diff --git a/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java b/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java
index 66ea21f7905..6feab80a297 100644
--- a/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java
+++ b/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java
@@ -114,7 +114,7 @@ public void createUserDefinedLocalAuthenticatorInvalidName() throws JsonProcessi
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60004"))
+                .body("code", equalTo("AUT-60014"))
                 .body("message", equalTo("Authenticator name is invalid."))
                 .body("description", equalTo("The provided authenticator name invalid@name is not in the " +
                         "expected format ^[a-zA-Z0-9][a-zA-Z0-9-_]*$."));
@@ -130,7 +130,7 @@ public void createUserDefinedLocalAuthenticatorMissingEndpointProperty() throws
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60003"))
+                .body("code", equalTo("AUT-60011"))
                 .body("message", equalTo("Invalid endpoint configuration provided."))
                 .body("description", equalTo("The property username must be provided as an authentication " +
                         "property for the BASIC authentication type."));
@@ -146,7 +146,7 @@ public void createUserDefinedLocalAuthenticatorEmptyDisplayName() throws JsonPro
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60004"))
+                .body("code", equalTo("AUT-60015"))
                 .body("message", equalTo("Invalid empty or blank value."))
                 .body("description", equalTo("Value for displayName should not be empty or blank."));
     }
@@ -176,7 +176,7 @@ public void createUserDefinedLocalAuthenticatorEmptyEndpointProperty() throws Js
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60003"))
+                .body("code", equalTo("AUT-60011"))
                 .body("message", equalTo("Invalid endpoint configuration provided."))
                 .body("description", equalTo("The Property username cannot be blank."));
     }
@@ -240,7 +240,7 @@ public void createUserDefinedLocalAuthenticatorWithExistingAuthenticatorName() t
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60003"))
+                .body("code", equalTo("AUT-60013"))
                 .body("message", equalTo("The authenticator already exists."))
                 .body("description", equalTo("The authenticator already exists for the given name:" +
                         " customAuthenticator."));
@@ -257,7 +257,7 @@ public void updateUserDefinedLocalAuthenticatorMissingEndpointProperty() throws
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60003"))
+                .body("code", equalTo("AUT-60011"))
                 .body("message", equalTo("Invalid endpoint configuration provided."))
                 .body("description", equalTo("The property username must be provided as an authentication " +
                         "property for the BASIC authentication type."));
@@ -274,7 +274,7 @@ public void updateUserDefinedLocalAuthenticatorEmptyDisplayName() throws JsonPro
                 .log().ifValidationFails()
                 .assertThat()
                 .statusCode(HttpStatus.SC_BAD_REQUEST)
-                .body("code", equalTo("AUT-60004"))
+                .body("code", equalTo("AUT-60015"))
                 .body("message", equalTo("Invalid empty or blank value."))
                 .body("description", equalTo("Value for displayName should not be empty or blank."));
     }
diff --git a/pom.xml b/pom.xml
index febd4217d12..30349e85003 100755
--- a/pom.xml
+++ b/pom.xml
@@ -2356,7 +2356,7 @@
     <properties>
 
         <!--Carbon Identity Framework Version-->
-        <carbon.identity.framework.version>7.7.60</carbon.identity.framework.version>
+        <carbon.identity.framework.version>7.7.66</carbon.identity.framework.version>
         <carbon.identity.framework.version.range>[5.14.67, 8.0.0)</carbon.identity.framework.version.range>
 
         <!--SAML Common Utils Version-->
@@ -2468,7 +2468,7 @@
 
         <!-- Identity REST API feature -->
         <identity.api.dispatcher.version>2.0.17</identity.api.dispatcher.version>
-        <identity.server.api.version>1.3.15</identity.server.api.version>
+        <identity.server.api.version>1.3.16</identity.server.api.version>
         <identity.user.api.version>1.3.47</identity.user.api.version>
 
         <identity.agent.sso.version>5.5.9</identity.agent.sso.version>