Skip to content

Release Notes

Release Highlights


Note From the Team

Hey everyone,

We are very excited to release Open AMT Cloud Toolkit version 2.4. For this release, the team primarily focused on adding features requested by customers and making improvements to automation tests. You can find more details under what's new section which outlines key features added to this release. Also, If you haven't had a chance yet, I encourage you to watch the release video where Mike provides some highlights from this release.

Best wishes,
The Open AMT Cloud Toolkit Team

What's New?

Customer Request: Support for configuring Wi-Fi only platforms

With this release, customers can now provision and manage vPro AMT platforms which only have a vPro AMT supported Wi-Fi adapter. These platforms can only be activated in CCM. For ACM activation, manual touch through MEBx is required.

Customer Request: Short lived JWT for redirection sessions

MPS can now issue a short-lived JWT (default 5 min) that can be used to authenticate Redirection sessions between the console and MPS so that Redirection sessions can only be initiated by an authenticated and authorized user. This short-lived token can be configured using "redirection_expiration_time" property in .mpsrc file within MPS or overridden with ENV. You can find more details about the API under User Authentication section of MPS APIs.

Feature: HTTP Entity Conflict Support in RPS

We now check for entity conflicts in RPS, running a pre-check to determine if profile data is fresh before updating it. This helps avoids collisions between fresh and stale profile data, which may occur if the profile has been changed prior to sending updates. Entity conflict support adds a new version property to the APIs and will be required to be sent in the payload for updates or the value must be present in the if-match header.

Customer Request: Configuration setting to disable/enable MPS auth

Customers using their own authentication server needed a way to disable default MPS JWT User Authentication. The configuration setting web_auth_enabled in MPS allows users to enable/disable default MPS JWT User Authentication. This configuration is enabled by default. We recommend a value of false only when using a different authentication server. This setting will not affect the new API Endpoint for Short Lived JWTs that is required for Redirection sessions.

Improvement: Set minimum TLS version for CIRA connections

Some versions of TLS encryption algorithms supported by AMT are weaker than others. This configuration option lets users enforce a minimum TLS version to restrict CIRA connections, the connection between MPS and AMT, from older versions of AMT. In .mpsrc within mps_tls_config, the default value of minVersion property is set to TLSv1, as the older versions of AMT, version 10 and older, use TLSv1. Changing this value to newer versions of TLS will effectively prevent older versions of AMT from connecting.

Improvement: Removed auto-load toggle and always auto-load certificate

We removed the auto-load toggle from the CIRA Config page on our Sample Web UI as it is typically used with the full Open AMT Cloud Toolkit. By default, the CIRA certificate will always auto-load so that the UI is more simplified. If you wish to manually provide the CIRA certificate, you may do so using the RPS API directly.

Coming Soon: Set AMT Features with AMT Profile

In our next release, we will support the ability to set AMT Features as part of the AMT Profile during activation. This includes settings such as IDE Redirection and User Consent Mode for KVM. This feature eliminates the need for setting these features post-activation. While we wanted to complete this feature for this release, we weren't quite able to get everything in. However, the database changes to support this feature are included with this release. If you are migrating from v2.3.0 version of the toolkit, you'll need to add the following columns to the profiles table in the RPS Database:

tls_mode integer NULL,
user_consent varchar(7) NULL,
ider_enabled BOOLEAN NULL,
kvm_enabled BOOLEAN NULL,
sol_enabled BOOLEAN NULL,

This will prepare the database for the feature to come.

Get the Details

Additions, Modifications, and Removals

Open AMT Cloud Toolkit

  • healthchecks: health check probes draft (#dea1ff3)
  • db: update db scripts for rps (#6f90244)

RPS

  • network: support WiFi only activation and provisioning (#655)
  • concurrency: adds 409/412 response codes for resource conflicts (#13a1522)
  • profile: added user consent, kvm, sol and ider to AMT profile (#651) (#3306ae3)
  • cira: added an error message when failed to remove certs (#664) (#645d28a)
  • see change log for full list of changes

MPS

  • api: to get short lived bearer token for direction sessions (#612) (#32c5652)
  • auth: Added a User Auth configuration setting to disable/enable MPS auth (#897e9f2)
  • Security: variable to set minimum TLS version (#611) (#4657e06)
  • see change log for full list of changes

Sample Web UI

  • auth: redirection expiration time is set to 5 minutes (#c11bf29)
  • devices: differentiation between out-of-band and in-band power actions (#06e5d43)
  • etag: handle version conflicts in UI with popup dialog (#b70c20e)
  • login: MPS web_auth_enabled set to false, sample web ui cannot be (#656) (#6e04c77)
  • profiles: remove none connection option (#6292482)
  • cira: remove auto-load slider, always auto-load certificate (#38b8b81)
  • profiles: remove excess mebx random password warning (#db35499)
  • profile-detail: update logic to be more readable (#b5722ab)
  • all password fields toggle hidden (#658) (#4372357)
  • put power menu options back on device-toolbar (#e6ba52d)
  • see change log for full list of changes

Resolved Issues

RPS

MPS

Open Issues and Requests

Open AMT Cloud Toolkit

RPS

MPS

RPC

Sample Web UI

UI Toolkit

Back to top