Support Center

June 2019

Feature Releases

Enhancements:
  • Two new SAML SSO Connectors are available for admins to connect their applications with JumpCloud:
  • Admins can now configure the behavior of user lockout and password expiration for RADIUS servers in the JumpCloud API. Two new fields have been added to the RADIUS servers API:
    • userLockoutAction - can be set to either REMOVE or MAINTAIN.
    • userPasswordExpirationAction - can be set to either REMOVE or MAINTAIN.

When the userLockoutAction field is set to MAINTAIN for a RADIUS server, if a user is locked out, the user is maintained on the RADIUS server and is still able to log in to the server.

When the userLockoutAction field is set to REMOVE for a RADIUS server, if a user is locked out, the user in removed on the RADIUS server and unable to log in to the server. This is the default behavior.

When the userPasswordExpirationAction field is set to MAINTAIN for a RADIUS server, a user with an expired password is maintained on the RADIUS server and is still able to log in to the server.

When the userPasswordExpirationAction field is set to REMOVE for a RADIUS server, a user with an expired password is removed on the RADIUS server and is unable to log in to the server. This is the default behavior.

 


Enhancements:

Enhancements:

Enhancements:
  • An organization's password complexity settings are now shown on the User Portal's Update Password modal so that users can more easily create compliant passwords. See How Do I Change My JumpCloud User Account Password?
  • Agent 0.10.68:
    • ​Support for RedHat Enterprise Linux 8.
    • Admins can now unlock users with mixed case usersnames on macOS systems.
    • MFA is now respected on CentOS 6.9.

Enhancements:
  • We've updated the Admin Portal! You'll be notified of this change the first time you log in. We've updated the color palette and gave everything a more modern look and feel. Note that no functionality has changed; everything works the same as it did before these cosmetic changes.

Enhancements:

Enhancements:
  • The FileVault 2 System Policy is now generally available. This policy lets administrators remotely enable and enforce FileVault for their JumpCloud managed Mac systems and easily view Recovery Keys for Macs that have been enabled for FileVault through this policy. See FileVault 2 System Policy.
  • Two new Windows policies are available: 
    • Windows Defender Policy - controls the behavior of Windows Defender in Windows.
    • Windows Device Installation Policy - controls the behavior of Device Installation in Windows.

Enhancements:
 
  • The JAMF SAML SSO Connector now supports the Groups Attribute to include user groups in SAML assertions. See Single Sign On (SSO) with JAMF Cloud.
  • There is a new Password Aging option that lets admins require that users change their passwords after logging in to the User Portal in the days leading to their password expiration date. See Security Settings. When this option is enabled, users can't dismiss the password change modal they see in the User Portal in the days leading to their password expiration date. 
    ImportantUsers on JumpCloud managed Mac systems are strongly encouraged to update their passwords in the JumpCloud Mac app to keep their JumpCloud password in sync with Keychain and FileVault. This new option encourages users to change their password in the User Portal, which would require a system restart to sync passwords on Mac systems. Use care when selecting this option and educate your Mac users of the preferred password reset methods. 
  • Provider admins can now be added to the Multi-Tenant Portal on the Administrators tab. See Using the JumpCloud Multi-Tenant Portal.

 

Last Updated: Jun 25, 2019 04:55PM MDT

Related Articles
desk-forwarding@jumpcloud.com
http://assets3.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete