Tricentis Tosca Server Version 2023.1 Patch 1-8
This topic is all about patches for the 2023.1 version of Tosca Server.
Keep in mind that patches are cumulative: the latest patch always contains the latest fixes and those of previous patches. This means you only need to install the latest patch to get all fixes for this version.
![]() |
To ensure full functionality, you must also install Tosca 2023.1.3 or newer. |
Installation
Due to service dependencies, patches are a full installation of Tosca Server. This means that to install a patch, you need to perform an upgrade to the patch version:
-
Download Tosca Server 2023.1.8 (opens in new tab) from the Tricentis Support Hub. Please note that you have to be signed in with your Tricentis Support Hub credentials to see the download.
-
Perform the upgrade to the patch version:
-
Uninstall your current version of Tosca Server.
-
Unzip the new version. Then run the executable and follow the upgrade process. This includes additional manual configurations after the upgrade, for example reinstating your settings.
New features
This section lists new features that we've added.
REST API: triggering test runs (since patch 8)
Triggering test runs via REST API (opens in new tab) is now disabled by default.
To enable triggering test runs via REST API, follow these steps:
-
Open the REST API appsettings.json file. After a default installation, this file is at C:\Program Files (x86)\TRICENTIS\Tosca Server\RestApiService.
-
Set the setting DisableExecutionTasks to false.
-
Save and close the file, and then restart the service.
Resolved issues
This section lists all issues we've resolved.
Fixed in |
Component |
Issue |
Description |
---|---|---|---|
2023.1.8 |
Interactive Testing, Exploratory Testing |
TOSCA-11390 |
Tricentis is no longer signing 3rd party DLLs. |
2023.1.8 |
Gateway |
TOSCA-5488 |
For any request to Tosca Server that requires a token, Gateway contacts Authentication Service. With this fix, Gateway waits less time to attempt another call after an unsuccessful call. |
2023.1.8 |
REST API |
TOSCA-12121 |
Removes a potential security vulnerability related to the REST API. |
2023.1.8 |
Test Data Service |
TOSCA-4759 |
Improves responsiveness in case of larger data sets with multiple columns. |
2023.1.7 |
Distributed Execution |
TOS-77387 |
Users can now see imported results even if a part of the E2G via AOS execution fails. |
2023.1.6 |
Distributed Execution |
TOS-74017 |
Fixes an issue where canceling an event via the Execution API was not possible. |
2023.1.6 |
Distributed Execution |
TOSCA-1222 |
The execution API now provides additional information if execution results have already been previously imported. |
2023.1.6 |
Gateway |
TOSCA-6185 |
Fixes behavior where Gateway logged the same issue multiple times. |
2023.1.6 |
Mobile Engine 3.0 |
TOSCA-6367 |
Fixes an issue with enabling Appium plug-ins in the capability definitions that caused the execution to fail on TDC. |
2023.1.6 |
Notification Service |
TOSCA-5810 |
Fixes behavior that caused an exception during large commits, using Tricentis Notification Service with MS SQL Server and Tosca Dashboards. |
2023.1.6 |
User Administration |
TOSCA-6406 |
LDAP group search is optimized for retrieving large search results. |
2023.1.6 |
User Administration |
TOSCA-6692 |
If you use an AD connection, users can now also use their standard email address to sign in. |
2023.1.5 |
Authentication Service |
TOSCA-3001 |
Fixed behavior where - under certain circumstances - sessions persisted even after users signed out. |
2023.1.5 |
File Service |
SHSE-3956 |
Upgraded third-party libraries to protect against potential exploits. |
2023.1.5 |
Notification Service |
SHSE-3954 |
Upgraded third-party libraries to protect against potential exploits. |
2023.1.5 |
Project Service |
SHSE-3957 |
Upgraded third-party libraries to protect against potential exploits. |
2023.1.5 |
TDS |
TOS-71887 |
Upgraded third-party libraries to protect against potential exploits. |
2023.1.5 |
Test Data Service |
SHSE-3959 |
Upgraded third-party libraries to protect against potential exploits. |
2023.1.5 |
Tosca - SAP Engine 3.0 |
TBOX-19053 |
Fixed an issue with the SAP Module “Netweaver Business Client Logon” in German language. |
2023.1.5 |
Test Data Service |
TOSCA-3074 |
Resolved failing calls of Test Data Service to Tricentis User Administration by preventing usage of expired authentication token. |
2023.1.4 |
Project Service |
SHSE-3486 |
Additional improvements to handling of heavy load on Project Service, which reduces 500 errors or issues with users working in parallel. |
2023.1.3 |
Distributed Execution |
TOS-74637 |
Introduces an environment variable that allows affected customers to work around a DEX Server installation rollback issue. For detailed information on what to do, please check out this Knowledge Base Article. |
2023.1.2 |
Distributed Execution |
TOS-73889 |
Distribution execution files are correctly signed and versioned, allowing installation to proceed under strict policies. |
2023.1.1 |
Distributed Execution |
TOS-72518 |
Agent configuration dialog explains implications of using real user credentials for RDP. |
2023.1.1 |
Project Service |
SHSE-3486 |
Improved handling of heavy load on Project Service, which resolves a 500 error that occasionally occurred with users working in parallel. |