- 06 Sep 2024
- 25 Minutes to read
- Print
- DarkLight
- PDF
Release Notes Archive
- Updated on 06 Sep 2024
- 25 Minutes to read
- Print
- DarkLight
- PDF
Release Notes v24.05
2. Changes in this Release
2.1. New Features
System Email Customization: You can now modify the system emails sent to your users. Modifications include branding to add your logo and color scheme and editable signature and footer text areas.
2.2. Enhancements
Site and Portfolio Admin Management Improvements: We’ve made changes to the user onboarding process to improve clarity when creating Admin and Access Users.
Group Name Edit: You can now edit the names of existing groups.
Support for Identical TAN subnets on the iNode: Secure Edge v24.05 introduced the ability to add TAN networks with the same subnet to an iNode. We have enhanced the device onboarding process to support this enhanced iNode functionality. Now, when adding a device to an iNode with identical TAN networks, you can select the specific TAN network to associate with the device.
Web Interface (HTTP(s)) Connections Timeout: We’ve made enhancements to prevent unexpected timeouts when connecting to HTTP(s) type connections.
Other Systems Enhancements: We’ve made backend changes to increase the reliability and performance of RDP, VNC, and SSH connections.
2.3. Bug Fixes
Nil
3. Issues
3.1. Limitations
A new user may need to wait up to 5-minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0. SSO with encryption enabled SAML IDP is not yet available.
When a user performs password change, the notification response takes about 10 sec.
SSH to Ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
Maximum of 77 devices can be configured to be accessible via View End User Remote Access Agent.
TCP/UDP connections are not immediately accessible via View End User Remote Access Agent. Please allow 5-minutes after creation to allow onboarding of the device to complete on the backend.
When creating TCP/UDP connections, ensure that the assigned group has at least one user assigned prior to assigning the connection.
Editing of hostname is not allowed for TCP/UDP connections.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://.remoteaccess.view.com/userprofilepage. Changing the url to https://.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (up to 10 min) to reflect across systems. Please wait 15 minutes when re-adding a user with the same email ID as the deleted user. If verification email is not received after re-adding the user, please contact Customer Support for resolution.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again. Please wait 15-minutes when attempting to log-in.
In rare occurrences, user logout action gets redirected to the user profile page and the user is not logged out. The user should perform the logout action again.
Single Logout (SLO) will not log out the session at the external identify provider. The user needs to also log out from their identity provider.
User needs to perform logout/login after changing the password via View End User Remote Access Agent.
TCP/UDP device access via the View End User Remote Access Agent is not supported after HA switchover/iNode replacement. Please contact Customer Support to reinstate View End User Remote Access Agent capabilities.
For non-Admin Users, when viewing Active Sessions on the User Profile page, the list will always appear empty. Admin Users will see Active Sessions from the Org Profile page.
US/Pacific-New timezone selection in Scheduled Access config might not work. Please use America/Los Angeles timezone as an equivalent.
Portfolio login might be slow due to permission checks.
Portfolio admin is allowed to remove access group associations from an org admin.
Release Notes v24.04
2. Changes in this Release
2.1. New Features
Child Org Support for Site Selection: When adding new Devices, you are required to select the Site with which the Device is associated. The list of Sites was tied to the Parent Organization in Secure Edge. We’ve added the ability to show Sites contained within Child Organizations, as configured in Secure Edge.
Portfolio Management: Allow for sites to be grouped and managed as Portfolios. A Portfolio can contain one or many sites. A Site can belong to only one Portfolio. A Portfolio Admin user can administer all sites in that Portfolio. Portfolios can be created and modified by Org Admin users.
2.2. Enhancements
Improved Onboarding Performance: For RDP/SSH/VNC/Telnet Onboarding, there was an issue where changes to Group assignments would degrade the performance of the Remote Access Portal. This issue has been resolved.
Realm Details: Realm details are required when using the TCP/UDP Connection Type. Realm name is displayed in the User Profile Page and on the TCP/UDP Connection tile. The Realm value can quickly be copied from the User Profile Page or the TCP/UDP tile for user convenience.
OTA credentials are now deprecated. Users can access devices without repeatedly entering their credentials by using either "Stored Credentials" or "SSO integration".
2.3. Bug Fixes
Nil
3. Issues
3.1. Limitations
A new user may need to wait up to 5-minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0. SSO with encryption enabled SAML IDP is not yet available.
When a user performs password change, the notification response takes about 10 sec.
SSH to Ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
Maximum of 77 devices can be configured to be accessible via View End User Remote Access Agent.
TCP/UDP connections are not immediately accessible via View End User Remote Access Agent. Please allow 5-minutes after creation to allow onboarding of the device to complete on the backend.
When creating TCP/UDP connections, ensure that the assigned Group has at least one User assigned prior to assigning the Connection.
Editing of hostname is not allowed for TCP/UDP Connections.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://.remoteaccess.view.com/userprofilepage. Changing the url to https://.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (up to 10 min) to reflect across systems. Please wait 15 minutes when re-adding a user with the same email ID as the deleted user. If verification email is not received after re-adding the user, please contact Customer Support for resolution.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again. Please wait 15-minutes when attempting to log-in.
In rare occurrences, user logout action gets redirected to the user profile page and the user is not logged out. The user should perform the logout action again.
Single Logout (SLO) will not log out the session at the external identify provider. The user needs to also log out from their identity provider.
User need to perform logout/login, after changing the password via View End User Remote Access Agent.
TCP/UDP device access via the View End User Remote Access Agent is not supported after HA switchover/iNode replacement. Please contact Customer Support to reinstate View End User Remote Access Agent capabilities.
For non-Admin Users, when viewing Active Sessions on the User Profile page, the list will always appear empty. Admin Users will see Active Sessions from the Org Profile page.
US/Pacific-New timezone selection in scheduled access config may not work. Please use America/Los Angeles timezone as an equivalent.
Portfolio login might be slow due to permission checks.
Portfolio admin is allowed to remove access group associations from an org admin.
Release Notes v24.03
2. Changes in this Release
2.1. New Features
User Hierarchy
2.2. Enhancements
Table re-design in listing pages.
2.3. Bug Fixes
Nil
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
For SSO with encryption enabled SAML IDP, support is not available.
Maximum of 77 devices can be accessed via ThickClient.
Advised to create TCP/UDP connections within the subnet with a delay of 5 minutes. This is to allow onboarding of the device to complete on the backend.
Associate thick client users only when the group contains minimum 1 TCP/UDP device associated. Do not associate to empty group.
Edit of hostname is not allowed for TCP/UDP connection endpoint.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Single Logout (SLO) will not logout the session also at external identity provider.
User need to perform logout/login, after changing the password via ThickClient.
TCP/UDP device access via ThickClient is not supported after HA switchover/iNode Replacement
As a logged in user, when viewing the active sessions will always be empty.
US/Pacific-New timezone selection in scheduled access config may not work.
Site admin is allowed to delete other sites user_only/device_only/view_only users.
Release Notes v23.09
2. Changes in this Release
2.1. New Features
Provision to create/edit group in bulk
Provision to delete User/Device/Group in bulk
Provision to enable/disable User in bulk
2.2. Enhancements
Notification email template change
2.3. Bug Fixes
Nil
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
For SSO with encryption enabled SAML IDP, support is not available.
Maximum of 77 devices can be accessed via ThickClient.
Advised to create TCP/UDP connections within the subnet with a delay of 5 minutes. This is to allow onboarding of the device to complete on the backend.
Associate thick client users only when the group contains minimum 1 TCP/UDP device associated. Do not associate to empty group.
Edit of hostname is not allowed for TCP/UDP connection endpoint.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Single Logout (SLO) will not logout the session also at external identity provider.
User need to perform logout/login, after changing the password via ThickClient.
TCP/UDP device access via ThickClient is not supported after HA switchover/iNode Replacement
As a logged in user, when viewing the active sessions will always be empty.
US/Pacific-New timezone selection in scheduled access config may not work.
Release Notes v23.08
2. Changes in this Release
2.1. New Features
Schedule Based Access
#### 2.2. Enhancements
Nil
2.3. Bug Fixes
Nil
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
For SSO with encryption enabled SAML IDP, support is not available.
Maximum of 77 devices can be accessed via ThickClient.
Advised to create TCP/UDP connections within the subnet with a delay of 5 minutes. This is to allow onboarding of the device to complete on the backend.
Associate thick client users only when the group contains minimum 1 TCP/UDP device associated. Do not associate to empty group.
Edit of hostname is not allowed for TCP/UDP connection endpoint.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Single Logout (SLO) will not logout the session also at external identity provider.
User need to perform logout/login, after changing the password via ThickClient.
TCP/UDP device access via ThickClient is not supported after HA switchover/iNode Replacement
As a logged in user, when viewing the active sessions will always be empty.
US/Pacific-New timezone selection in scheduled access config may not work.
Release Notes v23.06
2. Changes in this Release
2.1. New Features
Support for TCP/UDP device access via ThickClient.
With Repnet association taken under the hoods, end users can add devices with the native IP of device. The need to translate device IP to Repnet IP is no more needed.
Support for rolling upgrades. This will ensure future OTA upgrades happen without any portal downtime or maintenance window.
2.2. Enhancements
Users can filter devices by Site.
While adding a device, the site (iNode association) is a added as a mandatory field. This association enables to take repnet conversion agnostic to users.
2.3. Bug Fixes
Some of the notable bug fixes:
Added capability to support HTTP(s) 2.0 device access for Metasys application.
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
For SSO with encryption enabled SAML IDP, support is not available.
Maximum of 77 devices can be accessed via ThickClient.
Advised to create TCP/UDP connections within the subnet with a delay of 5 minutes. This is to allow onboarding of the device to complete on the backend.
Associate thick client users only when the group contains minimum 1 TCP/UDP device associated. Do not associate to empty group.
Edit of hostname is not allowed for TCP/UDP connection endpoint.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Single Logout (SLO) will not logout the session also at external identity provider.
User need to perform logout/login, after changing the password via ThickClient.
TCP/UDP device access via ThickClient is not supported after HA switchover/iNode Replacement
As a logged in user, when viewing the active sessions will always be empty.
Release Notes v23.02
2. Changes in this Release
2.1. New Features
Users can choose language keyboard layouts, while connecting RDP device.
Users can list their current active sessions.
Admin users can list active sessions of all logged in users at org level.
SAML 2.0 protocol support for external auth domain.
Customer domain name is changed to view.com,Default branding is changed from ioTium to View.
2.2. Enhancements
Users can filter devices by IP address.
Users can transfer file upto 7.5GB in RDP connection.
Admin users can change email address of users.
2.3. Bug Fixes
Some of the notable bug fixes:
File upload screen language will always be in english.
After applying branding, change takes effect without browser reload.
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports OpenID Connect (OIDC) 2.0 and SAML 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
For SSO with encryption enabled SAML IDP, support is not available.
3.2. Known Problems
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Single Logout (SLO) will not logout the session also at external identity provider.
Release Notes v22.10
2. Changes in this Release
2.1. New Features
Verify email will now get triggered on user creation unlike earlier when it was triggered on user login. Admin users have the ability to resend email verification.
Ability to export as CSV Device, User, Group, User associated to Group, Endpoints associated to Group, Audit log and Access log is available to the portal admin users.
Users can integrate password authenticator (external browser plugins like 1password) to login to OTA portal.
Ability to add content-type rules per connection to potentially fix http(s) device connection failures.
Admin user can change the org’s password policies and MFA.
Support for TELNET device type
2.2. Enhancements
Custom Branding of OTA portal - Customers can now customize their organization’s OTA portal by uploading images.
Admin user can now filter users on email verification and MFA statuses.
Configurable page size (25, 50, 100), search on all columns, sort on all columns is now available on all listing pages. Also, goto page number is available.
Audit log now supports multi-select in type and target columns.
Multiple User Interface look-and-feel improvements.
Optimised backend applications for better performance.
2.3. Bug Fixes
Some of the notable bug fixes:
Disabling a user will immediately auto logout any existing user session.
Password change via forgot password is not logged in the audit logs.
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports only OpenID Connect (OIDC) 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices, it approximately takes 8 minutes.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
3.2. Known Problems
File exchange is supported for files with size upto 250 MB. When you try to transfer a file size greater than 250 MB, the transfer may fail. When this happens, you need to logout and login again; otherwise all subsequent file transfers may continue to fail.
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurence, user logout action gets redirected to userprofile page and not log out.
If an existing user is deleted and recreated, then email verification is not triggered.
Release Notes v22.07
2. Changes in this Release
2.1. New Features
Trouble shooting wizard to trouble shoot, and potentially fix http(s) device connection failures.
Ability to specify a sub-domain in the Device FQDN for http(s) connections. This facilitate human readable Fully Qualified Domain Names for accessing devices.
Ability for users to modify the IP Address and Port in the Device configuration settings.
Support for VNC device type.
Custom Branding of OTA portal - Customers can now customize their organization’s OTA portal to match their company’s branding standards.
Infrastructure to put up a Maintenance Site Notice in OTA portal, while performing iNode upgrades.
2.2. Enhancements
Multiple User Interface look-and-feel improvements.
Optimised backend applications for better perfromance.
2.3. Bug Fixes
Some of the notable bug fixes:
HTTPS connection with TLSv1.3 protocol version.
RDP support for legacy windows like xp and 7.
Phone number not editable.
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports only OpenID Connect (OIDC) 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices it approximately takes 8 minutes.
There is no mechanism available for an Admin user to know if a user email is verified or not.
SSH to ubuntu 18.04 and higher version fails, need to allow ssh-rsa in the sshd config.
Associating 1000 groups to an user will result in user login failure.
3.2. Known Problems
File exchange is supported for files with size upto 250 MB. When you try to transfer a file whose size is greater than 250 MB, the transfer may fail. When this happens, you need to logout and login again; otherwise all subsequent file transfers may continue to fail.
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
In a rare occurance, user logout action gets redirected to userprofile page and not log out.
Password change via forgot password is not logged in the audit logs.
Release Notes v22.02
2. Changes in this Release
2.1. New Features
Save RDP/SSH device login credentials for the connection. This will allow users to login seamlessly to their devices without having to enter the credentials again.
Allow users to set custom RDP resolution for the RDP device access.
Access user related pages are mobile/ tablet responsive. This will allow access users to access end devices from their mobile/tablets including ability to use the keyboard.
Audit trail view is enabled for all the configuration changes done on the OTA portal.
Ability to associate device and user from group details page.
2.2. Enhancements
Login using either username or user email to the portal.
Users can edit the device name.
Configurable MFA for SSO users.
To enable easy device addition, autofill of City / State / Country name options made available.
2.3. Bug Fixes
Some of the notable bug fixes:
Order of devices listing in the user profile is addressed from random to alphabetical order. Search using connection name is enabled in the user profile page.
Addressed issues related to http device access like Milestone, Powermeter applications.
Unable to create user with long email / last name is now addressed.
3. Issues
3.1. Limitations
A new user may need to wait a few minutes after user creation to change the password.
SSO supports only OpenID Connect (OIDC) 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices it approximately takes 8 minutes.
There is no mechanism available for an Admin user to know if a user email is verified or not
3.2. Known Problems
File exchange is supported for files with size upto 250 MB. When you try to transfer a file whose size is greater than 250 MB, the transfer may fail. When this happens, you need to logout and login again; otherwise all subsequent file transfers may continue to fail.
Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://manage..smartsentry.io/userprofilepage. Changing the url to https://manage..smartsentry.io will login to the portal successfully.
Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
In the password reset screen, if the old password is set as the new password and a login is attempted immediately sometimes the password reset screen is presented again.
Removing phone number associated to an user using the edit user is not removed.
Release Notes v21.07
2. Changes in this Release
2.1. New Features
Email Verification and Password Reset – Starting with this release, users can reset their own passwords in case they have forgotten it.
2.2. Enhancements
In the search filter the search icon is made bigger, so it is easier to locate.
Serviceability: During upgrades, a static maintenance page will replace the regular login page, to indicate that the environment is being updated.
User guide and Release notes documentation is now available in the portal.
General User Interface look-and-feel improvements.
Performance: Improved Dashboard page loading.
Various general serviceability and performance improvements.
2.3. Bug Fixes
Some of the notable bug fixes:
HTTP and HTTPS device access details are now updated in the audit logs.
Verified users locked out of accounts because of too many failed password attempts can now reset their passwords using the “Forgot your password?” flow.
Setting new passwords is inline with the secure password policy.
3. Issues
3.1. Limitations
After Muti-factor Authentication (MFA) setup and login, it may take a few minutes before you can edit your user profile information.
A new user may need to wait a few minutes after user creation to change the password.
SSO supports only OpenID Connect (OIDC) 2.0.
When a user performs password change, the notification response takes about 10 sec.
When a user is associated with multiple devices, then onboarding as well as deleting of the user takes a long time. For a user with 50 associated devices it approximately takes 8 minutes.
There is no mechanism available for an Admin user to know if a user email is verified or not.
Password reset via forgot password option can be exercised only using user id (no support to use email id to trigger password resets right now).
3.2. Known Problems
1 .File exchange is supported for files with size upto 250 MB. When you try to transfer a file whose size is greater than 250 MB, the transfer may fail. When this happens, you need to logout and login again; otherwise all subsequent file transfers may continue to fail.
2. Portal login with external IDP can fail with error "too many redirects". This happens when the user is not logged into the external IDP or the portal url is https://<customer>.remoteaccess.view.com/userprofilepage. Changing the url to https://<customer>.remoteaccess.view.com will login to the portal successfully.
3. Sometimes a user delete can take longer (upto 10 min) to reflect across systems. This issue can be hit when deleting a user and creating a user with the same email id immediately.
Release Notes v21.03
2. Changes in this Release
2.1. New Features
Single Sign-on (SSO) with external Identity Provider (IDP) - Login is now integrated with external IDP to support single sign-on functionality.
HTTP and HTTPS self-onboarding - You can self-onboard remote HTTP and HTTPS devices similar to RDP and SSH devices.
2.2. Enhancements
Device and user onboarding now have status indicators. Onboarded status indicates the resource is now ready to use.
2.3. Bug Fixes
Some of the notable bug fixes:
Group details may be removed from the user and device inventory list pages.
Page loading may be slow in all listing pages
3. Issues
3.1. Limitations
After Muti-factor Authentication (MFA) setup and login, it may take a few minutes before you can edit your user profile information.
A new user may need to wait a few minutes after user creation to change the password.
SSO supports only OpenID Connect (OIDC) 2.0.
3.2. Known Problems
1 User will be locked out for a period (default is 30 minutes) after a certain number of failed login attempts. The error message about wrong credentials is incorrect; in reality you are locked out and need to wait for your account to automatically get unlocked.
2. File exchange is supported for files with size upto 250 MB. When you try to transfer a file whose size is greater than 250 MB, the transfer may fail. When this happens, you need to logout and login again; otherwise all subsequent file transfers may continue to fail.
3. HTTP and HTTPS device access details are not updated in the audit logs.
4. Password change is accepted even if the password does not have at least one number 0-9.