Hello everyone! Here are the release notes for our most recent updates to Duo.
Public release notes are published on the Customer Community every other Friday, the day after the D-release is completely rolled out. You can subscribe to notifications for new release notes by following the process described here. If you have any questions about these changes, please comment below.
Check out the Guide to Duo End-of-Life and End-of-Support Plans. This guide provides an up-to-date list of current and past end-of-life plans for Duo products.
New features, enhancements, and other improvements
- Duo administrators may respond to Trust Monitor Security Events by locking out the end user via the Security Events dashboard in the Duo Admin Panel.
- End users may contact their help desk to regain access.
- Unenrolled user lockout lets Duo administrators specify the number of days that an unenrolled user can remain in an active state before being locked out.
- Locked out users must contact their organization's help desk to be unlocked. Once unlocked, the end user will have 3 days to enroll in a Duo-protected application or the Duo Self-Service Portal before being locked out again.
- Enabled in the Duo Admin Panel under Settings > Lockout & Fraud
- Application status > Using Traditional Prompt now provides a button to Activate Universal Prompt for N apps that are in Ready to Activate status.
Improved default passkey nicknames
Updated platform authenticator re-enrollment flow available in MFA and Passwordless
- When an end user with a platform authenticator cancels an authentication attempt from a new authentication device, the Duo Universal Prompt will give them an option to add their platform authenticator.
- This feature requires Duo Self-Service Portal enabled for the protected application.
Updated Duo Universal Prompt messaging to indicate when a platform authenticator was unsuccessful
- When an end user does not successfully complete Passwordless or MFA platform authentication, the Universal Prompt indicates which authentication method didn’t work and lets them choose another authentication method.
Improved access to the WebAuthn credential details page in the Duo Admin Panel
Duo Admin Panel banner reminder to review firewall rules
New and updated applications
- General availability of Custom Application Relay support for all TCP ports and protocols.
- General availability of Duo Network Gateway API for DNG administration.
- Upgraded bundled OpenSSL to 3.0.12.
- Upgraded bundled Redis version to 6.2.14.
- Updated libxml2 to 2.12.3.
- Increase validation for CA certificate renewal process.
- Minor improvements and enhancements.
- Minor improvements and enhancements.
- Replaced "Duo Device Health" with "Duo Desktop" in the Bluetooth permissions dialog.
Bug fixes