Showing results for 
Search instead for 
Do you mean 

M.App Enterprise 2019 Update 4 (16.6.364.4) is now available

by Community Manager ‎06-25-2020 05:15 AM - edited ‎06-29-2020 06:53 AM (1,187 Views)

The M.App Enterprise 2019 Update Update 4 (16.6.364.4) is now available.


The full install is available for download at the Hexagon Geospatial downloads website.


Instructions to install this release:




  • Microsoft .NET 4.6.1 or higher
  • IIS 8 or higher
  • Supported databases
    • PostgreSQL 9.4 and later
    • Microsoft SQL Server 2012 and later
    • Oracle 12c and later
      • Requires Oracle 12c ODAC or higher (64-bit) on client


Highlights included:


  • Improve performance of tile preloading for offline use
  • Update to latest HERE maps authentication methods
  • Update to latest LuciadFusion 2019 version (2019.1.08)
  • Update to latest LuciadRIA 2019 version (2019.1.10)
  • Update to Java 14
  • Several bug fixes

Please see the attached Release_Guide_MAE_16_6_4.pdf

‎06-25-2020 07:19 AM - edited ‎06-29-2020 02:48 AM

That's great news!

For which application type (desktop, web or mobile) does the highlight 'Improve performance of tile preloading for offline use' refer to? is there more details about this?

on ‎07-03-2020 01:52 AM

Thanks for the update! I noticed that the update installation procedure (from 2019 U3) won't finish if I choose the existing SSL certificate (signed by our internal CA). However, when I did "Create" a new self-signed certificate during installation for this machine the update finished correctly. Afterwards I could switch back to the previous certificate in IIS Manager.

I think the behaviour was different before. Was there anything changed in certificate handling/validation?

on ‎07-03-2020 01:55 AM

Hi @ArSeils,


just for your info: We had no problem with our SSL certificate (signed by external CA).

Maybe you should also have a closer look at your certifcate.




on ‎07-03-2020 02:56 AM

@s.rutka thanks for mentioning. Yes, I just did another update on a server with an external CA signed certificate and this worked perfect. I could not detect any problems with our internal certificate so far.