The following release notes summarize the most recent changes performed on the product.
Platform/AdminX
AdminX
New Features
- Community Admin & help desk admins now have the ability to lock the user indefinitely or for a defined period. Locked users are unable to authenticate into AdminX or web apps using Passwords or Passwordless means.
Community Admin & help desk admins can also unlock a locked user. The affected user will be unlocked immediately.
- Manage RADIUS Server Configurations to define allowed authentication mechanisms
Login with Push
Login with Password & OTP
Login with OTP & Password
Login with OTP
We support the download of Windows, Linux, and Darwin brokers with appropriate license keys and tenant information.
Enhancements
- UX enhancements to update the onboarding of authenticators from the user’s profile
Fixes
- Ability to request user invites to a secondary email
- Get user authorizations from the token instead of making additional API calls after receiving the token.
Platform
New Features
Introduction of Account OTP.
Updated seed logic for community
Updated OTP seed logic for user
Added a new field in the admin console’s `One Time Passcode` screen to display the community seed to the administrator
Added functionality of SCEP generation on-demand to be used by the mobile application
Enhancements
Updated user management /authenticate API on how it handles authModule - which is now made optional. The caller can also pass multiple auth modules as an array in authModules.
Refactored authN calls to use the newauthModules parameter.
Reorganized user locking and unlocking behavior.
Updated names of FIDO keys supported by default.
Added functionality to check the number of FIDO registrations for a user in /link/community/{communityId}/user/{userId}/status API.
Fixes
Fixed an issue where users were able to create an SMS gateway without "senderPhone".
Fixed an issue where journeyId was getting generated for the E_OTP_VERIFIED event when triggered via Postman.
Updated swagger doc for proof_of_authentication to contain authorization information.
Corrected validation of the `type` parameter in the events m/s.
Systems
Windows Credential Provider
Version: cp_wn_1.08.07
Removed the prerequisite of online login for authentication through FIDO keys to work.
Added configuration to enable/disable PIN prompt on the lock screen for logins through FIDO keys.
Updated the behavior of UV and UP flags on the credential provider based on the configuration received from the API.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article