Skip to content

Release 9.0.21.1

This is the Rolling Release Notes for the Release 9.0.21.1. These release notes are applicable only to Privacera's Self Managed version.

Breaking Changes

Privacera Portal: Access Log Location Updated in Portal

The access log location for the Portal service has been updated to improve log organization and simplify management.

  • Previous Path:: /opt/privacera/portal/tomcat/logs

  • New Path:: /opt/privacera/portal/logs/access-logs/

The new structure centralizes logs under a consistent directory structure for better accessibility and maintenance.

Known Issue: OAuth SSO Login May Fail for Portal Users

Some users may experience issues when attempting to log in via OAuth SSO. This is a known issue, and our team is actively working on a fix.

In the meantime, affected users can use alternative login methods, such as Username/Password or SSO via SAML or LDAP.

We appreciate your patience and will provide updates as soon as the issue is resolved.

Apache Ranger

New API Endpoint for Entitlement Policies

New API Endpoint for Entitlement Policies

A new API has been introduced for retrieving Ranger entitlement policies. This API enables fetching Ranger policies applicable to a specified principal (user, group, or role). This API is currently accessible via Python and curl REST clients.

Limitation

Integration with the Ranger Intg Java Client is not yet supported.

Privacera Portal

New Credit Card Validator Utility

New Credit Card Validator Utility

Privacera Portal now includes a Credit Card Validator tool. This utility validates credit card numbers using the Luhn Algorithm and default BIN/IIN ranges. It is designed with security and privacy in mind, ensuring that no credit card data is stored and that all validations are performed securely using industry-standard algorithms.

Privacera Monitoring

Improved Post Install Job Failure Handling

Improved Post Install Job Failure Handling

During the post install job execution, if the system encounters an issue accessing the Git repository, it automatically fall back to the local repository. This ensures that dashboards and alerts are successfully uploaded to your Grafana instance, even in the event of remote repository access issues.

Privacera Diagnostics

Support for Privacera-Managed Secrets in Portal and Discovery

Support for Privacera-Managed Secrets in Portal and Discovery

Resolved an issue in the Portal and Discovery components to support seamless integration with Privacera-managed secrets.

Spark Plugin

JWT Token Retrieval in EMR Serverless Bootstrap Now Successful

JWT Token Retrieval in EMR Serverless Bootstrap Now Successful

EMR Serverless jobs can now successfully retrieve the JWT token when using the bootstrap command.

Fixed CTAS Query Issue with Specific RLF Policy Condition on DBR 15.4 LTS

Fixed CTAS Query Issue with Specific RLF Policy Condition on DBR 15.4 LTS

On Databricks Runtime 15.4 LTS, a fix has been implemented to resolve failures in CTAS queries. These failures occurred when a Row Level Filtering (RLF) policy with a expression containing a SELECT query on a table was applied. Previously, this scenario unexpectedly required access to the underlying table.

Limitation

A known issue exists for SELECT queries that utilize Row Level Filtering (RLF) policy containing logical operators in query.

Comments