What's new 2021
New Remote Access versions are released and announced on a varying cadence. Occasionally, new versions that include only performance, stability and bug fixes, and do not require customer actions, are released without an announcement.
2021.12.12
Large scale customers often need to delegate the responsibilities of invitations and requests management to different managers. While they can do so today by allowing vendors to invite other vendors (an external vendor manager), they did not have the ability to delegate these responsibilities to their own company’s Business unit managers (internal employees). With this new version, Remote Access administrators now have an option to delegate permissions rights for inviting vendors to other company users (“vendor managers”). The administrator can determine the level of control that a vendor manager has over the invitations they send, including to which Vault groups they can invite, to what timeframe they can invite, which Applications, and more. This allows distributing the load of vendors’ management to multiple managers and segregation of duties, while maintaining least privilege principals. For more information, see Delegate Vendor Manager role.
This release adds security enhancements in the Remote Access service and Remote Access connector, reducing un-needed privileges and other enhancements.
Component |
Version |
---|---|
Remote Access SaaS |
2021.12.12 |
CyberArk Mobile app on android |
6.5 |
CyberArk Mobile app on iOS |
6.5 |
Remote Access CLI |
1.0.13601 |
Remote Access connector |
1.0.16201 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and app store settings. |
Remote Access connector |
To support new features in this release, you must upgrade your Remote Access CLI and connector according to Upgrade connectors. REMINDER: As we previously mentioned in 2021.09.12 release notes, from November 30th the Remote Access connector minimum version is 1.0.12409. Connector version 1.0.12002 (and below) will cease functioning within the next 30 days, affecting vendors’ and users’ ability to reach CyberArk via the Remote Access service. This is happening in accordance with the CyberArk end-of-life policy, and to provide optimal service to our Remote Access customers. As always, we advise to update to the latest version which contains the latest functionality, performance, and security enhancements, as well as the latest bug-fixes. |
2021.11.21
Component |
Version |
---|---|
Remote Access SaaS |
2021.11.21 |
CyberArk Mobile app on android |
6.4 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and app store settings. |
Component |
Area |
Description |
---|---|---|
CyberArk Mobile app |
Secure Native Access |
Fixed an issue with Windows domain accounts where only the first address was connecting from a list of addresses. |
2021.10.10
Remote Access provides an ability for company employees to authenticate via an external Identity provider, allowing users a unified SSO experience between Remote Access and other applications. Self-hosted PAM - Self-Hosted customers who used this capability were required to also integrate Remote Access with Active Directory. With this release, we removed this requirement. This reduces configuration steps, and removes the need for users to authenticate against Active Directory and save their user credentials in the CyberArk Mobile app. Remote Access will authenticate the user against their IdP, and will require them to authenticate again with the IdP on a periodic basis, set by the Remote Access administrator.
Remote AccessService Status page now provides notifications on scheduled maintenance work. Customers can also subscribe to updates in this page, getting email notifications on expected maintenance work.
The Data Protection FAQ was updated.
Component |
Version |
---|---|
Remote Access SaaS |
2021.10.10 |
CyberArk Mobile app on android |
6.0 |
CyberArk Mobile app on iOS |
6.0 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and app store settings. |
The Active Directory integration setting is no longer available if you have configured an integration with an external IdP. Note that if you integrated Remote Access with an external IdP and set the AD credential validation interval setting, you should now set the User credentials reauthentication to validate user authentication against their IdP on a periodic basis. For more information, see Set user credentials re-authentication.
Component |
Area |
Description |
---|---|---|
CyberArk Mobile app |
Secure Native Access |
Fixed and issue causing disconnects in some Secure Native Access sessions. |
2021.09.12
Remote Access no longer supports installation of the connector on RHEL versions 7.8 and below. RHEL version 7.9 continues to be supported.
Starting November 30, 2021, the Remote Access Connector minimum supported version will be 1.0.12409.
Connectors version 1.0.12002 (and below) will cease functioning after this date, affecting vendors’ and users’ ability to reach CyberArk via the Remote Access service.
This is happening in accordance with the CyberArk end-of-life policy, and to provide optimal service to our Remote Access customers.
As always, we advise to update to the latest version which contains the latest functionality, performance, and security enhancements, as well as the latest bug-fixes. For more information, see Upgrade connectors.
Component |
Version |
---|---|
Remote Access SaaS |
2021.09.12 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
2021.08.15
Documentation updates
-
Added a new section for Vendor access best practices.
-
Re-structured and updated the Deploy the HTML5 gateway for PSM sections.
Component |
Version |
---|---|
Remote Access SaaS |
2021.08.15 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Component |
Area |
Description |
---|---|---|
Remote Access APIs |
Service accounts |
Fixed an issue with authentication by Remote Access service accounts for API automation authentication. Affected customers should create new service accounts in the Remote Access portal to benefit from this change. For more information, see Service accounts. |
July 4, 2021
The Get-Connectors API enables administrators to pull and review the list of connectors in their Remote Access tenant and the status of each one.
Component |
Version |
---|---|
Remote Access SaaS |
04.07.2021 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
The Settings > External Identity Provider page was updated with new configuration parameters and user interface enhancements. For more information, see Configure external Identity Provider integration.
Component |
Area |
Description |
---|---|---|
Remote Access portal |
Authentication |
In some cases, when a user would try to log in to the PVWA via the Remote Access portal (either SAML or OpenID auth), they would get directed to a different auth method screen which was previously used in the same browser (for example CyberArk authentication). |
Remote Access connector |
Login |
Fixed an issue where some customers with older versions of the connector experienced issues with company users authenticating to the PVWA. |
June 27, 2021
CyberArk PAM - Self-Hosted is where customers manage their “keys to the kingdom” credentials, some of which are needed for critical operations and business continuity. While our solutions offer high availability and resiliency, there is a need to access business-critical accounts to ensure business continuity if PAM - Self-Hosted is unavailable due to planned or unplanned outage, or if the user has no connectivity ("offline"). Utilizing the new CyberArk Mobile App, CyberArk now provides access to credentials even when PAM - Self-Hosted is unavailable. Within the app, users can conveniently see the list of accounts to which they have permissions and select those who will be available for offline access. The CyberArk Mobile app will securely store the selected credentials within the app, protected with multi-factor and biometric authentication. When PAM - Self-Hosted is unavailable, users can fetch the stored credentials from the app and use them to connect directly to remote machines.
See Access PAM accounts offline credentials for more details for the end user.
See Activate offline access for PAM accounts for more details for the administrator.
Component |
Version |
---|---|
Remote Access SaaS |
27.06.2021 |
CyberArk Mobile app on android |
5.0 |
CyberArk Mobile app on iOS |
5.0 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and app store settings. |
The internal property of the user account that identifies the user's Vault name in PAM - Self-Hosted is now configured per Application (previously configured on the Active Directory settings page). For more information, see Add applications.
Component |
Area |
Description |
---|---|---|
Remote Access connector |
Deployment prerequisites |
Fixed the command for the RedHat snap extra repositories command. For more information, see Prerequisites for Red Hat v7.9. |
June 6, 2021
-
The Data Protection FAQ was updated.
-
The Configure just-in-time vendor access section was renamed with new headings to better reflect the topics.
-
Fixed a typo in the Configure OpenID authentication configuration.
-
Uploaded new videos for Secure Native Access configuration and user flow. To view them, see Configure secure native access and Secure native access through RDP.
Component |
Version |
---|---|
Remote Access SaaS |
06.06.2021 |
Remote Access CLI |
1.0.12602 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Remote Access CLI |
Customers can upgrade the snap CLI to receive the latest bug fixes. For more information, see Upgrade the Alero connector to Remote Access CLI. |
Additional changes were made to accommodate the rebranding changes. The Idaptive settings page is now called Identity SSO settings. For more information, see Configure CyberArk Identity SSO integration.
Component |
Area |
Description |
---|---|---|
Remote Access CLI |
VendorLDAP |
Fixed a rebranding error affecting the script provided by the Remote Access CLI for configuring VendorLDAP communication with the vault. |
Remote Access CLI |
VendorLDAP |
Fixed the default name provided to new VendorLDAP directories to accommodate PVWA limitations on directory name lengths. |
May 23, 2021
We have officially renamed the Alero service to the new name Remote Access. This release includes the changes in the Remote Access connector and VendorLDAP. For more information, see Upgrade the Alero connector to Remote Access CLI and Just-in-Time Provisioning High Availability.
The Remote Access connector hardening for Red Hat hosts has been updated based on CIS Hardening benchmark v3.1.0. For more information see Hardening benchmarks.
The Connectivity tests on Linux page was updated with additional connectivity tests to verify that the Remote Access connector traffic can be secured from the connector host.
Component |
Version |
---|---|
Remote Access SaaS |
23.05.2021 |
CyberArk Mobile app on android |
4.0.2 |
Remote Access CLI |
1.0.12501 |
Remote Access connector |
1.0.12409 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and Appstore settings. |
Remote Access connector |
Customers must upgrade the snap CLI from alero-connector to remote-access-cli and then upgrade the docker container. For more information, see Upgrade the Alero connector to Remote Access CLI. |
-
The alero-connector CLI is now known as the remote-access-cli. The alero-connector snap is being deprecated from this point further (but is still available).
-
The AleroLDAP component on the connector, used for just-in-time provisioning of vendors, is now known as the VendorLDAP
-
The alerouser included in the installation script for the alero-connector docker container is now the 'remoteaccessuser'.
-
The name of the running container seen on the host has been changed to remote-access.connector.
-
The name of the underlying connector image pulled from the CyberArk repository of alero.connector has not been changed.
-
In addition, these changes also affect the command to install and upgrade the connector, connector log locations, hardening commands. The documentation has been updated accordingly.
Prior to this release, a user who had passed a biometric challenge in the 10 seconds before launching the CyberArk Mobile app, would not have been challenged again.
In response to recent changes made by some device manufacturers, the CyberArk Mobile app now requires biometric authentication on each app launch regardless of prior biometric challenge results.
Component |
Area |
Description |
---|---|---|
Remote Access connector |
VendorLDAP |
Fixed an issue where in some cases after initializing the VendorLDAP service on the Remote Access connector, or when upgrading the connector with the service previously running, the LDAP service would stop. |
Remote Access connector |
Hardening |
Fixed issues with reaching the connector host after running Remote Access connector hardening for some Azure and VMware based hosts. |
CyberArk Mobile |
Android devices |
Fixed an issue affecting the user experience of the biometric challenge in some situations. |
May 9, 2021
We have officially renamed the former Alero portal to the new name Remote Access. Further, the mobile application is now named CyberArk Mobile. Functionality remains the same and only the names on the portal and the mobile app are changed.
-
The Connector CLI utility page is updated to better clarify the reset function.
-
The Manage users and Manage vendors pages were updated to better clarify how to delete users.
-
The commands for starting the connector manually were updated in the Troubleshooting page.
Component |
Version |
---|---|
Remote Access SaaS |
09.05.2021 |
CyberArk Mobile app on iOS |
4.0 |
CyberArk Mobile app on android |
4.0 |
Component |
Details |
---|---|
Remote Access SaaS |
Customers do not have to take any steps to apply the Remote Access SaaS upgrade as it is applied by CyberArk during the maintenance window. |
CyberArk Mobile app |
Upgrade the CyberArk Mobile app according to your device and Appstore settings. |
The CyberArk Alero mobile app is now known as the CyberArk Mobile app.
May 2, 2021
Administrators can now enable their remote vendors and users to open secure RDP sessions to protected privileged assets from mobile RDP clients via Alero. For more information, see Configure Secure Native Access
Alero now has additional notifications regarding possible error scenarios with Just-in-Time vendor provisioning into Privilege Cloud. For more information, see Privilege Cloud integration
Component |
Version |
---|---|
Alero SaaS |
02.05.2021 |
Alero mobile app on iOS |
3.5.3 |
Alero mobile app on android |
3.5.3 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero mobile app |
Upgrade the Alero mobile app according to your device and Appstore settings. |
Component |
Area |
Description |
---|---|---|
Alero SaaS |
User administration |
Additional verifications were added to prevent an administrator from deleting their own user via bulk actions. |
Alero mobile app |
Onboarding |
Fixed an issue where some users were prevented from re-creating their user profile via the Alero mobile app when one already existed. |
Alero SaaS |
Vendor administration |
The Privilege Cloud time limit for Just-in-time provisioned vendors is now aligned with Alero, preventing the scenario where Alero attempted to provision for longer than the vault limit. |
Alero SaaS |
Privilege Cloud notifications |
Some actions, such as, delegate admin, require approvals via notifications in the Alero mobile app. If the user set their mobile device not to allow notifications, these actions cannot be completed. We now added a more descriptive error message for administrators who might encounter this scenario. |
Alero mobile app |
Vendor administration |
Fixed an issue where in some cases assigning a vendor to a specific vendor group would result in an application crash. |
April 11, 2021
Alero is now committed to a 99.9% SLA. This improvement helps prove to our customers our commitment to making Alero even more reliable and available.
Component |
Version |
---|---|
Alero SaaS |
11.04.2021 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
In Active Directory integration settings, the Vault user log on name is now a drop down list instead of free text. You can now select from the list one of these parameters; sAMAccountName, userPrincipleName, mail or cn.
March 21, 2021
Alero tenant admins can now select and manage multiple users or vendors in a single step via easy to use checkboxes.
Component |
Version |
---|---|
Alero SaaS |
21.03.2021 |
Alero mobile app on iOS |
3.5.1 |
Alero mobile app on android |
3.5.1 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero mobile app |
Upgrade the Alero mobile app according to your device and Appstore settings. |
Component |
Area |
Description |
---|---|---|
Alero SaaS |
Vendor administration |
Alero tenant admins are now prevented from sending an invitation to a non-app vendor with a different address than the one already defined for that vendor. |
Alero Mobile App |
Secure Native Access |
UI and connection related fixes. |
March 14th, 2021
This release provides additional keyboard layout support for end users who connect through HTML5 browser-based privileged sessions. In addition to en-us-qwerty (default), fr-fr-azerty, and de-de-qwertz, end users can now use other keyboard layouts on their targets when working with privileged sessions. For details, see Keyboard layouts.
We have upgraded internal software used by the PSM HTML5 Gateway (Guacamole and Free-RDP) for enhanced security.
The Tomcat version was upgraded to enhance security in the HTML5 Docker Image.
The Secure Native Access documentation is updated with new information about setting up a secure native RDP connection to a specific account in PAM.
For details, see Set up a secure native RDP connection to a specific account
Component |
Version |
---|---|
Alero SaaS |
14.03.2021 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
The Alero Direct RDP Access feature name is now changed to Secure Native Access to better reflect the functionality provided.
Additional activities for Alero Secure Native Access have been added to help improve user activity visibility.
Component |
Area |
Description |
---|---|---|
Alero SaaS |
Vendor Provisioning |
In some cases, when a published application was hidden and then republished, the assigned Just-in-time vendors were not re-provisioned to the application. This issue has been resolved and should not reoccur. Some of the affected customers may need to republish the application to complete the fix implemented. |
Alero SaaS |
Application Service |
In some cases, when the user connected to a PVWA session, a timeout occurred when the user was idle for several minutes, regardless of configured timeout settings in the PVWA. |
Alero SaaS |
Application Service |
In some cases where multiple connectors were deployed in the same site, some users experienced session errors in the PVWA. |
Alero SaaS |
Idaptive Integration |
Customers that have Idaptive integration and enabled Alero Secure Native Access may have seen additional applications provisioned from Alero into their Idaptive portal. |
March 7th, 2021
Remote vendors and IT administrators are accustomed to using remote connection applications of their choosing, and usually prefer to maintain their regular work processes when working with PAM. CyberArk PAM adheres to those needs by providing the ability to connect with native Remote Desktop clients and connection managers. This release adds the ability for remote users and vendors to initiate privileged sessions directly from their desktop with connection managers and RDP client applications, while benefiting from Remote Access’s remote, VPN-less, password-less access. For details about configuration, see Configure Secure Native Access.
The connection from the client machine is initially established using the RDP client, but it provides connectivity not only to Windows machines, but to a wide range of systems and applications, and without the need to open any RDP inbound to your datacenter. The connection can be made from Windows, Mac or Unix / Linux end user workstation.
After a user initiates a connection from their RDP client, the mobile app allows users to authenticate and choose targets, triggering a secure session. Alternatively, they can pre-configure their connection managers with the relevant target account details. For details, see Connect with Secure Native Access .
This capability is currently available for PAM on-premises customers. |
Customers can now deploy and configure the Alero connector secure tunnel to communicate outbound SSH traffic to the Alero SaaS via port 22.
For details, see Set up connectors
The SaaS service status page for Alero is now available here: https://status.alero.io/. This page provides real-time visibility into the performance of Alero SaaS service uptime and tracks incident history.
For details, see Remote Access services.
We have deployed an additional traffic manager in Hong Kong, which facilitates improved connection times and session performance to customers located in this region. This joins the existing Alero Traffic Manager network deployed in Virginia, Frankfurt, Mumbai, Singapore, Montreal and Sydney.
We have added a new command to the Alero CLI which allows users to choose the colors for the Error and Warning messages presented via the Alero CLI.
For details, see Settings commands.
The Data Protection FAQ for Alero is updated with new information related to the Direct RDP Access feature.
Component |
Version |
---|---|
Alero SaaS |
7.3.2021 |
Alero mobile app on iOS |
3.5 |
Alero CLI |
1.0.11501 |
Alero connector |
1.0.12002 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero connector |
To use Alero Configure Secure Native Access, or to configure a connector to perform SSH communication over port 22, upgrade your Alero CLI and connector according to Upgrade connectors. |
Alero mobile app |
To use Connect with Secure Native Access , install the latest version of the Alero mobile application. |
Component |
Area |
Description |
---|---|---|
Alero CLI |
AleroLDAP commands |
The 'show-users' and 'request-users' commands are renamed to show-vendors and request-vendors to better reflect the functionality provided. |
January 31st, 2021
We have added a new data center in Sydney, Australia, to meet market demand in that region.
The new data center, in addition to our existing data centers based in US (Virginia), EU (Frankfurt), and Canada (Montreal), further extends our global network.
When configuring your Alero tenant, mobile application, and connector, you can use the Australia datacenter to ensure all data is kept within Australia borders. Additionally, this new data center also acts as an additional Traffic Manager, improving performance of any Alero user sessions in the region.
Component |
Version |
---|---|
Alero SaaS |
31.1.2021 |
Alero mobile app on iOS |
3.4 |
Alero mobile app on android |
3.4 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero mobile app |
To use the new Australian data center, install version 3.4 of the Alero mobile application. |
Component |
Area |
Description |
---|---|---|
Alero portal |
Integration with Idaptive and External IdP |
We have updated the UI in the Idaptive and External IDP integration settings pages. There is no change in functionality. |
Component |
Area |
Description |
---|---|---|
Alero portal |
Vendor management |
The Canadian flag was not displaying correctly in some vendor invitations sent from the Canadian data center. |
January 24th, 2021
CyberArk has received Alero’s official SOC 2 Type II certification. This means that an independent auditing firm has reviewed and examined our control objectives, activities, and tested those controls to ensure that they are operating effectively. In achieving this certification, customers can be assured that data is kept secure through the implementation of standardized controls as defined in the AICPA Trust Service Principles framework.
The Alero license has been updated per CyberArk 2021. As part of this update, we also provide better visibility into usage of Alero licenses broken down by Vendor or User according to license allotment. For details, see Licensing.
In the latest version of the Alero connector, you can deploy and configure AleroLDAP for Just-in-time vendor provisioning on multiple Alero connectors, allowing for high availability of this component to the PVWA. Multiple connectors in the same site now automatically use the same AleroLDAP CA certificate as well as bind user information to ensure no manual steps are required by the customer, and to maintain Just-in-time vendor provisioning in case of a disruption to any one connector.
The latest connector and SaaS release also includes AleroLDAP maintenance tasks, reporting of connector activities, and notifications on AleroLDAP certificate expiration. For details, see Configure just-in-time vendor access.
Idaptive Administrators can now allow their users to reach PVWA applications configured via Alero without onboarding via the Alero mobile application first. This is in addition to the existing integration, further improving the experience for joint customers looking for a seamless SSO and MFA experience across business applications and privileged accounts. For details, see the Idaptive docs.
Alero now displays a notification in the notification center when a connector has been 'disconnected' for more than 5 minutes. This alert indicates to Alero administrators that remedial action may need to be taken to restore service. For details, see Connector.
Component |
Version |
---|---|
Alero SaaS |
24.1.2021 |
Alero CLI |
1.0.11201 |
Alero connector |
1.0.10601 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero Connector |
Customers must upgrade their Alero connector according to Upgrade Connectors and then run the init-LDAP flow from the CLI in order to configure AleroLDAP HA. |
Component |
Description |
---|---|
Alero connector |
Customers looking to implement HA for their Just-In-Time Vendor LDAP must upgrade their Alero connector according to Upgrade connectors, and then run the init-LDAP flow from the CLI. For instructions, see Add additional connectors to existing VendorLDAP. |
Component |
Area |
Description |
---|---|---|
Connector |
Connector/SaaS certificate |
In some instances where multiple connectors shared the same 'Let’s Encrypt' certificate and this certificate expired, the seamless renewal process did not succeed. |
Connector |
Just-In-Time Vendors/Groups |
In some instances, new/updated users and groups were not delivered to the connector without manual intervention. |
January 10th, 2021
Alero administrators can now view tenant audit activities in the Alero mobile app, which enables better monitoring without requiring the use of a browser.
The following 'Show Help' pages in the Alero portal have been reviewed and updated for clarification.
Settings: Manage general settings and Manage identities settings
Component |
Version |
---|---|
Alero SaaS |
10.1.2021 |
Alero mobile app on iOS |
3.3 |
Alero mobile app on android |
3.3 |
Component |
Details |
---|---|
Alero SaaS |
Customers do not have to take any steps to apply the Alero SaaS upgrade as it is applied by CyberArk during the maintenance window. |
Alero mobile app |
Upgrade the Alero mobile app according to your device and Appstore settings. |
Component |
Description |
---|---|
Alero mobile app |
Customers who want to view tenant activities on the mobile app must upgrade the app to at least 3.3. |
Component |
Area |
Description |
---|---|---|
Alero portal |
Integration with Idaptive |
When integration is initiated between Alero and Idaptive tenants, a popup message appears before the tenant link is completed, with an important notice about data transfer in the event that your Alero tenant data center and Idaptive tenant data center are in different geographic regions. |
Component |
Area |
Description |
---|---|---|
Portal |
Self-Service Invitation |
The self-service invitation URL did not load in all scenarios. |
Mobile |
Tenant Administration |
In some scenarios, the activation status for a vendor that was displayed in the mobile app was not accurate. |
Mobile |
View invitation |
Cleaned up the 'View existing invitations' screen on iOS. |
Mobile |
App Login |
In some scenarios, users saw the list of their tenants twice. |