vPro AMT platforms which only have a vPro AMT supported Wi-Fi adapter. These platforms can only be activated in CCM. For ACM activation, manual touch through MEBx is required.
Customer Request: Short lived JWT for redirection sessions
MPS can now issue a short-lived JWT (default 5 min) that can be used to authenticate Redirection sessions between the console and MPS so that Redirection sessions can only be initiated by an authenticated and authorized user. This short-lived token can be configured using "redirection_expiration_time" property in .mpsrc
file within MPS or overridden with ENV. You can find more details about the API under User Authentication section of MPS APIs.
Feature: HTTP Entity Conflict Support in RPS
We now check for entity conflicts in RPS, running a pre-check to determine if profile data is fresh before updating it. This helps avoids collisions between fresh and stale profile data, which may occur if the profile has been changed prior to sending updates. Entity conflict support adds a new version
property to the APIs and will be required to be sent in the payload for updates or the value must be present in the if-match
header.
Customer Request: Configuration setting to disable/enable MPS auth
Customers using their own authentication server needed a way to disable default MPS JWT User Authentication. The configuration setting web_auth_enabled
in MPS allows users to enable/disable default MPS JWT User Authentication. This configuration is enabled by default. We recommend a value of false only when using a different authentication server. This setting will not affect the new API Endpoint for Short Lived JWTs that is required for Redirection sessions.
Improvement: Set minimum TLS version for CIRA connections
Some versions of TLS encryption algorithms supported by AMT are weaker than others. This configuration option lets users enforce a minimum TLS version to restrict CIRA connections, the connection between MPS and AMT, from older versions of AMT. In .mpsrc
within mps_tls_config
, the default value of minVersion
property is set to TLSv1, as the older versions of AMT, version 10 and older, use TLSv1. Changing this value to newer versions of TLS will effectively prevent older versions of AMT from connecting.
Improvement: Removed auto-load toggle and always auto-load certificate
We removed the auto-load toggle from the CIRA Config page on our Sample Web UI as it is typically used with the full Open AMT Cloud Toolkit. By default, the CIRA certificate will always auto-load so that the UI is more simplified. If you wish to manually provide the CIRA certificate, you may do so using the RPS API directly.
Coming Soon: Set AMT Features with AMT Profile
In our next release, we will support the ability to set AMT Features as part of the AMT Profile during activation. This includes settings such as IDE Redirection and User Consent Mode for KVM. This feature eliminates the need for setting these features post-activation. While we wanted to complete this feature for this release, we weren't quite able to get everything in. However, the database changes to support this feature are included with this release. If you are migrating from v2.3.0 version of the toolkit, you'll need to add the following columns to the profiles
table in the RPS Database:
tls_mode integer NULL,
user_consent varchar(7) NULL,
ider_enabled BOOLEAN NULL,
kvm_enabled BOOLEAN NULL,
sol_enabled BOOLEAN NULL,
This will prepare the database for the feature to come.
Get the Details¶
Additions, Modifications, and Removals¶
Open AMT Cloud Toolkit¶
- healthchecks: health check probes draft (#dea1ff3)
- db: update db scripts for rps (#6f90244)
RPS¶
- network: support WiFi only activation and provisioning (#655)
- concurrency: adds 409/412 response codes for resource conflicts (#13a1522)
- profile: added user consent, kvm, sol and ider to AMT profile (#651) (#3306ae3)
- cira: added an error message when failed to remove certs (#664) (#645d28a)
- see change log for full list of changes
MPS¶
- api: to get short lived bearer token for direction sessions (#612) (#32c5652)
- auth: Added a User Auth configuration setting to disable/enable MPS auth (#897e9f2)
- Security: variable to set minimum TLS version (#611) (#4657e06)
- see change log for full list of changes
Sample Web UI¶
- auth: redirection expiration time is set to 5 minutes (#c11bf29)
- devices: differentiation between out-of-band and in-band power actions (#06e5d43)
- etag: handle version conflicts in UI with popup dialog (#b70c20e)
- login: MPS web_auth_enabled set to false, sample web ui cannot be (#656) (#6e04c77)
- profiles: remove none connection option (#6292482)
- cira: remove auto-load slider, always auto-load certificate (#38b8b81)
- profiles: remove excess mebx random password warning (#db35499)
- profile-detail: update logic to be more readable (#b5722ab)
- all password fields toggle hidden (#658) (#4372357)
- put power menu options back on device-toolbar (#e6ba52d)
- see change log for full list of changes
Resolved Issues¶
RPS¶
- Connecting to Lanless Device with CIRA and WLAN Profiles fails: Enhancement
- RPS not able to remove wifi profile from already configured device: Bug
MPS¶
- Short Lived Bearer Token for KVM Session Support: Enhancement
- Feature Request: Create configuration parameter to disable "Auth" Service from MPS: Enhancement
Open Issues and Requests¶
Open AMT Cloud Toolkit¶
- Kustomize Install: Enhancement
- Support for MongoDB in addition to PostgreSQL: Enhancement
- Are there plans to support OCR??: Enhancement
- v2.3.0 docker-compose.yml is using the latest tag for the docker images: Tech-Debt
RPS¶
- RPS should support wildcard domain suffix: Enhancement
- Data shouldn't be added if vault calls fail: Bug
- Use database abstraction/ORM layer to support multiple SQL-based database: Enhancement
- Support Intel AMT Alarm Clock feature: Enhancement
- Poor error msg related WiFi profile issues: Enhancement
- Any plans for a MutualTLS implementation?: Enhancement
- Reconfiguring an AMT device (without unprovisioning) fails for TLS Profiles: Bug
MPS¶
- AMT does not connect to MPS after configuration: Known Issue
- Use database abstraction/ORM layer to support multiple SQL-based database: Enhancement
- MPS should wait for vault to be unsealed - CIRA connections fail: Enhancement
RPC¶
- activation failures would benefit from passing the RPS error code to the client: Enhancement
- Gosh it would be excellent if rpc could tell the user that they don't have an AMT compatible network device: Enhancement
- Occasionally Receive APF_CHANNEL_OPEN_FAILURE: Bug
- Library build of rpc-go should use return codes: Enhancement