Changes for page 261 - Taking Charge
Last modified by Erik Bakker on 2026/02/12 09:08
From version 282.1
edited by Erik Bakker
on 2025/09/21 21:33
on 2025/09/21 21:33
Change comment:
There is no comment for this version
To version 311.1
edited by Erik Bakker
on 2026/02/10 10:28
on 2026/02/10 10:28
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -2 53-RinceRepeat1 +261 - Taking Charge - Content
-
... ... @@ -1,22 +1,43 @@ 1 -This release featuresvariousupdates to our platform,withauser-centricfocus,aswe workon wrapping upimprovedfunctionalityforour new eventstreamingbroker. Allthoseimprovementswillbe sharedinthefutureonce everythingis ready.1 +This release includes many updates to our platform. We are releasing some beta features for customers using our latest version of the API Gateway, allowing them to use multiple authentication methods. On top of that, we will release new **[[environment templates>>Main.Release Information.Cloud Templates.WebHome||target="blank"]]** that update a multitude of configurations on cloud and on-premises machines. Furthermore, we have a series of smaller improvements to enhance your everyday work. 2 2 3 -Please find out more on our [[Release blog>>doc:Main.Release Information.Release Blogs.2 53-RinceRepeat.WebHome||target="blank"]].3 +Please find out more on our [[Release blog>>doc:Main.Release Information.Release Blogs.261 - Taking Charge.WebHome||target="blank"]]. 4 4 5 -==== MajorChanges ====5 +==== New Features ==== 6 6 7 -* Deploy -> Containers: The user can now easily see the containers a flow should run on in Deploy → Containers via the button in the flow grid. Furthermore, we have overhauled the user experience on this overview to align with recent improvements to other parts of Deploy. (#976) 7 +* API gateways using the latest Multiple Authentication Methods feature can now configure the [[Authorization Code OAuth2 grant type>>https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow||target="blank"]] for their gateway users. Note that the following timeouts apply: 8 +** The authorization code is valid for **5 minutes**, meaning it should be used to obtain an access token within that period. 9 +** Clients that obtain an access token with an authorization code will also obtain a //refresh token//, which can be used to obtain a subsequent access token without user intervention. This refresh token is valid for **24 hours**, meaning the client application must call the eMagiz API gateway at least that often; otherwise, manual intervention is needed to authorize the call again. 8 8 9 -==== M inor changes ====11 +==== Major changes ==== 10 10 13 +* Deploy -> Architecture (Upgrade): The authorization server has been incorporated into the environment template. The first deployment will happen in Deploy > Architecture. All infra-side updates will be covered within the environment upgrade. 14 +* Deploy -> Architecture (Upgrade): Double lane models can now upgrade to an intermediate environment template first, before upgrading to the final template in case of a service-impacting template. This allows us to verify that all containers in the backup zone are running properly before the final, service-affecting template is applied. 11 11 12 -* Manage - Alerting - Triggers: Removed the deprecated, eMagiz-defined log trigger specified under the ‘other’ tab for Log entries. This trigger would generate an alert in the event of a runtime crash due to memory issues or failure to deliver a message. 13 -** Since the release of our new log alerting, it is possible to specify this alert rule yourself under the ‘logs’ tab if you still wish to receive these alerts. To do so, create four new log triggers as shown in our [[release blog>>doc:Main.Release Information.Release Blogs.253 - Rince Repeat.WebHome||target="blank"]] 14 -* Manage - Alerting - Triggers: Introduced a new ‘Quotas’ tab, where the quota limits for metrics, log, and error messages can be viewed per environment. 16 +==== Minor changes ==== 15 15 18 +* Generic -> Authorization Server: Improved security headers of the endpoints of eMagiz-hosted authorization servers. 19 +* Design -> Security: Removed the security setting button from the API Gateway catalog. You can still access the settings from the design overview. 20 +* Deploy: All pop-ups showing important information, like a key, secret, or password, are structured so that the data is visualised and can be copied by the user when the “show data” action button is utilised. (#1735) 21 +* Deploy -> User Management: Any reference to a URL related to the authorization server is now shown, including ‘https://'. 22 +* Deploy -> Architecture: Endpoint URL for routes is available on the view/edit pop-up of specific routes on the Deploy architecture. Additionally, the construction of how it is provided as a help text, and this feature is only available for the AWS model. (#792) 23 +* Manage -> Monitoring (HTTP Statistics): The details page will now show the display name of the user that initiated a request instead of the Id. Note: For this change to be applied to your environment, you need to adhere to the following requirements: 24 +** The MAM API-Gateway migration must be completed 25 +** You must be running on the latest environment template 26 +*** Single lane: R18 27 +*** Double lane: R20 28 +*** The gateway container must be deployed with the latest eMagiz runtime (version 3.5.0 or up) 29 + 16 16 ==== Bug fixes ==== 17 17 18 -* Create - Flow Testing: Validation message is changed to make it more transparent to the user why they could not set the desired name for the flow test message. (#1702) 19 -* Create - Flow designer: You can no longer view the save button on a standard aggregator component while not in “Start Editing“ mode (#1703) 20 -* Deploy - Releases: Height of the release details pop-up is fixed to keep it consistent between all releases, including the Create Phase Release. (#1706) 21 -* API Management - Swagger (UI): NonEmptyString is now correctly represented in the swagger resource in Create, and therefore the Swagger UI that API users can check for details. (#1652) 22 -** When the user wants to use the Swagger resource with the correct information, one of the API flows in Create requires a flow version push. 32 +* Generic: System display names in all phases are updated progressively with the change in the Capture phase. All other places where the system display name was allowed to be changed are now disallowed, and changes can only be made from Capture. (#449) 33 +* Design - System Message: After successfully importing an OpenAPI file in the system request/response message, the user remains on the same page. (#1308) 34 +* Design - System (Failover): When you identify a system as a failover and subsequently create the integration on that system, you do not need to push multiple versions anymore before you can deploy your release. 35 +* Design - Architecture: We inform the user via the History overview when an overwrite action is triggered in the test environment for their model upon request. (#1697) 36 +* Create - Flow Designer: The help text of the XPath expression field on the XPath splitter is updated. (#1467) 37 +* Create - Transformation: Users can mark all XPath expressions as checked by a button in the transformation page. This button will remove only the warnings that come with the import from store feature, and will delete only those with an XPath expression. 38 +* Create - Add Integrations: When creating a new event processor with JSON as input and XML as output, this configuration is reflected in the generated flow in Create after transfer. Now the message format is automatically recognized and handled correctly, similar to API Gateway operations. 39 +* Deploy - Architecture (Start/Stop Flows): Your search phrase when searching for “component names” in this overview can now contain special characters present in the technical name of your inbound component(s). (#1639) 40 + 41 +==== Remarks ==== 42 + 43 +* Generic: When retrieving information from our infrastructure about available customer agents, we improved performance by reducing the amount of data we retrieve and process.