April 2021 Release Notes


As part of our ongoing efforts to provide customers with the most stable and seamless service release experience, we revamped our release process. Service releases now utilize a staggered deployment schedule over a period of time. With this revamped process, customers should expect new features and bug fixes to be gradually applied to our global customer base. 

If you don’t see a new feature immediately following our monthly release, you will soon, unless the feature must be enabled by your account manager.    

The April release offers some exciting new functionalities such as Delegated Admin! This frequently requested feature allows you to limit administrative access by granting customizable granular privileges within Users, Apps, and Roles. April's security enhancements continue with Device Trust Check which allows admins to prompt for a user certificate, Single Logout for Trusted IdP, and the ability to require reCAPTCHA to block bot attacks.  

We also created a direct link for account unlock, added two attributes to the Namely Directory Connector, improved user licensing, and fixed customer reported bugs. 

Without further ado, here's what happened in April at OneLogin!

  1. Security & Authentication
  2. Manageability & Reliability
  3. API

Security & Authentication

Device Trust Check

We added a Device Trust Check field in User Policies that provides admins with the ability to prompt for a user certificate, but doesn't require a certificate to log in. If the user is prompted and doesn't submit a certificate, the user can log in. This field provides the end user with the opportunity to submit a PKI or 3rd party certificate. 

Note: Contact your account manager to enable this feature.

If you select Device Trust Check and MFA Bypass for Trusted Devices, then a user on a single policy is prompted for MFA on personal devices, but isn't challenged on corporate devices.

To configure MFA Bypass, go to Security > Policies > New User Policy > MFA tab and select Device Trust Check

trusted device

To learn more about User Policies, see User Policies. 

Single Logout for Trusted IdP

OneLogin's Trusted IdP configuration now supports SAML Single Logout. If a user logs in with an IdP that supports SLO, then we provide a hub that logs the user out of the configured IdP.

For the initial session termination, OneLogin gives precedence to the configured Trusted IdP used to log in, then proceeds to the subsequent apps that support single logout.

Note: SLO is only available for SAML based IDP configurations.

To configure Trusted IdP SLO, go to Authentication > Trusted IdPs > Settings and enter the SAML based Logout URL.

identity service provider

We offer support and validations for: 

Note: The SLO chain terminates if any app or IdP fails to respond. SLO isn't a 100% reliable strategy to terminate user sessions across all services. Since there are potential failures, we recommend this as part of an overall solution to manage user sessions.

To learn more about Trusted IdP, see Trusted IdP (Relying Party Trust).

Custom URL for Login 

If you create Custom URL links, we now prepend the custom links to the default links on the login page. For example, if you create two custom links named Unique Site and Alternative Sign in, they would appear as follows:

Unique Site | Alternative Sign in | Forgot Password | Help 

To learn more about Custom URLs, see Branding.

Direct Link to Self-service Unlock

For org's on Multi-step Login, onelogin.com/login2#action=unlock_account is the direct link for self-service account unlock.

Note: The user must be on a user policy that allows account unlock.

Authentication Factors

We changed the name of the RSA SecurID authentication factor to RADIUS. This factor supports RSA SecurID and OneSpan.

company apps

Security Enhancements

You can require users to complete reCAPTCHA before they update their passwords or unlock their account. This feature increases your org's security by blocking bot attacks.

To require reCAPTCHA for password updates or account unlock, go to Security > Policies > New User Policy or select an existing policy > Account Recovery and check Require reCAPTCHA.

company apps

To learn more about User Policies, see User Policies. 

General Improvements

Bug Fixes

Directories

Manageability & Reliability

Delegated Admin

We released the Delegated Admin feature to an early test group. Delegated Admin allows super users and above to grant granular administrative privileges to users. With Delegated Admin, IT administrators can assign simpler IT tasks to others in the organization while maintaining their security-first values.

To enable the feature, contact your OneLogin account manager.

To learn more about this feature, see Delegated Admin.

Bug Fixes

We clarified the language displayed when a user clicks Change Password on the new profile. 

API

Bug Fixes