Backend API 17.6.7
Released on February 28, 2026
New Features
FIPS‑only crypto stack and endpoints for IL5 environment
Upgraded backend signing to modern FIPS‑aligned algorithms
End‑to‑end IL5 region awareness in core data services
QRC / ML‑KEM support for SAML SSO
FIPS‑compatible audit and reporting stack
IL5‑ready support tooling in staging and GovCloud
Hardened enterprise region transfer and BreachWatch continuity
New ARAM events for accurate PAM consumption tracking
Improvements
KA-7104: Ensured support tool endpoints respond with the correct status and message format in staging, restoring expected behavior for support workflows.
KA-7423: Added BI consumption tracking for PAM by logging ARAM events when active PAM seat counts change for MSP and MC enterprises. Invited users are excluded from billed PAM seat counts while still enforcing license limits based on the full assigned user count.
KA-7880: Verified that KeeperApp uses only FIPS-compliant cryptographic libraries and removed dependencies on non-FIPS Bouncy Castle components.
KA-7881: Ensured all encryption models and cryptographic operations in KeeperApp use only FIPS-approved cryptographic calls to maintain full FIPS compliance.
KA-7882: Ensured KeeperApp uses FIPS-compliant endpoints for all external API calls, including Keeper services and supported third-party integrations.
KA-7938: Updated backend signing to use SHA-256 for Okta-related API calls in alignment with FIPS-compliant security practices.
KA-7996: Added support for the latest QRC-based encryption to SAML flows so clients using ML-KEM keys can successfully initiate and complete SSO logins and logouts.
KA-8005: Updated the internal test tool to use the correct keys for BI, support, and router so that calls are validated against the appropriate transmission keys.
Bug Fixes
KA-7959: Resolved setup failures and enhanced validation for Azure Monitor SIEM integration so administrators can complete configuration without manual intervention.
KA-7974: Added clearer error reporting when required encryption keys are absent, making it easier to diagnose and correct misconfiguration issues.
KA-7993: Clarified that only admins with license management privileges can initiate Free Trials for add-ons, aligning trial access with existing role-based permissions.
KA-8022: Restored compatibility between DUO two-factor authentication and new FIPS compliance requirements so enterprises can successfully configure and use DUO 2FA without errors.
KA-8035: Clarified expected behavior of device verification emails so that messages are only sent when a new device requires approval and not for already approved devices.
KA-8049: Ensured MSP admins can successfully create teams in managed companies that require elliptic‑curve keys, preventing key type conflicts during team creation.
KA-8063: Fixed an issue that caused errors when editing records after an Enterprise Registration Transfer when BreachWatch is disabled on the destination account
KA-8103: Fixed gaps in PAM ARAM event generation so events are correctly created when PAM add-ons are paused and unpaused in MSP/MC. Added validation to ensure BI consumption ARAM events are only generated when the associated PAM add-on exists.
Last updated
Was this helpful?

